Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Mon, 2014-12-22 06:51 PM
Attorney General Eric Holder announced last week that the number of people in the adult correctional systems in the United States has fallen to its lowest level since 2003. The finding is highlighted...
Thu, 2014-12-18 07:57 PM

Diego G. Rodriguez

Director James B. Comey has named Diego G. Rodriguez the assistant director in charge (ADIC) of the FBI’s New York Field Office. In this role, he will oversee all operations and personnel in the five...
Tue, 2014-12-09 06:33 PM
The FBI Monday released Hate Crime Statistics, 2013, the Uniform Crime Reporting (UCR) Program’s first publication to present data collected under the Matthew Shepard and James Byrd, Jr. Hate Crime...
Tue, 2014-12-09 05:38 PM

Tom Gazsi

The Port of Los Angeles has appointed Tom Gazsi, the former City of Costa Mesa Police Chief, as a new deputy chief of police. Gazsi will oversee the Emergency Management and Field Operations Group...
Tue, 2014-12-09 05:20 PM
Technology helps the military fight the war on terror. It also helps malevolent male military personnel spy on female personnel. In a shocking announcement this week, the Navy reported that hidden...
Mon, 2014-12-08 06:24 PM
U.S. Attorney General Eric Holder announced Monday that the Justice Department (DOJ) will take new steps to bar profiling by federal law enforcement agencies, building upon a 2003 policy that had...
Wed, 2014-12-03 05:27 PM
The House of Representatives overwhelmingly passed three bills Monday aimed at strengthening nuclear security and detection, protecting critical infrastructure against the threat of electromagnetic...
Tue, 2014-12-02 06:06 PM
The United States Monday signed three customs agreements with Singapore, ensuring greater cooperation and mutual assistance on customs enforcement and the facilitation of lawful trade and travel,...
Tue, 2014-12-02 05:13 PM
A Danish citizen last week pleaded guilty in the Eastern District of Virginia and was ordered to pay a fine of $500,000 for advertising and selling StealthGenie, a spyware application that could...
Mon, 2014-12-01 05:11 PM
The Department of Homeland Security (DHS) has announced the launch of the 2015 Secretary's Honors Program Cyber Student Volunteer Initiative for current two- and four-year college students. Beginning...
Sun, 2014-11-30 08:58 PM
Dear GSN Readers: Government Security News has posted its October/November Digital Edition online. We will also be mailing out the new publication to our readers Monday morning. This edition has a...
Sun, 2014-11-30 07:21 PM
The British government introduced a far-ranging bill last week aimed at protecting U.K. citizens from international terrorism. The Counter-Terrorism and Security Bill aims to bolster the U.K.’s...

Company News

Frisco, TX, April 6 – HITRUST has announced that it is undertaking a study called HITRUST Cyber Discovery to analyze the methods, severity and pervasiveness of cyber threats targeting a variety of healthcare organizations. The study will enable a better understanding of the actual magnitude, complexity, relations of cyber-attacks, commonalities of target organizations and data, and degree of cyber threats persisting within organizations.
Fremont, CA, April 6 – GammaTech Computer Corp, a manufacturer of rugged and innovative notebook and tablet computers, now offers its rugged DURABOOK R11 tablet in four separate bundled configurations. The R11 tablet with a brilliant 11.6" widescreen display is the lightest (2.73 pounds), and thinnest rugged tablet in its class.
Overland Park, KS and Denver, April 6 – Accuvant and FishNet Security, which recently joined together, have announced their next Knowledge Share Series webcast, “On the Hot Seat: Preparing for Executive and Board Discussions,” will take place on Wednesday, April 8, 2015 at 9:00 a.m. PDT/12:00 p.m. EDT.
Seattle, WA, April 2 – F5 Networks (NASDAQ: FFIV) has announced its new 
Arlington, VA, April 2 – Lunarline and Damballa have announced a strategic partnership to bring Damballa’s advanced threat detection technology to Lunarline’s government clients in the Intelligence, DoD and Federal Civilian communities.
El Segundo, CA, April 2 – NC4 has announced that it is supporting the Defense Security Information Exchange (DSIE, also known as the DIB-ISAO) in providing its Cyber Threat Exchange Solutions for cyber threat information sharing. NC4 operates Cyber Threat Exchanges for over 30 trusted communities serving over 3,000 companies, government organizations, and 16,000 IT security professionals.
Cambridge, MA, April 2 – The APWG reports in its new Phishing Activity Trends Report that phishing against banks and ISPs rose markedly compared to other sectors in the third quarter of 2014. The number of brands being attacked remains high, and malware variants continue to proliferate at a record rate of increase.
Concord, MA, March 31 – Technical Communications Corporation (TCC) (NasdaqCM: TCCO) is announcing its Crypto Learning Center, a suite of live and on-demand webinars, and in-person trainings for customers and industry to empower organizations with practical knowledge to proactively enhance voice and data communications security and facilitate secure operations.

Commentary and Opinions

When newspapers, popular magazines, and cable news channels run stories on public safety security and video surveillance, their knee-jerk reaction is too often a clever reference to “Big Brother” and an implication that something dangerous and sinister is happening.
You approach the scene, taking the first steps to determining what happened and how to prevent it in the future. Following your training, you secure the area, conduct a scan of the scene, take photos to maintain a permanent record of the scene as you found it, and begin collecting and evaluating physical evidence.
With new technologies -- such as virtualization, cloud computing and mobility -- come new threats to IT systems. The sophistication of those threats -- both internal and external -- has become a major concern for the federal government. In fact, cyber security is among the top priorities for the White House and Congress as evidenced by recent legislation and initiatives aimed at protecting sensitive data and intelligence, including health and personally identifiable information.
In our increasingly digital world, our nation’s information security is just as important as its physical security. With President Obama declaring that cyber threats are “one of the most serious economic and national security challenges we face as a nation,” all areas of government are under increasing pressure to develop a proactive and comprehensive IT defense strategy.
According to former 9/11 Commission counsel and CEO of the Secure Identity and Biometrics Association (SIBA) Janice Kephart, there is no further reason for Congress to delay implementing biometric exit legislation at airports and seaports.“The science is there, and proof is in the 16 nations that have fully implemented best-in-class biometrics that speed travel and virtually eliminate fraud, most of them in the past couple of years. Passage of a biometric exit bill -- and full deployment by DHS -- is both cost-effective and feasible now.
 

Digital Version of January/February 2015 Print Edition

Click Here

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.