Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2013-05-30 10:44 AM

TWIC enrollment

TSA, which already which has OMB approval to gather personal information from applicants for a Transportation Worker Identification Credential (commonly called a TWIC card) for a period of six months...
Tue, 2013-05-28 11:26 AM
The security system at CBP’s Alpine Air Branch in Alpine, TX, which was knocked out by a lightning strike shortly after it became operational in July 2012, is now in need of replacement and repair....
Sat, 2013-05-25 09:18 PM
Electrosoft Services Inc., of Reston, VA, has announced that it has been awarded a contract for the Department of Veterans Affairs which calls for the deployment of its Enterprise Physical Access...
Tue, 2013-05-21 05:12 PM
TSA announced on May 21 that the agency has screened more than 10 million travelers through TSA Pre lanes.  TSA Pre expedited screening allows travelers to leave on their shoes, light outerwear...
Fri, 2013-05-17 05:55 PM

Stephen Pineau

Viscount Systems, a supplier of security systems and software, announced on May 17 that its Freedom access control technology has been selected for a secured U.S. Government site in Philadelphia, PA...
Wed, 2013-05-15 08:19 PM
The FBI’s Next Generation Identification (NGI) Increment 3, a state-of-the-art biometric identification system, was deployed on May 5, providing significant improvement in latent fingerprint search...
Wed, 2013-05-15 06:45 PM

Video intercom
from Aiphone

Radnor Township School District in Pennsylvania has taken another step in bolstering district security with the installation of JK Series video intercom buzz-in systems by Aiphone at the main...
Tue, 2013-05-14 06:55 PM

Bridgepoint
Biometric
Scanner

Quintron Systems, of Santa Maria, CA, has announced the integration of its AccessNsite access control system with Bridgepoint’s new TrustPoint 3-factor biometric reader. 
Fri, 2013-05-10 04:20 PM
The Coast Guard has decided to extend by 30 days the comment period for individuals and organizations who want to offer their opinion on the proposed new Coast Guard rule that would require certain...
Fri, 2013-05-10 02:25 PM

U.S. Border Crossing Card

The U.S. State Department wants to gather technical and capabilities information from prospective vendors that can provide the hardware, equipment, maintenance and, possibly, the printing of many...
Tue, 2013-05-07 08:49 AM

Holly Tsourides

Matrix Systems, an access control and security solutions provider, has appointed Holly Tsourides as its new Chief Executive Officer to lead the company into its next phase of development and growth....
Thu, 2013-05-02 11:04 AM
SICPA Securink Corp., a Swiss-based company with a North American headquarters in Springfield, VA, has been awarded a contract worth more than $671,000 to provide a “unique blue hue” security ink and...

Company News

New York, April 28 – With cyber risk rapidly becoming a top-of-mind concern for senior executives and boards across industry segments, American International Group (NYSE: AIG) has announced key new partnerships with leading cybersecurity experts to expand the risk mitigation and prevention services it offers cyber insurance clients.
San Francisco, April 23 – Tripwire, Inc., a global provider of advanced threat, security and compliance solutions, has announced that 
Toronto, Canada, April 28 – SecureKey Technologies has announced that it renewed its contract for 2015 with the U.S. Postal Service to enable its U.S. FedRAMP-certified briidge.net Exchange cloud platform to continue serving as the core infrastructure for Connect.Gov.
New York, April 27 – Marsh, a global provider of insurance broking and risk management, has announced the launch of Marsh Cyber Monitor and Marsh Cyber View, new cyber risk assessment services to help the risk management community effectively understand, measure, and manage their cyber risk. These offerings are part of a broader effort by Marsh to integrate its risk and insurance advisory capabilities with best-in-class cyber technology and service providers.
Chemsford, MA, April 27 – Axis Communications, a global provider of network video, has announced that Axis’ Zipstream technology was recognized by the Security Industry Association (SIA) in its annual New Product Showcase (NPS). Zipstream took top honors in the Video Surveillance Advanced Imaging Technologies category, making this Axis’ second consecutive year as a NPS winner.
San Mateo, April 21 – Agari, the provider of data-driven security solutions that detect and prevent advanced email cyberattacks, has announced the availability of the Agari Email Trust Cloud.
San Francisco, April 21 – Accuvant and FishNet Security, which recently joined together, have announced plans to launch their new, combined corporate name and brand, and to begin conducting business as Optiv Security in summer 2015. This change will enable the company to complete its transformational growth merger and allow it to become a strategic primary source that helps organizations more effectively fight the cyber security battle. The announcement was made at RSA Conference 2015.
San Francisco, April 21 – RSA Conference – Intel Security has announced multiple product portfolio enhancements that provide organizations greater visibility into security incidents, stronger controls to prevent data exfiltration, and cloud and partner integrations that ease the management of their security environment.

Commentary and Opinions

London, August 10 - The latest 364 page report from business intelligence provider visiongain offers comprehensive analysis of the global border security market. Visiongain assesses that this market will generate revenues of $16.4bn in 2015.
By Steve Bittenbender Republican presidential candidate Jeb Bush unveiled on Monday a proposal to tackle immigration issues, saying any plan that addresses amnesty for illegal aliens must also come with a “robust strategy to improve border security.”
Teaneck, NJ, July 14 – Multi-factor authentication – a security protection required by US government standards – could have prevented the recent Internal Revenue Service (IRS) and Office of Personnel Management (OPM) security breaches that have exposed the personal information of millions of citizens to hackers, spies and cyber-criminals. The Federal government has been encouraging its agencies to use multi-factor authentication since November 2009, when it published the FICAM (Federal Identity and Access Management) Roadmap and Implementation Guidance.
By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
 

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.