Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Wed, 2013-04-03 09:13 AM
Defense researchers will use $50 million under a new White House initiative to better understand the human brain, mapping the organ’s capabilities and understanding its functions.
Wed, 2013-04-03 08:44 AM

TWIC reader

Even though the Coast Guard recently issued a set of proposed rules for electronic TWIC card readers over two years late, one congressman said the rules still need more public input to insure they’re...
Tue, 2013-04-02 08:10 AM

Sen. Schumer (D-NY)

As lawmakers in Washington sound more confident that comprehensive immigration reform could become a reality, Sen. Charles Schumer (D-NY) moved to expand the visa waiver program for Polish workers...
Mon, 2013-04-01 07:59 AM

Guns seized in
Pennsylvania

Investigators from Immigration and Customs Enforcement helped take down what it said was the largest illegal prescription pill networks in Pennsylvania history in late March.
Thu, 2013-03-28 11:42 AM

Mona Island

Two weeks after U.S. Customs and Border Protection rescued 77 stranded undocumented Haitian migrants from a dangerous, storm-tossed strait in the Caribbean, more than 100 additional undocumented...
Thu, 2013-03-28 07:43 AM
Wounded U.S. armed forces members are now eligible for the Transportation Security Administration’s pre-approved Pre Check expedited screening at airport security checkpoints across the country. The...
Wed, 2013-03-27 06:18 PM

Coast Guard personnel
examine TWIC reader

Following up its announcement on March 22 that owners of certain vessels and maritime facilities might be required to install electronic TWIC card readers under proposed new regulations, the U.S....
Wed, 2013-03-27 08:58 AM

Swap meet

A pair of Mexican nationals convicted of operating a large-scale counterfeit document mill and selling the phony cards at area swap meets will spend two to five years in prison for their efforts....
Sun, 2013-03-24 11:51 AM

TWIC card reader

The U.S. Coast Guard has proposed new rules that would require certain “high risk” vessels and maritime facilities to install electronic TWIC readers, which would require visitors to such ships and...
Fri, 2013-03-22 08:34 AM

Form I-94

In a move that U.S. Customs and Border Protection said would smooth entry into the U.S. and potentially save millions of dollars in processing costs, it formally submitted new rules that would...
Thu, 2013-03-21 08:32 AM

Phoenix Sky Harbor

TSA is defending itself against charges that its screeners at the Phoenix, AZ, airport “humiliated” a wounded U.S. veteran by asking that he remove his prosthetic legs.
Thu, 2013-03-21 08:03 AM

Omar Shafik
Hammami

A former Islamist rap artist from Alabama and a training instructor/foreign fighter leader who hails from San Diego, but works for Al Shabaab in Somalia are worth $5 million each to the U.S....

Company News

Phoenix, AZ-based BeyondTrust, the global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks, has announced that the newest versions of PowerBroker for Windows and PowerBroker Password Safe have the ability to integrate to create an enhanced least privilege experience for IT staff and end users.
Belcamp, MD-based SafeNet Assured Technologies, a U.S. based provider of government high assurance data security solutions, has announced its formal company launch. SafeNet Assured Technologies’ mission is to provide high assurance data security products and technologies to defense, intelligence, and civilian agencies across the Federal Government.
In the wake of the latest data breach news and the fact that the personal records of more than 85 million people were exposed in 2014 alone, LifeLock has released a new identity theft risk calculator to help consumers assess their risk and adjust their behavior accordingly. The calculator asks consumers questions ranging from their habits related to changing their online passwords to whether they take steps to safeguard their postal mail.
On the globally recognized Safer Internet Day, the National Center for Missing & Exploited Children (NCMEC) and CA Technologies are joining forces to host a free webinar on Tuesday, February 10 at 4 p.m. EST, focused on new strategies in teaching online safety.
Secure cloud provider FireHost has announced it will be teaming with Dell Services to deliver secure, fully managed private cloud services to meet customers’ needs for secure, compliant private cloud environments.
Austin, TX-based HID Global, a worldwide provider of secure identity solutions, has announced it has completed the consolidation of its world headquarters and North American Operations Center. The company has also achieved recognition by three organizations for successfully implementing some of the industry’s most stringent sustainability guidelines in the design, construction and operation of its 250,000 square feet of manufacturing, office and warehouse space.
Virtustream, the enterprise-class cloud software and services provider, has announced that the H.J. Heinz Company, one of the world’s leading marketers and producers of healthy, convenient and affordable foods, has implemented Virtustream’s xStream platform to deploy a platform-as-a-service (PaaS) infrastructure and run production SAP HANA in the cloud.
New York, NY-based EXIGER, the global regulatory and financial crime, risk and compliance firm, has announced the appointment of John W. Melican as managing director.A seasoned anti-money laundering and compliance professional, Melican joins EXIGER from Bank of Tokyo-Mitsubishi UFJ. Most recently, he was Head of Bank Secrecy Act/Anti-Money Laundering, Sanctions and Anti-Corruption Compliance for the Americas. In this role, he was responsible for overseeing the firm’s anti-corruption and international sanction initiatives.

Commentary and Opinions

By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
 

Digital Version of March/April 2015
Print Edition

 

Click Here

Digital Version of January/February 2015 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.