Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Tue, 2015-06-30 08:47 PM
Blaine, WA, June 29 – U.S. Customs and Border Protection (CBP), Office of Field Operations, is reminding travelers planning trips across the border this holiday weekend into the United States to make...
Thu, 2015-06-25 03:14 PM
GSN is pleased to announce the Winners and Finalists in its 2015 annual Airport, Seaport, Border Security Awards Program, which once again demonstrates the spectacular scientific achievements and...
Thu, 2015-06-25 12:47 PM
Washington, June 24 – A multi-year cyber investigation, led by the U.S. Secret Service, has culminated in Brooklyn federal court with the arraignment of Ercan Findikoglu, (AKA “Segate”). Findikoglu,...
Tue, 2015-06-23 10:57 PM
Washington, June 22 – Internet Crimes Against Children (ICAC) Task Forces arrested 1,140 child predators from 41 states during a two-month, nationwide operation, the Office of Juvenile Justice and...
Tue, 2015-06-09 09:08 PM

Troy Potter

Washington, June 8 – The Secure Identity & Biometrics Association (SIBA), has announced their selection of Troy Potter of L-3 National Security Solutions (NSS) as Chairman, effective immediately...
Sun, 2015-06-07 09:11 PM
Toronto, Ontario, June 4 – Canadian Prime Minister Stephen Harper has announced a number of measures that he says will increase the safety and security of Canadians. He was joined by Joe...
Mon, 2015-06-01 02:06 AM
Washington, D.C., May 22 – The Federal Bureau of Investigation (FBI) has announced a reboot of its popular Child ID App, which provides parents with an easy way to electronically store their children...
Wed, 2015-05-27 09:35 PM
Haifa, Israel, May 21, 2015 – Elbit Systems Ltd. (the "Company") (NASDAQ and TASE: ESLT), has announced that it has signed an agreement to acquire  NICE Systems Ltd.’s (“NICE”) Cyber and...
Tue, 2015-05-12 04:54 PM
Biometric facial recognition technology in use at 100 e-Gates in German airports is cutting transaction times for each passenger to less than 20 seconds, according to Dr. Jörg Helbig, director of...
Mon, 2015-05-11 10:41 PM
Washington, D.C., May 11 – Director James B. Comey has named Stephen Woolery the special agent in charge (SAC) of the Counterterrorism Division in Los Angeles. Woolery most recently served as chief...
Tue, 2015-05-05 10:51 PM
San Francisco, CA, May 5 – Ripple Labs has agreed to resolve a criminal investigation in exchange for a settlement agreement calling for a series of substantial remedial measures, including a...
Mon, 2015-05-04 02:44 AM
Washington, May 1 – Director James B. Comey has named Joseph M. Demarest, Jr. to the newly established position of associate executive assistant director for the FBI’s Criminal, Cyber, Response, and...

Company News

San Diego, CA, June 30 – CyberFlow Analytics, an emerging provider in the cyber security market with its Security Behavior Analytics solution, has announced it is partnering with MaxMind to enable geolocation for cyber breach activity in the enterprise and Industrial Internet of Things (IoT). Enterprises must be able to track behavioral anomalies not only between devices but also between internal and external locations as part of their cyber security practice.
San Jose, CA, June 30 – Sonasoft Corp. (OTCPK: SSFT), a provider of enterprise-class email archiving and eDiscovery software solutions, has launched a no-cost promotion on its eDiscovery and email archiving software with purchase of a one-year maintenance contract and professional installation. U.S.
Orlando, FL, July 2 – Panda Security has announced the launch of a new version of Panda Mobile Security, the company's solution to combat cyber threats on mobile devices.
Aix-en-Provence, France, June 29 – INSIDE Secure (Euronext Paris:INSD), a provider of embedded security solutions for mobile and connected devices, has announced the availability of SafeZone FIPS cryptographic module version 1.1 – the industry’s first FIPS certified cryptographic module validated on a Trusted Execution Environment (TEE).
Waltham, MA, June 23 – There are significant gaps in cybersecurity knowledge, shared visibility and mutual trust between those who serve on organizations’ board of directors and IT security professionals. These gaps between those responsible for corporate and cyber governance and those responsible for the day-to-day defense against threats could have damaging impacts on organizations’ cybersecurity posture, leaving them more vulnerable to attack and breaches.
East Greenbush, NY, July 1 – The Center for Internet Security (CIS) has made public the latest release of the Critical Security Controls Draft Version 6.0 in its effort to receive feedback from the greater cybersecurity community.
Carlsbad, CA, June 29 – ViaSat Inc. (NASDAQ: VSAT), a provider of broadband and communication technologies and services, has introduced new cybersecurity service and product enhancements as part of its comprehensive government security portfolio.
Irvine, CA, July 2 – CrowdStrike Inc., a provider of endpoint protection, threat intelligence, and 24x7 monitoring and incident response services, has announced the company has secured a new patent from the U.S. Patent & Trademark Office (USPTO) for the core functionality of CrowdStrike Falcon endpoint security sensor.

Commentary and Opinions

By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
 

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.