Government


Learning From the Best

The average small-business owner may view the world of federal government contracts as an intimidating, mind-boggling realm dominated by huge corporations— with the promise of great financial success just out of reach. However, breaking into the federal government marketplace is a feat that can be accomplished by small private companies—and one that has been achieved by countless organizations, especially in recent years.

A Growing Threat

In the United States, people encounter a perpetual tradeoff between freedom and security. The nation depends on a complex system of critical infrastructures to maintain a high quality of life and the freedoms enjoyed every day. New threats to security have these organizations taking a second look at their vulnerabilities, however, scrambling to minimize disruption and to maintain the integrity of their operations. In the past, national security was perceived as the role of government. Today, Department of Homeland Security efforts to protect critical infrastructures from physical attack are a shared responsibility of the public and private sectors, as well as individual citizens.

Corrective Action

Correctional facility infrastructures are aging, inmate populations in the United States are increasing, and the cost of operating jails and prisons is growing twice as fast. Correctional facility officials know these facts all too well.

TSA Names Special Counselor

TSA recently announced the appointment of Kimberly Hubbard Walton as the assistant administrator for the Office of the Special Counselor (OSC).

Meeting the Mandates

The Department of Homeland Security’s publication of chemical facilities anti-terrorism (CFAT) standards has many chemical and petrochemical companies scrambling to develop security plans for their high-risk facilities. The continued post-9/11 threat of terrorism dictates urgency, and the DHS put teeth in the CFAT rules.

Gemalto VP Testifies on Privacy and Security of Government IDs

Gemalto's vice president urged DHS and congress to make privacy and data security the highest priorities in ID programs.

Company Joins DOD IT Team

SI International announced recently that it is a member of the KT Consulting team that has been awarded the IT Services, Program Support Services contract with DoD and WHS.

Federal Government To Spend $345 Million On Identity, Access Management In 2008

A recent report from INPUT projects the federal market for identity and access management to grow by 6.2 percent annually through 2012.



A Monumental Task

IT seems a shame to have to start yet another article on security with the words “in the aftermath of 9/11.” However, when it comes to protecting national monuments and treasures, the fact is security has had to change significantly in the past six years as a result of heightened terrorism concerns.

Safe and Sound

GOVERNMENT security has been the subject of unprecedented focus since 9/11. Before the attacks, advanced physical security was considered a necessary expenditure only for military facilities and key government installations in high-target areas around the world. Before 9/11, people were comfortable with security and confident terrorism would never touch the country directly on home soil.

Teaming Up

NAVIGATING the world of federal government contracts can be a head-spinning operation for even the most committed and headstrong business. But for many, working with the federal government, especially with the constantly growing Department of Homeland Security, is too big a proposition to pass up. With 183,000 employees and a budget of more than $42.7 billion in fiscal year 2007, DHS is the third-largest cabinet department in the federal government and a target for many companies to garner new business.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

On Alert

SECURING the flow of oil from offshore platforms, land-based drilling rigs and pumping stations across miles of pipeline and infrastructure is a top priority for the government and the petroleum industry.

First-Class Upgrade

PROVIDING adequate airport security has become an ongoing debate of national importance after being plunged into a post-9/11 world. Who can forget the eerie sight of an empty sky during the immediate days following the infamous attack in the nation's history.

Homeland Security Insider

THE Transportation Security Administration is doing a good job protecting air travelers. Likewise, airport security managers are working hard to keep the public safe and to speed us through the facilities. Until recently, getting through airport security was technologically simple -- bags were run through an X-ray scanner while walking through a conventional metal detector.

Right On Track

SEPTEMBER 2006 marked the fifth anniversary of the Sept. 11, 2001, attacks on the World Trade Center, sparking widespread debate on whether the United States is any safer today than it was on that fateful day in 2001. Since 9/11, much has been done to promote greater vigilance of both foreign and homegrown terrorist activities. But until another successful or unsuccessful terrorist attack, the nation may never know the complete answer.

Flying High

NOWADAYS, it takes much more to have a safe flight, and airports are strengthening security to ensure passengers do travel safely.

The Last Word

SECURITY, a once seemingly mundane staple of American life, has seen a drastic reconstruction in recent years. In part, protecting utility infrastructures has sped to the forefront of the debate. Water, and its infrastructure for delivery, has been no exception.

The Magic Touch

THE fluctuating state of global migration, combined with international terrorism threats, make ID verification increasingly important at border crossings. According to Customs and Border Protection, in 2005, the United States had an average of 1.2 million visitors per day at the 314 land, air and seaports last year.

Homeland Security Insider

AFTER returning from a business trip earlier this week, I undertook the all too familiar task of sorting through mail, newspapers and magazines that had accumulated during my absence.

Featured

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3