Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Tue, 2013-12-17 03:47 PM
In order to give itself enough time to resolve a bid protest, TSA has decided to award a contract extension on a sole source basis to InfoZen, of Bethesda, MD, to continue providing the operations...
Mon, 2013-12-16 02:56 PM
TSA has issued a solicitation for what it calls “Credential Authentication Technology,” or CAT, which can ensure that only legitimate airport personnel, airline crews, non-traveling passengers using...
Thu, 2013-12-12 04:08 PM
TSA is gathering market research information from small businesses that can provide databases and reporting mechanisms that can monitor the movements of railcars carrying toxic inhalation hazards and...
Sun, 2013-12-08 05:06 PM

London Gateway

Marine terminal operator DP World is constructing London Gateway, the UK’s first major deep-sea container port this century, as part of a development that will include the largest logistics park in...
Sat, 2013-12-07 05:20 PM
The U.S. Secret Service has indicated that it plans to negotiate sole source contracts with one commercial company and one state government in order to gain access to their proprietary databases. In...
Fri, 2013-12-06 03:53 PM
As facial recognition technology moves into the commercial marketplace, the National Telecommunications and Information Administration (NTIA) has laid out a schedule of public meetings in which...
Thu, 2013-12-05 02:45 PM

Chuck Brooks

Government Security News is pleased to announce the winners of its GSN 2013 Homeland Security Awards program, which were selected from hundreds of nominations submitted by leading vendors of IT and...
Wed, 2013-12-04 04:08 PM
TSA announced on December 4 that it will charge a fee of $85 per individual to participate for five years in the Pre[check] trusted traveler program, which will enable cleared passengers to move...
Sun, 2013-12-01 12:25 PM
TSA’s blogger, Bob Burns, offered a few travel tips on November 26 for passengers moving around the country during the holiday season, particularly those who are counting on expedited screening...
Thu, 2013-11-28 06:42 PM
The U.S. Secret Service has announced that it plans to procure on a sole source basis several legal and law enforcement databases from Reed Elsevier, Inc., which does business as LexisNexis. The...
Tue, 2013-11-26 03:27 PM
More than twice as many non-immigrant travelers to the United States each year are applying for their visas or travel authorizations via an online electronic system, rather than filling out paper...
Mon, 2013-11-25 03:52 PM

VA Medical Center
in Durham, NC

The U.S. Department of Veterans Affairs has decided to stick with Sonitrol, which is already providing its physical access control systems at the VA Medical Center’s main campus in Durham, NC, as it...

Company News

The Internet Society has outlined its approach to cyber security policy:The headlines of today regarding hacking, exposure of large quantities of personal data, denial of service attacks, and the continued revelations about pervasive monitoring are deeply disturbing.
Westford, MA-based Software House, part of the Security Products business unit of Tyco, the world’s largest pure-play fire protection and security company, has announced the certification of its iSTAR Edge and iSTAR Ultra door controllers under the government’s Federal Information Processing Standards Publications (FIPS) 140-2 program, the most stringent standard for cryptographic products.
Gallagher -- an international provider of access control and security systems technology -- is previewing the latest releases in their extensive product portfolio at the security show Intersec Dubai, from 18 - 20 January 2015.“Intersec Dubai provides a great opportunity for people to be able to see our product in operation and talk to our team about the unique features and functionality Gallagher brings to the security market,” said Steve Bell, Chief Technology Officer at Gallagher.
Reston, VA-based Inmarsat Government, a provider of secure, global, mission-critical telecommunications to the U.S. public sector, has announced it has executed a service provider agreement with Globecomm Systems Inc. to supply Inmarsat Global Xpress service in support of U.S. government customers.
In recent months Safety Vision, vendor of video surveillance products, has welcomed four new individuals to its Sales and Marketing Departments. Spurred by an uptick in sales, the company’s president and CEO Bruce Smith recently enacted an innovative approach to acquiring new talent. “We were seeking out new ways of selling. We wanted to innovate and then define approaches to solving mobile video surveillance issues,” said Smith. How does one go about achieving this?
Bristol, England-based ForgeRock Inc., an open source provider of Identity Relationship Management (IRM) solutions, and FireEye, Inc., which stops today’s advanced cyber attacks, has announced an integration of intelligence from the ForgeRock Identity Platform with the FireEye Threat Analytics Platform (TAP) to provide enhanced security incident detection and response management.
Amid growing fears about the disease, one visitor identification software solution eases concerns around the potential spread of Ebola in a hospital setting. The Fast-Pass Visitor Management System manufactured by Security Identification Systems Corporation (SISCO) can keep track of people visiting patients in hospitals.
Good Technology, a secure mobility company, has announced that KIRA, a leading provider of facilities maintenance and construction services, has selected Good for Enterprise (GFE) to securely manage more than 1,000 remote employees, data and devices, as well as accelerating employee productivity.

Commentary and Opinions

Earlier this month, responding to a question from the editor of this publication, the Secretary of the Department of Homeland Security (DHS), Janet Napolitano, categorically rejected the use of profiling in homeland security efforts.  Instead of focusing its resources on young, Muslim men, DHS paid the most attention to behavior indicating terrorist activity, such as travel patterns. The Secretary’s rejection of profiling is spot on, both as a matter of efficacy and as a matter of ethics.
Instead of a sparkle, it drives a tear in your eye. I often wonder who takes genuine interest in really innovative first-level security features that are truly user-friendly and help citizens and governments alike to ascertain easy-to-verify authenticity for currency and ID documents.
“We Got Him!” was the headline. “What’s next?” is the question now asked by many Americans, days after Osama Bin Laden’s demise. There are a number of simple things that we can do to help protect against terrorism. Some, like “See Something, Say Something,” have become ingrained in our national psyche. Perhaps less obvious is the imperative to guard against counterfeit goods. The connection may not be immediately apparent, but it is real and serious.
As a product-agnostic provider of HSPD-12 compliant design and installation services for physical security systems in federal buildings, our team has learned significant lessons about key phases of most projects. First, it is critical to know the answers to certain questions prior to any design and installation activity. Second, the type of project -- whether it is a remodeling or new construction of federal entities -- can create its own challenges. Third, testing and validation is the final due diligence necessary for a successful system.
 Every day, people and organizations hand over their most valuable and vital personal information to government agencies. It is then up to the recipient – a federal or state agency, or another government organization – to safely store that data.
 

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.