Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Tue, 2015-02-17 05:54 PM
In recent days I have repeatedly stressed the need for a DHS appropriations bill for FY 2015, unburdened by politically charged amendments that attempt to defund our executive actions on immigration...
Mon, 2015-02-16 10:27 PM
Director James B. Comey has named John S. Adams the special agent in charge of the FBI’s Norfolk Division. Adams most recently served as deputy assistant director of the Counterterrorism Division (...
Sun, 2015-02-15 08:55 PM
The White House has issued a Presidential Memorandum to promote economic competitiveness and innovation while safeguarding privacy, civil rights, and civil liberties in the domestic use of unmanned...
Tue, 2015-02-10 09:23 PM
Director James B. Comey has named Richard Frankel special agent in charge (SAC) of the FBI’s Newark Division. Frankel most recently served as SAC of the Criminal Division in the New York Field Office.
Sun, 2015-02-08 09:22 PM
Following a four-week trial, A California man was found guilty Wednesday in New York on all seven counts in connection with his operation and ownership of Silk Road, a hidden website designed to...
Mon, 2015-02-02 06:31 PM
The Department of Health and Human Services' (HHS) Office of the National Coordinator for Health Information Technology (ONC) has released Connecting Health and Care for the Nation: A Shared...
Sun, 2015-01-25 10:09 PM
Jonathan Freed has been appointed as the National Security Agency's new Associate Director for Strategic Communications. Freed, a longtime public relations professional and former journalist, most...
Thu, 2015-01-22 10:20 PM
The Department of Energy (DOE) will provide a $25 million grant over the next five years to support the creation of a new cybersecurity consortium consisting of 13 Historically Black Colleges and...
Wed, 2015-01-21 09:31 PM
During bilateral meetings in Washington last week, President Obama and Prime Minister David Cameron agreed to further strengthen and deepen cybersecurity cooperation between the United States and the...
Tue, 2015-01-20 08:29 PM

John Walsh

The MacDonnell Group of Halifax, Nova Scotia has announced that John Walsh, CEO of Port Canaveral, will deliver the opening presentation and welcome remarks at its 2015 Port Security Operations...
Tue, 2015-01-13 07:47 PM
Director James B. Comey has named Roger C. Stanton special agent in charge of the FBI’s Birmingham Division. Stanton most recently served as section chief of the Counter-Improvised Explosive Devices...
Mon, 2015-01-12 07:59 PM
Director James B. Comey has named Scott Bean special agent in charge of the FBI’s Administrative Division of the Washington Field Office (WFO). Bean most recently served as section chief for the...

Company News

Rolling Meadows, IL, June 16 – RF IDeas, Inc., a manufacturer of employee badge readers for in-building applications such as computer access, identification, time and attendance, have announced the latest release of its innovative new pcProx® Nano Readers.
London, June 17 – Tripwire, Inc., a provider of advanced threat, security and compliance solutions, has announced the results of a study sponsored by Tripwire on cyber literacy challenges faced by organizations.
Warren, NJ, June 15 – Professional Risk Solutions (PRS) has launched a new data breach insurance policy designed to cater to the needs of senior living facility owners. PRS CareNet is built specifically for the long-term care sector. It has been introduced on the back of research carried out by PRS, which revealed that data breach insurance is one the top concerns of senior housing investors and owners. This new product targets nursing homes, assisted living, continuing care retirement communities and other similar businesses that serve the aging.
St. Michael, MN, June 11 – CINCH systems, Inc. is pleased to announce and welcome Steve Craig as the company’s Director of Sales and Marketing. Craig will be responsible for sales and marketing efforts to achieve growth objectives.  
Boulder, CO, June 11 – LogRhythm, a security intelligence company, has announced the appointment of Karen Blasing to the company’s board of directors.
Denver, CO, June 11 – Coalfire has announced that it has completed the independent assessment of the Virtustream Federal Cloud under the Federal Risk and Authorization Management Program (FedRAMP). Virtustream, the enterprise-class cloud software and services provider, received their Provisional Authority to Operate (P-ATO) from the Joint Authorization Board for the Federal Risk and Authorization Management Program (FedRAMP).
Washington, June 9 – Oberthur Technologies (OT), a global provider of high-security solutions and a provider of Personal Identification & Verification (PIV) smart cards to the U.S. Federal government, has announced its latest generation of PIV cards, ID-One PIV® on Cosmo V8, has been submitted to the General Services Administration (GSA) for inclusion on the HSPD-12 Approved Products List (APL).
Washington, June 10 – LexisNexis® Risk Solutions and ISAFE Inc. has announced that LexisNexis’ identity management solutions will be integrated into ISAFE’s market leading school-enabled, cloud-based parental permissions platform, an advance which greatly simplifies organizations’ compliance with the Children’s Online Privacy and Protection Act (COPPA), while removing long term costs and complexity for schools.

Commentary and Opinions

With security awareness, threat assessment, and risk analysis extending into new areas like international traveler health screening, vigilance at the doors of elementary schools, and intensified subway passenger safety, it’s important for government security professionals everywhere to keep their knowledge and credentials continuously up-to-date.
The Javelin Strategy & Research’s 2014 Identity Fraud Study revealed that 13.1 million Americans became victims of identity theft last year. This startling statistic underscores the determination of malicious actors to access sensitive data. Despite the rise in exploits, vital aspects of security -- such as encryption -- has tended to slip through the cracks.
The possibility of governments collecting and analyzing personal data changed dramatically after the enactment of The Patriot Act in 2001. The public outcry following WikiLeaks and the NSA PRISM program has kept controversial data collection methods in the headlines over the past few years. The legality of this type of data collection is still in question.
When it comes to cybersecurity, boldface security organizations can seem just as susceptible to hacks as anyone else. For example, NATO suffered over 2,500 significant cyber attacks in 2012 alone. Security experts believe that the number of sophisticated offensives against NATO is likely to increase over the coming years.
Governor Jerry Brown (D-CA) has signed urgently needed legislation aimed at increasing safety and services -- and decreasing violence and assaults -- in California’s five state hospitals, according to the Safety Now Coalition, a coalition of workers in California's Department of Mental Health Hospitals.
 

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.