Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Mon, 2013-04-22 01:29 PM

Martel
Valencia-Cortez

The same week Boston was struggling with capturing an elusive terror suspect, U.S. Border Patrol agents arrested a dangerous alien smuggler that has menaced the San Diego area for months. In the...
Mon, 2013-04-22 01:06 PM

Jabhat al Nusrah
flag

Federal agents arrested an Aurora, IL, man on April 19 for trying to board a plane in Chicago and travel to Syria to help Jabhat al Nusrah, a jihadist military group there. The arrest of 18-year-old...
Mon, 2013-04-22 07:54 AM

Tsanaev capture
MA State Police photo

After initial heartfelt congratulations to federal, state and local law enforcement following the massive manhunt and subsequent apprehension of the second suspect in the Boston Marathon bombing,...
Wed, 2013-04-17 11:02 AM

U.S./Mexico border

The “Gang of Eight” U.S. senators who had been working on sweeping immigration reform bill filed their sprawling legislation on April 17. The legislation, which contains a raft of immigration reform...
Tue, 2013-04-16 08:46 AM

Border fence

The Senate Judiciary Committee has delayed a hearing on hotly-anticipated comprehensive immigration reform legislation until April 19, and scheduled another for the week of April 22.
Mon, 2013-04-15 05:05 PM
The office that once was known as US-VISIT (for United States Visitor and Immigrant Status indicator Technology), and is now called the Office of Biometric Identity Management, or OBIM, estimates...
Fri, 2013-04-12 02:59 PM

Zebra Technologies'
Ram Ramaprasad

As he ponders the possibility of “comprehensive immigration reform,” which could provide a new legal status for approximately 12 million currently-undocumented aliens, Ram Ramaprasad, the director of...
Fri, 2013-04-12 08:49 AM
Not knowing his mother’s maiden name and a non-existent tattoo were the first tips that the man trying to pass through customs at Baltimore Washington International Airport on April 5 with a U.S....
Thu, 2013-04-11 02:32 PM

SAFE CIV
Credential

The requirement that federal employees and federal contractors trying to gain access to federal buildings and computer networks possess Personal Identification Verification (PIV) compliant smart...
Wed, 2013-04-10 03:43 PM

SiteCOMMANDER

Sentry View Systems, Inc.has announced the launch of its SiteCOMMANDER, a flexible command and control solution with unlimited multi-server capabilities and fully mobile functionality.
Wed, 2013-04-10 01:57 PM

Ramirez, Hotchkiss, Gelfman

AXIS Communications, the IP camera supplier, has established an innovative partnership with the Wentworth Institute of Technology, of Boston, MA, to tap the fertile brains of some of Wentworth's...
Wed, 2013-04-10 08:32 AM

Walli Mujahidh

The second of two men convicted of trying to mount an armed assault on a Seattle military processing center in 2011 will spend 17 years in prison.

Company News

El Segundo, CA, April 2 – NC4 has announced that it is supporting the Defense Security Information Exchange (DSIE, also known as the DIB-ISAO) in providing its Cyber Threat Exchange Solutions for cyber threat information sharing. NC4 operates Cyber Threat Exchanges for over 30 trusted communities serving over 3,000 companies, government organizations, and 16,000 IT security professionals.
Cambridge, MA, April 2 – The APWG reports in its new Phishing Activity Trends Report that phishing against banks and ISPs rose markedly compared to other sectors in the third quarter of 2014. The number of brands being attacked remains high, and malware variants continue to proliferate at a record rate of increase.
Concord, MA, March 31 – Technical Communications Corporation (TCC) (NasdaqCM: TCCO) is announcing its Crypto Learning Center, a suite of live and on-demand webinars, and in-person trainings for customers and industry to empower organizations with practical knowledge to proactively enhance voice and data communications security and facilitate secure operations.
Waltham, MA, April 1 – CounterTack, a provider of Big Data Endpoint Detection and Response (EDR), have announced that it will be co-hosting an event, “Beyond Next-Generation Cybersecurity 2015: The CISO Perspective on Countering the Global Threatscape,” on Tuesday, April 21, 2015 in San Francisco, at the Palace Hotel.
Fairfax, VA, March 31 – SRA International, a provider of IT solutions and professional services to government organizations, has announced that the company has signed an asset purchase agreement, on March 30, to acquire part of the Government Services business of Qbase, a privately-held software products and services company supporting customers in the intelligence, national security, government, healthcare, and energy arenas.
March 30 – CNL Software, a provider of Physical Security Information Management (PSIM) software, and Edge360, a provider of Safe City security solutions, will be presenting two exclusive Safe City sessions at ISC West 2015. The sessions will especially benefit those involved with city surveillance programs, policing, security consultancy, homeland security, law enforcement or system integration.
Dallas, March 26 – Jericho Systems, a provider of Attribute Based Access Control (ABAC) and content filtering technology, has been invited by the Department of Homeland SECURITY (DHS) Science and Technology Directorate (S&T) to discuss its current efforts with the Northern California Regional Intelligence Center (NCRIC) and the Open Geospatial Consortium Geo4NIEM Testbed effort at the PIV
Since 2011 the Open Security Exchange (OSE) has sought to align with an organization where convergence of Physical Security and Information Technology would be continued and sustained. After many intense discussions it was decided that the Open Security Exchange would become a guild under The Merge Foundation.

Commentary and Opinions

By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.
 

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.