Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

Why Identity Is the New Firewall

By Mark Steffler
February 10, 2014

The recognition of the need for homeland security, and the rapid growth of the security industry around that need, is based in part on recognition of the critical need to ensure that no individuals in a facility or campus ever have access to an area where they are not authorized to enter. This is mission critical with no margin for error for government agencies and facilities – and of the highest importance for the private sector as well. Beyond the essential physical safety of the other individuals on the property, this concern relates to the security of classified data, the need to protect both physical and logical technology located on the premises, intellectual property theft, concerns of vandalism or workplace violence and liability.

Countermeasures to reduce, mitigate and eliminate external and internal terrorist threats have been and remain of paramount importance to the Federal Government. In 2004, the White House issued the Homeland Security Presidential Directive 12 (HSPD-12), which set the entire government on a path towards this goal with the vital step of establishing trust for federal workers and contractors who require access.

The first step was creation of the Personal Identity Verification smart card (PIV card), which resulted from the NIST FIPS-201 specification, published in 2005. The second step is to actually use the PIV card for everyday access to secure cyber and physical assets and resources.These measures are entirely dependent on the ability of government agencies to manage identities, so that no PIV card is ever valid for an individual who should not be authorized on that day, at that time, to enter those premises.

Physical Identity and Access Management (PIAM) Definitions and Challenges:

  • Database of every identity that who may be present in a facility or on a campus
  • Ongoing updates of current access privileges of every identity
  • Valid for all locations of the enterprise
  • Instant, automatic updates for:
    • New personnel
    • New or lost certifications
    • Vendors added or subtracted
  • Authorization for each individual door or building
  • Management of all relevant compliance issues

There is technology in existence today that will solve these problems, sustain valid identities 24/7 and create a virtual firewall around the organization. By utilizing an enterprise-based PIAM solution, it is now possible for government and private sector entities to prevent prohibited internal access by employees, contractors and other individuals enrolled in the system. The softwarecan be implemented across multiple facilities and buildings across a campus, or across the globe, in alignment with FICAM guidelines. There is no need to rip and replace existing PACS infrastructure, as the use of this software enables existing physical access control systems to fully recognize and validate PIV and other ID cards. This is something that visitor management systems cannot do, and the benefits are clear.

Implementing this type of software solution will help organizations preserve their existing investments in technology, reduce future costs and simplify many complex procedures. Not only will this have the effect of improving overall security, it will also make it easier and more cost-efficient to purchase, install, deploy and maintain fully compliant physical access control systems. A robust and technologically advanced software solution to address the challenges will provide a policy-based approach to managing and enrolling PIV cardholders in diverse PACS. This will enable the flexible enrollment, validation and processing of individuals gaining temporary or long-term access to a given facility, along with a policy-based approach to guard against fraud and foster real-time audit and compliance – without changing the user’s existing physical security infrastructure.

Automating PIAM systems makes it possible for the agencies to set rules, controls and policies that are maintained and updated instantly, and to onboard every identity and maintain correct authorization and provisioning for every identity in real time. The software that can accomplish this monumental task utilizes PACS virtualization – whereby the software finds and connects networks, virtualizes functions like switching and routing and identifies access control devices as PACS. Every device and or system, no matter the vendor, brand or protocol used, becomes another set of data points for the overall PIAM solution to incorporate. What is important is that all these formerly disparate products and systems can now be polled, programmed and controlled via a single platform.

By taking complete control of physical identity management, the user can create a virtual firewall around and within each individual facility – helping to keep unauthorized individuals off the premises, and contributing significantly to the cause of homeland security.

KEYWORDS: Homeland Security PIAM (physical identity and access management) PIV card workplace violence

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark Steffler, Vice President, Federal Practice, Quantum Secure

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Help desk employees

    Help Desk Havoc: Why Identity Verification Is Still the Weakest Link in Targeted Attacks

    See More
  • cyber-frame

    If Michael Jordan is zero trust, then identity governance is Scottie Pippen — Why cybersecurity is a team sport

    See More
  • cloud

    Identity is the new cloud perimeter

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

  • Risk Analysis and the Security Survey, 4th Edition

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing