Access Control | Identification

Featured Videos

IntraLogic's official release of the "One Button" Lockdown system on CBS 2 News.


Sun, 2015-04-19 06:53 PM
The same ultrasound technology that allows expectant parents to look at their offspring in utero has been showcased in fingerprint biometrics by Sonovation at ISC West, the spring trade show of...
Fri, 2015-04-17 12:13 AM
Sydney, Australia, April 15 – The Ministry of Interior for the United Arab Emirates was selected this week as the next chair of the Virtual Global Taskforce (VGT), an international alliance of law...
Wed, 2015-04-15 11:39 PM
Singapore, April 13 – Ministers and senior police officials from around the world have gathered at the official opening of the INTERPOL Global Complex for Innovation (IGCI), which is set to empower...
Mon, 2015-04-13 12:43 AM
Washington, April 9 – The Federal Bureau of Investigation (FBI) and the National Cyber Investigative Joint Task Force-International Cyber Crime Coordination Cell (IC4) has coordinated with Europol’s...
Thu, 2015-04-09 11:32 PM
Washington, April 9 – A member of the identity theft and credit card fraud ring known as “” has been sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards...
Wed, 2015-04-08 10:56 PM
One focus of the ASIS 25th New York City Security Conference and Expo, to be held April 22-23, will be educational sessions on current topics in terrorism. But the event will also consist of many...
Tue, 2015-04-07 06:42 PM
Port Canaveral, FL – As a recipient of only 1.5% of the DHS federal grants, says Captain Tom Allan, Commandant of Sector Jacksonville, FL, the U.S. Coast Guard is “the best bargain you’re ever going...
Thu, 2015-04-02 06:06 PM

Josh Shapiro 

Harrisburg, PA, April 1 – Governor Tom Wolf has announced that he has named Montgomery County Commissioners' Chairman Josh Shapiro the chair of the Pennsylvania Commission on Crime and Delinquency."I...
Thu, 2015-04-02 02:45 AM
Washington, April 1 – Director James B. Comey has appointed three new executives as special agents in charge at the FBI New York Office (NYO). George Ennis was named special agent in charge of the...
Tue, 2015-03-24 11:27 PM
Following a successful launch of its Airport, Seaport and Border Security Awards in 2014, Government Security News has announced the opening of its second annual version of the program, which opened...
Sun, 2015-03-15 08:08 PM
Alexandria, VA – ASIS International (ASIS) will honor New York City Police Commissioner William J. Bratton with its 2015 Person of the Year Award at a luncheon at noon on Thursday, April 23 in New...
Wed, 2015-03-11 09:39 PM
Washington, March 11 -- The Federal Bureau of Investigation (FBI) is commemorating its Ten Most Wanted Fugitives program, created 65 years ago.

Company News

Morrisville, VT & Dallas, TX, July 1 – Zix Corporation (ZixCorp), (Nasdaq: ZIXI), a provider of email data protection, has announced that Union Bank enables employee access to corporate data on mobile devices through 
Newark, NJ, July 1 – Ushering in the highest standard for 4K imaging and performance in a video surveillance solution, Panasonic System Communications Company of North America has begun shipping the first of its new True 4K cameras, featuring a 12 megapixel 4K ULTRA HD imaging sensor.
When the content managers of a global technology company with a sterling reputation for delivering outstanding products and services learned that the corporate focus was shiftingto becoming green, in part through making content mobile, they quickly realized that a digitization strategy that scales to a global level would be an imperative.
Pittsburgh, PA, June 30 – Black Box Corporation, a technology solutions provider, has announced it is one of 20 industry partners awarded prime contractor status to provide information technology products and solutions to the United States Air Force through its Network-Centric Solutions 2 (NETCENTS-2) NetOps and Infrastructure Solutions Full and Open, Indefinite Delivery, Indefinite Quantity contract. NETCENTS-2 contracts provide the Air Force with a primary source of IT products, services and solutions.
Aix-En-Provence, June 29 – INSIDE Secure (Euronext Paris:INSD), a leader in embedded security solutions for mobile and connected devices, today announced availability of SafeZone FIPS cryptographic module version 1.1—the industry’s first FIPS certified cryptographic module validated on a Trusted Execution Environment (TEE).
London, June 26 – Advanced endpoint security vendor Malwarebytes has announced it has selected Blue Solutions as its first UK distributor, as part of a wider expansion into EMEA enterprise markets.
Hartford, CT, June 25 – Most midsize business leaders view a data breach among their top risks and a majority consider IT security “very important” when selecting a supplier, according to The Hartford’s survey of midsize business owners and C-level executives.
Paris, June 25 – Arkoon Netasq, a subsidiary of Airbus Defence and Space and a cyber security provider, has released version 9.1 of Stormshield Data Security, its software suite dedicated to data protection. This new version allows users to exchange email messages securely on the cloud, to protect their data on tablets on the move and to take advantage of the latest trends in technology like working on the move or collaboratively.

2017 GSN Airport, Seaport, Border Security Awards 

April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Commentary and Opinions

The September 11, 2001 attacks spurred increased interest in the use of biometric technologies to improve the security of visa and immigration documentation and government-issued identification card programs. Unlike traditional identification methods, which require individuals to present an identification card, a personal identification number (PIN) or a password, biometric identifiers rely on unique biological information about an individual, which is much more difficult to falsify. Iris recognition technology -- a form of biometric technology that uses pattern-recognition techniques and high-resolution images of an individual's iris -- generated significant initial interest because it is a highly accurate and less intrusive system for identification and verification than fingerprinting and other methods. Nearly 80 percent of the 1,000 U.S. residents surveyed for the Unisys Security Index, released in October 2009, said that they would be willing to use iris recognition technology. Widespread adoption remains elusive, particularly in the public sector, due to concerns about interoperability between various iris recognition technologies and a desire to avoid 'vendor lock-in,' or standardizing on a single vendor's solution.
Massive volumes of information and data are readily available across the Internet. Potential sources of valuable intelligence are contained in an endless array of Web sites, online media outlets, blogs and social networking communities. At the same time, homeland security organizations manage internal databases and access external information sources. The difficulty of connecting the unstructured textual information collected from Internet resources with structured databases restricts the contribution of Open Source Intelligence (OSINT) to the overall investigation cycle. Semantic Web offers a solution by establishing a standard for representing knowledge, such that there is a common language between computer processing and human intentions. An essential component of Semantic Web is ontology, which describes how concepts are represented in a certain knowledge domain. Using Semantic Web technology along with the appropriate ontology allows dissimilar information gathered from the Internet and stored in organizational databases to be mapped into a common semantic representation.
Incident command occurs at the local level, and during any disaster incident that local emergency response officials manage, they need to be confident that an individual's most current qualifications are readily available in order to rapidly and accurately verify the credentials of on-scene personnel.
User authentication is widely considered the weakest link in any security system, whether it controls access to buildings, computers or networks. Local, state and federal agencies struggle with striking a balance when providing users with identification procedures that are secure and, at the same time, convenient to use. Unfortunately, convenience is often sacrificed to meet security needs, requiring users to constantly change lengthy and cryptic passwords or carry badges and tokens that can be lost, "borrowed" or stolen. As a result, passwords and ID tokens, which are easily hacked and often forgotten, not only provide inadequate security but are also a constant headache for users and IT staff.
Government at every level—federal, state, and local—is focused on effectively serving constituents while simultaneously increasing the ability to cope with evolving security issues, share critical information, and maintain a growing IT infrastructure. Issues at the forefront, such as maintaining and improving IT security and complying with federal regulations, must be addressed. Even when administrators lock up their servers, apply patches and use group policy to lock down server and workstation security, it can still only take a few minutes for a hacker to unlock the keys to the kingdom: administrator/root accounts and passwords. Anyone with initiative can gain unrestricted access to systems without leaving a trace.

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.