Quintron Systems, Inc., the recognised leader in advanced interoperable voice systems and physical access control/intrusion detection systems, recently announced that they have received FICAM approval for their AccessNsite access control security system, which therefore now resides on the GSA Approved Products List (APL). “Identity, Credential, and Access Management (ICAM) standards within the Federal Government continue to be a significant focus for our system’s development,” said James St. Pierre, vice president of sales and marketing at Quintron. “As the government continues to evolve its standard, we continue to innovate to meet the requirements.  We are very proud to have earned the distinction of credibility with this FICAM approval.”

The Office of Management and Budget (OMB) requires that Federal Agencies only procure qualified products and services listed on the GSA Approved Products List when implementing HSPD-12 into their environment. Approval of AccessNsite indicates Quintron’s cooperation with the Program and successful testing against a rigorous, comprehensive set of functional requirements. Given the extent and the rigor of the testing performed, the approval and inclusion in the APL is very noteworthy.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...