Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...


Mon, 2014-12-08 05:24 PM
U.S. Attorney General Eric Holder announced Monday that the Justice Department (DOJ) will take new steps to bar profiling by federal law enforcement agencies, building upon a 2003 policy that had...
Wed, 2014-12-03 04:27 PM
The House of Representatives overwhelmingly passed three bills Monday aimed at strengthening nuclear security and detection, protecting critical infrastructure against the threat of electromagnetic...
Tue, 2014-12-02 05:06 PM
The United States Monday signed three customs agreements with Singapore, ensuring greater cooperation and mutual assistance on customs enforcement and the facilitation of lawful trade and travel,...
Tue, 2014-12-02 04:13 PM
A Danish citizen last week pleaded guilty in the Eastern District of Virginia and was ordered to pay a fine of $500,000 for advertising and selling StealthGenie, a spyware application that could...
Mon, 2014-12-01 04:11 PM
The Department of Homeland Security (DHS) has announced the launch of the 2015 Secretary's Honors Program Cyber Student Volunteer Initiative for current two- and four-year college students. Beginning...
Sun, 2014-11-30 07:58 PM
Dear GSN Readers: Government Security News has posted its October/November Digital Edition online. We will also be mailing out the new publication to our readers Monday morning. This edition has a...
Sun, 2014-11-30 06:21 PM
The British government introduced a far-ranging bill last week aimed at protecting U.K. citizens from international terrorism. The Counter-Terrorism and Security Bill aims to bolster the U.K.’s...
Sun, 2014-11-30 03:37 PM
Last week in federal court in Brooklyn, NY, Elvis Rafael Rodriguez was sentenced to 34 months’ imprisonment for his participation in an international cybercrime organization responsible for two...
Thu, 2014-11-27 02:26 AM
Happy Thanksgiving from Government Security News! In observance of the holiday, the Daily Insider e-newsletter will resume publication on Monday, December 1. Enjoy the holiday and safe...
Tue, 2014-11-25 06:29 PM

Charles Perez

U.S. Customs and Border Protection (CBP) recently announced the selection of a new CBP airport director for George Bush Intercontinental Airport (IAH).Charles Perez, a 28-year CBP veteran, assumed...
Tue, 2014-11-25 01:52 PM
The National Security Agency (NSA) has announced the public release of its new technology that automates data flows among multiple computer networks, even when data formats and protocols differ. The...
Mon, 2014-11-24 06:15 PM
According to statistics collected by the FBI, 76 law enforcement officers were killed in line-of-duty incidents in 2013. Of these, 27 officers died as a result of felonious acts, and 49 officers died...

Commentary and Opinions

Every day citizens put their faith and trust in the decisions that government programs make about identities (security clearances, border crossings, benefits and credentials). However, these decisions may not be as trustworthy as you think, because they are often not based upon current and validated information. This lack of information awareness has been accentuated by the onset of Big Data (the dramatic increase in data volumes, sources, types and velocity), which increases the risk of an undetected change in a person’s identity profile.
An important deadline is fast approaching for federal, state, local and tribal law enforcement agencies. Starting September 30, 2014, the FBI will require advanced authentication for anyone accessing its criminal justice information (CJIS) system to keep highly sensitive law enforcement data from falling into the wrong hands. 
It is possible to forecast the types of warfare that one’s terrorist adversary is likely to conduct, whether as an organized group or as “lone wolf” operatives. Such a forecasting capability is especially crucial when complete information about one’s terrorist adversary is lacking. This is important because several recent high visibility terrorist attacks could have been pre-empted and thwarted if the intelligence and law enforcement agencies that were tracking these groups and operatives had possessed such a forecasting capability.
By Todd Musselman and Al Kinney The value of a robust identity management system has long been recognized; however, the actual development and implementation of an effective identity management system have proven to be more difficult tasks. This challenge has grown more complex as various solutions have emerged and matured, and has become more urgent as threats continue to grow in sophistication.
The time has come to re-think embassy security. The Department of State recently called for a “more serious and sustained commitment from Congress” to address security deficiencies at high-risk posts around the world, in the wake of last year's attack on the U.S. consulate in Benghazi, Libya, which resulted in the death of four people, including U.S. Ambassador J. Christopher Stevens.   

Company News

Seattle, WA, July 15 – IOActive, Inc., the worldwide provider of research-driven security services, has announced that it has become a member of the Institute for Critical Infrastructure Technology (ICIT). IOActive will be instrumental in helping the ICIT strengthen its advisory services in areas related to Smart Cities, including cyber security around Internet of Things (IoT), including vehicles, smart grids, and devices.
Millis, MA, July 15 – Kanguru announces the addition of new SuperSpeed USB 3.0 technology to its Defender secure flash drives, providing unsurpassed security and convenience for data.
Phoenix, AZ, July 15 – BeyondTrust, the global cybersecurity company dedicated to proactively eliminating data breaches from insider privilege abuse and external hacking attacks, has announced the appointment of Lisa Donnan to vice president of Federal. In her new position, Donnan will leverage her successful track record of growing federal business over the past 20 years to further expand BeyondTrust’s reputation as a global leader in the Privileged Account Management (PAM) and Vulnerability Management (VM) markets.
July 14, 2015 – Sunnyvale, CA – Good Technology, a provider of secure mobility services, has announced that the U.S. Navy has implemented the HP Mobile Management Solution leveraging Good for Enterprise to secure official government data on multiple mobile device platforms. The Good Technology solution enables the Navy to offer more device choices to U.S. Navy personnel while securing their mission-critical data.
Hood River, OR, July 6 – Sierra-Olympic Technologies (, supplier of infrared (IR) and thermal imaging components, cameras, and systems solutions for advanced imaging applications, has introduced The Oculus series by Silent Sentinel, Ltd. The new environmentally-rugged outdoor video surveillance systems feature simultaneous visible and thermal imaging outputs. The continuous zoom optical cameras, available in either standard definition (SD) or high definition (HD), are paired with fixed field of view (FOV) thermal ima
Winnipeg, Canada, July 10 – Medit, a supplier of equipment and accessories for NDT industry, has announced a new addition to their comprehensive selection of remote visual inspection devices - FreedomView Advanced Borescope. “We are very excited to introduce this great scope to our clients, as it is both – a professional level borescope with state-of-the-art features and a portable, easy-to-use device that is ideal for everyday “on the go” inspections,” said Terry Peristerakis, Sale Manager at Medit
San Francisco, July 9 – Splunk Inc. (NASDAQ: SPLK), provider of a software platform for real-time Operational Intelligence, has announced it has acquired Caspida, Inc., an innovator in machine learning and behavioral analytics.

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition

Click Here

Digital Version of May/June 2015
Print Edition


Click Here

Technology Sectors

Market Sectors

White Papers


This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.


To download this white paper click here

Vector Firm


There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.