Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Mon, 2014-09-22 07:12 PM
US Customs and Border Protection Field Operations officers and import specialists seized in late August two fraudulent iPhone 6 cell phones among other counterfeit phones and cell phone accessories,...
Mon, 2014-09-15 09:00 PM
Attorney General Eric Holder announced Monday that the Justice Department will launch a new series of pilot programs in cities across the country to bring together community representatives, public...
Mon, 2014-09-15 08:13 PM
The New York City Fire Department (FDNY) has added new technology to 15 firefighting trucks to help it keep track of firefighters’ location.Through the technology, the FDNY can automatically see...
Wed, 2014-09-10 08:52 PM

Terry Wade

FBI Director James B. Comey has named Terry Wade special agent in charge of the criminal division at the FBI’s Los Angeles Field Office. Mr. Wade most recently served as section chief of the...
Tue, 2014-09-09 10:45 PM
The Transportation Security Administration (TSA) has expanded its popular TSA Pre✓ program to Bishop International Airport (FNT). Passengers traveling on American Airlines, Delta Air Lines, Southwest...
Tue, 2014-09-09 07:57 PM
More than 20,000 security professionals from 80 countries are expected to attend the ASIS International (ASIS) 2014 60th Annual Seminar and Exhibits taking place 29 Sept.-02 Oct. at the Georgia World...
Mon, 2014-09-08 06:39 PM
The Joint Cybercrime Action Taskforce (J-CAT) was recently launched to further strengthen the fight against cybercrime in the European Union and beyond. Hosted at the European Cybercrime Centre (EC3...
Wed, 2014-09-03 07:53 PM
FBI Director James B. Comey has named Joshua Skule special agent in charge of the FBI’s Intelligence Division of the Washington Field Office (WFO). He most recently served as a deputy assistant...
Thu, 2014-08-28 07:17 PM
Thanks to alerts from concerned readers and advertisers of Government Security News, we learned yesterday that attempts to log into the “GSN” website have resulted in notices to the effect that “...
Wed, 2014-08-27 07:54 PM
Thirty-eight people were charged last week for their role in a large-scale auto insurance fraud ring that resulted in hundreds of thousands of dollars in lost revenue. The charges follow a year-long...
Wed, 2014-08-27 02:09 AM

TSA Admin. John Pistole

The U.S. Department of Homeland Security recently achieved two major milestones for its trusted traveler programs. The Transportation Security Administration Pre✓ application program, which began in...
Tue, 2014-08-26 07:15 PM
A former acting director of cyber security at the U.S. Department of Health and Human Services has been convicted on child pornography charges, according to the Department of Justice (DOJ).Timothy...

Company News

Minneapolis, MN, May 21 – Kroll Ontrack, a provider of ediscovery and 
San Francisco, May 21 – Autodesk, Inc. (NASDAQ:ADSK) has announced that it has initiated the U.S. federal government compliance process for cloud products and services known as the Federal Risk and Authorization Management Program (FedRAMP).
Pasadena, CA, May 21 – Guidance Software, (NASDAQ:GUID), a digital investigations company, has announced highlights of the 
Atlanta, GA, May 21 – Modulo, a provider of technology governance, risk and compliance (GRC) solutions, has announced that a growing number of major media companies are selecting Modulo’s GRC solution to automate its digital risk and compliance programs.
London & Hong Kong, May 20 – Ribose has become the world’s first collaboration platform to complete the UK Cyber Essentials Plus assessment, a UK Government-backed and industry-supported scheme that helps to protect businesses against cyber threats.
San Francisco, May 19 – Riverbed Technology, a provider of application performance infrastructure, has announced the results of its commissioned study of federal IT decision makers that uncovered a troubling lack of resources for addressing application performance issues. These federal leaders indicated they suffered from insufficient network and application visibility, which can lead to lost productivity and inefficiency at a time when the federal government relies on mission-critical applications more than ever.
New York, NY, May 19 – Vkansee, a developer of ultra-thin optical fingerprint sensors, has announced the development of a fingerprint sensor that is 400% more powerful than Apple’s and Samsung’s sensors. While Apple gets its component from its own Authentec unit and Samsung gets its reader from Synaptics, these only allow for 550 pixels per inch when capturing a fingerprint. This resolution means these sensors can gather 10 or 11 data points, whereas Vkansee's 2,000 pixel-per-inch system can capture 150 data points. 
Palo Alto, CA May 18 – Big data software solutions and infrastructure provider Sysorex (NASDAQ:SYRX) has announced it has been chosen by a Fortune 500 California-based health care services provider to design, develop and deploy an advanced information systems architecture that will ensure the availability, safety and security of the company’s tier one critical business systems and data. Work on the project, which has value of nearly $2 million, will begin immediately.

Commentary and Opinions

In 2007, I said the following when referring to the Department of Homeland Security (DHS) and Customs and Border Protection’s (CBP) policy on container security: “Perhaps, the dumbest policy, model, or standard of all is the sealed-door standard.” Five years later, despite technological advances and use by the private sector and military, CBP is still focused on container “doors” as a security measure. CBP has still not developed an alternative.
In 1992, the FBI established its Criminal Justice Information Services (CJIS) division. It is the largest division of the FBI and it provides state, local, and federal law enforcement and criminal justice agencies with access to centralized information, such as fingerprint identification records, criminal histories and sex offender registrations. Due to the extreme sensitivity of this information, the agency has mandated enhanced security measures to protect access to it.
President Obama’s proposed budget highlights the critical role that IT plays in making government work better for citizens and business. The budget encourages the wider use of technology to enhance efficiencies in delivering needed services, while cutting the IT budget over several years. U.S. Chief Information Officer Steven VanRoekel titled his accompanying IT budget priorities, Doing More with Less. In this era of fiscal austerity, key strategic activities are essential to achieving this vision:
In January, the European Commission proposed a comprehensive reform of the EU’s 1995 Data Protection Directive to strengthen consumer privacy laws and harmonize privacy regulations and enforcement across EU member states. While the EU proposal has many useful recommendations, it falls short in a number of areas. Specifically, it adds new regulations that will negatively impact the Internet economy, limits the potential for future innovation and imposes excessive burdens on organizations.
By Robert Mueller, III [Editor’s note: Robert Mueller, III, the Directopr of the FBI, delivered the following congressional testimony before the House Permanent Select Committee on Intelligence in Washington, DC, on October 6, 2011.] Good morning, Chairman Rogers, Ranking Member Ruppersberger, and members of the committee. Thank you for the opportunity to appear before the committee today to discuss the threats facing our nation and the efforts of the FBI to protect the United States over the past 10 years.
 

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.