Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2014-01-16 11:51 PM
Mexico recently launched its first trusted traveler program open to U.S. citizens entitled Programa Viajero Confiable. The program is designed to expedite the process for U.S. citizens to enter...
Tue, 2014-01-14 09:43 AM
Worldwide secure identity powerhouse HID Global announced the opening of its new World Headquarters and North American Operations Center in Austin, Texas yesterday before an audience of dignitaries...
Thu, 2014-01-02 11:46 AM
TSA has determined that the system of records it has established for its “TSA Precheck” trusted traveler program will be subject to various exemptions spelled out in the Privacy Act, and that...
Mon, 2013-12-23 02:41 PM
CBP officials estimate that approximately 120,000 operators of private aircraft will arrive in the United States each year and present several documents to CBP inspectors for their review. The number...
Sat, 2013-12-21 01:22 PM

Sarasota Bradenton
International Airport

TSA has issued a presolicitation notice announcing that it intends to hire a small business to provide passenger screening services at Sarasota Bradenton International Airport in Florida. The notice...
Tue, 2013-12-17 04:47 PM
In order to give itself enough time to resolve a bid protest, TSA has decided to award a contract extension on a sole source basis to InfoZen, of Bethesda, MD, to continue providing the operations...
Mon, 2013-12-16 03:56 PM
TSA has issued a solicitation for what it calls “Credential Authentication Technology,” or CAT, which can ensure that only legitimate airport personnel, airline crews, non-traveling passengers using...
Thu, 2013-12-12 05:08 PM
TSA is gathering market research information from small businesses that can provide databases and reporting mechanisms that can monitor the movements of railcars carrying toxic inhalation hazards and...
Sun, 2013-12-08 06:06 PM

London Gateway

Marine terminal operator DP World is constructing London Gateway, the UK’s first major deep-sea container port this century, as part of a development that will include the largest logistics park in...
Sat, 2013-12-07 06:20 PM
The U.S. Secret Service has indicated that it plans to negotiate sole source contracts with one commercial company and one state government in order to gain access to their proprietary databases. In...
Fri, 2013-12-06 04:53 PM
As facial recognition technology moves into the commercial marketplace, the National Telecommunications and Information Administration (NTIA) has laid out a schedule of public meetings in which...
Thu, 2013-12-05 03:45 PM

Chuck Brooks

Government Security News is pleased to announce the winners of its GSN 2013 Homeland Security Awards program, which were selected from hundreds of nominations submitted by leading vendors of IT and...

Company News

ISACA CEO Matt Loeb, who is attending the White House Summit for Cybersecurity and Consumer Protection on Friday at Stanford University, has underscored the need for public and private collaboration to prevent, detect and respond to sophisticated cyber threats. ISACA, a global association of 115,000 information and cybersecurity professionals, recently conducted a survey in which 83% of respondents said cyberattacks are one of the top three threats facing organizations, but only 38% feel prepared.
Portland, OR-based Tripwire, a provider of advanced threat, security and compliance solutions, has announced the integration of multiple sources of threat intelligence into its Adaptive Threat Protection solution. The expanded solution now incorporates threat intelligence from a variety of commercial and community best-of-breed threat intelligence offerings including Check Point Software, Cisco, CrowdStrike, Lastline, Palo Alto Networks and Soltra, the STIX TAXII communication platform.
Innovative Business Software (IBS), a major supplier of Central Station automation software, has earned the first-ever UL certification for a cloud-based monitoring product. The DMP SCS-VR Virtual Receiver was a key component in developing this new approach to Central Station automation. Using the SCS-VR, SBN Cloud allows Central Stations of all sizes to provide monitoring services without the cost of installing, maintaining, and operating the infrastructure required to respond to alarm signals.
Digital Monitoring Products (DMP) has named Derek Ottman as Dealer Development Manager for the Midwest Region, which includes Illinois, Minnesota, Wisconsin, and eastern Iowa. He will be responsible for developing new sales and providing on-going service to DMP authorized dealers throughout the region, helping them to grow their businesses.
Technical communicators, tools vendors, consultants, and even client organizations and end users all feel the rapid changes coming to content preparation, delivery and consumption. To better understand these changes over time Data Conversion Laboratory (DCL) and The Center for Information-Development Management (CIDM) are now conducting their third annual survey of practitioners, Following the Trends -- Is Your Content Ready?, which is open now until March 16, 2015.
Phoenix, AZ-based BeyondTrust, the global cyber security company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks, has announced that the newest versions of PowerBroker for Windows and PowerBroker Password Safe have the ability to integrate to create an enhanced least privilege experience for IT staff and end users.
Belcamp, MD-based SafeNet Assured Technologies, a U.S. based provider of government high assurance data security solutions, has announced its formal company launch. SafeNet Assured Technologies’ mission is to provide high assurance data security products and technologies to defense, intelligence, and civilian agencies across the Federal Government.
In the wake of the latest data breach news and the fact that the personal records of more than 85 million people were exposed in 2014 alone, LifeLock has released a new identity theft risk calculator to help consumers assess their risk and adjust their behavior accordingly. The calculator asks consumers questions ranging from their habits related to changing their online passwords to whether they take steps to safeguard their postal mail.

Commentary and Opinions

Fortiter in re, suaviter in modo -- Be resolute in action, and gentle in manner Since the events of 9/11, there have been increasing calls from the public -- as well as incentives from certain sectors of the government -- for science to “do something” to better define, predict, and in this way perhaps prevent terrorism and other violent social behavior.
Traditionally, the Security Industry Association has been a standards developing body, but we recognize that we are not alone in this effort and many other organizations are doing good work on their own standards. However, the only thing worse than having no standards at all is have three standards for the same thing! To that end, SIA has produced a White Paper that describes an approach to harmonizing technical and operational standards among cooperating standards organizations, consortia and forums within the electronic physical security industry.
Earlier this month, responding to a question from the editor of this publication, the Secretary of the Department of Homeland Security (DHS), Janet Napolitano, categorically rejected the use of profiling in homeland security efforts.  Instead of focusing its resources on young, Muslim men, DHS paid the most attention to behavior indicating terrorist activity, such as travel patterns. The Secretary’s rejection of profiling is spot on, both as a matter of efficacy and as a matter of ethics.
Instead of a sparkle, it drives a tear in your eye. I often wonder who takes genuine interest in really innovative first-level security features that are truly user-friendly and help citizens and governments alike to ascertain easy-to-verify authenticity for currency and ID documents.
“We Got Him!” was the headline. “What’s next?” is the question now asked by many Americans, days after Osama Bin Laden’s demise. There are a number of simple things that we can do to help protect against terrorism. Some, like “See Something, Say Something,” have become ingrained in our national psyche. Perhaps less obvious is the imperative to guard against counterfeit goods. The connection may not be immediately apparent, but it is real and serious.
 

Digital Version of January/February 2015 Print Edition

Click Here

Digital Version of November/December 2014 Print Edition

Click Here

Technology Sectors

Market Sectors

http://www.nikeairmaxfreedom.com nike air max

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.