Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...


Fri, 2011-09-30 02:31 PM

Bosch's 9412G
control panel

The U.S. Secret Service plans to hire an 8(a)-qualified systems integrator to install intrusion detection systems, closed circuit television, access control systems and “any additional security...
Thu, 2011-09-29 09:24 AM
A pilot program to collect biometric data from temporary workers leaving the U.S. from two border points in Arizona -- which Customs and Border Protection has been running for nearly two years -- has...
Thu, 2011-09-29 07:39 AM

Operation Cross Check

Immigration and Customs Enforcement’s seven-day national "Cross Check" operation involving almost 2,000 agents from two dozen field offices across the county led to the arrest of more than 2,900...
Wed, 2011-09-28 09:24 AM

KCM in Minneapolis

Flight crew members flying from Minneapolis-St. Paul International Airport (MSP) began using the Known Crewmember (KCM) expedited identification program on Sept. 20.
Tue, 2011-09-27 11:36 AM

Matthew Bettenhausen

The “lone wolf” terrorist is one of the greatest fears of security officials, but individual, lone citizens have also helped foil, or solve, a host of terrorist conspiracies, said the former director...
Tue, 2011-09-27 11:06 AM

Jonathan Melaku

The man arrested on June 17 for behaving suspiciously near the Pentagon and accused of an earlier shooting spree of buildings in the Washington area has been charged with trying to escape from a...
Fri, 2011-09-23 08:37 AM

Del Rio weapons

U.S. Customs and Border Protection officers in Texas seized the largest cargo of high–powered assault rifles to date this year at the Del Rio Port of Entry on Sept. 21, said the agency.
Thu, 2011-09-22 12:02 PM

MorphoTrak's Gary Jones
demonstrates the
Finger-on-the-Fly reader

MorphoTrak displayed at the ASIS conference – and will officially release in the near future – an innovative fingerprint reader the company is calling Finger-on-the-Fly, which can capture and process...
Thu, 2011-09-22 09:18 AM

Lewis Brown

The recent death of a destitute former college basketball star on the streets of Los Angeles shows DHS’ quest to require individuals have federally-approved documents to travel by air can have a...
Thu, 2011-09-22 07:47 AM

US Attorney General Eric Holder

The United States and Belgium agreed on Sept. 20 to share biometric and biographical information to prevent terrorists and serious criminals from continuing their activities internationally. The...
Tue, 2011-09-20 07:37 PM

Blaine Frederick beneath
a Hoyos iris reader

Stanley Security Solutions told GSN at the ASIS conference that it expects to sell 14 Hoyos “in-motion, at-a-glance” iris readers that will be installed as access control devices at entrances to the...
Tue, 2011-09-20 06:37 PM

Michael Trapp

Prepare for the threats that are most likely to affect your business and facilities, not perceived threats, the director of a corporate security of an oil refining company warned ASIS attendees on...

Company News

SimplexGrinnell, a Tyco International company, is highlighting the capabilities of its Simplex 4100ES (eServices) fire alarm system, emphasizing how the new platform’s serviceability features can improve operational efficiency and lower life-cycle costs. The 4100ES system has been built with the needs of engineers, contractors, facility managers and building owners in mind, says a news release issued by the company on June 12.
Honeywell released on June 6 a new technology platform for its popular Total Connect service that allows home and business owners to remotely manage their security systems and view live video, via PCs, smartphones, tablets and other Web-enabled devices.
When it comes to sniffing for explosives and drugs, the first image that comes into the minds of many folks is a facsimile of Rin Tin Tin. The sniffer that will be announced the week of May 16 by a Wilmington, MA, maker of security sensing devices, though, will have more science than snout.
Mapping out zones where mobile phones are persona non grata can be essential in some secure facilities such as research labs, military bases and correctional facilities. The question, though, is how can those zones be policed? Some organizations use jamming systems, which blocks the wireless signal to the phone, but that can be an expensive solution. Varitronics, of Metuchen, NJ, has another idea. It's a compact cell phone monitoring device called the WatchHound.
Mobile identity solution provider MaxID Pty Ltd said on May 9 it had won a 1,000 unit sale in South Africa.According to MaxID, the undisclosed customer bought 1,000 of the company’s iDL500 MaxID Pty Ltd is a wholly owned company of MaxID Corp, a leading provider of mobile identity solutions.
Cross Match Technologies, Inc., a global provider of biometric identity solutions, announced on May 9 that John Hinmon has joined the company as vice president of marketing, with additional responsibilities relating to the company’s mergers and acquisitions activities.
Bexar County’s Pre-Trial Services and Sheriff’s Office selected electronic monitoring technology and solutions from G4S Justice Services, LLC (G4S), a provider of advanced monitoring services. The county seat of San Antonio, TX, Bexar County is the 19th most populous county in the nation, with a population of 1,714,773, according to the 2010 census.
Software House, part of Tyco Security Products, announced on April 27 the integration of C•CURE 9000 with HID Global’s EDGE family of IP-based access control solutions. This integration demonstrates the mutual commitment of HID Global and Software House to providing open platform offerings that give customers more options for integrated solutions, said Software House in a news release it issued on April 27.

Commentary and Opinions

Washington, March 18 – The National Retail Federation has presented Congress with practical, commonsense and achievable solutions to better protect consumers and help businesses prevent cyberattacks and data breaches.“We should not be satisfied with simply determining what to do after a data breach occurs,” NRF senior vice president for Government Relations David French said. “Instead, it is important to look at why such breaches occur and what the perpetrators get out of them so that we can find ways to reduce and prevent not only the breaches themselves but the follow-on harm.”
By Nimrod LuriaPolice and FBI are investigating defacement attacks on numerous North American websites in which attackers placed an ISIS flag banner on website home pages and played an Arabic song in the background, as reported by NBC News.The sites appear to have one thing in common: they are all built on the WordPress content management platform.
By Fraser ThomasLast week the US Congress began the process of making President Obama’s State of the Union address, where he focused on ways to secure the nation's businesses and infrastructure in cyberspace, a reality.On Wednesday two House members reintroduced a bill requiring companies to meet a specific set of data security standards when handling customers’ personal information.
By Michael D. HelmMost Americans do not know who Ali al-Marri is and it is my sincere hope that they never find out because of another horrendous attack. Nonetheless, it is extremely alarming that not only has our government released the convicted al-Qaeda operative from U.S. custody to Qatar, but that it has also gone largely unnoticed by the mainstream media.
National Association of Federal Credit Unions (NAFCU) President and CEO Dan Berger renewed the association’s push for national data security and breach notification standards for retailers amid news of a possible data breach at Chick-fil-A chain restaurants.

Digital Version of January/February 2015 Print Edition

Click Here

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.