Access Control | Identification

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Thu, 2012-12-13 09:33 AM
Three Mexican men face federal immigration charges after they were arrested in Phoenix, AZ, for allegedly running a drop house, as well as brutalizing and terrorizing the illegal aliens they were...
Wed, 2012-12-12 09:03 AM

FBI headquarters

Federal agents arrested two men on Dec. 11 as they prepared to travel to north Africa to wage violent jihad. Randy Wilson, also known as Rasheed Wilson, 25 was arrested the morning of Dec. 11 in...
Tue, 2012-12-11 03:26 PM
European banking giant HSBC will forfeit $1.256 billion under a prosecution agreement it signed with the U.S. Justice Department for failing to put protections in place to stem money laundering by...
Tue, 2012-12-11 09:16 AM
Thirty-one convicted criminal aliens, immigration fugitives and immigration violators were arrested by ICE enforcement officers during a two-day-long operation in the Chicago area.
Mon, 2012-12-10 04:07 PM

Michael Jackson,
CEO of VidSys

It has become conventional wisdom that Physical Security Information Management (PSIM) systems have become more and more capable in recent years, by developing the ability to ingest and make sense of...
Mon, 2012-12-10 12:17 PM

Blue Water Bridge

The Canadian government expanded its trusted traders’ expedited border crossing pilot program to another site on Dec. 7. Patricia Davidson, Member of Parliament for Sarnia-Lambton, on behalf of...
Fri, 2012-12-07 12:46 PM
Twenty-one businesses in Puerto Rico, including one of the island’s leading telecommunications carriers and some of its biggest retailers, took part in the largest signing ceremony ever for ICE's...
Fri, 2012-12-07 09:23 AM

DHS detention facility

The Department of Homeland Security formally moved on Dec. 6 to fulfill a presidential order to develop standards aimed at protecting people housed in government detention facilities from sexual...
Fri, 2012-12-07 08:52 AM

TSA checkpoint

The program that has seen 16 airports around the nation move to private screeners at security checkpoints in lieu of TSA agents needs better guidance and a formal process to measure performance...
Wed, 2012-12-05 08:46 AM
A U.S. deputy marshal faces federal charges for allegedly disclosing the identity of an undercover Homeland Security Investigations officer to his father, who was a suspected drug dealer at the time.
Tue, 2012-12-04 02:23 PM

Amistad dam

A modernized U.S. border inspection station on the Rio Grande will open on December 11 to replace a 1960’s era facility near Del Rio, Texas. The new inspection facility at the Amistad Dam replaces an...
Tue, 2012-12-04 11:37 AM

FBI Aldawsari
surveillance image

Two private company managers’ gut instincts spurred the 2011 FBI investigation and arrest of a former Texas Tech university student who planned to cause mayhem and carnage with powerful home-made...

Company News

The Metropolitan Sewer District of Greater Cincinnati uses a KeyWatcher key control and management system by Morse Watchmans to safeguard the keys to the District's vans, bulldozers, cranes, service trucks and cars, and make the keys available to authorized employees whenever they are needed. Six 48-key KeyWatcher cabinets store about 180 keys used by the district's 150 employees to serve wastewater collection needs, says a news release issued by Morse Watchmans on Nov. 12.  

ECKey, a supplier of smartphone readers and access control systems, has moved its access control technology to the U.S. 

Founded in New Zealand in 2005, ECKey moved all operations to Lancaster, PA, in September 2012. “We are growing fast in the Americas and Western Europe and wanted to be closer to our customer base,” explained Paul Bodell, president and CEO of ECKey. “We are building a world-class support organization and the U.S. was the obvious choice for location”.

Observint Technologies announced on Nov. 7 that it will continue to expand its portfolio of integrated systems products and technologies with the addition of Infinias, a supplier of network-based access control hardware and software solutions. 

Viscount Systems Inc., a supplier of IT-focused solutions for physical security under its Freedom product line, announced on Nov. 5 that the company has filed for a series of patents for securing facilities and tracking users through the use of mobile, handheld devices, such as phones or PDAs. 

Stanley Security Solutions announced on Oct. 24 that it is the Official Security Partner of the Colts and will be providing security for the Indiana Farm Bureau Football Center, as well as the grounds around the Colts practice center. This is the fourth season for the two organizations’ partnership. 

Ultra Electronics Card Systems has announced that its Prima 4 reverse-transfer printer from its Magicard series of ID card printers has successfully completed the U.S. General Services Administration (GSA) evaluation program for certification of the Federal Information Processing Standard (FIPS) 201 card printer specification. 

Badgetec’s new plastic clothing attachment for visitor passes and badges replaces traditional pins, adhesives and bulldog clips.

Associated Aircraft Group has been granted access into Ronald Reagan Washington National Airport (DCA) by the Transportation Security Administration under the DCA Access Security Program (DASSP).

The company, which says it is the East Coast's largest executive Sikorsky S-76 helicopter services provider, will offer service flying to and from Washington D.C. from anywhere along the East Coast.

AAG is a subsidiary of Sikorsky Aircraft Corp., a subsidiary of United Technologies Corp.

Commentary and Opinions

Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.

Car theft is a fruitful field of opportunity for today’s criminals as they seek new and innovative ways for gaining quick profits. Recent reports indicate that prior to committing theft, organized car-theft gangs are doing their homework. They are targeting specific car rental facilities, conducting exhaustive site-studies of the facilities to identify vulnerabilities that will make their job easier.

When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.

You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.

With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.

 

Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John D. Clark, Sr. and the Whitestone Group, which he founded in 2000, returned to the GSN Awards Dinner in 2012 to pick up their second trophy in two years, this time for the “Best Facility Security/Force Protection Service.” The Whitestone Group’s A-list of clients includes NASA, DoD, USDA, VA, DHS, Social Security Administration, U.S. Coast Guard, Army, Air Force and the Department of Interior, which has just approved a new 5-year facility security contract for the Hoover Dam.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...