Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Wed, 2015-04-15 11:39 PM
Singapore, April 13 – Ministers and senior police officials from around the world have gathered at the official opening of the INTERPOL Global Complex for Innovation (IGCI), which is set to empower...
Mon, 2015-04-13 12:43 AM
Washington, April 9 – The Federal Bureau of Investigation (FBI) and the National Cyber Investigative Joint Task Force-International Cyber Crime Coordination Cell (IC4) has coordinated with Europol’s...
Thu, 2015-04-09 11:32 PM
Washington, April 9 – A member of the identity theft and credit card fraud ring known as “Carder.su” has been sentenced to 150 months in federal prison for selling stolen and counterfeit credit cards...
Wed, 2015-04-08 10:56 PM
One focus of the ASIS 25th New York City Security Conference and Expo, to be held April 22-23, will be educational sessions on current topics in terrorism. But the event will also consist of many...
Tue, 2015-04-07 06:42 PM
Port Canaveral, FL – As a recipient of only 1.5% of the DHS federal grants, says Captain Tom Allan, Commandant of Sector Jacksonville, FL, the U.S. Coast Guard is “the best bargain you’re ever going...
Thu, 2015-04-02 06:06 PM

Josh Shapiro 

Harrisburg, PA, April 1 – Governor Tom Wolf has announced that he has named Montgomery County Commissioners' Chairman Josh Shapiro the chair of the Pennsylvania Commission on Crime and Delinquency."I...
Thu, 2015-04-02 02:45 AM
Washington, April 1 – Director James B. Comey has appointed three new executives as special agents in charge at the FBI New York Office (NYO). George Ennis was named special agent in charge of the...
Tue, 2015-03-24 11:27 PM
Following a successful launch of its Airport, Seaport and Border Security Awards in 2014, Government Security News has announced the opening of its second annual version of the program, which opened...
Sun, 2015-03-15 08:08 PM
Alexandria, VA – ASIS International (ASIS) will honor New York City Police Commissioner William J. Bratton with its 2015 Person of the Year Award at a luncheon at noon on Thursday, April 23 in New...
Wed, 2015-03-11 09:39 PM
Washington, March 11 -- The Federal Bureau of Investigation (FBI) is commemorating its Ten Most Wanted Fugitives program, created 65 years ago.
Wed, 2015-03-11 01:29 AM
Next Tuesday, port executives, government leaders and other key stakeholders will meet at Port Canaveral, FL, to discuss the threat of nuclear materials in ship cargo containers and other pressing...
Sun, 2015-03-08 02:21 PM
An indictment was unsealed last week against two Vietnamese citizens who resided in the Netherlands, for their roles in hacking email service providers throughout the U.S. The guilty plea of one of...

Company News

Foster City, CA, July 16 – Norse, a provider of live attack intelligence, has announced the next-generation version of its popular 
Seattle, WA, July 15 – IOActive, Inc., the worldwide provider of research-driven security services, has announced that it has become a member of the Institute for Critical Infrastructure Technology (ICIT). IOActive will be instrumental in helping the ICIT strengthen its advisory services in areas related to Smart Cities, including cyber security around Internet of Things (IoT), including vehicles, smart grids, and devices.
Millis, MA, July 15 – Kanguru announces the addition of new SuperSpeed USB 3.0 technology to its Defender secure flash drives, providing unsurpassed security and convenience for data.
Phoenix, AZ, July 15 – BeyondTrust, the global cybersecurity company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks, has announced the appointment of Lisa Donnan to vice president of Federal. In her new position, Donnan will leverage her successful track record of growing federal business over the past 20 years to further expand BeyondTrust’s reputation as a global leader in the Privileged Account Management (PAM) and Vulnerability Management (VM) markets.
July 14, 2015 – Sunnyvale, CA – Good Technology, a provider of secure mobility services, has announced that the U.S. Navy has implemented the HP Mobile Management Solution leveraging Good for Enterprise to secure official government data on multiple mobile device platforms. The Good Technology solution enables the Navy to offer more device choices to U.S. Navy personnel while securing their mission-critical data.
Hood River, OR, July 6 – Sierra-Olympic Technologies (www.sierraolympic.com), supplier of infrared (IR) and thermal imaging components, cameras, and systems solutions for advanced imaging applications, has introduced The Oculus series by Silent Sentinel, Ltd. The new environmentally-rugged outdoor video surveillance systems feature simultaneous visible and thermal imaging outputs. The continuous zoom optical cameras, available in either standard definition (SD) or high definition (HD), are paired with fixed field of view (FOV) thermal ima
Winnipeg, Canada, July 10 – Medit, a supplier of equipment and accessories for NDT industry, has announced a new addition to their comprehensive selection of remote visual inspection devices - FreedomView Advanced Borescope. “We are very excited to introduce this great scope to our clients, as it is both – a professional level borescope with state-of-the-art features and a portable, easy-to-use device that is ideal for everyday “on the go” inspections,” said Terry Peristerakis, Sale Manager at Medit

Commentary and Opinions

With more than 10 million purported attempts to break into Pentagon systems and servers each day, it was not surprising when the White House confirmed that individuals thought to be working for the Russian government attempted to hack its servers.
From September until January, Monday evenings find living rooms across America filled with armchair quarterbacks. During pre-game shows and post-game analyses, experts and amateurs alike discuss the retreat and progress of their favorite teams. Even fantasy leagues abound to test players’ strategic and tactical prowess on the gridiron.
As we enter into the new fiscal year, three trends are going to be on the minds of every IT leader in Washington, D.C. And -- no big surprise -- they all revolve around Big Data. Those three crucial initiatives that will top the government enterprise priority list in 2015 are application rationalization, virtualization and cyber security.
With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.
The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
 

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.