Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Wed, 2015-04-29 07:35 PM
­Fort George G. Meade, MD – The U.S. Naval Academy has won the 2015 Cyber Defense Exercise (CDX), capturing its third trophy since the annual competition began in 2001, the National Security Agency (...
Tue, 2015-04-28 04:06 PM

Janice Kephart

Washington, April 28, 2015 – In testimony before the Senate Homeland Security Committee, former 9/11 Commission border counsel Janice Kephart has called upon the Department of Homeland Security to...
Fri, 2015-04-24 12:01 AM

Robert Bonner

Editor’s Note: On April 21, the first day of the 9th Border Security Expo, held in Phoenix, AZ, Robert C. Bonner, as a member of the Expo’s advisory board, was prepared to present the prestigious...
Tue, 2015-04-21 08:14 PM
Las Vegas, NV, April 21 – Artificial intelligence, which has been used to entertain through toys such as Tamagotchi, as well as to reap profit from picking investments, is now being used by Houston-...
Sun, 2015-04-19 06:53 PM
The same ultrasound technology that allows expectant parents to look at their offspring in utero has been showcased in fingerprint biometrics by Sonovation at ISC West, the spring trade show of...
Fri, 2015-04-17 12:13 AM
Sydney, Australia, April 15 – The Ministry of Interior for the United Arab Emirates was selected this week as the next chair of the Virtual Global Taskforce (VGT), an international alliance of law...
Wed, 2015-04-15 11:39 PM
Singapore, April 13 – Ministers and senior police officials from around the world have gathered at the official opening of the INTERPOL Global Complex for Innovation (IGCI), which is set to empower...
Mon, 2015-04-13 12:43 AM
Washington, April 9 – The Federal Bureau of Investigation (FBI) and the National Cyber Investigative Joint Task Force-International Cyber Crime Coordination Cell (IC4) has coordinated with Europol’s...
Thu, 2015-04-09 11:32 PM
Washington, April 9 – A member of the identity theft and credit card fraud ring known as “Carder.su” has been sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards...
Wed, 2015-04-08 10:56 PM
One focus of the ASIS 25th New York City Security Conference and Expo, to be held April 22-23, will be educational sessions on current topics in terrorism. But the event will also consist of many...
Tue, 2015-04-07 06:42 PM
Port Canaveral, FL – As a recipient of only 1.5% of the DHS federal grants, says Captain Tom Allan, Commandant of Sector Jacksonville, FL, the U.S. Coast Guard is “the best bargain you’re ever going...
Thu, 2015-04-02 06:06 PM

Josh Shapiro 

Harrisburg, PA, April 1 – Governor Tom Wolf has announced that he has named Montgomery County Commissioners' Chairman Josh Shapiro the chair of the Pennsylvania Commission on Crime and Delinquency."I...

Company News

Pittsburgh, PA, June 30 – Black Box Corporation, a technology solutions provider, has announced it is one of 20 industry partners awarded prime contractor status to provide information technology products and solutions to the United States Air Force through its Network-Centric Solutions 2 (NETCENTS-2) NetOps and Infrastructure Solutions Full and Open, Indefinite Delivery, Indefinite Quantity contract. NETCENTS-2 contracts provide the Air Force with a primary source of IT products, services and solutions.
Aix-En-Provence, June 29 – INSIDE Secure (Euronext Paris:INSD), a leader in embedded security solutions for mobile and connected devices, today announced availability of SafeZone FIPS cryptographic module version 1.1—the industry’s first FIPS certified cryptographic module validated on a Trusted Execution Environment (TEE).
London, June 26 – Advanced endpoint security vendor Malwarebytes has announced it has selected Blue Solutions as its first UK distributor, as part of a wider expansion into EMEA enterprise markets.
Hartford, CT, June 25 – Most midsize business leaders view a data breach among their top risks and a majority consider IT security “very important” when selecting a supplier, according to The Hartford’s survey of midsize business owners and C-level executives.
Paris, June 25 – Arkoon Netasq, a subsidiary of Airbus Defence and Space and a cyber security provider, has released version 9.1 of Stormshield Data Security, its software suite dedicated to data protection. This new version allows users to exchange email messages securely on the cloud, to protect their data on tablets on the move and to take advantage of the latest trends in technology like working on the move or collaboratively.
Moonachie, NJ, June 26 – A global provider of IT solutions and ICT services, Samsung SDS America, Inc. (Samsung SDSA) has announced that the 
Portland, OR, June 25 – Tripwire, Inc., a provider of advanced threat, security and compliance solutions, has announced the results of a survey conducted by Dimensional Research. The survey examined the views of over 400 executives and IT professionals in the energy, oil, gas and utility industries on cybersecurity and compliance initiatives.
Pasadena, CA, June 24 – Guidance Software, Inc. (NASDAQ: GUID) a provider of digital investigations, has unveiled 

Commentary and Opinions

By Kirk Spring As we’ve seen by recently reported hacks of healthcare networks, security breaches are becoming commonplace. Attacks on secure networks can come from internal or external sources. “Breach prevention” is no longer a workable strategy.
Washington, March 18 – The National Retail Federation has presented Congress with practical, commonsense and achievable solutions to better protect consumers and help businesses prevent cyberattacks and data breaches.“We should not be satisfied with simply determining what to do after a data breach occurs,” NRF senior vice president for Government Relations David French said. “Instead, it is important to look at why such breaches occur and what the perpetrators get out of them so that we can find ways to reduce and prevent not only the breaches themselves but the follow-on harm.”
By Nimrod LuriaPolice and FBI are investigating defacement attacks on numerous North American websites in which attackers placed an ISIS flag banner on website home pages and played an Arabic song in the background, as reported by NBC News.The sites appear to have one thing in common: they are all built on the WordPress content management platform.
By Fraser ThomasLast week the US Congress began the process of making President Obama’s State of the Union address, where he focused on ways to secure the nation's businesses and infrastructure in cyberspace, a reality.On Wednesday two House members reintroduced a bill requiring companies to meet a specific set of data security standards when handling customers’ personal information.
 

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.