Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...


Thu, 2011-08-04 07:41 AM
The Transportation Security Administration needs to bolster its oversight of the security badging process for airport workers, or risk safety of passengers, airport workers and aircraft, said a study...
Wed, 2011-08-03 02:01 PM
In a brief notice published in the Federal Register on August 3, TSA makes clear that it collects information from aircraft operators about individuals who are not planning to travel, but who are...
Tue, 2011-08-02 07:29 AM

Attorney General Eric Holder

The U.S. Department of Justice asked a federal court in Alabama to block a new state immigration measure set to take effect on Sept. 1 because it would overburden federal agencies and intrude on...
Fri, 2011-07-29 02:55 PM

Naser Abdo

Naser Abdo, the suspect in a plot to mount a second attack on the U.S. Army base at Fort Hood, TX, was hit with federal weapons possession and bomb-making charges on July 29. The 21-year-old Abdo...
Fri, 2011-07-29 08:31 AM
A bill that would clear up some of the Federal Protective Service’s jurisdictional issues and secretly test its guards for competency cleared a key House subcommittee markup on July 28.
Fri, 2011-07-29 08:03 AM

Pfc. Naser Abdo

A U.S. Army soldier who planned another bloody assault on a Texas army post was arrested on child pornography charges apparently hours before carrying out his plans. On the afternoon of July 27, the...
Thu, 2011-07-28 09:21 AM
The nation's largest warehouse club chain is partnering with U.S. Immigration and Customs Enforcement (ICE) in the agency’s employee identification verification program. The big box chain signed on...
Wed, 2011-07-27 12:20 PM

Rep. Peter King (R-NY)

Al Shabaab is a growing threat to U.S. interests abroad and even the homeland, said community activists and law enforcement experts testifying at a House Homeland Security Committee hearing on the...
Wed, 2011-07-27 07:48 AM

Vancouver International

U.S. Customs and Border Protection’s Global Entry has made entry kiosks available at two Canadian airports and plans a third by the fall that accept two kinds of security preclearance documents. CBP...
Fri, 2011-07-22 09:37 AM
TSA awarded on July 18 a $469,000 contract to Aware, Inc., of Bedford, MA, to provide two components of the electronic system TSA uses to transmit fingerprint application data to and from the FBI and...
Wed, 2011-07-20 11:45 AM

ATR image

TSA is set to begin installing new software on some of its airport scanners that renders images of passengers’ bodies into a generic outline instead of the detailed personal images that many...
Wed, 2011-07-20 09:35 AM

Cabeza Prieta wilderness

Customs and Border Protection agents have been busy in the last few days rescuing people from the intense desert heat in the southern Arizona borderlands.The agency said there were six separate...

Company News

When it comes to sniffing for explosives and drugs, the first image that comes into the minds of many folks is a facsimile of Rin Tin Tin. The sniffer that will be announced the week of May 16 by a Wilmington, MA, maker of security sensing devices, though, will have more science than snout.
Mapping out zones where mobile phones are persona non grata can be essential in some secure facilities such as research labs, military bases and correctional facilities. The question, though, is how can those zones be policed? Some organizations use jamming systems, which blocks the wireless signal to the phone, but that can be an expensive solution. Varitronics, of Metuchen, NJ, has another idea. It's a compact cell phone monitoring device called the WatchHound.
Mobile identity solution provider MaxID Pty Ltd said on May 9 it had won a 1,000 unit sale in South Africa.According to MaxID, the undisclosed customer bought 1,000 of the company’s iDL500 MaxID Pty Ltd is a wholly owned company of MaxID Corp, a leading provider of mobile identity solutions.
Cross Match Technologies, Inc., a global provider of biometric identity solutions, announced on May 9 that John Hinmon has joined the company as vice president of marketing, with additional responsibilities relating to the company’s mergers and acquisitions activities.
Bexar County’s Pre-Trial Services and Sheriff’s Office selected electronic monitoring technology and solutions from G4S Justice Services, LLC (G4S), a provider of advanced monitoring services. The county seat of San Antonio, TX, Bexar County is the 19th most populous county in the nation, with a population of 1,714,773, according to the 2010 census.
Software House, part of Tyco Security Products, announced on April 27 the integration of C•CURE 9000 with HID Global’s EDGE family of IP-based access control solutions. This integration demonstrates the mutual commitment of HID Global and Software House to providing open platform offerings that give customers more options for integrated solutions, said Software House in a news release it issued on April 27.
To further support AMAG Technology’s growth and commitment to the security consultant community, AMAG has hired Bernice Noriz as its new business development manager. In this newly-created position, Noriz will work closely with security engineers, architects and consultants in the western half of the U.S. to cultivate relationships, and identify, create and manage new business opportunities for the company. She will report to the director of business development, Jody Ross.
With gasoline prices on the rise, fuel smuggling has become a problem, especially in places like Europe where petrol is now selling in the $7 to $8.50 price range. By some estimates, some 10 percent of the gasoline sold in Bulgaria is counterfeit, for example, and in some regions of the United Kingdom, it's as high as 25 percent.

Commentary and Opinions

Washington, March 18 – The National Retail Federation has presented Congress with practical, commonsense and achievable solutions to better protect consumers and help businesses prevent cyberattacks and data breaches.“We should not be satisfied with simply determining what to do after a data breach occurs,” NRF senior vice president for Government Relations David French said. “Instead, it is important to look at why such breaches occur and what the perpetrators get out of them so that we can find ways to reduce and prevent not only the breaches themselves but the follow-on harm.”
By Nimrod LuriaPolice and FBI are investigating defacement attacks on numerous North American websites in which attackers placed an ISIS flag banner on website home pages and played an Arabic song in the background, as reported by NBC News.The sites appear to have one thing in common: they are all built on the WordPress content management platform.
By Fraser ThomasLast week the US Congress began the process of making President Obama’s State of the Union address, where he focused on ways to secure the nation's businesses and infrastructure in cyberspace, a reality.On Wednesday two House members reintroduced a bill requiring companies to meet a specific set of data security standards when handling customers’ personal information.
By Michael D. HelmMost Americans do not know who Ali al-Marri is and it is my sincere hope that they never find out because of another horrendous attack. Nonetheless, it is extremely alarming that not only has our government released the convicted al-Qaeda operative from U.S. custody to Qatar, but that it has also gone largely unnoticed by the mainstream media.
National Association of Federal Credit Unions (NAFCU) President and CEO Dan Berger renewed the association’s push for national data security and breach notification standards for retailers amid news of a possible data breach at Chick-fil-A chain restaurants.

Digital Version of January/February 2015 Print Edition

Click Here

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.