Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2011-10-06 10:15 AM

Abu Du’a

The U.S. State Department has put a $10 million bounty on the leader of Al Qaeda in Iraq (AQI) leader, Ibrahim Qaeda Awwad Ibrahim Ali al-Badri, and identified him as a Specially Designated Global...
Thu, 2011-10-06 09:54 AM

Morses Line border crossing

U.S. Customs and Border Protection has begun procedures to close the oldest border crossing on the northern border, saying the facility would require significant and expensive changes to keep it open...
Tue, 2011-10-04 05:49 PM
Government Security News has announced finalists and preemptive winners in all three broad categories of its 2011 Homeland Security Awards Program – Vendors of IT Security Products and Solutions,...
Tue, 2011-10-04 09:06 AM

GPS tracking device

As the Supreme Court prepares cases for the coming year, privacy groups told it to block evidence gathered by government and law enforcement through the warrantless use of global positioning systems...
Tue, 2011-10-04 07:56 AM

TSA's John Pistole

The TSA is set to test new voluntary passenger screening procedures and identification technology that can detect fake or altered identification documents at selected airports around the country. The...
Mon, 2011-10-03 04:44 PM
TSA has awarded a $79 million contract to BAE Systems Information Solutions, of Herndon, VA, to design, manufacture, test and deliver a credential authentication technology and boarding pass scanning...
Mon, 2011-10-03 02:05 PM
Following the receipt of a record number of entries from vendor companies and government agencies in this year’s annual Homeland Security Awards program, Government Security News has announced that...
Fri, 2011-09-30 02:31 PM

Bosch's 9412G
control panel

The U.S. Secret Service plans to hire an 8(a)-qualified systems integrator to install intrusion detection systems, closed circuit television, access control systems and “any additional security...
Thu, 2011-09-29 09:24 AM
A pilot program to collect biometric data from temporary workers leaving the U.S. from two border points in Arizona -- which Customs and Border Protection has been running for nearly two years -- has...
Thu, 2011-09-29 07:39 AM

Operation Cross Check

Immigration and Customs Enforcement’s seven-day national "Cross Check" operation involving almost 2,000 agents from two dozen field offices across the county led to the arrest of more than 2,900...
Wed, 2011-09-28 09:24 AM

KCM in Minneapolis

Flight crew members flying from Minneapolis-St. Paul International Airport (MSP) began using the Known Crewmember (KCM) expedited identification program on Sept. 20.
Tue, 2011-09-27 11:36 AM

Matthew Bettenhausen

The “lone wolf” terrorist is one of the greatest fears of security officials, but individual, lone citizens have also helped foil, or solve, a host of terrorist conspiracies, said the former director...

Company News

State of Montana officials are notifying 1.3 million people regarding a recent incident where hackers gained entry to a Department of Public Health and Human Services (DPHHS) computer server, though officials said there is no knowledge that information on the server was used inappropriately, or was even accessed.The state is notifying individuals whose personal information was on the server, consistent with state and federal laws. The notification list includes both current and former Montana residents, and in some instances, the estates of deceased individuals.
Uticon Engineering Consultancy has installed the two-factor authentication solution SecurAccess from SecurEnvoy. Personal login details in combination with a passcode obtained via SMS are used in the solution in order to clearly identify employees.
Santa Monica-based Quintron Systems, a provider of advanced interoperable voice systems and physical access control/intrusion detection systems, has released AccessNsite version 7.9.4 to its dealer channel for immediate deployment. The 7.9.4 version of access control and intrusion detection software brings a multitude of new features including enhancements to Escort, Access Level Groups, and native Mercury MPL support.
Atlanta, GA-based AirWatch, a provider of enterprise mobility management (EMM), has announced that the Florida Department of Law Enforcement (FDLE) has selected AirWatch to manage its agency wide deployment of government-owned mobile devices.
The Cambridge, MA-based Anti-Phishing Working Group (APWG) reports in its new Phishing Activity Trends Report that the number of phishing sites in the first quarter of 2014 leaped 10.7 percent over the previous quarter. The APWG previously reported that 2013 was one of the heaviest years for phishing on record, and Q1 2014 perpetuated that trend, posting the second-highest number of phishing attacks ever recorded in a first quarter.
Dell has announced new proactive security solutions designed to provide organizations of all sizes with protection for their valuable data in the face of new and increasingly sophisticated end user security threats, while continuing to meet employees’ expectations for productivity and data access.
Mountain View, CA-based Symantec has announced the launch of a first-of-its-kind program, the Symantec Cyber Career Connection (SC3), to address the global workforce gap in cybersecurity and provide new career opportunities for young adults who may not be college-bound.
Ashburn, VA-based Telos Identity Management Solutions (Telos ID) has announced that Michael Heffer has been promoted to vice president, Defense Manpower Data Center (DMDC) operations. In his new position, Heffer directs all aspects of the company’s activities in support of the DMDC.The DMDC collects a variety of personnel, manpower, training, financial, and other data for the Department of Defense (DoD). This data is used for healthcare, retirement funding and other administrative needs.

Commentary and Opinions

London, August 10 - The latest 364 page report from business intelligence provider visiongain offers comprehensive analysis of the global border security market. Visiongain assesses that this market will generate revenues of $16.4bn in 2015.
By Steve Bittenbender Republican presidential candidate Jeb Bush unveiled on Monday a proposal to tackle immigration issues, saying any plan that addresses amnesty for illegal aliens must also come with a “robust strategy to improve border security.”
Teaneck, NJ, July 14 – Multi-factor authentication – a security protection required by US government standards – could have prevented the recent Internal Revenue Service (IRS) and Office of Personnel Management (OPM) security breaches that have exposed the personal information of millions of citizens to hackers, spies and cyber-criminals. The Federal government has been encouraging its agencies to use multi-factor authentication since November 2009, when it published the FICAM (Federal Identity and Access Management) Roadmap and Implementation Guidance.
By Nir PolakEspionage isn’t what it used to be. While Hollywood still loves to produce thrillers about secret agents in disguise, the news tells a different story about how intelligence leaks out of the U.S. government. Often, its starts with an incoming email that looks innocuous. That’s exactly what happened to the White House recently, when a group of Russian hackers launched a sustained attack armed only with a phishing email and a piece of malware.
 

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.