Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...


Mon, 2011-07-18 02:11 PM

Bill Conner

Dallas-based Entrust, Inc., a leading supplier of identity-based solutions for government agencies and global 1000 commercial enterprises, has become a sponsor of the 2011 Government Security News...
Mon, 2011-07-18 07:59 AM
Accenture has been selected by the Ministry of Internal Affairs in The Netherlands to design and deliver Automated Border Control Systems (ABCS) at Schiphol Airport in Amsterdam. The new systems will...
Mon, 2011-07-18 06:28 AM

Smugglers' craft

A number of small boats being used to smuggle humans and drugs into California have been intercepted in the last month, according to the U.S. Immigration and Customs Enforcement agency, showing that...
Fri, 2011-07-15 07:58 AM

Hartsfield-Jackson International

The Transportation Security Administration wants to speed up its pre-flight identity screening process through a pilot program at several U.S. airports beginning this fall.TSA Administrator John...
Thu, 2011-07-14 12:01 PM

Pasadena Refining Systems

Codebench, Inc., a provider of TWIC / HSPD-12 / FIPS-201 authentication and physical access control middleware, announced on July 13 that Pasadena Refining Systems, Inc., a subsidiary of Petrobras...
Thu, 2011-07-14 08:07 AM

Rep. Peter King (R-NY)

As the scandal over alleged telephone records hacking and illegal wire taps by newspaper reporters in the U.K. grows, U.S. lawmakers and policy groups have demanded official investigations of whether...
Wed, 2011-07-13 07:45 AM

Rep. Lamar Smith (R-TX)

A group of House Republicans, lead by the Chairman of the House Judiciary Committee, introduced a bill on July 12 that would strip the Obama administration’s ability to use prosecutorial discretion...
Tue, 2011-07-12 05:19 PM

Mica: list of
problems growing

Standards for guarding against someone sneaking explosives on a plane in the United States have been slow to come by, according to a report released July 12 by the U.S. Government Accountability...
Tue, 2011-07-12 08:02 AM

Sonoran Desert

As the deadly summer heat bakes the desert along U.S. /Mexico border, the two countries implemented a voluntary return program for Mexican immigrants found travelling unlawfully in the region.
Mon, 2011-07-11 02:25 PM
The U.S. State Department has awarded a security guard contract to protect a global hotspot, the U.S. Embassy in Athens, Greece, as well as the U.S. Consulate in Thessaloniki, Greece, to a joint...
Mon, 2011-07-11 12:31 PM


The man accused of using other people’s expired or stolen boarding passes to fly cross-country was indicted on July 8 on dual federal felony charges tied to the incidents.
Mon, 2011-07-11 08:31 AM

EFF's Lynch

The FBI’s next-generation criminal identification biometric database could include not only information about criminals, but every day people, said the Electronic Frontier Foundation (EFF) on July 8.

Company News

Oxford, U.K. – A new global online resource for building cybersecurity capacity has been launched. The Cybersecurity Capacity Portal will help coordinate international efforts in cybersecurity through sharing of information and best practice, to support decisions and investments that can significantly enhance safety and security in cyberspace.

Deputy Chief Ken Kroll of the Romeoville, IL, police needed a replacement for the department’s old livescan fingerprint and DC Book mugshot solutions. “What was key was finding a company that could convert nine years of booking data. When iTouch said that they could do it in one system that was a big selling point for us.”

Like many departments across the country, the Romeoville police had previously used two separate systems for processing criminals, one for collecting fingerprints, and a second for capturing mugshots.

Pasadena, CA-based Guidance Software, a provider of digital investigations, has announced the appointment of Jay Ackerman as its first chief revenue officer. Ackerman will provide leadership across all customer-facing organizations to deliver the highest-quality customer experience, from initial contact through the sales process, implementation, and ongoing management. Those teams include sales, professional services, and technical support.

Credit card fraud and identify theft are serious problems for consumers and industries. Though corporations and individuals work to improve safeguards, it has become increasingly difficult to protect financial data and personal information from criminal activity. Fortunately, new insights into quantum physics may soon offer a solution.

Hillsboro, OR-based Eid Passport, Inc., a provider of assurance identity management solutions, has been awarded a one-year contract extension by the FBI to continue serving as an FBI-approved Channeler. Eid Passport is one of only a small number of companies approved by the FBI and has received contract renewals since it was first selected as an FBI-approved Channeler in November 2006.

Portland, OR-based Tripwire, Inc., a provider of advanced threat, security and compliance management solutions, and Check Point Software Technologies Ltd., an Internet security firm, have announced a technology partnership and integration. The collaboration is part of Tripwire’s Technology Alliance Program, designed to allow a wide variety of vendors team with Tripwire to deliver innovative security solutions.

Lowell, MA-based Oncam Grandeye, the security division of Oncam Technologies, has announced that it has selected Jumbi Edulbehram to succeed Graham Wallis as regional president, Americas. He will be based in the company’s Lowell, MA office, responsible for sales, marketing, and development activities in the Americas.

Minneapolis, MN-based Kroll Ontrack has released a year-end review discussing data security, business continuity, and mobile devices being among the biggest trends impacting the data recovery industry in 2014. The most talked about trend however was how data recovery companies could help corporations protect their data from theft.

Commentary and Opinions

With more than 10 million purported attempts to break into Pentagon systems and servers each day, it was not surprising when the White House confirmed that individuals thought to be working for the Russian government attempted to hack its servers.

From September until January, Monday evenings find living rooms across America filled with armchair quarterbacks. During pre-game shows and post-game analyses, experts and amateurs alike discuss the retreat and progress of their favorite teams. Even fantasy leagues abound to test players’ strategic and tactical prowess on the gridiron.

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.

With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.


Technology Sectors

Market Sectors

Essential Guides nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.