Get ready for CJIS

What is CJIS?

September 30, 2014, The FBI's Criminal Justice Information Services (CJIS), the primary central repository for criminal justice information, will require law enforcement personnel to use advanced authentication methods when logging in to the CJIS database.

Why the mandate?

The very nature of the data contained in the CJI database, including fingerprint records, criminal histories, and sex offender registrations, makes it a prime target for cyber criminals and hackers. To counter these security risks caused by over-reliance on weak password-based authentication, the CJIS Security Policy now requires the use of advanced authentication.

How to become compliant

Gemalto has identified four critical steps to implement advanced authentication. Supporting brochures and video will help you get a more detailed plan of action.

  1. Select an advanced authentication that is right for your organization
  2. Ensure connectivity with existing infrastructures
  3. Pilot and test solution
  4. Prepare and train your officers to use the new devices.

Downloads

Strong Authentication

Strong Authentication

Implementation Guide
Strong Authentication

Guide to CJIS Security with Advanced Authentication

Guide to CJIS Security

A Brief for Law Enforcement Organizations
Guide to CJIS Security with Advanced Authentication [PDF - 2.4mb]

Sources of Financial Assistance for CJIS Mandate

Video

On demand webinar

CJIS Video

How to Become CJIS Compliant from Planning to Implementation
Recording of live webinar, featuring Tom Flynn, Vice President, Security, Gemalto and John Bailey, Technical Sales Manager, NetMotion.
Runtime: 54 min

Presentation from Gemalto/NetMotion CJIS webinar