Access Control | Identification

Featured Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.

News

Mon, 2015-05-04 02:44 AM
Washington, May 1 – Director James B. Comey has named Joseph M. Demarest, Jr. to the newly established position of associate executive assistant director for the FBI’s Criminal, Cyber, Response, and...
Wed, 2015-04-29 07:35 PM
­Fort George G. Meade, MD – The U.S. Naval Academy has won the 2015 Cyber Defense Exercise (CDX), capturing its third trophy since the annual competition began in 2001, the National Security Agency (...
Tue, 2015-04-28 04:06 PM

Janice Kephart

Washington, April 28, 2015 – In testimony before the Senate Homeland Security Committee, former 9/11 Commission border counsel Janice Kephart has called upon the Department of Homeland Security to...
Fri, 2015-04-24 12:01 AM

Robert Bonner

Editor’s Note: On April 21, the first day of the 9th Border Security Expo, held in Phoenix, AZ, Robert C. Bonner, as a member of the Expo’s advisory board, was prepared to present the prestigious...
Tue, 2015-04-21 08:14 PM
Las Vegas, NV, April 21 – Artificial intelligence, which has been used to entertain through toys such as Tamagotchi, as well as to reap profit from picking investments, is now being used by Houston-...
Sun, 2015-04-19 06:53 PM
The same ultrasound technology that allows expectant parents to look at their offspring in utero has been showcased in fingerprint biometrics by Sonovation at ISC West, the spring trade show of...
Fri, 2015-04-17 12:13 AM
Sydney, Australia, April 15 – The Ministry of Interior for the United Arab Emirates was selected this week as the next chair of the Virtual Global Taskforce (VGT), an international alliance of law...
Wed, 2015-04-15 11:39 PM
Singapore, April 13 – Ministers and senior police officials from around the world have gathered at the official opening of the INTERPOL Global Complex for Innovation (IGCI), which is set to empower...
Mon, 2015-04-13 12:43 AM
Washington, April 9 – The Federal Bureau of Investigation (FBI) and the National Cyber Investigative Joint Task Force-International Cyber Crime Coordination Cell (IC4) has coordinated with Europol’s...
Thu, 2015-04-09 11:32 PM
Washington, April 9 – A member of the identity theft and credit card fraud ring known as “Carder.su” has been sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards...
Wed, 2015-04-08 10:56 PM
One focus of the ASIS 25th New York City Security Conference and Expo, to be held April 22-23, will be educational sessions on current topics in terrorism. But the event will also consist of many...
Tue, 2015-04-07 06:42 PM
Port Canaveral, FL – As a recipient of only 1.5% of the DHS federal grants, says Captain Tom Allan, Commandant of Sector Jacksonville, FL, the U.S. Coast Guard is “the best bargain you’re ever going...

Pages

Company News

Kroll Ontrack research: data loss due to IT administrator oversights may heighten information security risks
Minneapolis, MN, June 9 – Kroll Ontrack has released its most recent list of common IT administrator errors that can lead to data loss and network downtime. The findings indicate that the complexity in storage environments and sheer growth in data volume can mean impactful data loss when human error strikes, leaving many organizations vulnerable...
Carillon Federal Services and Telos ID team to issue PIV-I credentials
Vienna & Ashburn, VA, June 9 – Carillon Federal Services Inc. and Telos Identity Management Solutions, LLC, have agreed to collaborate on high assurance interoperable Personal Identity Verification (PIV-I) credentials for use with Telos ID’s TSA Designated Aviation Channeling and FBI channeling programs. Carillon is licensed by the U.S....
Entrust Datacard announces self-service kiosk-optimized instant issuance system
Minneapolis, MN, June 9 – Entrust Datacard has announced the availability of the next-generation kiosk-optimized Datacard® CE870TM instant issuance system that enables financial institutions, retailers, governments and healthcare organizations to instantly issue permanent embossed or flat payment cards or identification cards through a self-...
Navigant deepens risk management, compliance and security capabilities within the Energy Practice
Chicago, June 8 – Navigant (NYSE: NCI) has announced the addition of several seasoned professionals to join the Firm’s Energy practice as part of a newly formed Risk Management, Compliance and Security (RMCS) solution offering team. Brian Harrell and Chris Luras are joining recent additions Ed Dobrowolski and Matt Blizard to further expand the...
Avecto: Sandboxing, not antivirus, the top priority for security professionals
Washington, June 8 – Gartner Security & Risk Management Summit – Sandboxing has come to the top of a global survey as the most effective defense strategy against malware, as security leaders wake up to proactive measures. Endpoint security company Avecto surveyed more than 200 professionals at global security shows and found that holistically...
DSC Touch ‘all-in-one’ system features built-in camera and Android technology
Toronto, June 5 – DSC, part of the Security Products business unit of Tyco, has announced the introduction of DSC Touch, an advanced home automation solution complete with a 7-inch touchscreen, Android-based software, Alarm.com integration, dual-path connectivity with integrated Wi-Fi and Cellular and Z-Wave enabled technology as the latest...
Digital Guardian releases Digital Guardian App for Splunk
Waltham, MA, June 4 – Digital Guardian, an endpoint security platform built to stop data theft, has released the Digital Guardian App for Splunk. The Digital Guardian App for Splunk harnesses the power of Splunk® Enterprise’s big data analytics capabilities to more rapidly detect and respond to insider attacks and advanced threats targeting...
Accuvant and FishNet Security to host free webcast on building confidence in your information security posture
Denver & Overland Park, KS, June 2 – Accuvant and FishNet Security, which recently joined together to create a major cyber security solutions provider, has announced their next Knowledge Share Series webcast, “Building Confidence in Your Information Security Posture,” will take place on Thursday, June 11, 2015 at 9:00 a.m. PDT/12:00 p.m. EDT....
Visa and FireEye join forces to help merchants, financial institutions defend against targeted attacks on consumer payment data
San Francisco & Milpitas, June 3 – Visa Inc. (NYSE:V) and FireEye, Inc. (NASDAQ:FEYE) have announced their intention to co-develop tools and services to help merchants and issuers protect against advanced cyber attacks targeting payment data. The first of its kind Visa and FireEye Community Threat Intelligence (CTI) offering will bring...
IT industry luminary Shlomo Kramer joins board and invests in LightCyber
Los Altos, CA, Ramat Gan, Israel, June 4 – LightCyber, a provider of Active Breach Detection solutions, has announced that network security business luminary Shlomo Kramer has joined its board of directors. Kramer is best known as the co-founder of Check Point Software, founder and CEO of Imperva, early investor and board member of Palo Alto...

Pages

 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Commentary and Opinions

The September 11, 2001 attacks spurred increased interest in the use of biometric technologies to improve the security of visa and immigration documentation and government-issued identification card...
Massive volumes of information and data are readily available across the Internet. Potential sources of valuable intelligence are contained in an endless array of Web sites, online media outlets,...
Incident command occurs at the local level, and during any disaster incident that local emergency response officials manage, they need to be confident that an individual's most current...
User authentication is widely considered the weakest link in any security system, whether it controls access to buildings, computers or networks. Local, state and federal agencies struggle with...
Government at every level—federal, state, and local—is focused on effectively serving constituents while simultaneously increasing the ability to cope with evolving security issues, share...

Pages

White Papers

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here