Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2014-08-28 07:17 PM
Thanks to alerts from concerned readers and advertisers of Government Security News, we learned yesterday that attempts to log into the “GSN” website have resulted in notices to the effect that “...
Wed, 2014-08-27 07:54 PM
Thirty-eight people were charged last week for their role in a large-scale auto insurance fraud ring that resulted in hundreds of thousands of dollars in lost revenue. The charges follow a year-long...
Wed, 2014-08-27 02:09 AM

TSA Admin. John Pistole

The U.S. Department of Homeland Security recently achieved two major milestones for its trusted traveler programs. The Transportation Security Administration Pre✓ application program, which began in...
Tue, 2014-08-26 07:15 PM
A former acting director of cyber security at the U.S. Department of Health and Human Services has been convicted on child pornography charges, according to the Department of Justice (DOJ).Timothy...
Sun, 2014-07-06 09:10 PM
A group of privacy organizations has written a letter to Congress saying that a newly released draft version of a bill, the Cybersecurity Information Sharing Act of 2014 (CISA), which aims to improve...
Thu, 2014-06-26 04:32 AM
The Senate Committee on Homeland Security and Governmental Affairs approved legislation Wednesday that would take a number of steps to modernize and address critical challenges to the nation’s cyber...
Tue, 2014-06-24 09:04 AM

Michael Madsen

GSN parent company World Business Media has announced that Michael Madsen, the company’s first advertising director and longtime sales “MVP,” has been promoted from Associate Publisher to Publisher...
Mon, 2014-06-23 11:48 PM
U.S. Immigration and Customs Enforcement's (ICE) Homeland Security Investigations has revamped the Student and Exchange Visitor Program (SEVP) to update its primary designated school officials (PDSOs...
Tue, 2014-06-17 02:33 AM
AT&T has confirmed that attackers have compromised the personal information of some mobile account holders. In a letter mailed to customers, AT&T revealed that three employees of one of its...
Mon, 2014-06-09 04:45 AM
As more people use smart phones or tablets to pay bills, make purchases, store personal information, and even control access to their houses, the need for robust password security has become more...
Fri, 2014-05-09 02:49 AM

Jim Sensenbrenner 

The House Intelligence Committee approved the USA Freedom Act Thursday, a bill that would put far greater restrictions on how the National Security Agency is able to collect and analyze Americans’...
Wed, 2014-04-30 09:23 PM
The DHS has announced the expansion of the Transportation Security Administration’s (TSA) expedited screening program, TSA PreCheck, to include eligible customers of Air Canada, the first...

Company News

San Francisco, April 22 – Tripwire, Inc., a global provider of advanced threat, security and compliance solutions, has announced the results of a survey of 227 attendees at 
Manchester, NH, April 22 – The University of New Hampshire at Manchester has announced a new Bachelor of Science in Homeland Security.
Phoenix, AZ, April 21 – BeyondTrust, a cybersecurity company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks, has announced the appointment of Dr. Ronald D. Sugar, former Northrop Grumman chairman and CEO, to the company’s Board of Directors. Dr. Sugar’s experience in current board of director roles with industry giants such as Apple and Chevron Corporation will benefit BeyondTrust’s continued growth and leadership in the cybersecurity market.
Atlanta and San Francisco, April 20 – Damballa, a provider of advanced threat detection and cont
Alexandria, VA, April 20 – CSG Invotas, a provider of security orchestration and automation, has unveiled Security Orchestrator 3.0 to accelerate data breach response time, minimize the impact of breaches, and enable internal resources to devote more time to high-impact security initiatives.
Las Vegas, NV, April 16 – Moxa, a manufacturer of communications equipment for harsh environments, has unveiled at the International Security Conference & Exposition (ISC) the new flagship of its IP network video surveillance family: the VPort™ 66-2MP.
Seattle, WA, April 14 – F5 Networks (NASDAQ:FFIV) has announced a new cloud-delivered manag
Sunnyvale, CA, April 16 – Agiliance®, Inc., the Big Data Risk Company™ and independent provider of integrated solutions for operational and security risk intelligence, has announced that Vice President and Chief Security Strategist Torsten George has been invited to present a session on the Four Essential Building Blocks for Cyber Securi

Commentary and Opinions

President Obama’s proposed budget highlights the critical role that IT plays in making government work better for citizens and business. The budget encourages the wider use of technology to enhance efficiencies in delivering needed services, while cutting the IT budget over several years. U.S. Chief Information Officer Steven VanRoekel titled his accompanying IT budget priorities, Doing More with Less. In this era of fiscal austerity, key strategic activities are essential to achieving this vision:
In January, the European Commission proposed a comprehensive reform of the EU’s 1995 Data Protection Directive to strengthen consumer privacy laws and harmonize privacy regulations and enforcement across EU member states. While the EU proposal has many useful recommendations, it falls short in a number of areas. Specifically, it adds new regulations that will negatively impact the Internet economy, limits the potential for future innovation and imposes excessive burdens on organizations.
By Robert Mueller, III [Editor’s note: Robert Mueller, III, the Directopr of the FBI, delivered the following congressional testimony before the House Permanent Select Committee on Intelligence in Washington, DC, on October 6, 2011.] Good morning, Chairman Rogers, Ranking Member Ruppersberger, and members of the committee. Thank you for the opportunity to appear before the committee today to discuss the threats facing our nation and the efforts of the FBI to protect the United States over the past 10 years.
In recognition of the tenth anniversary of the 9/11 terrorist attacks, many take a look back at how a revitalized concern for national security spurred numerous initiatives to improve the nation’s defense system. A decade of technological innovation and policy evolution later, the U.S. has made great strides in securing U.S. borders. In retrospect, many of these changes are byproducts of lessons learned from the official 9/11 investigation.
Whenever I tell people what I do for a living, they invariably say something like, “Oh 9/11, what a tragedy, but it must have been great for your business. Is that why you went into it?” Then, I will always have to explain that I was already in the electronic security industry, and that there’s no clear correlation between those tragic events and providing physical security to buildings and the people who inhabit them.
 

Digital Version of March/April 2015
Print Edition

 

Click Here

Digital Version of January/February 2015 Print Edition

Click Here

Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.