Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...


Thu, 2011-11-03 10:07 AM

Flight 253 in Detroit

Federal agencies’ communications to pilots and airliner personnel during in-flight incidents could stand some improvements, along with plans to control the nation’s airspace in the event of a 9/11...
Thu, 2011-11-03 07:37 AM

TSA's Pistole

TSA’s series of new identity verification programs under trial at airports across the country are yielding positive results and the agency is working to refine them, the agency’s leader told Congress.
Wed, 2011-11-02 09:50 AM

Big Bend NP, TX

Customs and Border Protection has begun the process of opening a new border crossing in a remote section of Texas that it says is the first Class B port of entry in the southwest since the agency was...
Wed, 2011-11-02 07:58 AM
The federal government’s efforts to remove criminal aliens from the country have grown substantially in the last six years and some of the programs it uses can be very effective, but they are flawed...
Tue, 2011-11-01 08:21 AM

South Carolina

The U.S. Department of Justice challenged South Carolina’s recently-approved immigration law in federal court on Oct. 31, saying the state’s new rules conflicted with the federal government’s...
Tue, 2011-11-01 07:54 AM

Upper Midwest

U.S. Forest Service police are unprepared for what a public employee watchdog group said is an influx of Mexican drug gang growing operations in the upper Midwest.
Mon, 2011-10-31 08:12 AM

PIDC, Los Fresnos, TX

A Jamaican who had been awaiting deportation in a south Texas detention facility was found guilty of assaulting an ICE agent in the summer of 2010. The man, Kemar James, 23, a Jamaican citizen and...
Fri, 2011-10-28 08:47 AM

Cockpit laser glare

The steep increase in the number of incidents of lasers pointed into aircraft cockpits has prompted the Federal Aviation Administration to open a Website for pilots to more easily report such...
Fri, 2011-10-28 07:34 AM
An El Paso, TX, man received a 15-year sentence for running a smuggling operation that transported and harbored as many as 5,000 illegal aliens, some from as far away as southwest Asia.
Thu, 2011-10-27 12:01 PM
A recent study published by the Primary Research Group, of New York, NY, looks closely at how academic, public and special libraries use RFID technology, and concludes that more than one-quarter of...
Wed, 2011-10-26 08:18 AM
Reports in recent days that the TSA is allegedly setting up extensive highway checkpoints across the state of Tennessee are wildly exaggerated, said the agency in a statement on Oct. 25.
Mon, 2011-10-24 11:21 AM
TSA has issued a “broad agency announcement” under which it is soliciting proposals for research projects in the following specific areas: passenger and baggage screening, threat assessment, cargo...

Company News

Austin, TX-based HID Global, a provider of secure identity solutions, has announced that it has teamed with Eid Passport, a provider of high-assurance identity management solutions, to supply Eid Passport with its ActivID Credential Management System (CMS) for Eid Passport’s new Personal Identity Verification -- Interoperable (PIV-I) managed service.
San Francisco, CA-based Splunk, a provider of a software platform for real-time operational intelligence, has announced the general availability of version 3.1 of the Splunk App for Enterprise Security. Splunk has introduced a new risk scoring framework in the Splunk App for Enterprise Security to enable easier, faster threat detection and containment by empowering users to assign risk scores to any data.
Dallas, TX-based Zix Corporation (ZixCorp), a provider of email data protection, has announced that ZixOne is available on the Samsung Solutions Exchange, expanding mobile security options for enterprises using Samsung’s mobile devices. The Samsung Solutions Exchange addresses the needs of business owners by creating mobile solutions on a portfolio of enterprise-grade Samsung mobile products.
New York, NY-based Viewpointe, a provider of managed service and a payments provider to regulated industries, has announced a new white paper that highlights how using the appropriate cloud infrastructure can optimize business processes, deliver competitive agility, and address information mismanagement.
Gemalto, Datacard, and Morpho have ranked in the top three positions in ABI Research’s latest “Government & Healthcare ID: Smart Card and Legacy Credentials” competitive assessment. The assessment consists of 1H 2013 smart card market shares alongside a vendor matrix where by the top smart card and legacy credential ecosystem players were measured against a set of innovation and implementation criteria.
Round Rock, TX-based Dell Software has announced availability of two new backup appliances and a host of enhancements to its AppAssure backup, replication and disaster recovery software.
Costa Mesa, CA-based Emulex Corp., a provider of network connectivity, monitoring, and management, has announced the results of a study of 547 U.S. and European-based network and security operations (NetOps and SecOps) professionals, which found that 45% of IT staffs monitor network and application performance manually, instead of implementing network monitoring tools.
Toronto, Canada-based SecureKey, a provider of trusted identity networks, and Oberthur Technologies (OT), a provider of digital security solutions for the mobility space, has announced their collaboration to bring to market a range of solutions compliant with the GSMA-led Mobile Connect initiative that provides secure access and authentication for online services.

Commentary and Opinions

Teaneck, NJ, July 14 – Multi-factor authentication – a security protection required by US government standards – could have prevented the recent Internal Revenue Service (IRS) and Office of Personnel Management (OPM) security breaches that have exposed the personal information of millions of citizens to hackers, spies and cyber-criminals. The Federal government has been encouraging its agencies to use multi-factor authentication since November 2009, when it published the FICAM (Federal Identity and Access Management) Roadmap and Implementation Guidance.
By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
By John HarrisWith the 1998 implementation of the Government Paperwork Elimination Act, the United States government made clear its intentions to become more efficient and save taxpayer dollars by reducing its dependence on paper documents.
By Steve SpatigWith reports of widespread data breaches in the global spotlight, data center managers are under increasing pressure by regulatory bodies to ensure that access to restricted information is protected. Cyber security remains a number one priority, but in many cases, data breaches occur because an employee is given temporary physical access to that data in some way. Within the data center environment, preventing unauthorized physical access to sensitive government data is crucial.

June/July 2015 Digital Edition

Click Here

Digital Version of May/June 2015
Print Edition


Click Here

Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.