How Not to Reinvent the Wheel

September 2010
Security: Solutions for Enterprise Security Leaders;Sep2010, Vol. 47 Issue 9, p72
Trade Publication
In this article the author reflects on the move of the U.S. federal government to advance security and identity management solutions. The author comments on the use of a smart card to gain access to a facility and a computer network. Also investigated is the publication of the Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance by the Federal Chief Information Officers Council and the Federal Enterprise Architecture in November 2009.


Related Articles

  • From Casinos to 'Multi-cards' DeBerry, Ron // Security: Solutions for Enterprise Security Leaders;Jul2005, Vol. 42 Issue 7, p18 

    Discusses the different security system methods that center on multi-technology cards including biometrics and smart chips. Personal computer-based approach; Standalone approach; Portable database approach; Integrated template management approach. INSET: Wedded to Embedded.

  • An 8 Step ID Card Plan.  // Security: Solutions for Enterprise Security Leaders;Apr2006, Vol. 43 Issue 4, p64 

    The article discusses steps to put a dual-use identification smart card system to work. First is to assess security policies and levels. Second is to hire a champion to drive the transition. Third is to develop an implementation plan. Fourth is to select the access technology. Fifth is to select...

  • PLAN AHEAD TO MAXIMIZE BENEFITS TO HSPD-12 INVESTMENT. Belchick, David // Government Security;Oct2005, Vol. 4 Issue 7, p34 

    The article offers suggestions on how to maximize agencies' benefits to the Homeland Security Presidential Directive 12 investment in the United States. The smart card is the most visible part of the initiative, which aims to bring about the convergence of physical and information technology...

  • Procurement Watch.  // Government Security;Apr2006, Vol. 5 Issue 3, p42 

    The article offers news briefs related to several deals of security systems in the United States. The U.S. Department of State has chosen a credentialing system for the U.S. passports from Trans Digital Technologies Corp. The U.S. Department of the Interior has chosen smart cards from Oberthur...

  • HOW TO BUY: CARDS & READERS. Whitehust, Londsay // SDM: Security Distributing & Marketing;Jul2004, Vol. 34 Issue 7, p63 

    Discusses factors to be considered by customers planning to purchase cards and readers for their security systems in the United States. Applications of proximity and smart cards; System durability and simplicity; Technical support provided by manufacturers. INSET: Lasting Value.

  • Smart Cards Continue to Hover.  // Security: Solutions for Enterprise Security Leaders;May2009, Vol. 46 Issue 5, p52 

    The article reports on the use of smart card technology by financial institutions and governments as an important element for credentialing schemes in the U.S. The majority of the regional financial organizations worldwide have ordered that financial credit and debit cards must be smart...

  • SDM iNSiDER.  // SDM: Security Distributing & Marketing;Sep2004, Vol. 34 Issue 9, p26 

    This article reports on some developments related to the security systems industry. HID Corp. of Irvine, California has announced support for the United States Government Smart Card Interoperability Specification Version 2.1 based on the company's iCLASS 13.56 MHz contact less smart card...

  • On the Market.  // Security: Solutions for Enterprise Security Leaders;Jun2004, Vol. 41 Issue 6, p50 

    Presents products for the security industry. Security officer uniforms; Guard Tour System; Fingerprint and smart cards; Audible/visual emergency signaling devices.

  • From Security Guards to Servers. Babcock, Regina Raiford // Buildings;Sep2003, Vol. 97 Issue 9, p22 

    Provides information on the Readykey PRO card access system from JMG Security Systems Inc. Statement issued by Gil Ledesma, sales manager at JMG; Features; Impact of technology innovations on security.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics