Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Fri, 2013-11-22 12:47 PM

Bill Solms

Wave Systems Corp., which has recently become a sponsor of the Government Security News 2013 homeland security awards program, brings a unique approach to the challenge of authenticating a user to a...
Wed, 2013-11-20 06:16 PM
CBP has announced that one million people have been given the designation of a ‘trusted traveler’ through the Global Entry program. The program, which was launched five years ago, provides arriving...
Tue, 2013-11-19 07:32 PM
U.S. Citizenship and Immigration Services (USCIS) Director Alejandro Mayorkas announced on November 18 an enhancement to the E-Verify program that will help combat identity fraud by...
Tue, 2013-11-19 05:01 PM
Contrary to language in regulations it issued in 2009, the Coast Guard has now determined that a Transportation Worker Identification Credential, or TWIC card, cannot be considered as sufficient...
Sun, 2013-11-17 06:00 PM

Triggerfish T4H
Remotely Operated
Vehicle

Using their Triggerfish T4H Remotely Operated Vehicle (ROV) from Deep Ocean Engineering, Inc., the Carter County, TN, emergency and rescue squad located and retrieved a fisherman from Roane Mountain...
Thu, 2013-11-14 03:24 PM

LPR system
by Vigilant

Vigilant Solutions announced on November 14 that the Hollywood (Florida) Police Department used a license plate recognition system by Vigilant Solutions to bring two interstate fugitives to...
Thu, 2013-11-14 02:57 PM

William Solms

Wave Systems Corp. has announced that William Solms, the company’s vice president of North American sales, has been appointed by the board of directors as CEO, replacing Steven Sprague. Solms will be...
Tue, 2013-11-12 10:00 PM

U.S.-Mexico border

On October 30, agents from the U.S. Border Patrol encountered a 37-year-old man in a canyon near Imperial Beach, CA. It was determined that he had crossed the border illegally with several other...
Tue, 2013-11-12 09:46 PM
Telos Identity Management Solutions, LLC  has been selected by the Denver International Airport to provide Designated Aviation Channeling (DAC) services for processing employee and contractor...
Mon, 2013-11-11 02:59 PM
The Homeland Security Investigations (HIS) unit of DHS is gathering information from prospective vendors who could perform deoxyribonucleic acid (DNA) tests on samples collected from various...
Thu, 2013-11-07 09:53 PM

Severn Bridge connects
England and South Wales

An access control solution from Access Control Technology (ACT) is being used on the main crossing points between England and South Wales.  The two bridge crossings are the (suspension) Severn...
Tue, 2013-11-05 01:30 PM
Government Security News has announced its 2013 Homeland Security Awards finalists, and in some cases preemptive winners, in three different broad awards categories: Vendors of IT security products...

Company News

LexisNexis Risk Solutions has announced the results of a comprehensive study focused on the use of social media by law enforcement for crime investigation and prevention. The study, a follow-up to one conducted in 2012, revealed that social media use remains high -- eight out of 10 law enforcement professionals use it – with the most common use being for crime investigations (63 percent).

Amazon Web Services, Inc. (AWS), an Amazon.com company, has announced three new services to make it easier for enterprises to maintain security, governance, and compliance of their resources in the AWS Cloud. AWS Key Management Service is a fully managed service that makes it easy for customers to create and control the encryption keys used to encrypt their data on the AWS Cloud.

Indianapolis, IN-based STANLEY Security, a provider of access control and integrated security solutions, has announced it has expanded its network of value-added resellers (VARs) to distribute its suite of EyeLock iris-based identity authentication products and technology solutions. The channel now includes Vanderbilt Industries, Low Voltage Contractors, Stone Security and Xentry Systems Integration.

FRISCO, TX- July 1, 2014- Encryptics, a provider of patented data privacy and protection services for businesses and government entities, has named John D. Cohen as the company’s Chief Strategy Advisor. In this role, Cohen will be responsible for continuing to position its data encryption technology at the forefront of the cybersecurity landscape for private and public companies, governments, and public safety entities.

The HUG or Heavy Utility Gate is a completely self-contained, solar charged, battery operated access gate that can be deployed in seconds, and with its solar option can cycle over a thousand times daily without the need for any external power.

In addition to roadblocks, checkpoints, and as a manned or unmanned access gate, the HUG can also be strategically placed to protect personnel, equipment, vehicles, staging and restricted areas.

Robert Weaver is an award-winning and nationally recognized senior executive who over the course of a 40 year distinguished career served in a variety of leadership positions in the U.S. Secret Service (USSS), U.S. Supreme Court, Federal Bureau of Investigation, and in the Department of Homeland Security (DHS).

Cleveland, OH-based Mace Security International, Inc. and Hudson, OH-based National School Control Systems, LLC are pleased to announce a joint marketing agreement for safety and security products with a focus on the Bearacade Door Control System. The target markets for these systems include educational, corporate, nonprofit, and government institutions.

TrendLabs has released a report called, The Invisible Becomes Visible, in which it outlines its industry predictions on what the cyber threat landscape is expected to look like in 2015.

Commentary and Opinions

Fortiter in re, suaviter in modo -- Be resolute in action, and gentle in manner

Since the events of 9/11, there have been increasing calls from the public -- as well as incentives from certain sectors of the government -- for science to “do something” to better define, predict, and in this way perhaps prevent terrorism and other violent social behavior.

Traditionally, the Security Industry Association has been a standards developing body, but we recognize that we are not alone in this effort and many other organizations are doing good work on their own standards.

However, the only thing worse than having no standards at all is have three standards for the same thing! To that end, SIA has produced a White Paper that describes an approach to harmonizing technical and operational standards among cooperating standards organizations, consortia and forums within the electronic physical security industry.

Earlier this month, responding to a question from the editor of this publication, the Secretary of the Department of Homeland Security (DHS), Janet Napolitano, categorically rejected the use of profiling in homeland security efforts.  Instead of focusing its resources on young, Muslim men, DHS paid the most attention to behavior indicating terrorist activity, such as travel patterns. The Secretary’s rejection of profiling is spot on, both as a matter of efficacy and as a matter of ethics.

Instead of a sparkle, it drives a tear in your eye. I often wonder who takes genuine interest in really innovative first-level security features that are truly user-friendly and help citizens and governments alike to ascertain easy-to-verify authenticity for currency and ID documents.

“We Got Him!” was the headline. “What’s next?” is the question now asked by many Americans, days after Osama Bin Laden’s demise. There are a number of simple things that we can do to help protect against terrorism. Some, like “See Something, Say Something,” have become ingrained in our national psyche. Perhaps less obvious is the imperative to guard against counterfeit goods. The connection may not be immediately apparent, but it is real and serious.

 

Technology Sectors

Market Sectors

Essential Guides

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.