Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2015-06-25 03:14 PM
GSN is pleased to announce the Winners and Finalists in its 2015 annual Airport, Seaport, Border Security Awards Program, which once again demonstrates the spectacular scientific achievements and...
Thu, 2015-06-25 12:47 PM
Washington, June 24 – A multi-year cyber investigation, led by the U.S. Secret Service, has culminated in Brooklyn federal court with the arraignment of Ercan Findikoglu, (AKA “Segate”). Findikoglu,...
Tue, 2015-06-23 10:57 PM
Washington, June 22 – Internet Crimes Against Children (ICAC) Task Forces arrested 1,140 child predators from 41 states during a two-month, nationwide operation, the Office of Juvenile Justice and...
Tue, 2015-06-09 09:08 PM

Troy Potter

Washington, June 8 – The Secure Identity & Biometrics Association (SIBA), has announced their selection of Troy Potter of L-3 National Security Solutions (NSS) as Chairman, effective immediately...
Sun, 2015-06-07 09:11 PM
Toronto, Ontario, June 4 – Canadian Prime Minister Stephen Harper has announced a number of measures that he says will increase the safety and security of Canadians. He was joined by Joe...
Mon, 2015-06-01 02:06 AM
Washington, D.C., May 22 – The Federal Bureau of Investigation (FBI) has announced a reboot of its popular Child ID App, which provides parents with an easy way to electronically store their children...
Wed, 2015-05-27 09:35 PM
Haifa, Israel, May 21, 2015 – Elbit Systems Ltd. (the "Company") (NASDAQ and TASE: ESLT), has announced that it has signed an agreement to acquire  NICE Systems Ltd.’s (“NICE”) Cyber and...
Tue, 2015-05-12 04:54 PM
Biometric facial recognition technology in use at 100 e-Gates in German airports is cutting transaction times for each passenger to less than 20 seconds, according to Dr. Jörg Helbig, director of...
Mon, 2015-05-11 10:41 PM
Washington, D.C., May 11 – Director James B. Comey has named Stephen Woolery the special agent in charge (SAC) of the Counterterrorism Division in Los Angeles. Woolery most recently served as chief...
Tue, 2015-05-05 10:51 PM
San Francisco, CA, May 5 – Ripple Labs has agreed to resolve a criminal investigation in exchange for a settlement agreement calling for a series of substantial remedial measures, including a...
Mon, 2015-05-04 02:44 AM
Washington, May 1 – Director James B. Comey has named Joseph M. Demarest, Jr. to the newly established position of associate executive assistant director for the FBI’s Criminal, Cyber, Response, and...
Wed, 2015-04-29 07:35 PM
­Fort George G. Meade, MD – The U.S. Naval Academy has won the 2015 Cyber Defense Exercise (CDX), capturing its third trophy since the annual competition began in 2001, the National Security Agency (...

Company News

Plymouth, MA, Issued July 17, 2015… Avwatch, Inc.’s (www.avwatch.us) proven network communications technology, which has supported the efforts of firefighters in the West for the past six years, was recently deployed by a Western state law enforcement agency, allowing law enforcement officials to view, remotely and in real-time, the capture of a felon from as far as 40 miles away.
NEW YORK, July 20, 2015 - Varonis Systems, Inc., a leading provider of software solutions for unstructured, human-generated enterprise data, today announced that it has been added to the U.S.
Foster City, CA, July 16 – Norse, a provider of live attack intelligence, has announced the next-generation version of its popular 
Seattle, WA, July 15 – IOActive, Inc., the worldwide provider of research-driven security services, has announced that it has become a member of the Institute for Critical Infrastructure Technology (ICIT). IOActive will be instrumental in helping the ICIT strengthen its advisory services in areas related to Smart Cities, including cyber security around Internet of Things (IoT), including vehicles, smart grids, and devices.
Millis, MA, July 15 – Kanguru announces the addition of new SuperSpeed USB 3.0 technology to its Defender secure flash drives, providing unsurpassed security and convenience for data.
Phoenix, AZ, July 15 – BeyondTrust, the global cybersecurity company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks, has announced the appointment of Lisa Donnan to vice president of Federal. In her new position, Donnan will leverage her successful track record of growing federal business over the past 20 years to further expand BeyondTrust’s reputation as a global leader in the Privileged Account Management (PAM) and Vulnerability Management (VM) markets.
July 14, 2015 – Sunnyvale, CA – Good Technology, a provider of secure mobility services, has announced that the U.S. Navy has implemented the HP Mobile Management Solution leveraging Good for Enterprise to secure official government data on multiple mobile device platforms. The Good Technology solution enables the Navy to offer more device choices to U.S. Navy personnel while securing their mission-critical data.
Hood River, OR, July 6 – Sierra-Olympic Technologies (www.sierraolympic.com), supplier of infrared (IR) and thermal imaging components, cameras, and systems solutions for advanced imaging applications, has introduced The Oculus series by Silent Sentinel, Ltd. The new environmentally-rugged outdoor video surveillance systems feature simultaneous visible and thermal imaging outputs. The continuous zoom optical cameras, available in either standard definition (SD) or high definition (HD), are paired with fixed field of view (FOV) thermal ima

Commentary and Opinions

By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
Washington, March 18 – The National Retail Federation has presented Congress with practical, commonsense and achievable solutions to better protect consumers and help businesses prevent cyberattacks and data breaches.“We should not be satisfied with simply determining what to do after a data breach occurs,” NRF senior vice president for Government Relations David French said. “Instead, it is important to look at why such breaches occur and what the perpetrators get out of them so that we can find ways to reduce and prevent not only the breaches themselves but the follow-on harm.”
By Nimrod LuriaPolice and FBI are investigating defacement attacks on numerous North American websites in which attackers placed an ISIS flag banner on website home pages and played an Arabic song in the background, as reported by NBC News.The sites appear to have one thing in common: they are all built on the WordPress content management platform.
 

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.