Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Wed, 2013-08-28 02:58 PM

Rajeev Dubey

Vector Electric Inc. (VEI), along with a number of design partners, has installed a new integrated, comprehensive security solution, incorporating the Brivo ACS OnSite Aparato, at the Customs and...
Tue, 2013-08-20 04:24 PM
MorphoTrak, Inc., a biometric identity management company, has partnered with IdentityOne to deliver BIOGUARD, a system that identifies inmates through their fingerprints. 
Tue, 2013-08-20 09:31 AM

GSN now displays
corporate videos on
its Web site

As part of an expansion of promotional opportunities on its Web site, Government Security News has adopted a new policy of accepting paid corporate videos on the home page and the Web site’s 18...
Thu, 2013-08-15 04:56 PM

Boarding pass
scanner
by Desko

TSA has awarded three different companies IDIQ contracts, each with a ceiling value of $5.5 million, to supply boarding pass scanners for use at U.S. airports. According to separate award notices...
Mon, 2013-08-12 03:21 PM
Detex Corporation announced on August 8 that it is offering a new maximum security life safety door hardware system designed for retail.  Installed on doors that require higher levels of...
Mon, 2013-08-12 12:19 PM

Rep. Tulsi Gabbard

President Barack Obama signed on August 9 the bipartisan, bicameral Helping Heroes Fly Act (H.R. 1344), which aims to improve airport security screening processes for wounded and severely disabled...
Fri, 2013-08-09 03:39 PM

Traveler using a
Global Entry kiosk

CBP’s Global Entry trusted traveler program, which currently is open only to U.S. citizens and permanent residents, Mexican nationals and some citizens of the Netherlands, has been opened up...
Mon, 2013-08-05 04:09 PM

Charles Edwards,
deputy IG at DHS

The DHS inspector general’s office has taken a look at the process by which DHS adds the names of individuals to the nation’s terrorist “watchlist” and, while acknowledging that new procedures at DHS...
Wed, 2013-07-31 02:21 PM

SEEK II device
by CrossMatch

Customs and Border Protection is planning to procure 67 handheld mobile biometric capture devices manufactured by CrossMatch Technologies, of Palm Beach Gardens, FL, or an equivalent product, for use...
Tue, 2013-07-30 03:08 PM

Mobile TWIC card reader
from Intellicheck Mobilisa

Progress in the nation’s TWIC program has been painfully slow since 9/11, with hundreds of thousands of port employees and visiting truck divers being issued TWIC cards, but with TWIC readers -- the...
Mon, 2013-07-29 06:17 PM

U.S. Government returns
Saddam Hussein's sword
to government of Iraq

A ceremonial sword, looted in 2003 from Saddam Hussein’s personal office in Baghdad, was returned to the Republic of Iraq Monday by U.S. Immigration and Customs Enforcement’s (ICE) Homeland Security...
Mon, 2013-07-29 10:42 AM

Commercial vehicles lined up
to enter U.S. at Otay Mesa
crossing in California in 2011

The U.S. Government Accountability Office (GAO) released a report on July 24 entitled, CBP Action Needed to Improve Wait Time Data and Measure Outcomes of Trade Facilitation Efforts, a study eagerly...

Company News

London, June 2 – Infosecurity Europe – Handing control of sensitive data to a third-party cloud service provider remains one of the biggest data compliance challenges today.
Dallas, June 3 – Zix Corporation (ZixCorp), (NASDAQ: ZIXI), brings awareness to the insecurity of email by showcasing an email hack by former blackhat and world famous hacker Kevin Mitnick. During the recording, Mitnick will demonstrate one method used by hackers to intercept email and steal valuable company or personal data, leveraging resources available for just a few hundred dollars. “Hackers want to get access to email. They can intercept your email all the time, and you’re clueless,” said Mitnick. “The only way to protect your communications is encryption.”
Fairfax, VA, June 3 – Logos Technologies has announced its new compact, ultra-lightweight, wide-area motion imagery (WAMI) sensor system, 
Newton, MA, June 2 – CyberArk Software Ltd. (NASDAQ: CYBR), the company that protects organizations from cyber attacks that have made their way inside the network perimeter, has announced an independent study from Nucleus Research on customer return on investment (ROI).
Zug, June 2 – Allied World Assurance Company Holdings, AG announced today that Allied World North America has launched Allied World // FrameWRX℠ (“FrameWRX”), a prescriptive and proactive cyber risk management solution designed to empower companies to address this challenging area of exposure head on.
Parsippany, NJ, June 1 – Vanderbilt Industries, a global provider of technologies that help organizations ensure safety and security, has announced that it has completed the acquisition of the Security Products business from Siemens.
Tustin, CA, June 1 – GOTrust Technology Inc. (GO-Trust®) has announced the availability of cryptographic tokens that meet and exceed the NIST (SP800-157) Derived PIV Credentials Guidelines for mobile devices.
Paris, June 1 – Arkoon Netasq, a subsidiary of Airbus Defence and Space and a cybersecurity provider, now offers a solution combining Unified Threat Management (UTM) and a next-generation firewall to meet the requirements of organizations wishing to secure their access to Amazon Web Services (AWS) environments on a scalable basis.
 

June 2016 Digital Edition

 

Click Here

April 2016 Digital Edition

Click Here

March 2016 Digital Edition

Click Here

February 2016 Digital Edition

 

Click Here

January 2016 Digital Edition

 

Click Here

December 2015/January 2016 Digital Edition

 

Click Here

Technology Sectors

Market Sectors

Commentary and Opinions

London, August 10 - The latest 364 page report from business intelligence provider visiongain offers comprehensive analysis of the global border security market. Visiongain assesses that this market will generate revenues of $16.4bn in 2015.
By Steve Bittenbender Republican presidential candidate Jeb Bush unveiled on Monday a proposal to tackle immigration issues, saying any plan that addresses amnesty for illegal aliens must also come with a “robust strategy to improve border security.”
Teaneck, NJ, July 14 – Multi-factor authentication – a security protection required by US government standards – could have prevented the recent Internal Revenue Service (IRS) and Office of Personnel Management (OPM) security breaches that have exposed the personal information of millions of citizens to hackers, spies and cyber-criminals. The Federal government has been encouraging its agencies to use multi-factor authentication since November 2009, when it published the FICAM (Federal Identity and Access Management) Roadmap and Implementation Guidance.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.