Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2011-06-30 11:47 AM
The U.S. Secret Service has purchased an advanced tool, known as Informatica’s Identity Resolution (IIR), which is a robust, highly scalable software that enables government organizations to search...
Thu, 2011-06-30 08:23 AM
A subcommittee of the National Science and Technology Council will hold a public forum in Milwaukee, WI, on August 12 to discuss issues related to Automated Fingerprint Identification System (AFIS)...
Thu, 2011-06-30 08:13 AM

Texas Capitol Building

A Texas bill that would have criminalized airport pat-downs in the state by Transportation Security Administration personnel, died after the state’s special legislative session adjourned on June 29.
Wed, 2011-06-29 12:50 PM
Consumer groups from North America and Europe recently agreed that information gathered by increasingly-intelligent utility networks should be guided by policies that protect consumers’ data privacy.
Tue, 2011-06-28 09:20 AM

TX Rep. Straus (R)

A paler version of an incendiary Texas bill aimed at criminalizing federal airport security passenger pat-downs passed the state’s House of Representatives on June 27.
Mon, 2011-06-27 01:24 PM

Ray Batt

System integrator ARINC has announced a new, national border management system which incorporates its core identity management and biometric technology with instantaneous intelligence gathered from a...
Fri, 2011-06-24 12:55 PM

David Wilhite

In the opinion of David Wilhite, CEO and President of Quintron Systems in Santa Maria, CA, the recent hurricanes, floods, wildfires and other natural disasters in the U.S. have dramatically...
Wed, 2011-06-22 09:15 AM
Applied DNA Sciences, Inc. has successfully completed a program to DNA mark microchips for the Defense Logistics Agency (DLA) of the U.S. Department of Defense (DoD). Used systematically, DNA marking...
Wed, 2011-06-22 08:52 AM
Immigration and Customs Enforcement, better known as ICE, is seeking permission to gather tips from the public about suspicious or criminal activities, and expects to receive more than 184,000 such...
Wed, 2011-06-22 07:58 AM

HazMat truck drivers

In order to better forecast the retention, transfer and drop-out rates for commercial truck drivers seeking “hazardous materials endorsements,” known as HMEs, TSA is planning to seek additional...
Wed, 2011-06-22 07:14 AM

Mich. state Rep. Tom McMillin

State legislation that would make TSA’s pat-down screening a crime was introduced in Michigan and has gained renewed momentum in Texas.Michigan state Rep. Tom McMillin (R-Rochester Hills) introduced...
Wed, 2011-06-22 06:13 AM

Newark Liberty International

TSA’s behavioral screening program should be temporarily shelved in light of reports that security officers at Newark Liberty International Airport used it to racially profile passengers there, said...

Company News

Portland, OR-based Tripwire, Inc., a global provider of advanced threat, security and compliance solutions, has announced the results of a consumer survey conducted on holiday shopping security practices by One Poll and Dimensional Research. Evaluating online cybersecurity awareness of 2,011 consumers from the U.S. and U.K., the survey revealed that more than 40 percent of respondents believe using a third party payer such as PayPal or Google Wallet is the safest way to pay for goods online.

Parents go to great lengths to shield their children from life’s bumps and bruises, but even the best bicycle helmets and baby gates can’t ward off a hazard that has surfaced in recent years. Identity theft is a threat many moms and dads don’t know how to protect against.

The Independent Community Bankers of America (ICBA) has said that the nation’s community banks reissued nearly 7.5 million credit and debit cards at a total reissuance cost of more than $90 million as a result of the Home Depot data breach. ICBA’s survey of a sample of community banks also found that more than 4 percent of community banks reported fraud on accounts that were compromised by the April-September breach. This number would have been higher had community banks not reissued cards as quickly as they did.

Recent protests around the country regarding deaths in various cities, as well as holiday travel and the upcoming Superbowl in Phoenix, are at the top of the list for security professionals, according to Michael Shetler, CEO of Phoenix-based Shetler Security.

Framingham, MA-based Staples has given an update on the investigation into its previously announced data security incident involving a small percentage of its retail point-of-sale systems.

One year after Target confirmed the company’s massive data breach, and as the holiday shopping season is approaching its peak, National Association of Federal Credit Unions (NAFCU) President and CEO Dan Berger reiterated the need for national standards on data security and breach notification for retailers.

Oxford, U.K. – A new global online resource for building cybersecurity capacity has been launched. The Cybersecurity Capacity Portal will help coordinate international efforts in cybersecurity through sharing of information and best practice, to support decisions and investments that can significantly enhance safety and security in cyberspace.

Deputy Chief Ken Kroll of the Romeoville, IL, police needed a replacement for the department’s old livescan fingerprint and DC Book mugshot solutions. “What was key was finding a company that could convert nine years of booking data. When iTouch said that they could do it in one system that was a big selling point for us.”

Like many departments across the country, the Romeoville police had previously used two separate systems for processing criminals, one for collecting fingerprints, and a second for capturing mugshots.

Commentary and Opinions

With more than 10 million purported attempts to break into Pentagon systems and servers each day, it was not surprising when the White House confirmed that individuals thought to be working for the Russian government attempted to hack its servers.

From September until January, Monday evenings find living rooms across America filled with armchair quarterbacks. During pre-game shows and post-game analyses, experts and amateurs alike discuss the retreat and progress of their favorite teams. Even fantasy leagues abound to test players’ strategic and tactical prowess on the gridiron.

As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.

With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.

The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.

 

Technology Sectors

Market Sectors

Essential Guides

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.