Access Control | Identification

Featured Videos

Peter Boriskin, Director of Product Management for ASSA ABLOY'S Commerical Electronic Access Control Products, indicates that he would like to describe the features and benefits of the SARGENT SE...

News

Sun, 2013-09-08 11:37 AM

Officials announce
arrests in Virginia

Three Charlottesville residents accused of producing tens of thousands of fake driver's licenses and shipping them across the country pleaded guilty on September 4 following an investigation by U.S....
Sun, 2013-09-08 11:22 AM

Rep. Candice Miller

A House homeland security subcommittee will conduct a hearing on September 10 that explores the question of biometric exit technologies, which can keep track of those individuals who have entered the...
Thu, 2013-09-05 07:13 PM

NIST approves
FIPS 201-2

The National Institute of Standards and Technology (NIST) announced on September 5 that it has approved the Federal Information Processing Standard (FIPS) Publication 201-2, essentially the second...
Sun, 2013-09-01 07:07 PM
Based on its caseload during the past year, TSA is estimating that it will receive information from more than 21,000 travelers in the coming year who take advantage of the DHS “Traveler Redress...
Sun, 2013-09-01 11:31 AM

Global Entry
enrollment center
in Washington, DC

More and more people are starting to take advantage of one of the fastest and easiest ways to get through CBP processing at airports nationwide, and at the Washington, DC, enrollment center the...
Wed, 2013-08-28 02:58 PM

Rajeev Dubey

Vector Electric Inc. (VEI), along with a number of design partners, has installed a new integrated, comprehensive security solution, incorporating the Brivo ACS OnSite Aparato, at the Customs and...
Tue, 2013-08-20 04:24 PM
MorphoTrak, Inc., a biometric identity management company, has partnered with IdentityOne to deliver BIOGUARD, a system that identifies inmates through their fingerprints. 
Tue, 2013-08-20 09:31 AM

GSN now displays
corporate videos on
its Web site

As part of an expansion of promotional opportunities on its Web site, Government Security News has adopted a new policy of accepting paid corporate videos on the home page and the Web site’s 18...
Thu, 2013-08-15 04:56 PM

Boarding pass
scanner
by Desko

TSA has awarded three different companies IDIQ contracts, each with a ceiling value of $5.5 million, to supply boarding pass scanners for use at U.S. airports. According to separate award notices...
Mon, 2013-08-12 03:21 PM
Detex Corporation announced on August 8 that it is offering a new maximum security life safety door hardware system designed for retail.  Installed on doors that require higher levels of...
Mon, 2013-08-12 12:19 PM

Rep. Tulsi Gabbard

President Barack Obama signed on August 9 the bipartisan, bicameral Helping Heroes Fly Act (H.R. 1344), which aims to improve airport security screening processes for wounded and severely disabled...
Fri, 2013-08-09 03:39 PM

Traveler using a
Global Entry kiosk

CBP’s Global Entry trusted traveler program, which currently is open only to U.S. citizens and permanent residents, Mexican nationals and some citizens of the Netherlands, has been opened up...

Company News

Austin, TX-based HID Global, a provider of secure identity solutions, has announced that it has teamed with Eid Passport, a provider of high-assurance identity management solutions, to supply Eid Passport with its ActivID Credential Management System (CMS) for Eid Passport’s new Personal Identity Verification -- Interoperable (PIV-I) managed service.

San Francisco, CA-based Splunk, a provider of a software platform for real-time operational intelligence, has announced the general availability of version 3.1 of the Splunk App for Enterprise Security. Splunk has introduced a new risk scoring framework in the Splunk App for Enterprise Security to enable easier, faster threat detection and containment by empowering users to assign risk scores to any data.

Dallas, TX-based Zix Corporation (ZixCorp), a provider of email data protection, has announced that ZixOne is available on the Samsung Solutions Exchange, expanding mobile security options for enterprises using Samsung’s mobile devices. The Samsung Solutions Exchange addresses the needs of business owners by creating mobile solutions on a portfolio of enterprise-grade Samsung mobile products.

New York, NY-based Viewpointe, a provider of managed service and a payments provider to regulated industries, has announced a new white paper that highlights how using the appropriate cloud infrastructure can optimize business processes, deliver competitive agility, and address information mismanagement.

Gemalto, Datacard, and Morpho have ranked in the top three positions in ABI Research’s latest “Government & Healthcare ID: Smart Card and Legacy Credentials” competitive assessment. The assessment consists of 1H 2013 smart card market shares alongside a vendor matrix where by the top smart card and legacy credential ecosystem players were measured against a set of innovation and implementation criteria.

Round Rock, TX-based Dell Software has announced availability of two new backup appliances and a host of enhancements to its AppAssure backup, replication and disaster recovery software.

Costa Mesa, CA-based Emulex Corp., a provider of network connectivity, monitoring, and management, has announced the results of a study of 547 U.S. and European-based network and security operations (NetOps and SecOps) professionals, which found that 45% of IT staffs monitor network and application performance manually, instead of implementing network monitoring tools.

Toronto, Canada-based SecureKey, a provider of trusted identity networks, and Oberthur Technologies (OT), a provider of digital security solutions for the mobility space, has announced their collaboration to bring to market a range of solutions compliant with the GSMA-led Mobile Connect initiative that provides secure access and authentication for online services.

Commentary and Opinions

Editor's Note: When GSN learned that the alleged Russian spy ring in the United States was using deception techniques such as "steganography," we decided to turn to a true expert in steganography for a description of this little-understood field.

 

During the past seven years, the Transportation Security Administration (TSA) has taken the position that it knows how to best create the safety and security standards necessary to secure airports across the United States.

So, what could possibly be wrong?

Everything.

While strolling up and down the aisles at the ASIS New York City Chapter’s security expo at the Javits Center on April 30, I tried to take a quick reading on the current state of the government security marketplace, but frankly the views of half a dozen exhibitors were all over the map.

I wondered whether the economy-wide recession during the past two years was depressing government procurements, or whether the Obama administration’s pump-priming stimulus program had led to an increase in such government purchases.

By Jonathan McDonald

Many government organizations are charged with combating terrorism, identifying criminals and effectively applying immigration policies. All these activities require that persons of interests (and organizations and networks) be accurately identified. Identification is an extremely complex process that is only compounded by increasing data volumes, complex relationships, and tightly coupled application and data architectures.

A resident of the northern Israeli city of Migdal Haemek received two letter bombs by post earlier this month. The woman who received the packages, whose name has not been released, felt the packages were suspicious and called the police.

Although she said she was not under threat and could not understand who could have sent her the bombs, she was vigilant enough to alert the professionals.

The officers who arrived on the scene, called in the police IED unit to examine the letters and bomb techs determined that they were, indeed, letter bombs.

 

Technology Sectors

Market Sectors

Essential Guides

Recent Access Control Videos

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

Xceedium Corporation garnered its second GSN awards trophy for the entry of its Xsuite solution in the “Best Privileged Access Management” category of the 2012 Awards Program.  Ken Ammon, Chief Strategist for the company, describes how privileged access management has become increasingly important as physical and logical access have merged, and the government, through HSPD-12, has required that the PIV smart card, historically used for physical access now must be used for logical access as well.

John D. Clark, Sr. and the Whitestone Group, which he founded in 2000, returned to the GSN Awards Dinner in 2012 to pick up their second trophy in two years, this time for the “Best Facility Security/Force Protection Service.” The Whitestone Group’s A-list of clients includes NASA, DoD, USDA, VA, DHS, Social Security Administration, U.S. Coast Guard, Army, Air Force and the Department of Interior, which has just approved a new 5-year facility security contract for the Hoover Dam.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

New Products

San Diego, CA-based Sperry West, the video surveillance manufacturer, has introduced the Spyder Big...

Fairport, NY-based Bosch Security Systems, Inc. has introduced the GVS1000, which the company describes as the industry's l...

McLean, VA-based QinetiQ North America characterizes its SPO-7 standoff passive object detection system as the kind calle...

Camden Door Controls have made their popular CM-30 Series illuminated pushbuttons even better with the introduction of new ‘Universal...

Norton Door Controls, a manufacturer of commercial door closers and an ASSA ABLOY Group company, has announced the introduction o...