Access Control | Identification

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Thu, 2014-01-02 11:46 AM
TSA has determined that the system of records it has established for its “TSA Precheck” trusted traveler program will be subject to various exemptions spelled out in the Privacy Act, and that...
Mon, 2013-12-23 02:41 PM
CBP officials estimate that approximately 120,000 operators of private aircraft will arrive in the United States each year and present several documents to CBP inspectors for their review. The number...
Sat, 2013-12-21 01:22 PM

Sarasota Bradenton
International Airport

TSA has issued a presolicitation notice announcing that it intends to hire a small business to provide passenger screening services at Sarasota Bradenton International Airport in Florida. The notice...
Tue, 2013-12-17 04:47 PM
In order to give itself enough time to resolve a bid protest, TSA has decided to award a contract extension on a sole source basis to InfoZen, of Bethesda, MD, to continue providing the operations...
Mon, 2013-12-16 03:56 PM
TSA has issued a solicitation for what it calls “Credential Authentication Technology,” or CAT, which can ensure that only legitimate airport personnel, airline crews, non-traveling passengers using...
Thu, 2013-12-12 05:08 PM
TSA is gathering market research information from small businesses that can provide databases and reporting mechanisms that can monitor the movements of railcars carrying toxic inhalation hazards and...
Sun, 2013-12-08 06:06 PM

London Gateway

Marine terminal operator DP World is constructing London Gateway, the UK’s first major deep-sea container port this century, as part of a development that will include the largest logistics park in...
Sat, 2013-12-07 06:20 PM
The U.S. Secret Service has indicated that it plans to negotiate sole source contracts with one commercial company and one state government in order to gain access to their proprietary databases. In...
Fri, 2013-12-06 04:53 PM
As facial recognition technology moves into the commercial marketplace, the National Telecommunications and Information Administration (NTIA) has laid out a schedule of public meetings in which...
Thu, 2013-12-05 03:45 PM

Chuck Brooks

Government Security News is pleased to announce the winners of its GSN 2013 Homeland Security Awards program, which were selected from hundreds of nominations submitted by leading vendors of IT and...
Wed, 2013-12-04 05:08 PM
TSA announced on December 4 that it will charge a fee of $85 per individual to participate for five years in the Pre[check] trusted traveler program, which will enable cleared passengers to move...
Sun, 2013-12-01 01:25 PM
TSA’s blogger, Bob Burns, offered a few travel tips on November 26 for passengers moving around the country during the holiday season, particularly those who are counting on expedited screening...

Company News

Minneapolis, MN-based Code42, a provider of endpoint data protection and management for business and enterprise, has announced an application programming interface (API) integration with Splunk Enterprise -- a provider of operational intelligence platform -- to provide deeper, real-time visualization and search analysis of endpoint data.

Calabasas, CA-based Ixia has announced the IxFlow App for Splunk Enterprise, which integrates Ixia’s Application and Threat Intelligence (ATI) Processor with Splunk Enterprise. The app provides IT managers and teams the ability to visualize and analyze user, device and application behaviors. Additionally, the application data that is available can be used to optimize the network’s security and performance.

Port Townsend, WA-based Intellicheck Mobilisa, a provider of identity solutions and wireless security systems, has been awarded a $247K contract to upgrade the current Defense ID system at Fort Irwin National Training Center in California.

Tysons Corner, VA-based Preferred Systems Solutions (PSS), a provider of Information Technology (IT) infrastructure, software development, enterprise resource planning, and financial consulting services to government, has announced the appointment of Fred Funk to their executive management team as senior vice president, National Security Group.

Leading software firm NICE Systems (NICE) has launched a video surveillance program, NICE Suspect Search, which claims to be able to reduce the time it takes to locate and track persons of interests through surveillance cameras. NICE Security Group’s Executive Vice President Chris Wooten states that the program aims to solve “the burden of processing all of the data [that] has limited the value of the video footage, [which is the] major pain point for [its] customers."

Frisco, TX-based Sheplers, a multi-channel western-wear retailer, has determined that their payment systems suffered a security breach in which hackers gained access to their systems and some of their customers’ payment card information was exposed. With the assistance of a leading computer security firm, Sheplers is continuing the investigation into the incident, and are cooperating with law enforcement in their efforts to find the criminals responsible.

Boston, MA-based Wealth Management Systems (WMSI) has announced that Doug Perkins has joined the firm as information security officer. An industry veteran with extensive experience in software development, project management, quality assurance, and operations and information security, Perkins is assuming responsibility for the design and future development of WMSI’s enterprise-wide information security strategies and policies. Mr. Perkins reports to BJ Ralston, WMSI’s chief compliance officer, and is based in WMSI’s Boston Office.

Princeton, NJ-based IXP Corporation, a public safety and emergency response provider that has partnered with Johns Hopkins University (JHU) for the past 10 years, has announced an innovation that raises campus security to the next level.

Commentary and Opinions

Every day citizens put their faith and trust in the decisions that government programs make about identities (security clearances, border crossings, benefits and credentials). However, these decisions may not be as trustworthy as you think, because they are often not based upon current and validated information. This lack of information awareness has been accentuated by the onset of Big Data (the dramatic increase in data volumes, sources, types and velocity), which increases the risk of an undetected change in a person’s identity profile.

An important deadline is fast approaching for federal, state, local and tribal law enforcement agencies. Starting September 30, 2014, the FBI will require advanced authentication for anyone accessing its criminal justice information (CJIS) system to keep highly sensitive law enforcement data from falling into the wrong hands. 

It is possible to forecast the types of warfare that one’s terrorist adversary is likely to conduct, whether as an organized group or as “lone wolf” operatives. Such a forecasting capability is especially crucial when complete information about one’s terrorist adversary is lacking. This is important because several recent high visibility terrorist attacks could have been pre-empted and thwarted if the intelligence and law enforcement agencies that were tracking these groups and operatives had possessed such a forecasting capability.

By Todd Musselman and Al Kinney

The value of a robust identity management system has long been recognized; however, the actual development and implementation of an effective identity management system have proven to be more difficult tasks. This challenge has grown more complex as various solutions have emerged and matured, and has become more urgent as threats continue to grow in sophistication.

The time has come to re-think embassy security. The Department of State recently called for a “more serious and sustained commitment from Congress” to address security deficiencies at high-risk posts around the world, in the wake of last year's attack on the U.S. consulate in Benghazi, Libya, which resulted in the death of four people, including U.S. Ambassador J. Christopher Stevens.   

 

Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John D. Clark, Sr. and the Whitestone Group, which he founded in 2000, returned to the GSN Awards Dinner in 2012 to pick up their second trophy in two years, this time for the “Best Facility Security/Force Protection Service.” The Whitestone Group’s A-list of clients includes NASA, DoD, USDA, VA, DHS, Social Security Administration, U.S. Coast Guard, Army, Air Force and the Department of Interior, which has just approved a new 5-year facility security contract for the Hoover Dam.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...