Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Wed, 2015-01-21 09:31 PM
During bilateral meetings in Washington last week, President Obama and Prime Minister David Cameron agreed to further strengthen and deepen cybersecurity cooperation between the United States and the...
Tue, 2015-01-20 08:29 PM

John Walsh

The MacDonnell Group of Halifax, Nova Scotia has announced that John Walsh, CEO of Port Canaveral, will deliver the opening presentation and welcome remarks at its 2015 Port Security Operations...
Tue, 2015-01-13 07:47 PM
Director James B. Comey has named Roger C. Stanton special agent in charge of the FBI’s Birmingham Division. Stanton most recently served as section chief of the Counter-Improvised Explosive Devices...
Mon, 2015-01-12 07:59 PM
Director James B. Comey has named Scott Bean special agent in charge of the FBI’s Administrative Division of the Washington Field Office (WFO). Bean most recently served as section chief for the...
Tue, 2015-01-06 02:30 AM

Timothy DeFoggi

The former acting director of cyber security at the U.S. Department of Health and Human Services was sentenced to 25 years in federal prison Monday for engaging in a child exploitation enterprise and...
Tue, 2014-12-30 05:15 PM
U.S. Customs and Border Protection has announced a reciprocal arrangement with Germany for each nation’s trusted traveler program -- the U.S. Global Entry program and the German EasyPASS. Global...
Wed, 2014-12-24 12:21 AM

Lawrence Dietz

Cyber security is an all-engulfing term that has different meanings depending on the context. For example: cyber security in the utility industry is not like cyber security in the legal profession,...
Tue, 2014-12-23 07:10 PM

Sarah Saldana

In comments made following the confirmation of former U.S. Attorney Sarah R. Saldana of the Northern District of Texas as Assistant Secretary of U.S. Immigration and Customs Enforcement (ICE), DHS...
Tue, 2014-12-23 05:17 PM
Director James B. Comey has named David Bowdich the assistant director in charge of the Los Angeles Field Office. Since September 2012, Bowdich has served as special agent in charge (SAC) of the Los...
Mon, 2014-12-22 06:51 PM
Attorney General Eric Holder announced last week that the number of people in the adult correctional systems in the United States has fallen to its lowest level since 2003. The finding is highlighted...
Thu, 2014-12-18 07:57 PM

Diego G. Rodriguez

Director James B. Comey has named Diego G. Rodriguez the assistant director in charge (ADIC) of the FBI’s New York Field Office. In this role, he will oversee all operations and personnel in the five...
Tue, 2014-12-09 06:33 PM
The FBI Monday released Hate Crime Statistics, 2013, the Uniform Crime Reporting (UCR) Program’s first publication to present data collected under the Matthew Shepard and James Byrd, Jr. Hate Crime...

Company News

Portland, OR, May 7 – Tripwire, Inc., a global provider of advanced threat, security and compliance management solutions, has announced an expanded partnership agreement with 
Boulder, CO, May 6 – Just within the past couple of years, the biometrics market has become firmly established as advances in technology and improved mobile devices enable use cases that were previously thought impossible, or in some cases never imagined. According to a new report from Tractica, biometrics use cases split into two distinct threads: consumer-facing use cases are typically high-volume at a low price, while enterprise-facing use cases (including government and defense) are typically much smaller volumes but utilize more expensi
Portland, OR, May 6 – Tripwire, a provider of advanced threat, security, and compliance solutions, and Belden, a provider of signal transmission solutions for mission-critical applications, has announced a market-leading NERC CIP compliance and cyber security strategy that will allow power transmission and distribution organizations to reliably and confidently monitor operational technology assets for a range of conditions that can impact compliance status and cyber security posture.
Boulder, CO, May 6 – Exelis (NYSE: XLS) and DigitalGlobe, Inc. (NYSE: DGI) have agreed to pr
Emeryville, CA, May 6 – Tanium, a security and systems management company, has announced the appointment of Ryan Kazanciyan as Chief Security Architect. Ryan brings over a decade of experience to Tanium, most recently serving as technical director and incident response functional lead at Mandiant (acquired by FireEye in 2013).
Arlington, VA, May 5 – The Telecommunications Industry Association (TIA), an association representing the manufacturers and suppliers of high-tech communications networks, announced today that top technology executives from Dell, xo Communications, Fujitsu and ADTRAN will take part in the annual TIA 
San Francisco, May 5 – Bay Dynamics, a provider of cybersecurity solutions and actionable risk intelligence to the world’s largest organizations, has announced that Comcast Cable is leveraging the company’s 
Pompano Beach, FL, May 5 ­– At ISC West 2015, IC Real Tech demonstrated its position as an innovator of video surveillance technologies, nabbing 3 key security industry awards for its revolutionary IC Realtime IC720 360x360 Virtual PTZ (pan, tilt, zoom) video camera and changing the way in which many security system companies will present surveillance systems to their clients.

Commentary and Opinions

The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
Governor Jerry Brown (D-CA) has signed urgently needed legislation aimed at increasing safety and services -- and decreasing violence and assaults -- in California’s five state hospitals, according to the Safety Now Coalition, a coalition of workers in California's Department of Mental Health Hospitals.
Unfortunately, none of us has any trouble imagining a security breach. Breaches are so frequent these days, so fast and so clever, that seemingly out of nowhere we could find critical infrastructure threatened, networks at risk, markets in danger.
Car theft is a fruitful field of opportunity for today’s criminals as they seek new and innovative ways for gaining quick profits. Recent reports indicate that prior to committing theft, organized car-theft gangs are doing their homework. They are targeting specific car rental facilities, conducting exhaustive site-studies of the facilities to identify vulnerabilities that will make their job easier.
 

Digital Version of March/April 2015
Print Edition

 

Click Here

Digital Version of January/February 2015 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.