Access Control | Identification

Featured Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and...

News

Thu, 2014-10-16 03:58 PM
A federal grand jury in Seattle returned a second superseding indictment last week charging a Russian national with 11 additional counts and further detailing his alleged scheme to hack into...
Tue, 2014-10-14 06:49 PM
Cybersecurity professionals from across the globe came together to compete in the World Finals of the Global CyberLympics held on September 29 2014 at ISACA’s EuroCACS/Information Security and Risk...
Thu, 2014-10-09 06:07 PM
Director James B. Comey has named Clifford Holly assistant director in charge of the Security Division at FBI Headquarters. Holly most recently served as deputy assistant director for the Training...
Wed, 2014-10-08 02:19 PM
Cybersecurity breaches affect businesses large and small, and the annual cost of computer- and network-based crimes worldwide is estimated to be more than $400 billion, according to a report from...
Tue, 2014-09-30 10:34 PM
AlliedBarton Security Services, often cited for its outstanding training programs, has announced the completion of two million AlliedBarton|EDGE training courses since 2009. The AlliedBarton|EDGE...
Thu, 2014-09-25 10:35 PM
In response to requests from a number of vendor companies and government agencies, Government Security News has announced an extension of the deadline for entries in its 2014 Homeland Security Awards...
Thu, 2014-09-25 07:17 PM
U.S. Customs and Border Protection (CBP) and Los Angeles International Airport (LAX) has unveiled 40 new Automated Passport Control (APC) kiosks at the airport’s Tom Bradley International Terminal....
Tue, 2014-09-23 08:09 PM

 

Attorney General Eric Holder has announced that the federal prison population has dropped by roughly 4,800 inmates since September 2013, representing the first time the federal inmate population has...
Mon, 2014-09-22 07:12 PM
US Customs and Border Protection Field Operations officers and import specialists seized in late August two fraudulent iPhone 6 cell phones among other counterfeit phones and cell phone accessories,...
Mon, 2014-09-15 09:00 PM
Attorney General Eric Holder announced Monday that the Justice Department will launch a new series of pilot programs in cities across the country to bring together community representatives, public...
Mon, 2014-09-15 08:13 PM
The New York City Fire Department (FDNY) has added new technology to 15 firefighting trucks to help it keep track of firefighters’ location.Through the technology, the FDNY can automatically see...
Wed, 2014-09-10 08:52 PM

Terry Wade

FBI Director James B. Comey has named Terry Wade special agent in charge of the criminal division at the FBI’s Los Angeles Field Office. Mr. Wade most recently served as section chief of the...

Company News

Englewood, CO, June 10 – Cybergy Holdings, Inc. (OTCQB: CYBG) is pleased to announce that it has entered into a definitive agreement to acquire 100% of CROSS Sciences LLC, a partner in enhancing the firm’s cybersecurity offerings, including its proprietary SmartFile technology which provides real-time document intelligence and insider threat detection.
Oakdale, MN, June 10 – Imation Corp. (NYSE:IMN), a global data storage and information security company, has announced the new IronKey H350 USB 3.0 hard drive.
San Francisco, CA, June 10 – RiskIQ, the Digital Footprint Security company, has announced that DocuSign, Inc. (DocuSign®) is using RiskIQ to protect its company, customers and employees from copycat and rogue applications in mobile app stores. RiskIQ discovers, inventories, and inspects all apps associated with DocuSign to detect potential security threats so that the company can proactively address them to mitigate risk.
Minneapolis, MN, June 9 – Kroll Ontrack has released its most recent list of common IT administrator errors that can lead to data loss and network downtime.
Vienna & Ashburn, VA, June 9 – Carillon Federal Services Inc.
Minneapolis, MN, June 9 – Entrust Datacard has announced the availability of the next-generation kiosk-optimized Datacard® CE870TM instant issuance system that enables financial institutions, retailers, governments and healthcare organizations to instantly issue permanent embossed or flat payment cards or identification cards through a self-service kiosk.
Chicago, June 8 – Navigant (NYSE: NCI) has announced the addition of several seasoned professionals to join the Firm’s Energy practice as part of a newly formed Risk Management, Compliance and Security (RMCS) solution offering team. Brian Harrell and Chris Luras are joining recent additions Ed Dobrowolski and Matt Blizard to further expand the team’s expertise in risk management, compliance and security.
Washington, June 8 – Gartner Security & Risk Management Summit – Sandboxing has come to the top of a global survey as the most effective defense strategy against malware, as security leaders wake up to proactive measures. Endpoint security company Avecto surveyed more than 200 professionals at global security shows and found that holistically securing an organization’s endpoint is a key priority, with sandboxing a standout winner.

Commentary and Opinions

While travelling through TSA lines at an airport, I often wonder how to make the process more efficient. TSA obviously has thought about this, too. Online pre-screening for frequent travelers and advanced imaging technology have been added to their repertoire to ease the screening process. Both advances are technological and both aim to increase efficiency and decrease human contact. Technology and humans cannot be on divergent paths in the homeland security and law enforcement arenas. They must work together.
In 2007, I said the following when referring to the Department of Homeland Security (DHS) and Customs and Border Protection’s (CBP) policy on container security: “Perhaps, the dumbest policy, model, or standard of all is the sealed-door standard.” Five years later, despite technological advances and use by the private sector and military, CBP is still focused on container “doors” as a security measure. CBP has still not developed an alternative.
In 1992, the FBI established its Criminal Justice Information Services (CJIS) division. It is the largest division of the FBI and it provides state, local, and federal law enforcement and criminal justice agencies with access to centralized information, such as fingerprint identification records, criminal histories and sex offender registrations. Due to the extreme sensitivity of this information, the agency has mandated enhanced security measures to protect access to it.
President Obama’s proposed budget highlights the critical role that IT plays in making government work better for citizens and business. The budget encourages the wider use of technology to enhance efficiencies in delivering needed services, while cutting the IT budget over several years. U.S. Chief Information Officer Steven VanRoekel titled his accompanying IT budget priorities, Doing More with Less. In this era of fiscal austerity, key strategic activities are essential to achieving this vision:
In January, the European Commission proposed a comprehensive reform of the EU’s 1995 Data Protection Directive to strengthen consumer privacy laws and harmonize privacy regulations and enforcement across EU member states. While the EU proposal has many useful recommendations, it falls short in a number of areas. Specifically, it adds new regulations that will negatively impact the Internet economy, limits the potential for future innovation and imposes excessive burdens on organizations.
 

Digital Version of July/August 2015 
Print Edition

GSN July/Aug Print Edition

Click Here

June/July 2015 Digital Edition



Click Here

Digital Version of May/June 2015
Print Edition

 

Click Here



Technology Sectors

Market Sectors

Recent Access Control Videos

Pan Kamal, VP of Marketing for Alert Enterprise, a security software company headquartered in Fremont, CA, explains in his opening remarks that he is going to describe Alert Enterprise’s award-winning unified solution for critical infrastructure protection. As Kamal points out, government and critical infrastructure agencies have recognized the dangers and have armed themselves to the teeth with network protection and cyber security tools on the IT security side, and have similarly armed themselves with perimeter protection tools on the physical security side.

E-Seek Inc, which designs and manufactures bar code readers for verifying drivers’ licenses, was platinum winner in GSN’s 2013 Border Security Awards in the category of “Best Identification Document Verification Solution”.  With barcodes now being used in drivers licenses issued by all 50 states, E-Seek produces desktop readers as well as a line of compact, portable and wireless readers that are widely used in law enforcement patrol cars, banks, casinos and hospitals.  In a major announcement at the Border Security Expo, Mr.

Vanguard Security Professionals has been a multiple Winner and Finalist in previous GSN Awards Programs and was named Winner in the 2012 category of “Best Intrusion Detection/Prevention Solution” and Finalist in the 2012 categories of “Best Identity Management Platform” and “Best Compliance/Vulnerability Assessment Solution.” Steven Ringelberg argues that new language is being used to describe the threat-scape, but many threats are the same as they have been for years.

John Szczygiel describes Brivo, Winner of the 2012 Award for “Best Integrated System for HSPD-12/FIPS 201 Compliance” for the second year in a row, as a cloud company that provides hosted subscriber services in the physical access control domain. The company’s “CloudPass” product has been established as a government community cloud, specifically for federal government agencies that want to take their physical access control and PAC into a cloud configuration. Brivo also offers a cloud transition service to clients that have on-premise servers and want to make the transition.

Jody Mack provides a thumbnail description of Vanguard Integrity Professionals, a Sponsor of the 2012 GSN Awards Program as well as a Winner in the 2012 IT security category of “Best Intrusion Detection/Prevention Solution” and 2012 Finalist in the categories of “Best ID Management Platform” and “Best Compliance/Vulnerability Assessment Solution”, not to mention a multiple Winner and Finalist in prior GSN Awards Programs.

White Papers

ADT

This white paper highlights a successful pilot HSPD-12 compliant visitor management project undertaken by a U.S. federal government agency, which successfully meets the objectives of Federal Identity, Credential, andAccess Management (FICAM) Road map use case 4.9 for how agencies should perform credentialing and validation of visitors to federal facilities.

 

To download this white paper click here

Vector Firm

 

There was a time when a trade show budget was never questioned. If your company had a product to launch,training to conduct, leads to generate or branding to imprint, the industry’s major trade show was the place to do it.

Please click the headline to read more.