Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2011-07-07 08:33 AM
Morgan Keegan, the Tennessee-based investment bank that tracks the homeland security industry closely, has issued its mid-year review which foresees “steady domestic security spending” in the United...
Thu, 2011-07-07 07:41 AM
The Transportation Security Administration has briefed airlines and overseas security agencies and shifted some security measures in light of recent intelligence suggesting terrorists could conceal...
Wed, 2011-07-06 10:27 AM

Terrorist Screening
Center and DHS
will maintain "mirrored"
databases in real time

The FBI, which maintains the official U.S. Government consolidated terrorist watchlist, will begin sharing the complete contents of that database with DHS, on a “near real time, synchronized” basis,...
Wed, 2011-07-06 08:55 AM

NDLON FOIA

The Federal Bureau of Investigation wants to expand the electronic fingerprint information collected under the Secure Communities program to include iris scans and palm print information within the...
Wed, 2011-07-06 07:31 AM

Davila's altered prints

A Dominican man allegedly tried to get by Customs and Border Protection anti-terrorism officers in Boston by altering his fingerprints.
Tue, 2011-07-05 08:47 AM

AIT backscatter unit

Transportation Security Administration agents physically screened the Nigerian American man who stowed away on a flight from New York to Los Angeles in June, but conceded they didn’t verify his...
Fri, 2011-07-01 09:46 AM

JFK International

The leader of the House Homeland Security Committee demanded immediate answers about how a Nigerian national managed to get past airport security to fly from New York to Los Angeles using a bogus...
Thu, 2011-06-30 11:47 AM
The U.S. Secret Service has purchased an advanced tool, known as Informatica’s Identity Resolution (IIR), which is a robust, highly scalable software that enables government organizations to search...
Thu, 2011-06-30 08:23 AM
A subcommittee of the National Science and Technology Council will hold a public forum in Milwaukee, WI, on August 12 to discuss issues related to Automated Fingerprint Identification System (AFIS)...
Thu, 2011-06-30 08:13 AM

Texas Capitol Building

A Texas bill that would have criminalized airport pat-downs in the state by Transportation Security Administration personnel, died after the state’s special legislative session adjourned on June 29.
Wed, 2011-06-29 12:50 PM
Consumer groups from North America and Europe recently agreed that information gathered by increasingly-intelligent utility networks should be guided by policies that protect consumers’ data privacy.
Tue, 2011-06-28 09:20 AM

TX Rep. Straus (R)

A paler version of an incendiary Texas bill aimed at criminalizing federal airport security passenger pat-downs passed the state’s House of Representatives on June 27.

Company News

Berkeley, CA-based Tanium, a provider of security and systems management, has announced the appointment of two key hires that will strengthen the executive bench and support the company through its next stages of hyper-growth. In newly created positions, Chad Fulgham, the former CIO of the FBI, joins Tanium as the company’s Chief Strategy Officer and Jennifer Johnson, recently a partner at the leading venture capital firm Andreessen Horowitz, has joined Tanium as Chief Marketing Officer.

McAfee, now part of Intel Security, and Europol's European Cybercrime Centre (EC3) have signed a Memorandum of Understanding (MoU) that brings together Intel Security expertise with EC3’s law enforcement skills in the war against cybercrime.

Dallas-based Zimbra, a provider of unified collaboration software, has announced the results of the Ponemon Institute’s “The Open Source Collaboration Study: Viewpoints on Security and Privacy in the U.S. and EMEA” report. The study surveyed 1,398 IT and IT security practitioners to learn about their companies’ involvement in the use of open source messaging and collaboration solutions, and their views on security and privacy.

San Mateo, CA-based Agari, a provider of data-driven security solutions that detect and prevent advanced email cyberthreats, has announced it has entered into an agreement with enterprise security company Palo Alto Networks. Per the agreement, Agari will provide email-based threat intelligence data to the Palo Alto Networks Threat Intelligence Cloud. This data will help enhance threat prevention of malware and advanced persistent threats (APTs) globally.

Sierra-Olympic, maker of infrared (IR) and thermal imaging components, cameras, and systems solutions for advanced imaging applications, has announced the first in a series of affordable, uncooled microbolometer thermal cameras for industrial, machine vision, and general purpose thermal imaging applications. The new Viento 320 features 320 x 240 pixel resolution with a 17-micron pixel pitch.

Columbia, MD-based Tenable Network Security, Inc., a provider of continuous network monitoring, has announced the release of Nessus v6, reducing customer exposure to security risks through advanced malware detection, compliance with system hardening policies, and enhanced security for mobile, virtualized and cloud environments.

McLean, VA-based Haystax Technology, a provider of advanced analytics and cybersecurity solutions, has announced that retired U.S. Marine General Peter Pace has been named chairman of the company’s board of directors. In this role, Pace will guide the Haystax business strategy and offer insights to best support America’s security needs. Pace, 16th Chairman of the Joint Chiefs of Staff, and a 2008 recipient of the Presidential Medal of Freedom has been a member of the Haystax board since 2013.

Santa Clara, CA-based Cyphort, a pioneer of Advanced Threat Defense solutions, has announced the appointment of co-founder Dr. Fengmin Gong as chief strategy officer. Dr. Gong joined Cyphort in 2012 to lead Cyphort’s Security Research, and will now add the additional responsibility for helping drive the overall technology strategy for the company.

Dr. Gong is a security veteran with over 25 years’ experience working in the industry. Prior to joining Cyphort, Dr. Gong co-founded Palo Alto Networks and IntruVert Networks.

Commentary and Opinions

From September until January, Monday evenings find living rooms across America filled with armchair quarterbacks. During pre-game shows and post-game analyses, experts and amateurs alike discuss the retreat and progress of their favorite teams. Even fantasy leagues abound to test players’ strategic and tactical prowess on the gridiron.

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.

With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.

The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.

 

Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...