Access Control | Identification

Featured Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.

News

Wed, 2015-01-21 09:31 PM
During bilateral meetings in Washington last week, President Obama and Prime Minister David Cameron agreed to further strengthen and deepen cybersecurity cooperation between the United States and the...
Tue, 2015-01-20 08:29 PM

John Walsh

The MacDonnell Group of Halifax, Nova Scotia has announced that John Walsh, CEO of Port Canaveral, will deliver the opening presentation and welcome remarks at its 2015 Port Security Operations...
Tue, 2015-01-13 07:47 PM
Director James B. Comey has named Roger C. Stanton special agent in charge of the FBI’s Birmingham Division. Stanton most recently served as section chief of the Counter-Improvised Explosive Devices...
Mon, 2015-01-12 07:59 PM
Director James B. Comey has named Scott Bean special agent in charge of the FBI’s Administrative Division of the Washington Field Office (WFO). Bean most recently served as section chief for the...
Tue, 2015-01-06 02:30 AM

Timothy DeFoggi

The former acting director of cyber security at the U.S. Department of Health and Human Services was sentenced to 25 years in federal prison Monday for engaging in a child exploitation enterprise and...
Tue, 2014-12-30 05:15 PM
U.S. Customs and Border Protection has announced a reciprocal arrangement with Germany for each nation’s trusted traveler program -- the U.S. Global Entry program and the German EasyPASS. Global...
Wed, 2014-12-24 12:21 AM

Lawrence Dietz

Cyber security is an all-engulfing term that has different meanings depending on the context. For example: cyber security in the utility industry is not like cyber security in the legal profession,...
Tue, 2014-12-23 07:10 PM

Sarah Saldana

In comments made following the confirmation of former U.S. Attorney Sarah R. Saldana of the Northern District of Texas as Assistant Secretary of U.S. Immigration and Customs Enforcement (ICE), DHS...
Tue, 2014-12-23 05:17 PM
Director James B. Comey has named David Bowdich the assistant director in charge of the Los Angeles Field Office. Since September 2012, Bowdich has served as special agent in charge (SAC) of the Los...
Mon, 2014-12-22 06:51 PM
Attorney General Eric Holder announced last week that the number of people in the adult correctional systems in the United States has fallen to its lowest level since 2003. The finding is highlighted...
Thu, 2014-12-18 07:57 PM

Diego G. Rodriguez

Director James B. Comey has named Diego G. Rodriguez the assistant director in charge (ADIC) of the FBI’s New York Field Office. In this role, he will oversee all operations and personnel in the five...
Tue, 2014-12-09 06:33 PM
The FBI Monday released Hate Crime Statistics, 2013, the Uniform Crime Reporting (UCR) Program’s first publication to present data collected under the Matthew Shepard and James Byrd, Jr. Hate Crime...

Company News

Newark, NJ, July 1 – Ushering in the highest standard for 4K imaging and performance in a video surveillance solution, Panasonic System Communications Company of North America has begun shipping the first of its new True 4K cameras, featuring a 12 megapixel 4K ULTRA HD imaging sensor.
When the content managers of a global technology company with a sterling reputation for delivering outstanding products and services learned that the corporate focus was shiftingto becoming green, in part through making content mobile, they quickly realized that a digitization strategy that scales to a global level would be an imperative.
Pittsburgh, PA, June 30 – Black Box Corporation, a technology solutions provider, has announced it is one of 20 industry partners awarded prime contractor status to provide information technology products and solutions to the United States Air Force through its Network-Centric Solutions 2 (NETCENTS-2) NetOps and Infrastructure Solutions Full and Open, Indefinite Delivery, Indefinite Quantity contract. NETCENTS-2 contracts provide the Air Force with a primary source of IT products, services and solutions.
Aix-En-Provence, June 29 – INSIDE Secure (Euronext Paris:INSD), a leader in embedded security solutions for mobile and connected devices, today announced availability of SafeZone FIPS cryptographic module version 1.1—the industry’s first FIPS certified cryptographic module validated on a Trusted Execution Environment (TEE).
London, June 26 – Advanced endpoint security vendor Malwarebytes has announced it has selected Blue Solutions as its first UK distributor, as part of a wider expansion into EMEA enterprise markets.
Hartford, CT, June 25 – Most midsize business leaders view a data breach among their top risks and a majority consider IT security “very important” when selecting a supplier, according to The Hartford’s survey of midsize business owners and C-level executives.
Paris, June 25 – Arkoon Netasq, a subsidiary of Airbus Defence and Space and a cyber security provider, has released version 9.1 of Stormshield Data Security, its software suite dedicated to data protection. This new version allows users to exchange email messages securely on the cloud, to protect their data on tablets on the move and to take advantage of the latest trends in technology like working on the move or collaboratively.
Moonachie, NJ, June 26 – A global provider of IT solutions and ICT services, Samsung SDS America, Inc. (Samsung SDSA) has announced that the 
 

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Sept 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Commentary and Opinions

The September 11, 2001 attacks spurred increased interest in the use of biometric technologies to improve the security of visa and immigration documentation and government-issued identification card programs. Unlike traditional identification methods, which require individuals to present an identification card, a personal identification number (PIN) or a password, biometric identifiers rely on unique biological information about an individual, which is much more difficult to falsify. Iris recognition technology -- a form of biometric technology that uses pattern-recognition techniques and high-resolution images of an individual's iris -- generated significant initial interest because it is a highly accurate and less intrusive system for identification and verification than fingerprinting and other methods. Nearly 80 percent of the 1,000 U.S. residents surveyed for the Unisys Security Index, released in October 2009, said that they would be willing to use iris recognition technology. Widespread adoption remains elusive, particularly in the public sector, due to concerns about interoperability between various iris recognition technologies and a desire to avoid 'vendor lock-in,' or standardizing on a single vendor's solution.
Massive volumes of information and data are readily available across the Internet. Potential sources of valuable intelligence are contained in an endless array of Web sites, online media outlets, blogs and social networking communities. At the same time, homeland security organizations manage internal databases and access external information sources. The difficulty of connecting the unstructured textual information collected from Internet resources with structured databases restricts the contribution of Open Source Intelligence (OSINT) to the overall investigation cycle. Semantic Web offers a solution by establishing a standard for representing knowledge, such that there is a common language between computer processing and human intentions. An essential component of Semantic Web is ontology, which describes how concepts are represented in a certain knowledge domain. Using Semantic Web technology along with the appropriate ontology allows dissimilar information gathered from the Internet and stored in organizational databases to be mapped into a common semantic representation.
Incident command occurs at the local level, and during any disaster incident that local emergency response officials manage, they need to be confident that an individual's most current qualifications are readily available in order to rapidly and accurately verify the credentials of on-scene personnel.
User authentication is widely considered the weakest link in any security system, whether it controls access to buildings, computers or networks. Local, state and federal agencies struggle with striking a balance when providing users with identification procedures that are secure and, at the same time, convenient to use. Unfortunately, convenience is often sacrificed to meet security needs, requiring users to constantly change lengthy and cryptic passwords or carry badges and tokens that can be lost, "borrowed" or stolen. As a result, passwords and ID tokens, which are easily hacked and often forgotten, not only provide inadequate security but are also a constant headache for users and IT staff.
Government at every level—federal, state, and local—is focused on effectively serving constituents while simultaneously increasing the ability to cope with evolving security issues, share critical information, and maintain a growing IT infrastructure. Issues at the forefront, such as maintaining and improving IT security and complying with federal regulations, must be addressed. Even when administrators lock up their servers, apply patches and use group policy to lock down server and workstation security, it can still only take a few minutes for a hacker to unlock the keys to the kingdom: administrator/root accounts and passwords. Anyone with initiative can gain unrestricted access to systems without leaving a trace.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.