Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

ID Federal Standards: Many Vendors, So Little Time...

By Scott Price
May 6, 2006
Scott Price


A number of security and smart card vendors have begun to tout products as crucial components of an HSPD-12 solution. See the sidebar in this column. In fact, the market for integrating physical and logical access security across federal agencies is so large that even analysts are reluctant to put a dollar value on it.

Smart card vendors, identity management systems providers, hardware manufacturers and software developers are all competing for the attention of government managers, who now find themselves sorting through a mass of vendor and product data to find the optimal, integrated and HSPD-12 compliant solution.

Dual benefit

Consolidating logical and physical security controls into a single, card-connected system as HSDP-12 intends will produce many benefits for federal agencies, contractor firms and even corporate operations. Taking advantage of card-connected technology will reduce security costs by 40 to 60 percent over traditional approaches – all while enabling an agency to control a greater percentage of its access points. A single system also eliminates the costs of installing and wiring traditional access points, as well as the considerable expense of traditional architectures and systems for access control at remote locations. It should now be much more affordable for agencies to expand the number of locations and systems that are electronically secured.

Agencies can also benefit from using a single interface to control both wired and card-connected access points – allowing administrators to manage a large number of users and locations more efficiently. Each card, or smart credential, securely carries the roles and privileges of the individual from wired to standalone access points, creating a card-connected environment. In this way, within the access control system, cardholders become an extension of the physical access network, and their cards carry information to and from the readers. By following this model, security is increased significantly at a fraction of the normal cost. For example, if an employee leaves the agency, rather than replace door locks and wiring (at a cost of $5,000 each, and time delays), the card permissions can be immediately revoked and the employee can no longer access the facility or information networks.

Finding right partner

So how does an agency or private sector firm determine the correct combination of technologies to meet deadlines and control costs? Systems integrators who align the latest technologies with user requirements and federal standards – and afford maximum interoperability across similar enterprises – represent a logical partner in this effort. These integrators offer established viable business relationships with product vendors of all types, and have experience in both specific technologies, and in the business of customer service and engineering support.

As with any true partner, the right integrator will provide the right solution to meet for HSPD-12 compliance. From cocktail napkin sketches to prototype and deployment to lifecycle maintenance, integrators should tailor credential technology systems, and ensure that both present and future agency needs are met with minimal cost and infrastructure impact.

Agencies can succeed in meeting the challenge of implementing an HSPD-12 solution. Understanding the true benefits of card-controlled strategies and working with partners who focus on the big picture are smart places to begin.

Challenging Background

On Aug. 27, 2004, President George Bush signed Homeland Security Presidential Directive 12 (HSPD-12). The directive set into motion an aggressive timeline for government departments and agencies to develop and implement a mandatory, government-wide standard for secure and reliable forms of identification for federal employees and contractors. Early in 2005, the National Institute for Standards & Technology further defined the requirements for HSPD-12 compliant solutions by outlining the required administrative procedures and technical specifications that agencies should follow to meet the standards.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Scott Price is a group senior vice president with Anteon serving as the General Manager of Advanced Technology within the Technology Solutions Group (TSG). In this capacity, Price is responsible for Anteon’s efforts in credential technology solutions that include HSPD-12 compliant solutions for civilian agencies, border management solutions for the Department of Homeland Security (DHS), First Responder solutions for states and counties and modernization and maintenance for the U.S. Navy and other maritime organizations.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing