Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Tue, 2013-05-14 06:55 PM

Bridgepoint
Biometric
Scanner

Quintron Systems, of Santa Maria, CA, has announced the integration of its AccessNsite access control system with Bridgepoint’s new TrustPoint 3-factor biometric reader. 
Fri, 2013-05-10 04:20 PM
The Coast Guard has decided to extend by 30 days the comment period for individuals and organizations who want to offer their opinion on the proposed new Coast Guard rule that would require certain...
Fri, 2013-05-10 02:25 PM

U.S. Border Crossing Card

The U.S. State Department wants to gather technical and capabilities information from prospective vendors that can provide the hardware, equipment, maintenance and, possibly, the printing of many...
Tue, 2013-05-07 08:49 AM

Holly Tsourides

Matrix Systems, an access control and security solutions provider, has appointed Holly Tsourides as its new Chief Executive Officer to lead the company into its next phase of development and growth....
Thu, 2013-05-02 11:04 AM
SICPA Securink Corp., a Swiss-based company with a North American headquarters in Springfield, VA, has been awarded a contract worth more than $671,000 to provide a “unique blue hue” security ink and...
Mon, 2013-04-29 03:19 PM
TSA has announced its intention to purchase an unspecified quantity of boarding pass scanners and associated support services, under “full and open competition,” in a presolicitation notice it...
Fri, 2013-04-26 08:38 AM

Gateway Community
College

A 19-year-old woman from East Haven, CT, pleaded guilty on April 25 to threatening a violent attack at a nearby community college that was possibly inspired by the mass shooting at Newtown Elementary...
Fri, 2013-04-26 07:42 AM

Boarding pass
notification

Airline passengers can now get notification directly on their boarding passes of their eligibility for TSA’s Pre Check security pre-approval program. The TSA said on its blog page on April 25 that...
Thu, 2013-04-25 04:59 PM
Following up on a record number of entries and a rousing awards dinner at the Washington, DC Convention Center in 2012, Government Security News has announced that its 2013 Homeland Security Awards...
Wed, 2013-04-24 09:01 AM

Philadelphia International

A French man who used a bogus identification card to gain access to a commercial airliner sitting at a gate at Philadelphia International Airport in March has been charged with fraud. Federal...
Tue, 2013-04-23 07:15 AM
The TSA will hold off on its order to allow smaller-bladed knives and other previously-prohibited items back on board commercial aircraft pending further input from the public. The order would have...
Mon, 2013-04-22 01:29 PM

Martel
Valencia-Cortez

The same week Boston was struggling with capturing an elusive terror suspect, U.S. Border Patrol agents arrested a dangerous alien smuggler that has menaced the San Diego area for months. In the...

Company News

Atlanta and San Francisco, April 20 – Damballa, a provider of advanced threat detection and cont
Alexandria, VA, April 20 – CSG Invotas, a provider of security orchestration and automation, has unveiled Security Orchestrator 3.0 to accelerate data breach response time, minimize the impact of breaches, and enable internal resources to devote more time to high-impact security initiatives.
Las Vegas, NV, April 16 – Moxa, a manufacturer of communications equipment for harsh environments, has unveiled at the International Security Conference & Exposition (ISC) the new flagship of its IP network video surveillance family: the VPort™ 66-2MP.
Seattle, WA, April 14 – F5 Networks (NASDAQ:FFIV) has announced a new cloud-delivered manag
Sunnyvale, CA, April 16 – Agiliance®, Inc., the Big Data Risk Company™ and independent provider of integrated solutions for operational and security risk intelligence, has announced that Vice President and Chief Security Strategist Torsten George has been invited to present a session on the Four Essential Building Blocks for Cyber Securi
Los Altos, CA & Ramat Gan, Israel, April 16 – LightCyber, a provider of Active Breach Detection solutions, has announced it will be exhibiting at the RSA Conference in San Francisco, April 20-23, 2015. Where: Booth 130, South Hall, Moscone Convention Center, San Francisco.
New York & London, April 16 – EXIGER, the global regulatory and financial crime, risk and compliance firm has announced the appointment of Jeff Schlanger as managing director & president of EXIGER Advisory, EXIGER’s specialized consulting division, which executes the firm’s monitoring assignments and delivers sustainable governance, risk management and re
Houston, April 15 – Softness, one of the bestselling NAS in the cloud, has announced the availability of SoftNAS Cloud Version 3.3. Created for cloud environments, SoftNAS provides cloud storage security and speeds backup and archival to Amazon Simple Storage Service (S3) in comparison to previous SoftNAS Cloud versions, permitting users to experience performance speed as fast as that of primary data access. SoftNAS keeps customer data totally within the users control while in the cloud. Extending Security and Data Protection in Cloud Environments

Commentary and Opinions

Teaneck, NJ, July 14 – Multi-factor authentication – a security protection required by US government standards – could have prevented the recent Internal Revenue Service (IRS) and Office of Personnel Management (OPM) security breaches that have exposed the personal information of millions of citizens to hackers, spies and cyber-criminals. The Federal government has been encouraging its agencies to use multi-factor authentication since November 2009, when it published the FICAM (Federal Identity and Access Management) Roadmap and Implementation Guidance.
By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
 

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.