government security

Spending the Government's Money

A look at how three major government entities manage security

The government security market is a growing multi-billion dollar business. To address a host of new security requirements, the security industry has partnered with the government to develop new security standards and capabilities. New requirements have led to opportunities in the physical access control systems and the identity management markets.

To address the needs of identity, credential and access management, the government is spending billions of dollars on ID cards and systems to provide a higher level of assurance of a cardholder's identity. Government facilities and sea ports are upgrading their PACS to take advantage of new ID cards mandated by the government.

Government Regulations

The government relies on regulations developed by various organizations to ensure products and services meet its own requirements. Depending on the customer, they may have different resources to verify compliance. For instance, the General Services Agency has defined the FIPS 201 evaluation program and the associated approved products list to assist federal agencies in determining which products have been tested to federal guidelines.

The TWIC program also publishes its own list, and TSA has posted the initial capabilities evaluation list showing which products meet its expectations for fixed and handheld devices. TSA also will conduct further environmental and functional testing to provide security system designers and purchasers with additional details on compliance of these products.

When selling to government customers— and others that are regulated to comply with additional standards, such as TWIC—products should be included on the appropriate resource lists.

The procedures for getting on these lists vary. Always start by contacting the agency responsible for the list. In addition to these lists of products that have met certain levels of compliance, various customers also will have to perform a separate certification and accreditation test, which is used to validate compliance. This generally is a system-wide test, so it does not apply to a single device and may not apply to a single manufacturer.

Selling to the Government

The government's process for awarding contracts begins with a request for information to discover what products and services exist in the market. Responding to an RFI is your opportunity to influence the specification. RFIs are used to gather information; solicitations are used to purchase. Solicitations issued by the government come in several flavors: request for quotation, request for proposal or invitation to bid. The government is looking for the best value: the product or service that meets the requirement at the lowest cost. Once the proposals are submitted, the government will conduct an evaluation and develop a list of companies that meet the requirements and offer competitive pricing. The candidates are invited for discussions and demonstrations and asked for a final bid.

A project may be more heavily weighted in favor of compatibility with an incumbent product or a specific function, a low-cost solution or one that minimizes human resources in favor of technology. The scoring may put a bias on the level of service the end user expects to receive; for example, in response time, equipment replacement or technology refresh period. The vendor should interview the customer and attempt to discern what his or her sensitivities are to these and other issues. This is known as pre-selling and is another area where the incumbent will have an advantage as they are already on site at the facility.

Position your product or service as a solution—not part of a solution—even if that means partnering with others to round out the offering. To convince the customer of how easily the solution can be implemented, show examples where similar solutions have been implemented and explain the lessons learned.

Timing is everything. You must be six to 12 months ahead of the opportunity hitting the streets. Take this time to pre-sell. If the customer has released the RFP, you are too late.

Gaining Access

Government buildings face many of the same access control and video challenges that non-government entities encounter. First, they must perform a risk assessment to determine what needs protection, how best to protect it and what technology will provide the most comprehensive solution.

Meeting the government-mandated requirements, along with installing a security system that facilitates the needs of the building and staff, are just some of the many factors that come into play—there also are budgetary constraints and aggressive timelines.

A PACS that integrates with video and performs as one system provides the best security option. Deeply integrated access control and digital video produces a faster response to alarms. Any system activity can trigger an automated response on any subsystems. The response might be to lock/unlock a door, to swing a PTZ camera to a different preset position based on the alarm, or to tag video and start recording at a higher resolution and frame rate.

Government security officials must decide whether to implement multiple layers of security for sensitive information, public officials and matters of national security. When security is required in a less sensitive area, smartcard readers requesting a card swipe to open a door are sufficient. However, rooms that require increased security may require a card swipe and PIN or a biometric and PIN for access.

Meeting government mandates such as TWIC is another challenge. TWIC is an identification credential for individuals requiring unescorted access to secure areas of buildings and vessels regulated by the Maritime Transportation Security Act. Persons who qualify for a TWIC receive a tamper-resistant credential containing their fingerprint and an access code that provides a positive link between the card and individual. Many ports have chosen to deploy an electronic credential authentication in association with the TWIC cards.

Integrating government-approved access control with a governmentissued identity credential such as PIV or TWIC requires electronic credential authentication software to perform a multifactor authentication before the card is loaded into the local database. The multifactor authentication includes viewing the photo of the cardholder, validating the card's digital certificates, matching a PIN and a biometric fingerprint to the card, and checking the cardholder's ID against the TSA Hotlist. Periodic authenticity checks of registered cardholders also are required.

Choosing the Right Solution

Some government facilities need a powerful, robust system that can manage thousands of readers and cardholders and hundreds of cameras. They need a true open-architecture system that includes an access control head end, which can integrate with best-of-breed products in video management, intrusion detection, building automation, advanced identity management, electronic credential authentication and mobile readers. Systems must manage multiple transactions 24/7.

All other systems can integrate via the access control system, and security officers can utilize the software features to manage the integrated systems. An easy-to-use, feature-rich system that seemlessly integrates with all other components necessary for a comprehensive SMS will provide the government with the right solution.

The Port of Houston

The Port of Houston Authority owns and operates the public facilities located along the 25-mile-long Houston Ship Channel and is responsible for the security of its terminals. The 150- plus private owners along the channel have their own security plans but work closely with POHA to maintain a high level of security. AMAG Technology's Symmetry Central Card Handler manages all cardholder information.

The POHA implemented the TWIC program to ensure that individuals who pose a threat do not gain unescorted access to secure areas of the nation's maritime transportation system. Symmetry Global Security Management System integrated with Codebench's PIVCheck Plus for enrollment provides the multifactor authentication needed to meet the TWIC requirements. Veridt credential readers are used at entrance/exit points to restricted areas and dynamically read both TWIC cards and locally issued port ID cards. The various components perform their own specific functions but communicate with other parts of the system in a cohesive manner.

The Hoover Dam

One of America's national icons, the Hoover Dam is the world's 34th largest hydroelectric generating station. Its authorized purposes are to provide flood control, water storage and delivery, and generate electricity. It is the No. 1 nongambling tourist destination in Nevada and is registered as one of the engineering marvels of the world.

The Bureau of Reclamation, which built the dam, needed to improve its quick detection ability and develop a pre-planned response to mitigate and recover from security-related incidents. The upgrade also had to meet Homeland Security Presidential Directive 7 and Department of the Interior guidelines.

Hoover Dam achieved a multifaceted protection strategy that includes a security force comprised of officers from the Hoover Dam Police Department, proprietary and contract guards, and technological components. Through the implementation of AMAG's Symmetry Enterprise Security Management System, all onsite security entities now work together as one to help protect this critical national resource from any threat or emergency resulting from a hostile act. Symmetry separates public access from controlled access with millions of visitors each year, provides early warning of an unauthorized entry or security breach and employs equipment that did not destroy the architectural integrity, providing added security without compromising the historical landmark.

The Pentagon

The Pentagon deploys the largest access control system with full-time operational abilities in the world. All stakeholders worked cooperatively to install AMAG's Symmetry Enterprise to protect the people, assets and national security information at the Pentagon.

Symmetry Enterprise's robust operational platform provides a userfriendly operation process, allowing for seamless access management for the world's largest office building. Symmetry manages a database that contains tens of thousands of cardholders and processes hundreds of thousands of events every day.

The Pentagon also is working to meet HSPD-12 and FIPS 201 requisites, and a recent upgrade will facilitate that requirement.

As technology changes and threats increase, the demand for government security will continue. Much of its core needs are the same as non-government, but it must follow government-mandated initiatives and use products that are on the GSA list.

Working with the government takes time and a commitment to quality products and customer service. However, it's well worth the effort. Once you land the government as a client, you will find a committed customer who will positively affect your company's bottom line.

This article originally appeared in the issue of .


  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Survey: Only 13 Percent of Research Institutions Are Prepared for AI

    A new survey commissioned by SHI International and Dell Technologies underscores the transformative potential of artificial intelligence (AI) while exposing significant gaps in preparedness at many research institutions. Read Now

  • Survey: 70 Percent of Organizations Have Established Dedicated SaaS Security Teams

    Seventy percent of organizations have prioritized investment in SaaS security, establishing dedicated SaaS security teams, despite economic uncertainty and workforce reductions. This was a key finding in the fourth Annual SaaS Security Survey Report: 2025 CISO Plans and Priorities released today by the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment. Read Now

  • Mobile Applications Are Empowering Security Personnel

    From real-time surveillance and access control management to remote monitoring and communications, a new generation of mobile applications is empowering security personnel to protect people and places. Mobile applications for physical security systems are emerging as indispensable tools to enhance safety. They also offer many features that are reshaping how modern security professionals approach their work. Read Now

Featured Cybersecurity


New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3