Homeland Security


The Turning Point

CRITICAL infrastructure organizations, including airports, seaports, energy manufacturing facilities and telecommunications networks, are essential to functioning of societies and economies.

ID'ed Indeed

NATIONAL identification cards were being promoted long before the terrorist attacks of Sept. 11, 2001, as a means to identify potential terrorists, curb illegal immigration and thwart criminal activity. Countries around the world are already using national ID cards. Singapore recently implemented Singapore Personal Access, or “SingPass,” an ID used for e-government services. Germany uses an encrypted biometric national ID. Malaysia established “Mykad,” a universal-purpose ID card, and no less than a dozen other countries have issued contracts to develop the infrastructure to support a national ID card.



Securing the Friendly Skies

ANYWHERE in the world, most security and intelligence officers will agree that transportation security is about managing risk. It's about detecting potential threats as early as possible, reacting appropriately and mitigating the ripple effects, all the while focusing on simplifying travel for billions of passengers who do not warrant concern.

Protecting Mobility

FROM Barcelona to Berlin and all across Europe, workers today need to access corporate information outside the workplace. Remote access frees workers from the restrictions of the corporate work environment. By working from any location and at any time, employees can collaborate more effectively, work more efficiently and ultimately be much more productive.

Going With the Flow

All Eyes on the Road

A heightened sense of awareness of threats that face the United States has placed ongoing pressure at a national, state and local level to keep citizens safe from terrorism, as well as natural disasters and other unplanned events.

Closing the Loop

THE security industry has a long and proud history of working side by side with the government to develop new technologies that result in an improved way of life for Americans. While commercial security products and practices have deep affiliation with both government applications, military and non-military, a new breed of security concerns gave birth to new security requirements and solutions–especially those pertaining to border control.

Homeland Security Insider

A few hours after taking control of Congress and following 12 years of Republican dominance, House Democrats announced a plan they say will strengthen homeland security. Accusing Republicans of neglect, Democrats on the Homeland Security Committee say their plan will implement the unfinished 9/11 Commission recommendations; require private companies to prepare for terrorism; require the government to inspect cargo on passenger planes; and require all cargo containers carried on ships to be scanned and sealed before leaving for an American port.

Visit with the Shrink

TO a significant extent, shrink can be predicted and tamed with targeted security resources, institutional awareness and effective, operationally feasible countermeasures. In statistical analysis, the goal is to explain variation and to determine what part of that variation is systematic and predictable.

Teaming Up

NAVIGATING the world of federal government contracts can be a head-spinning operation for even the most committed and headstrong business. But for many, working with the federal government, especially with the constantly growing Department of Homeland Security, is too big a proposition to pass up. With 183,000 employees and a budget of more than $42.7 billion in fiscal year 2007, DHS is the third-largest cabinet department in the federal government and a target for many companies to garner new business.

Homeland Security Insider

FOUR years in the making, the drive to implement HSPD-12 at long last began by issuing smart identification cards last October. Every federal agency has now opened at least one facility where employees can go to get personal identification verification (PIV) cards fitted to the strict criteria of FIPS 201. This year, federal agencies will begin to activate a massive interoperable system of card readers in which any agency's readers will be able to read and process cards presented by any and all federal employees -- no matter what agency employs them.

Fusion Frenzy

U.S. airports with one or more checkpoint areas, security officials have probably never thought of themselves as ID managers.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.