Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

ID Federal Standards: Many Vendors, So Little Time...

By Scott Price
May 6, 2006
Scott Price


A number of security and smart card vendors have begun to tout products as crucial components of an HSPD-12 solution. See the sidebar in this column. In fact, the market for integrating physical and logical access security across federal agencies is so large that even analysts are reluctant to put a dollar value on it.

Smart card vendors, identity management systems providers, hardware manufacturers and software developers are all competing for the attention of government managers, who now find themselves sorting through a mass of vendor and product data to find the optimal, integrated and HSPD-12 compliant solution.

Dual benefit

Consolidating logical and physical security controls into a single, card-connected system as HSDP-12 intends will produce many benefits for federal agencies, contractor firms and even corporate operations. Taking advantage of card-connected technology will reduce security costs by 40 to 60 percent over traditional approaches – all while enabling an agency to control a greater percentage of its access points. A single system also eliminates the costs of installing and wiring traditional access points, as well as the considerable expense of traditional architectures and systems for access control at remote locations. It should now be much more affordable for agencies to expand the number of locations and systems that are electronically secured.

Agencies can also benefit from using a single interface to control both wired and card-connected access points – allowing administrators to manage a large number of users and locations more efficiently. Each card, or smart credential, securely carries the roles and privileges of the individual from wired to standalone access points, creating a card-connected environment. In this way, within the access control system, cardholders become an extension of the physical access network, and their cards carry information to and from the readers. By following this model, security is increased significantly at a fraction of the normal cost. For example, if an employee leaves the agency, rather than replace door locks and wiring (at a cost of $5,000 each, and time delays), the card permissions can be immediately revoked and the employee can no longer access the facility or information networks.

Finding right partner

So how does an agency or private sector firm determine the correct combination of technologies to meet deadlines and control costs? Systems integrators who align the latest technologies with user requirements and federal standards – and afford maximum interoperability across similar enterprises – represent a logical partner in this effort. These integrators offer established viable business relationships with product vendors of all types, and have experience in both specific technologies, and in the business of customer service and engineering support.

As with any true partner, the right integrator will provide the right solution to meet for HSPD-12 compliance. From cocktail napkin sketches to prototype and deployment to lifecycle maintenance, integrators should tailor credential technology systems, and ensure that both present and future agency needs are met with minimal cost and infrastructure impact.

Agencies can succeed in meeting the challenge of implementing an HSPD-12 solution. Understanding the true benefits of card-controlled strategies and working with partners who focus on the big picture are smart places to begin.

Challenging Background

On Aug. 27, 2004, President George Bush signed Homeland Security Presidential Directive 12 (HSPD-12). The directive set into motion an aggressive timeline for government departments and agencies to develop and implement a mandatory, government-wide standard for secure and reliable forms of identification for federal employees and contractors. Early in 2005, the National Institute for Standards & Technology further defined the requirements for HSPD-12 compliant solutions by outlining the required administrative procedures and technical specifications that agencies should follow to meet the standards.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Scott Price is a group senior vice president with Anteon serving as the General Manager of Advanced Technology within the Technology Solutions Group (TSG). In this capacity, Price is responsible for Anteon’s efforts in credential technology solutions that include HSPD-12 compliant solutions for civilian agencies, border management solutions for the Department of Homeland Security (DHS), First Responder solutions for states and counties and modernization and maintenance for the U.S. Navy and other maritime organizations.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • vendor selection

    Many Vendors, Many Decisions: How Safeguarding your Vendor Selection Practices Can Help Reap Rewards for your Security Enterprise

    See More
  • Why Do So Many Focus on Black Swans?

    Why Do So Many Focus on Black Swans?

    See More
  • email-communication-freepik1170.jpg

    Why so many cybersecurity attacks still start with an email

    See More

Related Products

See More Products
  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing