2014 Digital Yearbook of Homeland Security Awards
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
The GSN <strong>2014</strong><br />
<strong>Digital</strong><br />
<strong>Yearbook</strong><br />
<strong>of</strong><br />
<strong>Homeland</strong><br />
<strong>Security</strong><br />
<strong>Awards</strong>
Thanks to our<br />
generous sponsors<br />
for making this<br />
important program<br />
possible.<br />
Thanks to our<br />
generous sponsors<br />
for making this<br />
yearbook possible<br />
About the GSN <strong>Homeland</strong><br />
<strong>Security</strong> <strong>Awards</strong> Program<br />
The Government <strong>Security</strong> News <strong>Awards</strong> Program was<br />
organized in 2009 to honor the distinguished vendors <strong>of</strong><br />
IT and Physical <strong>Security</strong> products and solutions, and the<br />
dedicated <strong>of</strong>ficials in federal, state, county and municipal<br />
government, whose combined efforts keep our nation<br />
safe and secure 24/7.<br />
We are also pleased to honor the vendors and government<br />
<strong>of</strong>ficials <strong>of</strong> other nations that have chosen to participate in<br />
this year’s program with their prize-winning entries.<br />
<strong>Homeland</strong> <strong>Security</strong> in many nations benefits from remarkable<br />
technology breakthroughs and ever-more sophisticated<br />
programs from government agencies, <strong>of</strong>ten produced in<br />
productive collaboration with private industry.<br />
We hope you find our awards program’s findings regarding<br />
the great achievements <strong>of</strong> the past year in the field <strong>of</strong><br />
<strong>Homeland</strong> <strong>Security</strong> to be interesting and informative.<br />
Adrian Courtenay, CEO<br />
Government <strong>Security</strong> News<br />
2
TABLE OF CONTENTS<br />
4<br />
6<br />
8<br />
10<br />
12<br />
16-37<br />
39<br />
42<br />
46-67<br />
68<br />
70<br />
74-99<br />
100<br />
Meet the Sponsors: Tenable<br />
Meet the Sponsors: HID Global<br />
Meet the Sponsors: Agiliance<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Solutions<br />
GSN Interview – Chuck Brooks,<br />
Distinguished Judge<br />
Winners in IT <strong>Security</strong> Categories<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Solutions<br />
GSN Interview – Scott Greiper,<br />
Distinguished Judge<br />
Winners in Physical <strong>Security</strong> Solutions<br />
Government Agency <strong>Awards</strong><br />
GSN Interview – K. Denise Krepp,<br />
Distinguished Judge<br />
Winners <strong>of</strong> Government Agency <strong>Awards</strong><br />
Government <strong>Security</strong> News<br />
About the Statute:<br />
The Statue <strong>of</strong> Liberty, a symbol<br />
<strong>of</strong> freedom and the United<br />
States, was designed by the<br />
French sculptor Frederic<br />
Auguste Bartholdi, given to the<br />
United States by the people<br />
<strong>of</strong> France and dedicated on<br />
October 28, 1886. The robed<br />
female figure representing the<br />
Roman goddess Libertas bears<br />
a torch and a tablet evoking<br />
the law, on which is inscribed<br />
the date <strong>of</strong> the American<br />
Declaration <strong>of</strong> Independence,<br />
July 4, 1776. The statue is an<br />
icon <strong>of</strong> freedom and a welcoming<br />
signal to immigrations<br />
arriving from abroad.<br />
3
MEET THE SPONSORS<br />
Continuous Network Monitoring for<br />
Government Agencies<br />
by Jennifer Collis, Government Solutions Marketing<br />
Manager, Tenable Network <strong>Security</strong><br />
When Tenable Network <strong>Security</strong> ® was founded in 2002, its<br />
founders knew that there were no quick and easy solutions<br />
for solving complex security problems. Tenable’s first<br />
product, Nessus ® , went on to become the most widely deployed<br />
vulnerability scanner in the world and is acknowledged<br />
as the global standard in detecting and assessing<br />
network data.<br />
4<br />
But a lot has changed since 2002. The modern IT landscape<br />
has expanded to include laptops, mobile devices,<br />
virtual systems, and cloud-based applications. In a BYOD<br />
(“bring your own device”) environment, employees use<br />
their own personal devices for work, introducing a significant<br />
risk into the traditional IT infrastructure. While these<br />
devices increase the agility <strong>of</strong> an organization, they also<br />
introduce visibility and security gaps, leaving the organization<br />
open to vulnerabilities and breaches. Periodic scanning<br />
helps, but it can miss devices that are not connected<br />
to the network 100% <strong>of</strong> the time. And if those devices have<br />
been surfing the Internet or shopping online, they may be<br />
completely unprotected from exploits and attacks.<br />
Another significant risk on the modern IT network is the<br />
prevalence <strong>of</strong> cloudbased<br />
applications<br />
and virtual systems.<br />
IT security managers<br />
may not be aware <strong>of</strong><br />
all virtual machines,<br />
many <strong>of</strong> which might<br />
be created and used<br />
for transient purposes.<br />
And the security<br />
team may also be unaware <strong>of</strong> the many cloud-based<br />
hosted services used by various departments.<br />
This is why Tenable has been pioneering continuous<br />
network monitoring since 2004: to ensure that your entire<br />
security program is aligned and working 24/7 to assess<br />
and protect today’s hybrid network systems. Continuous,
automated testing <strong>of</strong> a network’s defenses against a security<br />
policy is the best method to monitor the health and<br />
assurance <strong>of</strong> your network.<br />
NIST defines continuous network monitoring as “maintaining<br />
ongoing awareness <strong>of</strong> information security, vulnerabilities,<br />
and threats to support organizational risk management<br />
decisions.”<br />
Continuous network monitoring is one <strong>of</strong> the most<br />
promising developments in Next Generation Vulnerability<br />
Management (NGVM). Instead <strong>of</strong> scanning periodically,<br />
agencies can now implement real-time scanning to<br />
eliminate blind spots. A well-run network should include<br />
solutions that accurately measure security risks in real<br />
time and bring together the processes <strong>of</strong> asset discovery,<br />
vulnerability detection and configuration auditing.<br />
Tenable’s <strong>Security</strong>Center Continuous View (<strong>Security</strong>-<br />
Center CV) includes innovative continuous network<br />
monitoring tools, such<br />
as passive vulnerability<br />
scanning on devices<br />
that are not always<br />
connected to the<br />
network, log correlation<br />
and analysis, tight<br />
integrations with the<br />
security ecosystem, and<br />
advanced threat detection<br />
technologies. <strong>Security</strong>Center CV’s centralized console<br />
manages distributed Nessus vulnerability scanners for<br />
agency-wide security and compliance visibility. Sensors<br />
automatically discover and assess traditional IT systems,<br />
mobile users, virtual networks, and cloud-based applications.<br />
Advanced analytics, including extensive dashboards<br />
and customizable reports, aggregate scan data to help<br />
5<br />
you identify and remediate security and compliance<br />
issues.<br />
In today’s IT environment, an unknown risk can compromise<br />
your agency and put your executive management<br />
at the center <strong>of</strong> media attention. Continuous<br />
network monitoring provides peace <strong>of</strong> mind by reporting<br />
against any number <strong>of</strong> compliance standards and<br />
your own security policy. Only a well-run, carefully managed<br />
network can achieve security that is “obtainable<br />
and defendable,” which is the very meaning <strong>of</strong> the word<br />
tenable.<br />
About Tenable Network <strong>Security</strong><br />
Tenable Network <strong>Security</strong> provides continuous network<br />
monitoring to identify vulnerabilities, reduce risk and<br />
ensure compliance. Our family <strong>of</strong> products includes<br />
<strong>Security</strong>Center Continuous View, which provides the<br />
most comprehensive and integrated view <strong>of</strong> network<br />
health, and Nessus ® , the global standard in detecting<br />
and assessing network data. Tenable is relied upon by<br />
many <strong>of</strong> the world’s largest corporations, not-for-pr<strong>of</strong>it<br />
organizations and public sector agencies, including the<br />
entire U.S. Department <strong>of</strong> Defense. For more information,<br />
please visit tenable.com.
MEET THE SPONSORS<br />
HID Global completes consolidation<br />
at its Austin, TX, world headquarters<br />
and North American operations center<br />
Austin, TX-based HID Global, a worldwide provider <strong>of</strong><br />
secure identity solutions, has announced it has completed<br />
the consolidation <strong>of</strong> its world headquarters and North<br />
American Operations Center. The company has also<br />
achieved recognition by three organizations for successfully<br />
implementing some <strong>of</strong> the industry’s most stringent<br />
sustainability guidelines in the design, construction and<br />
operation <strong>of</strong> its 250,000 square feet <strong>of</strong> manufacturing, <strong>of</strong>fice<br />
and warehouse space.<br />
“We are very proud <strong>of</strong> our accomplishments, and grateful<br />
for the tremendous support we’ve received from the<br />
Austin community during this process,” said Jason Bohrer,<br />
vice president and general manager for HID Global’s<br />
North American Operations Center. “This facility has<br />
become our focal point for worldwide manufacturing<br />
excellence and a showcase for operational quality and<br />
sustainability that will enable us to strengthen and expand<br />
6<br />
our leadership <strong>of</strong>fering <strong>of</strong> world-class secure identity solutions.”<br />
Since opening its Austin facility in January <strong>2014</strong>, HID<br />
Global has successfully achieved the following:<br />
• Hired 310 employees.<br />
• Completed consolidation <strong>of</strong> all North American manufacturing<br />
operations, with 45 percent <strong>of</strong> all global<br />
revenue now being generated out <strong>of</strong> the new facility.<br />
The facility is also expected to become the cornerstone<br />
for manufacturing government ID credentials that will<br />
be shipped around the globe. HID Global will be pursuing<br />
a number <strong>of</strong> additional security certifications for its<br />
operation in the coming 12 to 18 months.<br />
• Earned recognition as the only industrial manufacturing<br />
facility in the state <strong>of</strong> Texas to achieve the highest, platinum-level<br />
distinction in the U.S. Green Building Council<br />
(USGBC) LEED rating program.<br />
• Received a four- out <strong>of</strong> five-star rating from Austin Energy<br />
Green Building (AEGB), which focuses on the city’s<br />
more stringent energy, water and indoor environmental<br />
quality requirements.
• Was named one <strong>of</strong> the city’s best new buildings in<br />
Austin Business Journal’s 15th annual Commercial Real<br />
Estate <strong>Awards</strong> competition.<br />
HID Global is a trusted source for innovative products,<br />
services, solutions, and know-how related to the creation,<br />
management, and use <strong>of</strong> secure identities for millions <strong>of</strong><br />
customers around the world. The company’s served markets<br />
include physical and logical access control, including<br />
strong authentication and credential management; card<br />
printing and personalization; visitor management systems;<br />
highly secure government and citizen ID; and identification<br />
RFID technologies used in animal ID and industry<br />
and logistics applications. The company’s primary brands<br />
include ActivID, EasyLobby, FARGO, IdenTrust, LaserCard,<br />
Lumidigm, and HID. HID Global has over 2,200 employees<br />
worldwide and operates international <strong>of</strong>fices that<br />
support more than 100 countries. HID Global is an ASSA<br />
ABLOY Group brand. For more information, visit http://<br />
www.hidglobal.com.<br />
7
MEET THE SPONSORS<br />
GSN INTERVIEW<br />
Joe Fantuzzi, President and CEO, Agiliance, Inc.<br />
– <strong>2014</strong> Winner, Best Compliance / Vulnerability Assessment Solution<br />
– <strong>2014</strong> Finalist, Best Big Data Analytics Solution<br />
– <strong>2014</strong> Finalist, Best Continuous Monitoring Solution<br />
Joe Fantuzzi has been president and CEO <strong>of</strong> Agiliance since January 2010. He drives the company’s business direction,<br />
strategy, and execution. His team successfully pioneered and delivered the first massively scaled, real-time Cyber <strong>Security</strong><br />
Operational Risk solution in the market. Bringing 25 years <strong>of</strong> s<strong>of</strong>tware experience to Agiliance, Joe is an expert in<br />
creating high-growth, venture-backed businesses in emerging technology markets, and has helped building over<br />
$3 billion in market valuation as an executive for industry leading companies throughout his career.<br />
GSN: Tell us a little bit more about Agiliance.<br />
JF: Agiliance is known as the Big Data Risk Management<br />
Company. We deliver integrated Cyber <strong>Security</strong> and Operational<br />
Risk Intelligence via cloud-managed services and<br />
s<strong>of</strong>tware. Agiliance solutions automate how Global 2000<br />
companies and government agencies achieve continuous<br />
monitoring <strong>of</strong> big data across financial, operations, and IT<br />
domains to orchestrate incident, threat, and vulnerability<br />
actions. RiskVision customers demonstrate automation use<br />
cases within 30 days on-demand, and within 60 days onpremise,<br />
made possible by a configurable, purpose-built<br />
platform and applications, leveraging over 70 data integrations<br />
to <strong>of</strong>f-the-shelf s<strong>of</strong>tware, and mapping content from<br />
over 300 domains and regulations. RiskVision scales with<br />
organizations, effectively managing assets, data, people,<br />
and processes to achieve 100 percent risk and compliance<br />
coverage. Its real-time risk analysis leads executives<br />
8<br />
to optimized business performance and better investment<br />
decisions.<br />
What key issues does RiskVision resolve<br />
for organizations?<br />
JF: RiskVision delivers real-time ‘data-to-command’ risk<br />
intelligence. Customer use cases are Incident Risk Response<br />
(IRR), Threat and Vulnerability Mitigation (TVM),<br />
Third-Party Risk (TPR), and Operational Risk Management<br />
(ORM). Previous approaches cost $10s <strong>of</strong> millions to piece<br />
together data from the mission, security, and IT operations,<br />
only to learn the data was obsolete once presented,<br />
and cyber-attackers had been inside the infrastructure for<br />
months. RiskVision’s integrated data model and massively<br />
scalable architecture change the game on cyber-attackers<br />
by speeding up the process to make cyber risks visible,<br />
measureable, and actionable. Inaccuracies are reduced
and legacy systems are retired, saving both time and money.<br />
Some production clients manage over 1 million assets<br />
and have over 10,000 daily users. Benefits are incident<br />
reduction, 5 – 10x faster time-to-remediation, less audit<br />
failures, and 2 – 3x operational efficiency gains.<br />
Please describe a major federal agency<br />
using the Agiliance RiskVision approach.<br />
JF: The U.S. Department <strong>of</strong> Veterans Affairs (VA) is one<br />
such example. They were experiencing major operational<br />
efficiency issues stemming from their Assessment and<br />
Authorization (A&A) procedures. Per FISMA law, every<br />
online system must maintain an Authority to Operate<br />
(ATO) certification, and FISMA subjects must renew their<br />
ATOs for every major<br />
system change. For the<br />
agency, this meant manual<br />
gathering and assessing<br />
millions <strong>of</strong> check results<br />
generated by third-party<br />
security monitoring tools.<br />
The problem with this approach<br />
was the vast amounts <strong>of</strong> data it produced and great<br />
difficulty understanding the real meaning <strong>of</strong> the collected<br />
data and correlating it to the agency’s compliance posture.<br />
And by time the data was processed and analyzed, it<br />
was no longer actionable. All the time and money spent<br />
collecting it, was wasted. As a result, completing each<br />
ATO was a labor- and time-intense process, inhibiting the<br />
agency’s ability to meet their audit deadlines.<br />
The agency implemented RiskVision to collect data<br />
from their IT and security tools and perform real-time<br />
diagnostics and mitigation using NIST SP 800-137 and the<br />
NIST IR 7756 (CEASARS) risk frameworks. The VA project<br />
is the largest cyber security risk project in the world, conducting<br />
daily control checks for 1+ million systems for<br />
more than 130 technical controls at the VA centers in DC<br />
and Austin, Texas; providing access to 4,000 workflow and<br />
reporting users, as well as 400,000 policy attestation users.<br />
9<br />
Now the VA can cross-verify controls between federal regulatory<br />
risk management frameworks such as FISMA, NIST<br />
SP 800-53, and CyberScope. After deploying RiskVision, the<br />
agency achieved significant cost and time saving. Rather<br />
than collecting each bit <strong>of</strong> data generated by more than 1<br />
million data collection points, the IT personnel now gathers<br />
and stores highly relevant information and attends to<br />
high-risk issues in a timely manner.<br />
How does Agiliance see the future <strong>of</strong> Cyber<br />
<strong>Security</strong> Operational Risk?<br />
JF: Notwithstanding better analytics and decision-making<br />
from use <strong>of</strong> big data technologies, cloud-managed services<br />
is the new way to informed risk management. In<br />
<strong>2014</strong> alone, our clouddelivered<br />
clients grew<br />
over 600 percent versus<br />
2013, led by customers in<br />
the Financial Services and<br />
Healthcare industries.<br />
One <strong>of</strong> our Financial Services<br />
customers is already<br />
managing 200,000 critical assets with an end-to-end threat,<br />
vulnerability, and ticketing solution delivered on the<br />
RiskVision platform and several connected technologies,<br />
all in the cloud. We’ve developed RiskVision’s managed<br />
services to be cloud security hardened and ready for cloud<br />
risk programs that are deploying in the DoD, IC, and civilian<br />
agencies. With pioneering efforts <strong>of</strong> CSA, FedRAMP,<br />
NIST, and others on cloud security, and the need to stand<br />
up solutions with operational efficiency, over 70% <strong>of</strong> cyber<br />
security operation risk management will be centered in<br />
the cloud by 2018.<br />
I can be reached by Twitter: @joe_fantuzzi and<br />
by email: jfantuzzi@agiliance.com<br />
On behalf <strong>of</strong> Agiliance and our customers, thank<br />
you for an opportunity to share our perspectives with<br />
your readers.
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
VENDORS OF IT SECURITY SOLUTIONS<br />
11<br />
12<br />
Roster <strong>of</strong> <strong>2014</strong> Winners<br />
GSN Interview with Distinguished Judge <strong>of</strong> <strong>2014</strong> <strong>Awards</strong>,<br />
Chuck Brooks<br />
16<br />
18<br />
22<br />
24<br />
26<br />
28<br />
30<br />
32<br />
34<br />
36<br />
38<br />
Winning entries reproduced with permission <strong>of</strong>:<br />
Blue Ridge Networks<br />
Agiliance<br />
RSA <strong>Security</strong> Division <strong>of</strong> EMC<br />
RSA <strong>Security</strong> Division <strong>of</strong> EMC<br />
RSA <strong>Security</strong> Division <strong>of</strong> EMC<br />
Encryptics<br />
NICE Systems<br />
Solar Wind<br />
Tenable Network <strong>Security</strong><br />
Event Tracker<br />
Applied Visions, Inc. / Secure Decisions Division<br />
10
Winners in the <strong>2014</strong><br />
<strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />
VENDORS OF IT SECURITY SOLUTIONS<br />
Best Anti-Malware Solution<br />
Blue-Ridge Networks – Winner<br />
Palo Alto Networks – Finalist<br />
Cyphort Inc – Finalist<br />
Best Identity Management Platform<br />
RSA <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />
NetIQ – Winner<br />
Real Time Technology Network – Finalist<br />
Best Compliance/Vulnerability Solutions<br />
Agiliance Inc – Winner<br />
Solar Winds – Finalist<br />
Pro<strong>of</strong>point, Inc – Finalist<br />
Applied Visions, Inc <strong>Security</strong> Division – Finalist<br />
RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Finalist<br />
TSA Advantage – Finalist<br />
Best Data <strong>Security</strong>/Loss<br />
Management Solution<br />
Imperva – Winner<br />
RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />
Waratec – Finalist<br />
Power Amin LLC – Finalist<br />
Watchful S<strong>of</strong>tware – Finalist<br />
Best Email <strong>Security</strong> &<br />
Integration Solution<br />
Encryptics – Winner<br />
Good Technology – Finalist<br />
Pro<strong>of</strong>point, Inc – Finalist<br />
Best Endpoint Securty Systems<br />
Bromium – Winner<br />
RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Finalist<br />
11<br />
Best Forensic S<strong>of</strong>tware<br />
NICE Systems – Winner<br />
RSA, Division <strong>of</strong> EMC – Finalist<br />
Big Data Analytics Solution<br />
Splunk – Winner<br />
RSA Division <strong>of</strong> EMC – Finalist<br />
Agiliance – Finalist<br />
Best Intrusion Detection/Prevention Solution<br />
Venyu Solutions – Winner<br />
Best Network <strong>Security</strong>/Enterprise Firewall<br />
Palo Alto Networks – Winner<br />
Black Lotus Communications – Finalist<br />
Firemon – Finalist<br />
Forescout – Winner – Finalist<br />
Best Privileged Access<br />
Management Solution<br />
RSA <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />
Beyond Trust – Winner<br />
Best Continuous Monitoring Solution<br />
Solarwinds – Winner<br />
Tenable Network <strong>Security</strong> – Winner<br />
Agiliance – Finalist<br />
Firemon –<br />
Lancope – Finalist<br />
Power Admin – Finalist<br />
Best <strong>Security</strong> Incident &<br />
Event Management Solution (SIEM)<br />
Event Tracker – Winner<br />
RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />
NetIQ – Finalist<br />
LogRhythm, Inc – Finalist<br />
Solarwinds – Finalist
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
GSN INTERVIEW<br />
Chuck Brooks, Distinguished Judge,<br />
GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />
Charles (Chuck) Brooks serves as Vice President/Client Executive for DHS at Xerox. Chuck<br />
served as the first Director <strong>of</strong> Legislative Affairs for the Science & Technology Directorate within<br />
the Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>. He was an Adjunct Faculty Member at Johns Hopkins<br />
University, where he taught a graduate course on “Congress and <strong>Homeland</strong> <strong>Security</strong>.” He also<br />
spent 6 years on Capitol Hill as a Senior Advisor on national security issues to the late Senator<br />
Arlen Specter. Chuck has an MA in International Relations from the University <strong>of</strong> Chicago and<br />
a BA in Political Science from DePauw University. He has served in several senior executive<br />
corporate roles and is widely published as a thought leader on subjects relating to homeland security, technology,<br />
innovation, CBRNE, and cybersecurity. He also operates two <strong>of</strong> the largest homeland security groups on LinkedIn<br />
and is a featured speaker at government and industry conferences. Chuck has also served as a judge for three recent<br />
Government <strong>Security</strong> News industry homeland security awards events.<br />
GSN: What is the threat landscape for the<br />
Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> as it<br />
enters its second decade <strong>of</strong> operations?<br />
CB: DHS has made great progress over the last decade<br />
but the current threat level is now heightened for DHS,<br />
the intelligence community, and law enforcement as a<br />
result <strong>of</strong> evolving threats. The most immediate threat is<br />
posed by ISIS and affiliated Islamic extremists who have<br />
gained combat experience in Iraq and Syria and have access<br />
to Western passports. Rep. Michael McCaul (R-Texas),<br />
chairman <strong>of</strong> the House <strong>Homeland</strong> <strong>Security</strong> Committee,<br />
said these terrorists “present the greatest threat we’ve<br />
seen since 9/11.” Also, a decade ago terrorists’ ability to<br />
12<br />
organize and mobilize was more limited because <strong>of</strong> communication<br />
capabilities. The exponential growth in smart<br />
phones (there are now 14B smartphones worldwide) and<br />
the terrorists’ use <strong>of</strong> social media has made surveillance<br />
and monitoring <strong>of</strong> those who might threaten the homeland<br />
a bigger challenge.<br />
The defense against CBRNE (chemical, biological,<br />
radiological, nuclear, and explosive) threats will continue<br />
to be priorities <strong>of</strong> DHS because <strong>of</strong> the asymmetrical terror<br />
consequences they present. The recent Ebola outbreak<br />
illustrates our vulnerability to pandemics and infectious<br />
disease outbreaks. The potential for bio-terrorism directed<br />
by non-state actors is a frightening but real scenario. Right-
fully so, countering biological threats remains a high priority<br />
at DHS. As our experiences in Afghanistan and Iraq<br />
have shown, man portable improvised explosive devices<br />
(IEDS) and vehicle-borne IEDS are still a major concern,<br />
especially against s<strong>of</strong>t targets.<br />
Other threats such as chemical and radiological<br />
substance releases, and natural disasters from floods, hurricanes<br />
and earthquakes all still pose plausible and dire<br />
threats to the homeland. Unfortunately, it is likely that the<br />
nation’s preparedness will be tested again in the coming<br />
decade.<br />
One area where DHS has taken on an increasingly<br />
larger role is in cybersecurity. Presidential Directives have<br />
mandated DHS to play the primary role in the civilian side<br />
<strong>of</strong> government for cybersecurity. A major reason for the<br />
new focus on cybersecurity has been the rapid changes<br />
in the information technology landscape. Since 2003, the<br />
capabilities and connectivity <strong>of</strong> cyber devices and communications<br />
has grown exponentially. Concurrently, so<br />
have the cyber intrusions and threats from malware and<br />
hackers. This has required restructuring <strong>of</strong> priorities and<br />
the cybersecurity missions at DHS. The cyber threat to the<br />
homeland reaches far beyond terrorists and includes various<br />
criminal enterprises and adversarial nation states.<br />
What do government and industry perceive<br />
to be the main cybersecurity threats and<br />
required responses?<br />
CB: Both government and industry have prioritized<br />
critical infrastructure as a focus <strong>of</strong> threat and hardened<br />
response. There is a growing understanding <strong>of</strong> the seriousness<br />
and sophistication <strong>of</strong> the cyber threats, especially<br />
denial <strong>of</strong> service. In terms <strong>of</strong> preparation, the financial and<br />
13<br />
retail communities have been at the forefront <strong>of</strong> addressing<br />
these threats with significant investment in technologies<br />
and in training. However, 43% <strong>of</strong> companies had<br />
breaches last year (including companies such as Home<br />
Depot, JPMorgan, and Target) and the intrusion threats<br />
are not diminishing.<br />
According to the think tank Center For Strategic<br />
and International Studies (CSIS), cyber related crime now<br />
costs the global economy about $445-billion every year.<br />
These breaches demonstrate that there is a continued<br />
need for protocols and enhanced collaboration between<br />
government and industry.<br />
Last year, The Council on Cyber<strong>Security</strong>, an influential<br />
not-for–pr<strong>of</strong>it organization, formed a “20 Critical <strong>Security</strong><br />
Controls list” with collaboration between the public<br />
and private sectors. The list provides an emerging working<br />
framework for protecting the critical infrastructure and<br />
provides a recommended set <strong>of</strong> actions for cyber defense<br />
that includes specific and actionable ways to stop today’s<br />
most pervasive attacks. I was honored to participate in<br />
that working group.<br />
Indeed, cyber security controls are very important.<br />
In the U.S., most (approximately 85%) <strong>of</strong> the cybersecurity<br />
critical infrastructure including defense, oil and gas,<br />
electric power grids, healthcare, utilities, communications,<br />
transportation, banking, and finance is owned by the<br />
private sector and regulated by the public sector. DHS has<br />
recognized the importance for private sector input into<br />
cybersecurity requirements across these verticals and has<br />
played a major part in bringing government and industry<br />
together to develop a strategy to protect critical infrastructure.
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
GSN INTERVIEW<br />
Chuck Brooks, Distinguished Judge,GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />
There will always be a need for better encryption,<br />
biometrics, analytics, and automated network security to<br />
protect critical infrastructure in all categories. Also, cyber<br />
resilience is an area that must be further developed both<br />
in processes and technologies. In the future, cybersecurity<br />
for the “Internet <strong>of</strong> Things,” consisting <strong>of</strong> hundreds <strong>of</strong> millions<br />
connected IP enabled smart devices, will certainly be<br />
a main priority<br />
What would be on your own master list<br />
<strong>of</strong> cybersecurity priorities and emerging<br />
trends?<br />
Emerging Technology Areas:<br />
• Internet <strong>of</strong> Things (society on new verge <strong>of</strong><br />
exponential interconnectivity)<br />
• Wearables<br />
• Drones and Robots<br />
• Artificial intelligence<br />
• Smart Cities<br />
• Connected transportation<br />
Priorities:<br />
• Protecting critical infrastructure through technologies<br />
and Public/Private cooperation<br />
• Better encryption and biometrics (quantum encryp<br />
tion, keyless authentication)<br />
• Automated network-security correcting systems (selfencrypting<br />
drives)<br />
14<br />
• Technologies for “real time” horizon scanning and<br />
monitoring <strong>of</strong> networks<br />
• Diagnostics and forensics (network traffic analysis,<br />
payload analysis, and endpoint behavior analysis)<br />
• Advanced defense for framework layers (network,<br />
payload, endpoint, firewalls, and anti-virus)<br />
• Mobility and BYOD security<br />
• Big data<br />
• Predictive analytics<br />
• Interoperability<br />
Trends:<br />
• Informed risk management<br />
• Emergence <strong>of</strong> Public/Private sector partnerships<br />
• More information sharing and collaboration<br />
between the public and private sectors<br />
• Shared R & D spending<br />
• Increased spending for cloud computing<br />
• Consolidation <strong>of</strong> data centers<br />
• Expansion <strong>of</strong> hiring and training <strong>of</strong> cybersecurity<br />
workforce<br />
• Tech foraging<br />
What is Xerox’s focus in the homeland security<br />
space?<br />
CB: Xerox has a great tradition <strong>of</strong> innovation and has<br />
become a world leader in digitization, contact centers,<br />
document management, IT, and data analytics. Xerox is
a recognized leader in “digitization” <strong>of</strong> documents in the<br />
Federal government. The company has been providing<br />
mailroom, scanning, imaging, indexing, and data capture<br />
for nearly three decades, including with DHS. Xerox uses<br />
innovative technologies, including Optical Character<br />
Recognition (OCR). OCR automatically extracts data from<br />
scanned images and makes those data available for electronic<br />
processing for millions <strong>of</strong> images each day. Having<br />
electronic access to data and files provides for more<br />
efficient planning and operations in the security environment.<br />
Xerox is also known for its contact center expertise.<br />
The company uses multi-channel contact technology<br />
tools via phone, email, web, and mobility to optimize,<br />
automate, and help scale customer service agent response.<br />
Contact center management solutions are designed to<br />
minimize impact, assure end-user incidents are addressed<br />
quickly, and prevent reoccurrence that is important for a<br />
public safety mission.<br />
Xerox has also developed and deployed a disease<br />
surveillance and outbreak management s<strong>of</strong>tware called<br />
Maven that is <strong>of</strong> interest to homeland security and public<br />
health agencies. It is configured to provide “contact<br />
tracing” for Ebola and other communicable diseases. The<br />
s<strong>of</strong>tware manages the identification and diagnosis <strong>of</strong> those<br />
who may have come in contact with an infected person.<br />
Federal government employees who regularly use LinkedIn,<br />
including over 65,000 from DHS. Social media has become<br />
part <strong>of</strong> the fabric <strong>of</strong> how we communicate, operate,<br />
and conduct business. The two homeland security groups<br />
I run on LinkedIn –“U.S. Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>”<br />
and “<strong>Homeland</strong> <strong>Security</strong>”– have grown to over 50,000<br />
members. (Please look them up and join and post!) I have<br />
become active now on Twitter too. Please follow me:<br />
@ChuckDBrooks<br />
I have also been active on the speaking circuit at<br />
conferences, including recent presentations at the National<br />
Press Club, <strong>Homeland</strong> <strong>Security</strong> Week, Secure Cities,<br />
George Washington University, Bowie State University,<br />
and CyberMaryland. Please check out my recent article<br />
in The Hill newspaper called “Navigating the Four Pillars<br />
<strong>of</strong> Washington, DC” that explores the interplay between<br />
government, industry, media, and policy organizations in<br />
the nation’s capitol.<br />
Thank you for speaking to me and letting me<br />
share my perspectives. GSN serves as an excellent media<br />
resource for all those active in the homeland security and<br />
national security fields. I strongly encourage others to<br />
become regular readers <strong>of</strong> your publication online and in<br />
print.<br />
Can you update us on your social media<br />
and thought leadership activities?<br />
CB: Many senior level executives in the Federal government<br />
are on social sites such as LinkedIn, GovLoop,<br />
Facebook, and Twitter. There are an estimated 1.4 million 15
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
Blue Ridge Net works –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Anti-Malware Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
AppGuard<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
It is evident with all the reported breaches in government,<br />
retail, banking, and consumers that there is a<br />
need for an innovative security solution that will protect<br />
computers. AppGuard is a patented solution that<br />
would have absolutely blocked all the reported breaches<br />
including Target, JP Morgan, community health systems,<br />
and all the cyber espionage that is happening at all<br />
levels <strong>of</strong> government. AppGuard’s unique approach is<br />
simple, cost effective, and stops the advanced threats<br />
that no other security capability has been able to defeat.<br />
AppGuard is proven technology, deployed in over 100<br />
countries, and is the best line <strong>of</strong> defense when malware<br />
strikes. It protects the endpoint from malvertising, mal-<br />
John Higginbotham<br />
Chairman and CEO<br />
Mike Fumai<br />
COO and Director<br />
warized documents, drive by downloads, watering hole<br />
attacks, phishing attacks, ransomware, advanced volatile<br />
threats, and others. It provides in-depth host-based<br />
threat intelligence complementing network based threat<br />
intelligence. All <strong>of</strong> this is accomplished with an easy to<br />
use, easy to deploy client with out-<strong>of</strong>-the box settings.<br />
16
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.appguardus.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.blueridge.com/index.php/products/<br />
appguard/enterprise<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Maureen Gray, VP <strong>of</strong> Operations<br />
Blue Ridge Networks<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (703) 631-9713<br />
cell: (571) 259-8428<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
maureen@blueridge.com<br />
17
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
Agiliance –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Compliance/Vulnerability Assessment Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RiskVision 7<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The biggest inhibitor <strong>of</strong> effective security and vulnerability<br />
management lies in the fact that the number <strong>of</strong><br />
threats to organizations has grown exponentially over nal resources. As a result, government organizations are<br />
the past few years. This is largely due to the increasing<br />
number <strong>of</strong> IT assets under management, which are tion, normalization, and business impact correlation.<br />
seeking technical solutions to automate data aggrega-<br />
creating a big data challenge. To ensure proper coverage,<br />
government organizations in many cases are relying ers have to exploit a s<strong>of</strong>tware flaw, thereby reducing the<br />
The ultimate objective is to shorten the window attack-<br />
on multiple tools to produce the necessary vulnerability overall risk <strong>of</strong> cyber-attacks and insider threats. Agiliance<br />
assessment data. This only adds to the volume, velocity,<br />
and complexity <strong>of</strong> data feeds that must be analyzed, achieving continuous monitoring and enabling them to<br />
is assisting civilian, defense, and intelligence agencies in<br />
normalized, and prioritized. Relying on human labor report on their organizations risk and security posture<br />
to comb through mountains <strong>of</strong> data logs is one <strong>of</strong> the in near real time. The company’s RiskVision s<strong>of</strong>tware<br />
main reasons that critical vulnerabilities are not being gathers data feeds from otherwise silo-based security<br />
addressed in a timely fashion. According to the Verizon and IT tools such as SIEMs, configuration management<br />
Data Breach Investigations Report, 92% <strong>of</strong> breaches databases, vulnerability scanners, threat data feeds and<br />
were discovered by a third party and not through inter- advisory services, database security management, etc.<br />
18
and then aggregates, normalizes, and correlates this<br />
information based on business criticality. This enables<br />
a near real time snap shot <strong>of</strong> an organization’s security<br />
posture. In addition, RiskVision automates an organization’s<br />
governance processes, providing insight into the<br />
agency’s compliance posture. The final result is a riskbased<br />
assessment <strong>of</strong> the organization’s infrastructure<br />
which prioritizes remediation actions based on business<br />
criticality. If needed, RiskVision can also assist with automatic<br />
ticket creation. By using the Agiliance ticketing<br />
system or integrating with leading ticketing and patch<br />
management systems, an organization’s security operations<br />
team can shadow the progress the IT team makes<br />
in mitigating the vulnerabilities. This eliminates the<br />
traditional approach best described as throwing something<br />
over the fence and praying for the best outcome.<br />
For one major government agency, using RiskVision<br />
resulted in a dramatic increase in operational efficiency.<br />
Prior to using Agiliance, it took 60 full-time employees<br />
working 24 x 7 for a month to manually create 180,000<br />
remediation tickets. With RiskVision, the agency was<br />
able to reduce the headcount required to oversee ticket<br />
creation by more than 80% and shrink the processing<br />
time from one month to a couple <strong>of</strong> days. RiskVision<br />
is considered by many to be the best compliance and<br />
vulnerability management solution on the market for<br />
its ability to combine risk intelligence, using big data<br />
gathered and correlated from security operations tools,<br />
with automated remediation that establishes bi-directional<br />
workflows with IT operations. The end result is<br />
improved operational efficiency through automated<br />
continuous monitoring and ticketing to remediate only<br />
business critical risks.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.agiliance.com<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Torsten George, Vice President <strong>of</strong> Worldwide<br />
Marketing and Products<br />
Agiliance, Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (408) 200-0461<br />
cell: (408) 431-3250<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
tgeorge@agiliance.com<br />
Links to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Agiliance Named Most Innovative Tech Company for <strong>2014</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0916_American_<br />
Business_<strong>Awards</strong>_Stevie_Competition.html<br />
Agiliance Wins Three <strong>2014</strong> Golden Bridge <strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0911_Agiliance_<br />
Wins_3_Golden_Bridge_<strong>Awards</strong>.html<br />
RiskVision Shortlisted for CIR Risk Management Award<br />
<strong>2014</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0904_CIR_Risk_<br />
Management_Award_<strong>2014</strong>.html<br />
Agiliance Named Finalist for Two <strong>2014</strong> Computing <strong>Security</strong><br />
<strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0821_<strong>2014</strong>_Computing_<strong>Security</strong>_<strong>Awards</strong>.html<br />
Agiliance Receives International Recognition from Stevie<br />
<strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0815_Stevie_<br />
<strong>Awards</strong>_Winner_<strong>2014</strong>.html<br />
19<br />
Links continued on next page
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
Agiliance – <strong>2014</strong> Winner<br />
Best Compliance/Vulnerability Assessment Solution<br />
Links to additional information, continued:<br />
Agiliance Expands Threat-Based, Real-Time Risk Remediation<br />
with CrowdStrike Falcon Intelligence:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0624_Crowd-<br />
Strike_Falcon_Intelligence.html<br />
RiskVision Earns Gold in the <strong>2014</strong> Network Products<br />
Guide <strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0624_<strong>2014</strong>_Networks_Products_Guide.html<br />
Agiliance Introduces First NIST Cybersecurity Framework<br />
<strong>Security</strong> Checklist Content Pack:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0623_NIST_Cybersecurity_Framework.html<br />
RiskVision is Platinum Winner in the <strong>2014</strong> Govies Government<br />
<strong>Security</strong> <strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0514_RV_Platinum_Winner_<strong>2014</strong>_Govies_<strong>Awards</strong>.html<br />
RiskVision Architecture and Cloud Services Set New Standard:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0505_RV_Architecture_Cloud_Services.html<br />
Agiliance Issues Updated ISO Information <strong>Security</strong> Management<br />
Process Controls Content:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0304_ISO_Content_Packs.html<br />
RiskVision Scores Big at Info <strong>Security</strong> Product Guide’s<br />
<strong>2014</strong> <strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0225_Info_<strong>Security</strong>_Products_Guide_<strong>2014</strong>.html<br />
RiskVision 7 Ushers New Era <strong>of</strong> Big Data Risk Management:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0224_RV7_Ushers_New_Era.html<br />
20
Cyber Defense Magazine Names RiskVision Most Innovative<br />
Risk Management Product:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0224_Cyber_Defense_Magazine.html<br />
RiskVision Helps Retailers to Strengthen their Cyber Defenses:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0131_Retailers_<br />
Strengthen_Cyber_Defenses.html<br />
Agiliance to Showcase Continuous Diagnostics and Mitigation<br />
Capabilities:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0124_Cybersecruity_Innovation_Forum.html<br />
RiskVision Assists Financial Services Organizations Raise<br />
Quality <strong>of</strong> Third-Party Risk Management:<br />
http://www.agiliance.com/news/pr_<strong>2014</strong>0123_Financial_<br />
Services_Organization.html<br />
Agiliance / ESG White Paper: Beyond GRC: SRM and the<br />
Move to Integrated Risk Management:<br />
http://www.agiliance.com/forms/WhitePaperReg.<br />
html?doc=Beyond_GRC<br />
Agiliance White Paper: How to Achieve a Continuous<br />
Monitoring Framework:<br />
http://www.agiliance.com/infocenter/whitepaper.html<br />
Agiliance Data Sheets:<br />
http://www.agiliance.com/infocenter/ Agiliance<br />
Case Studies:<br />
http://www.agiliance.com/infocenter/casestudy.html<br />
Agiliance Recorded Webcasts:<br />
http://www.agiliance.com/news/webcasts.html<br />
Agiliance Product Tours:<br />
http://www.agiliance.com/infocenter/tour.html<br />
21
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
RSA Securit y Division <strong>of</strong> EMC –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Identity Management Platform<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA SecurID<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA SecurID has a long and successful history in protecting<br />
sensitive information <strong>of</strong> the government. Go-<br />
changes every 60 seconds. By requiring users to provide<br />
rithms available) to generate a one-time password that<br />
ing back to before the Internet and continuing with a combination <strong>of</strong> something they know (their password)<br />
innovations that strengthen passwords in new and and something they have (the RSA SecurID one-time<br />
emerging infrastructures including cloud and mobility, password), RSA SecurID allows users gain secure access<br />
RSA SecurID is the industry’s most trusted two-factor to VPNs, wireless access points, cloud applications, web<br />
authentication solution. With government being an early applications, mobile applications and network operating<br />
innovator in interconnected networking (i.e. DARPA and systems – ensuring that private information is protected<br />
ARPANET) RSA SecurID was the first solution there to and the the identities <strong>of</strong> people, devices and applications<br />
exchanging that information are legitimate. Build-<br />
protect sensitive government information and applications.<br />
Used by more than 40 million users within 30,000 ing on its market-leading capabilities, RSA introduced<br />
organizations worldwide, RSA SecurID is the standard the industry’s first authentication platform that combines<br />
strong two-factor authentication with intelligence-<br />
for two-factor authentication solutions, reliably assuring<br />
the identities <strong>of</strong> users, devices and applications by driven, risk-based authentication. RSA Authentication<br />
using a proven algorithm (AES-128 which is recognized Manager (the brains behind RSA SecurID) uses Big Data<br />
by NIST as one <strong>of</strong> the strongest symmetric key algo- analytics to increase identity assurance by transparently<br />
22
uilding rich user pr<strong>of</strong>iles based on device and behavioral<br />
characteristics. Leveraging dozens <strong>of</strong> risk factors<br />
in near infinite combinations, it detects and permits<br />
normal behavior, and challenges or blocks anomalous<br />
activity to provide secure access control that exceeds<br />
stand-alone multifactor authentication methods. User<br />
login processes are fast, familiar and simple and yet<br />
still provides secure access control that goes well beyond<br />
stand-alone two- and multi-factor authentication<br />
methods giving organizations a higher level <strong>of</strong> identity<br />
assurance without compromising user convenience or<br />
productivity. What’s more the risk-based authentication<br />
is tokenless and invisible, greatly aiding in the protection<br />
<strong>of</strong> government portals and online benefits and<br />
health information and enables tens <strong>of</strong> thousands <strong>of</strong><br />
organizations to maintain various regulations and compliance<br />
needs including HIPPA, FACTA, FISMA, FFIEC,<br />
HSPD-12, CJIS, PCI-DSS and more. RSA SecurID includes<br />
management and administration tools that lower<br />
an organization’s overall TCO and make the solution<br />
easy to manage. Complementing RSA SecurID’s intuitive<br />
browser-based management console, RSA Authentication<br />
Manager’s single-pane view dashboard enables Help<br />
Desk administrators to quickly address common user<br />
inquiries. Also, a customizable Self-Service Console empowers<br />
users to manage their authentication needs and<br />
methods, and various aspects <strong>of</strong> their token lifecycles,<br />
enabling IT teams to apply time and resources – typically<br />
dedicated to managing a traditional authentication<br />
deployment – to other critical tasks. And, available as a<br />
VMware Virtual Appliance, RSA Authentication Manager<br />
enables customers to leverage existing virtual infrastructures<br />
and accelerate time to value.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.emc.com/domains/rsa/index.htm<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA SecurID Homepage:<br />
www.emc.com/security/rsa-securid.htm<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Shannon Todesca, Account Executive<br />
CHEN PR, Inc. (for RSA)<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (781) 672-3147<br />
cell: (508) 494-4607<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
stodesca@chenpr.com<br />
23
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
RSA Securit y Division <strong>of</strong> EMC –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Data <strong>Security</strong>/Loss Management Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA Data Loss Prevention (DLP)<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In this era <strong>of</strong> knowledge economy, the most valuable<br />
asset for organizations, after people, is information. We<br />
are seeing, nearly every day, headlines focused on data<br />
breaches and loss <strong>of</strong> sensitive information. Organizations<br />
need to adequately protect this information – not<br />
only for the well being <strong>of</strong> the business and brand, but<br />
also that <strong>of</strong> their customers and partners. RSA DLP is<br />
used by over 3,500 organizations to gain visibility into<br />
risk and prevent the loss <strong>of</strong> sensitive data from accidents,<br />
malicious insiders and external attackers. RSA<br />
DLP discovers and monitors the location and flow <strong>of</strong><br />
sensitive data, including regulated data or corporate IP,<br />
across the infrastructure including cloud, virtual and<br />
mobile devices. Through real-time alerts and enforcement<br />
controls including encryption, quarantine, block<br />
and notify, RSA DLP prevents the loss <strong>of</strong> sensitive data<br />
24<br />
via email, web, mobile devices, etc. The web-based<br />
management console allows organizations to set up a<br />
single DLP policy to protect sensitive data across the<br />
network, endpoints (connected or disconnected including<br />
mobile) and datacenter, with centralized incident<br />
management for complete visibility into risk. What sets<br />
RSA DLP apart is that it is protocol-and port-agnostic<br />
and can analyze traffic from all network layers and is the<br />
only DLP <strong>of</strong>fering that has exceptionally customizable<br />
workflows for incident management and investigations.<br />
RSA DLP can also be extended into GRC use cases for<br />
managing risk and audits, features native encryption<br />
functionality and open APIs for partners, and provides<br />
a single pane <strong>of</strong> glass view with native integrations with<br />
Big Data analytical tools.
Offering the lowest TCO on the market, RSA DLP provides:<br />
• The lowest number <strong>of</strong> false positives, significantly<br />
reducing the number <strong>of</strong> FTEs required and<br />
operational costs.<br />
• 170+ out-<strong>of</strong>-the-box policies based on industry/<br />
regional regulations, dramatically reducing set-up<br />
and tuning time.<br />
• A distributed architecture that easily scales to the<br />
largest environments, with the ability to run on<br />
virtual machines to reduce implementation costs.<br />
• The most extensive ecosystem <strong>of</strong> partners, enabling<br />
customers to leverage their existing infrastructure<br />
and built-in infrastructure integrations to further<br />
reduce deployment costs.<br />
By centralizing incident management, integrating with<br />
existing infrastructure, automating the enforcement<br />
<strong>of</strong> controls to protect data and establishing repeatable<br />
incident workflows, RSA DLP improves cost effectiveness<br />
for customers’ ongoing operations. In addition, with the<br />
RSA DLP Risk Remediation Manager module, customers<br />
can remediate tens <strong>of</strong> thousands <strong>of</strong> sensitive files in a<br />
matter <strong>of</strong> weeks – a manual process that previously took<br />
more than nine months to complete, with resources<br />
being pulled from other projects or hired as contractors.<br />
RSA DLP has also helped prevent loss <strong>of</strong> tens <strong>of</strong> thousands<br />
<strong>of</strong> customer records which would have resulted<br />
in millions <strong>of</strong> dollars in losses. In one example, RSA DLP<br />
prevented two contracted employees attempting to steal<br />
trade secrets and alerted the appropriate security teams<br />
to prevent damage, saving millions <strong>of</strong> dollars. RSA DLP<br />
also helps organizations prevent fines and pass audits<br />
more efficiently. Customers have reported audit savings<br />
<strong>of</strong> more than 25% thanks to the ability <strong>of</strong> RSA DLP to<br />
scan the infrastructure and auto-remediate violations.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.emc.com/domains/rsa/index.htm<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA DLP Homepage:<br />
www.emc.com/security/rsa-data-loss-prevention.htm<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Shannon Todesca, Account Executive<br />
CHEN PR, Inc. (for RSA)<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (781) 672-3147<br />
cell: (508) 494-4607<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
stodesca@chenpr.com<br />
25
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
RSA Securit y Division <strong>of</strong> EMC –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Privileged Access Management Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA Identity Management and Governance<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In the era <strong>of</strong> big data, mobile, cloud, and social media,<br />
identity and access management (IAM) has become a<br />
significant challenge for many organizations. Add on<br />
heightened threats, strict regulatory requirements, and<br />
a growing and demanding population <strong>of</strong> business users,<br />
securing access and enabling trusted interactions between<br />
users and resources can feel like a never ending<br />
game <strong>of</strong> whack-a-mole. The RSA Identity Management<br />
and Governance (IMG) solution helps organizations<br />
transform IAM into an enabler for a faster and more<br />
secure network by taking aim at three key ways in which<br />
organizations can deliver a strong Identity Management<br />
program:<br />
1. Identity Lifecycle Management — Streamlined selfservice<br />
user registration allows users to create accounts<br />
and choose access rights for themselves, new employees<br />
and contractors. The UI automatically enforces policies<br />
while suggesting entitlements based on similar users.<br />
Automated approval workflows and provisioning<br />
ensures that user access is delivered rapidly, while maintaining<br />
compliance with process and policy requirements.<br />
2. Data Access Governance. – With an increase in both<br />
data breaches and compliance requirements, it is critical<br />
to extend access governance to data as well as applications.<br />
RSA IMG is designed to provide ubiquitous support<br />
across all major file systems, providing one place to<br />
centrally manage and govern the access to all data. RSA<br />
IMG leverages identity context and data attributes (such<br />
as user access frequency) to establish a line-<strong>of</strong>-business<br />
owner for data resources.<br />
26
3. Provisioning 2.0 – RSA IMG is engineered to take a<br />
governance-driven approach, dramatically simplifying<br />
application onboarding, and enabling organizations to<br />
automate many more applications. For example, one<br />
customer in the transportation industry reduced<br />
application onboarding time by approximately 75%. The<br />
RSA IMG platform enables organizations to meet their<br />
security, regulatory and business access needs through<br />
a collaborative set <strong>of</strong> business processes. By automating<br />
manual tasks, providing evidence <strong>of</strong> compliance, reducing<br />
access-related business risk, and efficiently delivering<br />
business access, enterprises can confidently manage,<br />
control and enforce access to applications and data<br />
across the enterprise and the cloud. Beyond the immediate<br />
benefits seen after implementation, RSA IMG aids<br />
organizations by improving security, visibility, and compliance.<br />
By deploying the RSA IMG platform organizations<br />
experience significant reduction in effort for access<br />
reviews and audits, faster time to value with reduced<br />
deployment times from installation to production and<br />
orphaned accounts become a thing <strong>of</strong> the past. Without<br />
an automated approach to IAM, organizations are more<br />
susceptible to regulatory compliance violations and data<br />
breaches, some <strong>of</strong> which can cost millions <strong>of</strong> dollars<br />
in lost revenue and fines as well as significant brand<br />
damage. RSA IMG establishes increased security over<br />
sensitive information, visibility into the complete user<br />
access lifecycle, and ensured compliance to increasingly<br />
stringent regulations, potentially saving millions and<br />
protecting long-term vitality.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.emc.com/domains/rsa/index.htm<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA Identity Management and Governance Homepage:<br />
http://www.emc.com/security/rsa-identity-management-and-governance.htm#<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Shannon Todesca, Account Executive<br />
CHEN PR, Inc. (for RSA)<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (781) 672-3147<br />
cell: (508) 494-4607<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
stodesca@chenpr.com<br />
27
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
Encryptics –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Email <strong>Security</strong> and Integrity Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Encryptics for Email<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Encryptics’ flagship product, Encryptics for Email,<br />
showcases this data protection company’s commitment<br />
to true end-to-end data protection. This product<br />
utilizes a hybrid security model unlike any other on the<br />
market today. By eliminating the flaws inherent in existing<br />
models, Encryptics <strong>of</strong>fers the most innovative and<br />
effective solution for the email security space. Most data<br />
protection solutions utilize one <strong>of</strong> two standard security<br />
models: trusted server or peer-to-peer. In a trusted<br />
server model, encryption and authentication take place<br />
at a centralized location (a server, gateway, or router).<br />
This model makes it easy to manage authentication<br />
and control who has access to data once it’s encrypted.<br />
Unfortunately, data is not encrypted until it leaves the<br />
device it was created on and travels to an external appliance<br />
where the encryption will occur. Furthermore,<br />
if the encrypted data and the keys to unlock that data<br />
are stored in the same location, this single point within<br />
the transmission constitutes a serious security risk. The<br />
peer-to-peer model attempts to counter these drawbacks<br />
by decentralizing the process. Because encryption<br />
occurs at the user device level, this model addresses the<br />
security gap between the user’s device and an external<br />
appliance. However, in this model, authentication and<br />
key exchange are also handled at the user device level<br />
and are difficult to manage. Unfortunately, this model<br />
does not eliminate the potential for a single point <strong>of</strong><br />
failure: if the encryption keys travel alongside the encrypted<br />
data at any time, there is always risk <strong>of</strong> interception<br />
and exposure. Rather than choosing between these<br />
existing security models, Encryptics resolved to blend<br />
the best <strong>of</strong> both models in a patented, Trusted Peer-to-<br />
28
Peer platform. This innovative approach resulted in<br />
a superior solution designed to protect data over the<br />
course <strong>of</strong> its entire lifecycle, leaving no security gaps<br />
and no single points at risk <strong>of</strong> failure to secure the data.<br />
Taking it even further, Encryptics devised Data Rights<br />
Management (DRM) tools to empower data owners and<br />
preserve document integrity. With DRM, data owners<br />
can manage and maintain control <strong>of</strong> their data in real<br />
time, even when it resides on remote email servers<br />
and recipient devices. As its email product is gaining<br />
momentum, Encryptics hopes not only to shed light<br />
on the significance <strong>of</strong><br />
data security and Policy-<br />
Based Protection (PBP),<br />
an add-on that works<br />
with Encryptics for Email<br />
to prevent data loss, but<br />
also to revolutionize the<br />
way in which we protect<br />
important information in<br />
an increasingly unsecure<br />
technological landscape.<br />
With an easy-to-use product that brings convenience<br />
to our busy lives, Encryptics ensures that we can share<br />
and store almost any data without ever having to worry<br />
about leaks, hacks, or theft.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.encryptics.com/default.aspx<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Texas Department <strong>of</strong> Information Resources Case Study: Overview<br />
<strong>of</strong> how Encryptics empowered the first ever email security<br />
plan for Texas Department <strong>of</strong> Information Resources, home to<br />
the state’s technology solutions for government and education.<br />
https://www.encryptics.com/case_studies/DIR-EncrypticsCaseStudy.pdf<br />
Law Enforcement Association Case Study: Summary<br />
<strong>of</strong> a successful 30-day trial, resulting in a prominent state law<br />
enforcement association adopting Encryptics for Email to protect<br />
the personal identifiable information (PII) <strong>of</strong> its members.<br />
https://www.encryptics.com/case_studies/<br />
Law_Enforcement_Association.pdf<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Erika Swanner, Vice President <strong>of</strong> Marketing<br />
Encryptics<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (512) 657-2685<br />
cell: (214) 864-7486<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
eswanner@encryptics.com<br />
29
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
NICE Systems –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Forensic S<strong>of</strong>tware<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
NICE Suspect Search<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
An active shooter is on the loose. An airport checkpoint<br />
has just been breached. Police are frantically searching<br />
for a lost child amid a crowded location. A suspicious<br />
bag is left behind in a busy transit station. In each <strong>of</strong><br />
these situations, time is <strong>of</strong> the essence. Surveillance<br />
video can provide clues to finding a suspect, but will<br />
you be able to pinpoint the exact video you need in<br />
time? Here’s where NICE Suspect Search can help.<br />
Suspect Search is a patent-pending video analytics<br />
technology that helps you quickly locate and retrace<br />
the movements <strong>of</strong> a person <strong>of</strong> interest within a video<br />
surveillance network. It can scan an hour <strong>of</strong> video in<br />
less than a minute, automatically filtering out 95 percent<br />
<strong>of</strong> irrelevant images. Suspect searches can be initiated<br />
using a recorded image, an uploaded full body photo,<br />
or a suspect composite. As the search reveals snapshots<br />
<strong>of</strong> the suspect over time across different cameras, it<br />
evolves into a history <strong>of</strong> their movements before and potentially<br />
after the incident. Timely situational awareness<br />
is critical so snapshots are presented on an actual map.<br />
This answers questions like how did the suspect get<br />
here? Where did he go? Did he meet up with anyone or<br />
was he alone? And is he<br />
still on premise? Suspect<br />
Search revolutionizes<br />
video forensics, both<br />
for real-time use and for<br />
after-the-fact investigations.<br />
<strong>Digital</strong>ly stamped<br />
images, video, and location<br />
information associated<br />
with each search<br />
can easily be shared with<br />
police departments and<br />
district attorneys for<br />
forensic investigations.<br />
WHAT SETS SUSPECT SEARCH APART<br />
There are technologies on the market that can search<br />
for a specific color, but until now, none <strong>of</strong> them could<br />
search for a specific person, especially not in real-time.<br />
30
Suspect Search takes into account three parameters -- a<br />
full body image, the unique human signature <strong>of</strong> a person<br />
(e.g. size and the way they walk), and the textures<br />
and colors associated with that person like their clothes,<br />
accessories, hair, or skin. The Suspect Search algorithm<br />
analyzes, tags, sorts, and stores images in a database according<br />
to these parameters, increasing search accuracy.<br />
Furthermore, calculations are done in real-time. Video is<br />
analyzed as it is captured, so searches can begin immediately<br />
and results are available within seconds. Another<br />
differentiator is Suspect Search’s ability to simultaneously<br />
search across multiple camera feeds. Once the<br />
target has been located, Suspect Search’s geo-spacial<br />
capabilities allow operators to trace and retrace the suspect’s<br />
route to predict patterns <strong>of</strong> movement for quick<br />
apprehension.<br />
SUSPECT SEARCH BENEFITS<br />
By providing near real-time, actionable information<br />
about the whereabouts<br />
and movements <strong>of</strong><br />
persons <strong>of</strong> interest,<br />
Suspect Search can<br />
accelerate response<br />
times and effect positive<br />
outcomes, whether<br />
that means finding<br />
a lost child faster,<br />
apprehending suspects<br />
quicker, or avoiding<br />
costly shutdowns.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.nice.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.nice.com/nice-suspect-search<br />
https://www.youtube.com/watch?v=PD-hSXOt5<br />
FA&index=54&list=PLC3F1BBC80EE0AA53<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Linda Haelsen, Marketing Communications Manager<br />
NICE Systems<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(203) 481-4168<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
linda.haelsen@nice.com<br />
31
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
Solar Winds –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Continuous Monitoring Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SolarWinds User Device Tracker<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SolarWinds User Device Tracker (UDT) delivers automated<br />
user and device tracking with powerful switch<br />
port management capabilities empowering federal IT<br />
Pros with strong continuous monitoring capabilities and<br />
visibility into who or what is connected to their network.<br />
Highlights include:<br />
• Automatically discovers, maps and monitors switches,<br />
ports and network devices<br />
• Quickly finds devices and retrievers user name, port<br />
details, connection history and more<br />
• Enables searching on IP address, user name, hostname<br />
or MAC address to track endpoints<br />
• Allows whitelisting and watch lists with automatic<br />
alerts and click-<strong>of</strong>-a-button port shutdown<br />
• Provides detailed switch port usage data, capacity<br />
analysis and built-in reporting<br />
With the ever-increasing use <strong>of</strong> personal devices and<br />
applications, SolarWinds UDT provides federal IT Pros<br />
with peace <strong>of</strong> mind about the security <strong>of</strong> their network<br />
and the devices on it by continuously monitoring who<br />
and what connects to their network. Additionally,<br />
SolarWinds UDT can track down lost or rogue devices<br />
with a simple search <strong>of</strong> a user name, IP address, hostname<br />
or MAC address ensuring that all devices that can<br />
connect to federal networks stay in the right hands.<br />
SolarWinds UDT also features alerting that signifies<br />
unauthorized network access<br />
and provides the ability to<br />
quickly shut down switch<br />
ports to secure access to sensitive<br />
information. Updates<br />
to SolarWinds UDT coincide<br />
with the latest issues being<br />
tackled by IT Pros such as<br />
BYOD. In the latest update<br />
to scalability and additional<br />
support and optimization for<br />
varying devices and vendors<br />
was a priority. And, by work-<br />
32
ing closely with and listening to its user community,<br />
SolarWinds is able to gain real-time and candid feedback<br />
from IT practitioners, so its products can address the<br />
problems and challenges prevalent in IT security today.<br />
SolarWinds UDT provides three critical capabilities for<br />
network and systems managers. First, it makes it possible<br />
to physically locate an end-user device or user on<br />
the network extremely quickly. Second, it allows for<br />
rapid quarantine <strong>of</strong> users or systems by remotely shutting<br />
down a switch port. Finally, it supports watch-lists<br />
and can alert when certain types <strong>of</strong> devices or specific<br />
users connect to the network and even take pre-defined<br />
actions to help protect information and other assets. SolarWinds<br />
s<strong>of</strong>tware is built to scale and can support an IT<br />
environment <strong>of</strong> any size and is used by nearly every U.S.<br />
federal civilian agency, DoD branch and intelligence<br />
agency. SolarWinds UDT complements other products,<br />
such as SolarWinds Network Configuration Monitor,<br />
SolarWinds Log & Event Manager, SolarWinds Firewall<br />
<strong>Security</strong> Manager and SolarWinds Server & Application<br />
Monitor, to name a few, providing additional breadth<br />
and depth for continuous monitoring. SolarWinds s<strong>of</strong>tware<br />
can “collect once and report to many,” which gives<br />
IT, information assurance, and security departments<br />
the unique functionality they each need from a single,<br />
cost-effective set <strong>of</strong> tools.<br />
SolarWinds UDT licensing<br />
is based on the number <strong>of</strong><br />
switch ports to being monitored.<br />
The licensing model<br />
features large jumps in<br />
switch port count allowing<br />
for rapid growth <strong>of</strong> an organization<br />
before an additional<br />
licensing level is reached and<br />
can scale to an unlimited<br />
number <strong>of</strong> switch ports.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.solarwinds.com/user-device-tracker.aspx<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.youtube.com/watch?v=s4G_<br />
yPZq7Jc<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rebecca Orr, Corporate Communications Associate<br />
SolarWinds<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(512) 498-6372<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
rebecca.orr@solarwinds.com<br />
33
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
Tenable Net work Securit y –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Continuous Monitoring Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>Security</strong>Center<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Founded in 2002, Tenable Network <strong>Security</strong> provides<br />
continuous network monitoring to identify vulnerabilities,<br />
reduce risk and ensure compliance. Relied<br />
upon by more than 20,000 organizations around the<br />
world, Tenable’s key clients include Fortune Global 500<br />
companies across industries as well as the entire U.S.<br />
Department <strong>of</strong> Defense (DoD) and many <strong>of</strong> the world’s<br />
leading governments. With the largest install base and<br />
best expertise in the industry, Tenable gives customers<br />
the ability to identify their biggest threats and respond<br />
quickly. Through its work with the DoD, Tenable’s<br />
technology is meeting the vulnerability, compliance and<br />
real-time risk management requirements <strong>of</strong> one <strong>of</strong> the<br />
largest, most demanding government organizations in<br />
the world. The Defense Information System Agency was<br />
confronted with a limited capability to quickly and accu-<br />
rately assess the network security <strong>of</strong> Department <strong>of</strong> Defense<br />
(DoD) enterprise networks. To address this, DISA<br />
established Tenable Network <strong>Security</strong> as the foundation<br />
<strong>of</strong> its Assured Compliance Assessment Solution (ACAS)<br />
which replaced the Secure Configuration Compliance<br />
Validation Initiative (SCCVI) suite <strong>of</strong> s<strong>of</strong>tware previously<br />
acquired by the DoD.<br />
ACAS was created to fulfill a combination <strong>of</strong> operational<br />
and strategic objectives, including:<br />
• Provide an innovative technical solution with a flexible<br />
cost structure.<br />
• Employ a commercial solution that could be easily<br />
ordered and quickly deployed across the DoD infrastructure.<br />
• Support enterprise-wide deployment across the<br />
34
Department <strong>of</strong> Defense, with the ability to tier system<br />
evaluation and management throughout the<br />
organization.<br />
Ultimately, DISA wanted fast and accurate enterprisewide<br />
network security assessment that could satisfy the<br />
goal <strong>of</strong> increasing the accuracy <strong>of</strong> risk assessment and<br />
standards compliance verification. They wanted realtime<br />
risk assessment across DoD networks to provide essential<br />
situational awareness and enable true, risk-based<br />
management decisions consistent with existing and<br />
emerging federal guidelines for continuous monitoring.<br />
DISA’s selection <strong>of</strong> Tenable<br />
followed an extensive evaluation<br />
process culminating with<br />
a 6-month, multi-site implementation.<br />
As part <strong>of</strong> Tenable’s<br />
solution, DISA implemented<br />
Tenable <strong>Security</strong>Center, which<br />
provided continuous assetbased<br />
security and compliance<br />
monitoring, bringing together<br />
the processes <strong>of</strong> asset discovery, vulnerability detection<br />
and configuration auditing. The <strong>Security</strong>Center console<br />
works with Tenable’s Nessus vulnerability scanners, the<br />
global standard in detecting and assessing network data,<br />
to look for policy changes every time a scan is requested.<br />
This provides the ability to assess an organization’s<br />
vulnerability and compliance posture, as well as deliver<br />
analysis and workflow tools that allow the user to easily<br />
perform reporting, auditing and remediation tasks. Tenable<br />
<strong>Security</strong>Center streamlines vulnerability scanning,<br />
administration and reporting. For organizations with<br />
large and complex networks, <strong>Security</strong>Center provides a<br />
comprehensive view <strong>of</strong> enterprise security, compliance<br />
and risk, combining the power <strong>of</strong> Nessus scanning with<br />
an enterprise-class vulnerability and threat management<br />
platform. <strong>Security</strong>Center simplifies administration<br />
35<br />
using a single console that manages distributed Nessus<br />
scanners for enterprise-wide security and compliance<br />
visibility. It also accelerates scans with a distributed and<br />
load balanced scanning, and delivers advanced analytics<br />
including extensive dashboard and built-in and customizable<br />
reports that aggregate scan data to help you<br />
identify and respond to security and compliance issues.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.tenable.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Continuous Monitoring:<br />
http://www.tenable.com/solutions/continuousmonitoring<br />
Whitepaper:<br />
http://www.tenable.com/whitepapers/continuous-monitoring-for-the-new-it-landscape<br />
Blog:<br />
http://www.tenable.com/blog<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Chris Petty, Communications Coordinator<br />
Tenable Network <strong>Security</strong><br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(410) 872-0555 ext. 522<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
cpetty@tenable.com
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
EventTracker –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best <strong>Security</strong> Incident & Event Management (SIEM)<br />
Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
EventTracker Enterprise<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
EventTracker <strong>of</strong>fers a suite <strong>of</strong> award-winning products<br />
for <strong>Security</strong> Information and Event Management (SIEM)<br />
and event log management including EventTracker<br />
Enterprise. EventTracker Enterprise enables organizations<br />
to be constantly aware <strong>of</strong> potential security risks<br />
and internal or external threats can be identified and<br />
eliminated before they are exploited. Increasingly, Department<br />
<strong>of</strong> Defense, state and local government departments<br />
are deploying EventTracker’s (SIEM) solutions<br />
to meet their cyber security needs and to comply with<br />
FISMA and SCAP/FDCC initiatives by supporting NIST<br />
800-X and other regulatory guidelines.<br />
ments, including:<br />
• Real time collection and secure storage <strong>of</strong> all network<br />
system and device logs for as long as you require<br />
• Reporting & analytics<br />
• Powerful FISMA compliance reporting<br />
• Correlation and alerting on all event log sources<br />
• Behavior analysis and anomaly detection<br />
• FIPS 140-2 compliant transmission <strong>of</strong> event data<br />
Going beyond simple SIEM, EventTracker’s continuous<br />
monitoring solutions provide unequalled network visibility<br />
with integrated:<br />
• Registry and file integrity monitoring<br />
• User activity monitoring<br />
• Advanced USB monitoring<br />
• SCAP certified Configuration Assessment<br />
EventTracker <strong>of</strong>fers a unique, flexible and cost effective<br />
automated continuous monitoring solution that meets<br />
government information and network security require-<br />
These combined features enable security personnel<br />
to continuously monitor your environment in either<br />
real time, for a preventative approach, or in a forensic<br />
36
capacity to analyze what activity has occurred. The end<br />
result is a robust, customizable monitoring solution that<br />
utilizes best practices for determining risk and preventing<br />
incidents to give you the confidence that your<br />
organization is secure, all while helping demonstrate<br />
compliance.<br />
Other Benefits to government agencies and contractors<br />
include:<br />
• Simple Straight-forward Licensing<br />
• S<strong>of</strong>tware Only Solution – fully virtual ready<br />
• Flexible, Component-based Architecture<br />
• All Compliance Packs Included SIEM Simplified,<br />
EventTracker’s award winning services <strong>of</strong>fering, augments<br />
IT security teams and provides additional resources<br />
to effectively extract actionable information<br />
about the IT infrastructure. As an option, our experienced<br />
staff assumes responsibility for all SIEM related<br />
tasks including daily incident reviews, daily/weekly log<br />
reviews, configuration assessments, incident investigation<br />
support and audit support. EventTracker Enterprise<br />
empowers organizations to maintain regulatory compliance<br />
and simplifies the audit process, reducing audit<br />
times by up to 90%. Detailed reporting minimizes the<br />
time and effort to determine potential gaps in compliance<br />
requirements, and address them efficiently. Event-<br />
Tracker Enterprise processes hundreds <strong>of</strong> millions <strong>of</strong><br />
discrete log messages to distill critical information to the<br />
organization and provides a 360o view <strong>of</strong> the entire IT<br />
infrastructure, <strong>of</strong>fering real-time alerting and reporting.<br />
EventTracker Enterprise allows organizations to maintain<br />
continuous compliance.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.eventtracker.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.eventtracker.com/eventtracker/enterprise/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Dina Petrosky<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (860) 495-5566<br />
cell: (860) 912-3201<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
dina@smartconnectionspr.com<br />
37
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />
Applied Visions, Inc. / Secure Decisions<br />
Division – <strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Compliance/Vulnerability Assessment Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Code Dx ®<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Corporate and government enterprises are all potential<br />
victims <strong>of</strong> cyber-attacks that can adversely impact a<br />
company’s bottom line, damage public reputation,<br />
compromise sensitive government data, and diminish<br />
the public trust. Industry experts and the Department<br />
<strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> (DHS) have traced most compromises<br />
to poorly written s<strong>of</strong>tware. 70-80% <strong>of</strong> security<br />
breaches occur because <strong>of</strong> poorly written code containing<br />
numerous security vulnerabilities. Consequently,<br />
s<strong>of</strong>tware development and acquisition organizations<br />
are under increased pressure to find and fix s<strong>of</strong>tware<br />
vulnerabilities before they are deployed. DHS, NASA,<br />
DoD and commercial businesses have begun to use<br />
static application security testing (SAST) tools to find<br />
s<strong>of</strong>tware vulnerabilities during the development cycle<br />
and as part <strong>of</strong> the acquisition process. One problem,<br />
however, is that no single source code analysis tool finds<br />
most <strong>of</strong> the vulnerabilities in an application. Different<br />
tools identify different vulnerabilities. Benchmark tests<br />
by NIST and NSA reveal that, on average, a single static<br />
analysis tool will detect only 14% <strong>of</strong> all <strong>of</strong> the s<strong>of</strong>tware<br />
weaknesses in code. Consequently, one needs to use<br />
multiple source code analysis tools to find a majority <strong>of</strong><br />
the vulnerabilities. A second problem is that each tool<br />
outputs its results in a different format with different<br />
severity scales, making it difficult to combine the results<br />
and present them in a unified report. A third problem<br />
is related to expense: each commercial tool added to<br />
the vulnerability analysis adds significant cost; and each<br />
open-source SAST tool requires additional resources to<br />
find and configure them. Code Dx ® finds, prioritizes,<br />
and visualizes s<strong>of</strong>tware vulnerabilities – fast and afford-<br />
38
ably. Code Dx ® makes it easy for s<strong>of</strong>tware developers<br />
and security analysts to start checking their s<strong>of</strong>tware for<br />
vulnerabilities without a significant investment <strong>of</strong> time<br />
or money. It embeds, automatically selects, and runs the<br />
appropriate open-source static application security testing<br />
(SAST) tools for each language in a s<strong>of</strong>tware code<br />
base. It also adds in results from commercial analysis<br />
tools and manual code analyses, combines these with<br />
the results <strong>of</strong> the open-source tools, and unifies the<br />
results into a common severity scale and display. Its<br />
visual analytics help to triage and prioritize s<strong>of</strong>tware<br />
vulnerabilities so that the most important vulnerabilities<br />
are fixed first, and false positives are removed from<br />
future vulnerability scans. Code Dx provides advanced<br />
collaboration and reporting tools to ensure expeditious<br />
communication <strong>of</strong> findings and remediation recommendations.<br />
Compliance reports can be customized to<br />
show which vulnerabilities are potential violations <strong>of</strong><br />
regulations such as PCI or HIPAA. Code Dx removes the<br />
most prominent barriers to finding and fixing s<strong>of</strong>tware<br />
vulnerabilities: time to get started, complexity, and expense.<br />
Its entry point <strong>of</strong> $2,500 for an annual subscription<br />
makes it affordable even for small businesses.<br />
39<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.codedx.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Code Dx finds, prioritizes, and visualizes s<strong>of</strong>tware<br />
vulnerabilities fast and affordably: http://securedecisions.com/products/codedx/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Dr. Anita D’Amico / Director Secure Decisions<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Applied Visions, Inc. Secure Decisions Division<br />
<strong>of</strong>fice: (631) 759-3909<br />
cell: (516) 702-7706<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Anita.Damico@SecureDecisions.com
GSN Announces the 2015<br />
Airport/Seaport/Boarder <strong>Security</strong> <strong>Awards</strong> Program<br />
GSN’s second annual awards program recognizing excellence in Airport/Aviation <strong>Security</strong>,<br />
Maritime/Port <strong>Security</strong> and Border <strong>Security</strong> will open for entries on Monday, March 2, 2015.<br />
The updated 2015 edition <strong>of</strong> this exciting program will once again cover basic technology<br />
groups, including Access Control/Identification, Detection Solutions, Air/Land and Sea<br />
Communications and Surveillance, Integrated <strong>Security</strong> Programs and Aviation/Maritime<br />
and Border <strong>Security</strong> Human Resource Development.<br />
In addition to the staples <strong>of</strong> Cargo Screening, Thermal Nightvision, Integrated Harbor<br />
<strong>Security</strong> and Perimeter Protection, you can expect many new categories in Satellite<br />
Communications, Aviation and Military Beacons and Air Traffic Control – plus new categories<br />
recommended by knowledgable vendors or outstanding operators or security teams.<br />
The last group <strong>of</strong> entries will once again be dedicated to the following three categories:<br />
* Most Notable Airport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />
* Most Notable Seaport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Upgrade<br />
* Most Notable Border <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />
AIRPORT | SEAPORT | BORDER<br />
SECURITY<br />
AWARDS PROGRAM<br />
43 38
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products & Solutions<br />
40<br />
42<br />
Roster <strong>of</strong> <strong>2014</strong> Winners<br />
GSN Interview with Distinguished Judge <strong>of</strong> <strong>2014</strong> <strong>Awards</strong>,<br />
Scott Greiper<br />
46<br />
48<br />
50<br />
52<br />
54<br />
56<br />
58<br />
60<br />
62<br />
64<br />
66<br />
Winning entries reproduced with permission <strong>of</strong>:<br />
IRIS ID<br />
EID Passport<br />
Alert Enterprise<br />
Desktop Alert<br />
Desktop Alert<br />
NICE Systems<br />
Automative Systems<br />
SecureUSA<br />
NICE Systems<br />
HIKVISION<br />
HID Global<br />
39
Winners in the <strong>2014</strong><br />
<strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products & Solutions<br />
PHYSICAL ACCESS CONTROL<br />
AND IDENTIFICATION<br />
Best Biometric Identification Solution<br />
IRIS ID – Winner<br />
Best Intergrated System<br />
for HSPF-12/FIPS 201 Compliance<br />
Eid Passport – Winner<br />
Best Smart Card Solution<br />
WAVE Systems – Winner<br />
Best Platform for Physical/Logical Access<br />
Viscount Systems – Winner<br />
Alert Enterprise – Finalist<br />
HID – Finalist<br />
Honeywell – Finalist<br />
COMMUNICATION PRODUCTS<br />
Best Interoperable First Responder<br />
Communications<br />
Desktop Alert –Winner<br />
AtHoc – Finalist<br />
Best Mass Notification Systems<br />
Desktop Alert – Winner<br />
AtHoc – Finalist<br />
Best Regional or National Public Safety<br />
Communications Deployment<br />
AtHoc – Winner<br />
Alastar S<strong>of</strong>tware – Finalist<br />
DETECTION PRODUCTS<br />
Best Explosive Detection Product or Solution<br />
Implant Sciences – Winner<br />
American Science and Engineering (AS&E) – Finalist<br />
Best Long Range Detection Product,<br />
Service or System<br />
Rapiscan – Winner<br />
Pure Tech Systems – Finalist<br />
VIDEO SURVEILLANCE PRODUCTS<br />
Best Intelligent Video Surveillance Solution<br />
NICE Systems – Winner<br />
AXIS Communications – Finalist<br />
Panasonic – Finalist<br />
Puretech Systems – Finalist<br />
Best Network IP Cameras<br />
AXIS Communications – Winner<br />
Bosch – Finalist<br />
Hikvision – Finalist<br />
40
OTHER PRODUCTS<br />
Best Perimeter Protection System<br />
Automatic Systems – Winner<br />
Best Crash Barriers<br />
(Gates, Fences, Bollards, Guard Booths)<br />
Secure USA – Winner<br />
Best Physical <strong>Security</strong><br />
Information Management Solution (PSIM)<br />
NICE Systems – Winner<br />
Best Crash Barriers<br />
(Gates, Fences, Bollards, Guard Booths)<br />
Secure USA -- #609 – Winner<br />
SERVICES<br />
Best Disaster Preparedness and/or<br />
Disaster Recovery and Clean-up Services<br />
High Rise Esacape – [win status?]<br />
Best <strong>Homeland</strong> <strong>Security</strong> Training,<br />
Higher Education Program<br />
Bellevue University – Winner<br />
41
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
GSN INTERVIEW<br />
Scott Greiper, Distinguished Judge,<br />
GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />
Mr. Greiper is the President and Founding Partner <strong>of</strong> Secure Strategy Group (SSG), a boutique<br />
advisory and investment banking platform in the physical and cyber security sectors. He has<br />
had a distinguished 15-year career in the security and technology sectors as both a research<br />
analyst and investment banker, and is known as a thought leader in the industry. Before<br />
forming Secure Strategy Group, he was a Managing Director at Legend Merchant Group and<br />
Head <strong>of</strong> the firm’s Convergent <strong>Security</strong> Group, which provided capital, strategic advisory and<br />
M&A services to growth companies in the security and defense technology markets. Previously,<br />
Mr. Greiper was a Principal and Senior Analyst at C. E. Unterberg, Towbin, where he covered public companies in the<br />
Global <strong>Security</strong> industry and was consistently ranked as one <strong>of</strong> the top analysts in the sector. He has worked with a<br />
range <strong>of</strong> industry leaders and is a frequent guest speaker and moderator at conferences and seminars across the country.<br />
Mr. Greiper attended the Executive MBA program at Columbia University and holds a B. A. in Economics from The<br />
University <strong>of</strong> Chicago. He is a member <strong>of</strong> the FBI InfraGard program, BENS (Business Executives for National <strong>Security</strong>),<br />
ASIS (American Society for Industrial <strong>Security</strong>) and NYSSA (New York Society for <strong>Security</strong> Analysts).<br />
GSN: What is the key trend you’re seeing in<br />
the security industry as we enter 2015?<br />
SG: The massive global security industry is being transformed<br />
from “guns, guards and gates” into highly integrated<br />
technology solutions that must protect against both<br />
physical and cyber threats while at the same time demonstrating<br />
ROI. The distinction between cyber and physical<br />
security is blurring and the requirement for unified<br />
management <strong>of</strong> threats in different domains growing. This<br />
“unification” is in my mind the most important transformation<br />
impacting the security industry.<br />
42<br />
What is “Unified <strong>Security</strong>”? It is the growing integration<br />
<strong>of</strong> security and resilience solutions – themselves<br />
increasingly digital – across the full spectrum <strong>of</strong> requirements<br />
and threats, from cyber to physical. It is the integration<br />
<strong>of</strong> physical security solutions – surveillance, access<br />
control, fire alarms – onto the same common operating<br />
platform <strong>of</strong> cyber security solutions – anti-virus, intrusion<br />
detection. This in an effort to create full situational awareness<br />
<strong>of</strong> an organizations security systems and sensors, and<br />
to more readily coordinate response.<br />
More and more building automation systems,
such as HVAC, access control, utilities, and communications,<br />
and being monitored and driven by an enterprise’s<br />
network. As such, these systems provide an easier route<br />
to hack into the network, because they <strong>of</strong>ten sit in front<br />
<strong>of</strong> the firewall and don’t contain the same level <strong>of</strong> security<br />
as network systems do. The theft <strong>of</strong> over one hundred<br />
million customer accounts during the Target Stores breach<br />
was enabled by the theft <strong>of</strong> a password from an HVAC<br />
technician that was subsequently used to breach the Target<br />
network.<br />
What are the drivers <strong>of</strong> demand for Unified <strong>Security</strong><br />
Solutions?<br />
Improved Technology & ROI:<br />
• Technology and ROI: analog to digital video surveil<br />
lance; new capabilities in simulation, ROIP, etc –<br />
better security and ROI?<br />
• New capabilities to combine physical and digital<br />
access control and identity management<br />
• “S<strong>of</strong>tware trumps hardware”<br />
• Requirements for security technology to keep up with<br />
“smart buildings”<br />
• M2M/Internet <strong>of</strong> Things/smart sensors<br />
• Securing the “last mile”<br />
• <strong>Security</strong> integration with external partners (from<br />
warning to video sharing, a la Boston)<br />
• Critical Infrastructure Regulations like FERC, PPD-21<br />
• Federal specific regs (eg, FIPS 201-2) and new security<br />
requirements for products sold to the U.S. Government<br />
How does the investment community perceive<br />
the opportunities in the security market?<br />
SG: Investment returns in the security sector were strong<br />
in <strong>2014</strong>, mirroring the healthy growth in the industry. Secure<br />
Strategy Group publishes the SSG Small Cap <strong>Homeland</strong><br />
<strong>Security</strong> Report and Index, which tracks the top small<br />
and mid-sized public companies in the security industry,<br />
categorized across 11 different technology sectors.<br />
As you can see in the table below, our SSG Small<br />
Cap <strong>Security</strong> Industry Index returned 22.5% for <strong>2014</strong>,<br />
handily beating the Dow Jones Industrial Average (up<br />
10.0%), the S&P 500 (up 13.7%), the Nasdaq Composite<br />
(up 14.7%) and the Russell 2000 (up 4.9%). Moreover, 7 <strong>of</strong><br />
our 11 sectors showed positive returns.<br />
Regulations:<br />
• SEC cyber reporting guidance; Sarbanes Oxley<br />
requirements<br />
• Federal regulations such as FICAM and HSPD-12 that<br />
mandate improved security for federal buildings by<br />
implementing “cyber pro<strong>of</strong> ” access control systems<br />
43
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
GSN INTERVIEW<br />
Scott Greiper, Distinguished Judge,GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />
You act as both advisor and banker to your<br />
client companies. What are the key variables<br />
you look for before taking on a new<br />
client?<br />
SG: There are three key variables we measure when<br />
evaluating a new potential client assignment. We don’t<br />
assign a specific ranking to each, but at the end <strong>of</strong> the day<br />
the quality, integrity and experience <strong>of</strong> the management<br />
team is the tipping point between success and failure.<br />
Since we act in a capital raising capacity for our clients, we<br />
always position ourselves in the mind <strong>of</strong> an investor as we<br />
do our due diligence.<br />
Technology:<br />
• Does the technology fill a market gap and have real<br />
functional differentiation vs. the competition?<br />
• Does the technology <strong>of</strong>fer an ROI to the end user,<br />
either in terms <strong>of</strong> upfront acquisition cost or the total<br />
life cycle cost <strong>of</strong> ownership?<br />
• Does the technology <strong>of</strong>fer flexibility in terms <strong>of</strong> size,<br />
portability, weight, and mobility?<br />
• Can the technology be easily and cost-effectively up<br />
graded over time?<br />
• Can the technology maintain its functional and/or cost<br />
advantages over time?<br />
Management:<br />
• What is management’s background and experience in<br />
the specific technology sector?<br />
• Has management previously taken a company from<br />
early-stage, to growth stage to a successful exit in the<br />
past?<br />
• Is there a strong Board <strong>of</strong> Directors that brings exper<br />
tise in governance, operations and management?<br />
• Is there a strong ethical culture in the organization<br />
that starts “at the top”?<br />
• Has there been continuity in the core management<br />
team over time?<br />
Business Model:<br />
• Is there sustainability in the Company’s pricing model?<br />
• Can gross and operating margins be sustained or<br />
increased over time?<br />
• Is there both a direct and channel sales model in<br />
order to cost-effectively access end-user opportunities?<br />
• Is there a component <strong>of</strong> a recurring revenue or SaaS<br />
revenue model?<br />
• Are there customer concentration issues/is the sales<br />
cycle elongated?<br />
44
Tell us about some <strong>of</strong> the recent additions<br />
to your team.<br />
SG: We made a number <strong>of</strong> important additions to our<br />
team and our advisory board in <strong>2014</strong> to prepare us for<br />
growth in 2015.<br />
We added Mark Sauter as our Head <strong>of</strong> M&A. Mark<br />
was a co-founder <strong>of</strong> America’s first business accelerator for<br />
national security technology and manager <strong>of</strong> its contract<br />
with the NSA. Just prior to joining SSG, Mark was a principal<br />
in the Spectrum Group, one <strong>of</strong> the country’s leading<br />
M&A due diligence firms. He served as an Army <strong>of</strong>fice<br />
in Special Forces and infantry units and is a graduate <strong>of</strong><br />
Harvard University and the Columbia University Graduate<br />
School <strong>of</strong> Journalism. He is also co-author <strong>of</strong> McGraw<br />
Hill’s leading university textbook, “<strong>Homeland</strong> <strong>Security</strong>: A<br />
Complete Guide.”<br />
We added Tom DiNanno as our Head <strong>of</strong> Government<br />
Affairs. Tom served as Deputy Assistant Secretary for<br />
Critical Infrastructure Protection at the U.S. Department <strong>of</strong><br />
<strong>Homeland</strong> <strong>Security</strong>, served as Special Assistant to the Chief<br />
<strong>of</strong> Staff in the Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>, and in<br />
the White House Office <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> as Director<br />
<strong>of</strong> Corporate Relations. He received his MS in Business<br />
and Urban Planning from MIT, and an MA in Government<br />
Administration from the University <strong>of</strong> Pennsylvania.<br />
We added Brian Tuskan to our advisory board late<br />
last year. Brian serves as Senior Director <strong>of</strong> Micros<strong>of</strong>t Global<br />
<strong>Security</strong>, where he oversees global strategic development,<br />
integration and growth for Technology, Showcase,<br />
Investigations, and Communications for the Micros<strong>of</strong>t<br />
Global <strong>Security</strong> team. He joined Micros<strong>of</strong>t in 2000, after<br />
serving more than 12 years in law enforcement with the<br />
City <strong>of</strong> Redmond Police (Washington) and the Honolulu<br />
Police Department. During his distinguished law enforcement<br />
career he served as a metropolitan police <strong>of</strong>ficer,<br />
patrol, SWAT tactical team member, undercover narcotics<br />
detective, major crimes detective, and <strong>of</strong>ficer-in-charge.<br />
45
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
IRIS ID –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Biometric Identification Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
IrisAccess - Iris Recognition Systems<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Iris ID ® (formerly LG Iris) has been active in the development<br />
and deployment <strong>of</strong> iris recognition technology<br />
since 1997. The IrisAccess ® platform has been widely<br />
deployed around the world. Iris ID’s first generation<br />
product was the IrisAccess ® 2200 iris recognition system<br />
released in 1999, which paved the way for the first successful<br />
commercialization <strong>of</strong> iris<br />
recognition. This generation was<br />
subsequently followed by the releases<br />
<strong>of</strong> the IrisAccess 3000, iCAM<br />
4000, iCAM 7000 series, iCAM<br />
TD100, iCAM D1000, iCAM T10,<br />
iData ® EAC s<strong>of</strong>tware, IrisAccelerator<br />
® and iData ® S<strong>of</strong>tware Development<br />
tools. Twentieth-century security<br />
infrastructures are straining<br />
against the demand <strong>of</strong> twenty-first<br />
46<br />
century security implementation. The crushing pressure<br />
<strong>of</strong> an unpredictable global threats, stringent regulatory<br />
constrains increasing exceptions and escalating security<br />
threats are stressing facilities, and IT systems to the<br />
breaking point. In this volatile business environment,<br />
the world over are confronting extraordinary challenges<br />
including the inherent contradiction between improving<br />
operational efficiency, customer service, and the overall<br />
“experience” while anticipating and combating a broad<br />
range <strong>of</strong> security threats. This dual high service/high security<br />
challenge has created significant operational gaps<br />
in the homeland environment that require innovative<br />
process reengineering and comprehensive operational<br />
improvements. IrisAccess iris-based access control is one<br />
<strong>of</strong> an array <strong>of</strong> new and innovate<br />
business processes and automated<br />
technology solutions homeland<br />
security agencies are adopting to<br />
close these gaps, remain vegilant,<br />
and breakthrough to the customer<br />
experience. Secure access control<br />
is critical to addressing existing<br />
airport security/service operational<br />
gaps. This is particularly<br />
true for managing staff and third
party vendor access to restricted zones within a facility.<br />
IrisAccess ® solutions most effectively and reliably balance<br />
a number <strong>of</strong> seemingly irreconcilable constraints,<br />
including:<br />
• Regulatory Compliance<br />
• Cost minimization and reduction<br />
• Leveraging security infrastructure and investments<br />
• Comprehensive, multi-layered security<br />
• Balancing security with speed <strong>of</strong> access<br />
• Uniform access to multiple locations and facilities<br />
• Flexible solutions that evolve with planning process<br />
• User friendly, easily adopted, and accepted solutions<br />
• Integrating access control with existing and planned<br />
airport ID systems<br />
• Unique facility/location issues – environmental, local<br />
rules/regulation, end-user concerns<br />
IrisAccess highly reliable identification process can be a<br />
key component <strong>of</strong> any homeland security access control<br />
solution that successfully balancing these requirements.<br />
Iris ID IrisAccess solution is uniquely suited to quickly<br />
and accurately establish and verify identity enabling<br />
secure and reliable access control in the highly sensitive<br />
places. Iris ID IrisAccess systems provide high integrity<br />
mass enrolment applications, physical access security<br />
for airports, national ID programs, secure border crossings,<br />
data centers, biotech labs and HAZMAT environments,<br />
as well as other critical infrastructures. The only<br />
biometric technology designed for operation in oneto-many<br />
search mode, the technology also integrates<br />
with traditional system architectures which may include<br />
smart-cards as well as other tokens or PINs. Readily<br />
accommodating expansion and scalability in terms <strong>of</strong><br />
system and database size requirements, Iris ID continues<br />
to advance the “doorway to desktop” and global<br />
security solution that enterprise and governments seek<br />
today, as well as <strong>of</strong>fering the robust authentication<br />
47<br />
that will be required in an increasingly wireless world.<br />
IrisAccelerator and associated development tools have<br />
been proven to provide highly accurate and fast identification<br />
<strong>of</strong> individuals. Iris ID has been providing iris<br />
technology solutions for <strong>Homeland</strong> <strong>Security</strong> for past<br />
14 years. Iris ID products and solutions are currently<br />
used in more than 50 airports, high value assets such as<br />
nuclear power plants, critical infrastructure government<br />
or commercial security around the world for employee<br />
access control and homeland security. Recently Iris ID<br />
was awarded the honor <strong>of</strong> providing a border security<br />
solution for Canada Border <strong>Security</strong> Agency (CBSA) and<br />
Hammad International Airport, Doha Qatar.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.irisid.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Mohammed Murad<br />
Vice President, Iris ID Systems Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(609) 819-4747<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
murad@irisid.com
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
Eid Passport –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Integrated System for HSP D-12/FIPS 201<br />
Compliance<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The RAPIDGate Program<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The RAPIDGate ® Program, from Eid Passport, Inc., is<br />
an end-to-end high assurance identity management<br />
and installation access control solution for vendors,<br />
contractors, and service providers. This field-proven,<br />
accredited, and widely-accepted credentialing and<br />
vetting program has been deployed at more than 450<br />
federal facility access control points across the United<br />
States and its territories, helping the U.S. military guard<br />
against such threats as unauthorized access, identity<br />
theft, fraud and cyber-crime. These threats put the safety<br />
<strong>of</strong> military personnel, critical infrastructure, and other<br />
valuable assets at risk every day. This DIACAP ATOcertified<br />
program was specifically designed to enhance<br />
installation safety and security and improve operational<br />
efficiency and effectiveness in aligning with HSPD-12/<br />
FIPS 201 requirements by utilizing our proprietary,<br />
48<br />
self-contained physical access control system for card<br />
validation, authentication, and registration. Since 2004,<br />
the RAPIDGate Program has identity-pro<strong>of</strong>ed, performed<br />
suitability risk analysis and credentialed more<br />
than 790,000 vendor/contractor employees representing<br />
approximately 59,000 companies doing business<br />
with the U.S. Navy, Army, Marine Corps, and Coast<br />
Guard. Over 130,000,000 authentication events have<br />
been recorded, the majority <strong>of</strong> which are vendors and<br />
contractors requiring identity verification and access to<br />
military and government bases/buildings. As a result,<br />
Eid Passport is the leading commercial provider <strong>of</strong> U.S<br />
Department <strong>of</strong> Defense recognized vendor credentials.<br />
The time required to screen and verify vendors and<br />
contractors for base access cuts deeply into productivity,<br />
particularly for smaller companies who can least
afford to wait in line. This results in higher vendor costs,<br />
which ends up increasing military costs. To significantly<br />
reduce the time it takes for thousands <strong>of</strong> personnel to<br />
gain needed access to military facilities, the RAPID-RCx ®<br />
Program was developed. It seamlessly integrates access<br />
control point systems and biometric identity verification<br />
into a single, RAPIDGate credential. Additionally,<br />
Eid Passport is currently implementing its RAPIDGate<br />
Premier credentialing program for the U.S. Navy.<br />
This advanced program adds Personal Identity Verification<br />
Interoperable (PIV-I) credentials to the RAPIDGate<br />
Program. These enhanced, tamper-resistant credentials<br />
meets PIV-I credentialing standards and are in accordance<br />
with HSPD-12 and FIPS 201. RAPIDGate Premier<br />
PIV-I credentials contain: a unique ID code; a color<br />
photograph; the credential holder’s full name; organizational<br />
affiliation/company name; issued and expiration<br />
dates; and program seal <strong>of</strong> authenticity. Furthermore,<br />
the RAPIDGate Premier Program credentials are the<br />
only PIV-I credentials with integrated background vetting.<br />
Incorporating this enhanced credential with PIV-I<br />
compliant PACS systems provides participants with a<br />
single, interoperable credential granting them access to<br />
controlled areas such as flight lines, secure buildings,<br />
spaces, vaults, and other areas where authorized access<br />
is required. Once RAPIDGate has been deployed,<br />
security personnel can verify that anyone arriving with<br />
a RAPIDGate badge has been Registered And Previously<br />
ID’d. That means they’ve passed a thorough background<br />
screen, been photographed, fingerprinted and badged.<br />
Vendors like RAPIDGate because it saves them hours<br />
<strong>of</strong> time and improves worker productivity by providing<br />
rapid base access. Force Protection likes RAPIDGate<br />
because it allows security personnel to spend less time<br />
and resources screening “Registered And Previously<br />
ID’d” visitors who have already been vetted and allows<br />
them to meet security policy requirements.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
High-assurance identity management for vendors, contractors,<br />
suppliers, & service providers<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Eid Passport, Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
John Nee : (503) 924-5293<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
jnee@eidpassport.com<br />
49
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
Alert Enterprise –<br />
<strong>2014</strong> Finalist<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Platform for Physical and Logical Access<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Enterprise Guardian<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Companies are faced with the daunting task <strong>of</strong> reconciling<br />
employee, contractor and visitor lists against HR that are working fine. AlertEnterprise has developed a<br />
resorting to cost prohibitive replacement <strong>of</strong> systems<br />
Management Systems, Manual Contractor acquisition solution to bridge the security gaps across these silos <strong>of</strong><br />
processes and the list <strong>of</strong> electronic access cards that are Physical and Logical systems with a Converged Identity<br />
actually active. Add to that the complexity <strong>of</strong> monitoring Governance and Management solution that extends<br />
the system access that they have in enterprise and legacy beyond IT and enables you to manage and control user<br />
applications. Organizations are living with the risk that access risks across the entire enterprise. As an example<br />
terminated employees or contractors still have physical<br />
access to facilities. As companies grow and acquire is an Operator who works in the Transmission Control<br />
use case for this capability, let us consider Tom. Tom<br />
other facilities and merge with other companies, Access<br />
Control systems from multiple vendors need to be Tom must complete certain on-going training require-<br />
Room for a regulated Utility company we call Utilco.<br />
accounted for. A single command and control console ments to maintain his license to operate. Utilco has a<br />
that can consolidate identities and access rules across Learning Management System (LMS) in place that is<br />
multi-vendor badging systems can eliminate the overlap, linked to the company HR system. AlertEnterprise is<br />
cost burden and manual processes needed to centrally integrated with the HR systems, the Identity Management<br />
as well as the Badge Access system. During the<br />
manage physical access across all these systems without<br />
50
onboarding process, AlertEnterprise automates the<br />
background check process prescribed by Utilco and<br />
proceeds to make sure that all the certification requirements<br />
are met. If the requisite Continuing Education is<br />
not completed, the application reminds Tom that he has<br />
two more weeks to complete it. Tom may want to access<br />
the computer-based training in the evenings to make<br />
up for lost time. If additional reminders don’t have the<br />
desired effect, finally on the last day, when Tom uses his<br />
electronic access badge to get into the control room, it<br />
will automatically lock him out, enforcing the company<br />
policy and avoiding the possibility <strong>of</strong> costly compliance<br />
violations.<br />
With Enterprise Guardian from AlertEnterprise, organizations<br />
can:<br />
• Manage a Common <strong>Digital</strong> Identity for employees,<br />
contractors, etc. for IT and Physical<br />
• Unlike other solutions, provision to both IT Applications<br />
and Physical Access Control<br />
• Meet regulatory compliance requirements and automatically<br />
generate reporting<br />
• Actively enforce termination and transfers<br />
• Have a single console that operates across multiple<br />
vendor Access Control systems<br />
• Single interface to create identity and badge for multiple<br />
Access Control Systems<br />
• Enhanced risk analysis and training validation with<br />
Active Policy Enforcement<br />
• Powerful reporting across physical access vendors<br />
consolidating access and usage<br />
• Support PIV-I and PIV-C for Government and High<br />
<strong>Security</strong> FICAM; HSPD-12; OMB M-11-11<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.alertenterprise.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Enterprise Guardian Data Sheet:<br />
https://alertenterprise.box.com/s/roeqtb8p-<br />
473pf9kz286b<br />
AlertEnterprise Video:<br />
https://www.youtube.com/<br />
watch?v=1GdXEgntzgM<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Pan Kamal,Vice President, Marketing<br />
AlertEnterprise, Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (510) 897-6712<br />
cell: (650) 793-5992<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
pan.kamal@alertenterprise.com<br />
51
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
Desktop Alert –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Interoperable First Responder Communications<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Desktop Alert Inter-agency Mass Notification Platform<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Desktop Alert provides early warning mass notification<br />
alerts to over 1 million federal, military and civilian hardware and burdensome configuration logistics. For<br />
personnel daily with ‘less than one minute alerting’ as the first time in the existence <strong>of</strong> Northern Command /<br />
certified by our customer base. After an extensive worldwide<br />
vetting <strong>of</strong> vendors, the world’s most crucial peace network alerting to protect over 25,000 personnel.<br />
NORAD, the entire command is now retro fitted with<br />
keeping organization NATO selected Desktop Alert! Buttressed<br />
by this selection is that <strong>of</strong> the Institute <strong>of</strong> Peace alert all 25,000 personnel in ‘less than one minute’.<br />
The system selected enables emergency operators to<br />
2012 selection <strong>of</strong> Desktop Alert. http://www.virtual-strat-<br />
The system is also integrated with the National Weather<br />
egy.com/2012/04/17/united-states-institute-peace-selects-<br />
desktop-alert-mass-notification-system#axzz3IbIAv3c4 severe weather event, all targeted personnel are alerted<br />
Service using the Common Alerting Protocol. During a<br />
Desktop Alert was chosen over all vendors in this GSN automatically without operator assistance in less than<br />
competition for the coveted mass notification requirements<br />
by NATO HQ in Brussels Belgium. Key in our on-premise phone system. With a single mouse click, in<br />
one minute. The system also integrates with the base<br />
selection by NATO was the platforms ability to operate seconds personnel are reached by e-mail alerts, desktop<br />
popups, text messages, phone calls and mobile<br />
on the customer’s existing computational infrastructure<br />
thus saving several hundred thousand dollars in both apps. The implementation has augmented emergency<br />
52
esponse capability substantially and was recently<br />
reviewed and lauded by Maj. Gen. Jack Briggs, currently<br />
the Director <strong>of</strong> Operations for Headquarters U.S Northern<br />
Command, Peterson Air Force Base, Colorado. The<br />
implementation <strong>of</strong> the Desktop Alert MNS enables interagency<br />
communication during an emergent domestic<br />
event between the following US 1st in line 1st Responders:<br />
• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K personnel)<br />
• ARMY AND AIR NATIONAL GUARD NATIONWIDE<br />
(500+K personnel)<br />
• NORTHERM COMMAND / NORAD (25K personnel)<br />
• U.S. Defense Threat Reduction Agency (DTRA) (10k<br />
Personnel)<br />
• U.S. Army Special Operations Command at Fort Bragg<br />
• AFDW Pentagon (confidential)<br />
• 200+ Army and Air Force locations worldwide<br />
DTA is currently the second largest provider to DoD<br />
and continue to build market share year by year. The<br />
unification <strong>of</strong> alerting between these agencies provides<br />
formidable actionable intelligence during emergent<br />
homeland events. The nation’s most top tier 1st agency<br />
responders are all owners <strong>of</strong> the DTA MNS. NO other<br />
vendor can boast these credentials; especially with these<br />
numerous ‘key’ nation leading 1st inline 1st responder<br />
defense agencies as it relates to not only border security;<br />
but all other security concerns to the nation. While<br />
other vendors may claim more seat licenses within DoD;<br />
only Desktop Alert has unified the nation’s most critical<br />
security agencies with the Military and DHS with one<br />
de-facto system. Desktop Alert is far and away the leading<br />
MNS in use by the <strong>Homeland</strong>s Most Crucial Defense<br />
Agencies! The improved ability to attain actionable<br />
intelligence across all <strong>of</strong> these agencies in less than one<br />
minute during an emergent event provides immense<br />
dividends to the safety and protection <strong>of</strong> the homeland.<br />
53<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.prweb.com/releases/NORAD/<br />
NORTHERNCOMMAND/prweb9115614.htm<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Howard Ryan, CEO<br />
Desktop Alert Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (973) 727-0066<br />
cell: (973) 580-3447<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
howard@desktopalert.net
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
Desktop Alert –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Mass Notification Systems<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Desktop Alert Global Connect - Interagency Mass<br />
Notification Platform<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Desktop Alert provides early warning mass notification<br />
alerts to over 1 million federal, military and civilian<br />
personnel daily with ‘less than one minute alerting’ as<br />
certified by our customer base. After an extensive worldwide<br />
vetting <strong>of</strong> vendors, the world’s most crucial peace<br />
keeping organization NATO selected Desktop Alert! Buttressed<br />
by this selection is that <strong>of</strong> the Institute <strong>of</strong> Peace<br />
2012 selection <strong>of</strong> Desktop Alert. http://www.virtual-strategy.com/2012/04/17/united-states-institute-peace-selectsdesktop-alert-mass-notification-system#axzz3IbIAv3c4<br />
Desktop Alert was chosen over all vendors in this GSN<br />
competition for the coveted mass notification requirements<br />
by NATO HQ in Brussels Belgium. Key in our<br />
selection by NATO was the platforms ability to operate<br />
on the customer’s existing computational infrastructure<br />
thus saving several hundred thousand dollars in both<br />
hardware and burdensome configuration logistics.<br />
RECENT NEWS: DTA commended for its platform during<br />
Recent Shooter event at Fort Hood. (The Backup<br />
ARMY EM2P MNS Program alerted several minutes later<br />
than the DTA system!) Reference: http://www.desktopalert.net/News/fort-hood-update/<br />
DTA / Primary MNS at:<br />
• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K personnel)<br />
• ARMY AND AIR NATIONAL GUARD NATIONWIDE<br />
(500+K personnel)<br />
• NORTHERM COMMAND / NORAD (25K personnel)<br />
• U.S. Defense Threat Reduction Agency (DTRA) (10k<br />
Personnel)<br />
• AFDW Pentagon (confidential)<br />
• 200+ Army and Air Force locations worldwide<br />
DTA is currently the second largest provider to DoD<br />
and continue to build market share year by year. The<br />
unification <strong>of</strong> alerting between these agencies provides<br />
formidable actionable intelligence during emergent<br />
homeland events. Desktop Alert is the largest provider<br />
<strong>of</strong> MNS to the US Army Worldwide. Desktop Alert is<br />
the Primary MNS used at over 90% <strong>of</strong> US Army installations<br />
including Fort Hood. (NOTE! The US ARMY EM2P<br />
MNS Program is a BACKUP system only!). The nation’s<br />
54
most top tier 1st agency responders are all owners <strong>of</strong><br />
the DTA MNS. The Desktop Alert System sends desktop<br />
alert popups, text messages (SMS), e-mail and phone<br />
call alerts to all <strong>of</strong> these agencies personnel instantly<br />
in all 50 states and beyond. NO other vendor can boast<br />
these credentials; especially with these numerous ‘key’<br />
nation leading border defense agencies as it relates to<br />
not only border security; but all other security concerns<br />
to the nation. While other vendors may claim more seat<br />
licenses within DoD; only Desktop Alert has unified the<br />
nation’s most critical security agencies with the Military<br />
and DHS with one de-facto system. Desktop Alert is far<br />
and away the leading MNS in use by the <strong>Homeland</strong>s<br />
Most Crucial Defense Agencies! We hang our hat on the<br />
recent NATO selection, our usage by the National Guard<br />
Nationwide, our usage by FEMA HQ locations nationwide<br />
and <strong>of</strong> course the irrefutable fact that Desktop<br />
Alert is the ONLY proven vendor in this competition that<br />
delivers alerts in less than one minute. As a result <strong>of</strong> the<br />
NATO selection our company has also been contacted to<br />
REPLACE the incumbent for the entire US Marines Enterprise!<br />
When lives are at stake, seconds count. Numerous<br />
DoD agencies are unsatisfied with alerts received in<br />
5 to 10 minutes. The best is yet to come! Thank you for<br />
your review and consideration.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.desktopalert.net<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.prweb.com/releases/<strong>2014</strong>/11/<br />
prweb12296096.htm<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Howard Ryan, CEO<br />
Desktop Alert Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(973) 580-3447<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
howard@desktopalert.net<br />
55
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
NICE Systems –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Intelligent Video Surveillance Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
NICE Suspect Search<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
An active shooter is on the loose. An airport checkpoint<br />
has just been breached. Police are frantically searching<br />
for a lost child amid a crowded location. A suspicious<br />
bag is left behind in a busy transit station. In each <strong>of</strong><br />
these situations, time is <strong>of</strong> the essence. Surveillance video<br />
can provide clues to finding a suspect, but will you<br />
be able to pinpoint the exact video you need in time?<br />
Here’s where NICE Suspect Search can help. Suspect<br />
Search is a patent-pending video analytics technology<br />
that helps you quickly locate and retrace the movements<br />
<strong>of</strong> a person <strong>of</strong> interest within a video surveillance network.<br />
It can scan an hour <strong>of</strong> video in less than a minute,<br />
automatically filtering out 95 percent <strong>of</strong> irrelevant images.<br />
Suspect searches can be initiated using a recorded<br />
image, an uploaded full body photo, or a suspect composite.<br />
As the search reveals snapshots <strong>of</strong> the suspect<br />
56<br />
over time across different cameras, it evolves into a<br />
history <strong>of</strong> their movements before and potentially after<br />
the incident. Timely situational awareness is critical so<br />
snapshots are presented on an actual map. This answers<br />
questions like how did the suspect get here? Where did<br />
he go? Did he meet up with anyone or was he alone?<br />
And is he still on premise? Suspect Search revolutionizes<br />
video forensics, both for real-time use and for after-thefact<br />
investigations. <strong>Digital</strong>ly stamped images, video, and<br />
location information associated with each search can<br />
easily be shared with police departments and district<br />
attorneys for forensic investigations.
WHAT SETS SUSPECT SEARCH APART<br />
There are technologies on the market that can search<br />
for a specific color, but until now, none <strong>of</strong> them could<br />
search for a specific person, especially not in real-time.<br />
Suspect Search takes into account three parameters -- a<br />
full body image, the unique human signature <strong>of</strong> a person<br />
(e.g. size and the way they walk), and the textures<br />
and colors associated with that person like their clothes,<br />
accessories, hair, or skin. The Suspect Search algorithm<br />
analyzes, tags, sorts, and stores images in a database according<br />
to these parameters, increasing search accuracy.<br />
Furthermore, calculations are done in real-time. Video is<br />
analyzed as it is captured, so searches can begin immediately<br />
and results are available within seconds. Another<br />
differentiator is Suspect Search’s ability to simultaneously<br />
search across multiple camera feeds. Once the<br />
target has been located, Suspect Search’s geo-spacial<br />
capabilities allow operators to trace and retrace the suspect’s<br />
route to predict patterns <strong>of</strong> movement for quick<br />
apprehension.<br />
SUSPECT SEARCH BENEFITS<br />
By providing near real-time, actionable information<br />
about the whereabouts and movements <strong>of</strong> persons <strong>of</strong> interest,<br />
Suspect Search can accelerate response times and<br />
effect positive outcomes, whether that means finding a<br />
lost child faster, apprehending<br />
suspects quicker, or avoiding<br />
costly shutdowns.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.nice.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.nice.com/nice-suspect-search<br />
https://www.youtube.com/watch?v=PD-hSXOt5<br />
FA&index=54&list=PLC3F1BBC80EE0AA53<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Linda Haelsen, Marketing Communications Manager<br />
NICE Systems<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(203) 481-4168<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
linda.haelsen@nice.com<br />
57
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
Automatic Systems –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Perimeter Protection Product/System (Excluding<br />
Video)<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SlimLane Short - Swing Barrier Optical Turnstile<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SlimLane Short swing door optical turnstiles combine<br />
high speed bidirectional throughput with the highest reliability,<br />
security, and footprint variations <strong>of</strong> any barrier<br />
type optical turnstile. Available in narrow or wide lane<br />
versions and single or double swing doors in 24 or 120 able with either low glass height (35”), medium (47”),<br />
volt power configuration, SlimLane is already widely or high (67”) glass versions. The shorter cabinet length<br />
known as the most versatile swinging glass turnstile. allows for easier implementation into most elevator<br />
SlimLane <strong>of</strong>fers IP connectivity – and was the first security<br />
entrance control lane to boast this feature. SlimLane architectural demands in many front lobbies. Automatic<br />
bank openings, as well as to more readily adapt to strict<br />
is UL 2593 listed to help satisfy the most stringent <strong>of</strong> Systems is a leading manufacturer <strong>of</strong> pedestrian and<br />
building and safety codes. The standard and unique vehicle entrance control equipment, with North American<br />
headquarters/manufacturing in Brossard, Quebec,<br />
“SecuriSafe” mode prevents forced entry attempts while<br />
still allowing emergency egress at any time, and Slim- Canada. Under GSA Schedule Contract #GS-07F-0109Y,<br />
Lane is the only lane <strong>of</strong> its kind to <strong>of</strong>fer such a feature. Automatic Systems <strong>of</strong>fers both their full range <strong>of</strong> pedestrian<br />
and vehicle entrance control systems to federal<br />
This new SlimLane <strong>of</strong>fers a 48” cabinet length (existing<br />
standard length is 62”). Both product lengths are avail- government security buyers.<br />
58
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.automatic-systems.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Martha Tsiritas, Marketing Manager<br />
Automatic Systems<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(800) 263-6548 xt234<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
mtsiritas@automatic-systems.com<br />
59
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
Secure USA –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Crash Barrier (Gates, Fences, Bollards, Guard<br />
Booths)<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SideWALK Shallow Foundation Bollards<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The homeland security threat to urban and corporate<br />
campus facilities makes bollards a necessity for protetive<br />
stand<strong>of</strong>f zones for at-risk structures. SecureUSA ®<br />
invented shallow foundation bollard solutions that<br />
meet stringent ASTM performance specifications in<br />
circumstances which would normally preclude the use<br />
<strong>of</strong> “standard” deep foundation bollards. They do it with<br />
aesthetic style and design sensitivity, without sacrificing<br />
performance. T The SecureUSA ® SideWALK ® Bollard<br />
was developed to overcome the installation challenges<br />
commonly found in any location where underground<br />
infrastructure and utilities prevent deeper excavation.<br />
They carry ASTM-C40 to M50 crash ratings/zero penetration<br />
with a single bollard strike in as little as 6 inch<br />
foundation depths and a footprint designed to fit in virtually<br />
any sidewalk pavement. Standard crash rated bol-<br />
60<br />
lards typically require foundation depths <strong>of</strong> up to three<br />
feet or more to achieve desired crash ratings. In major<br />
metropolitan cities where the area under the pavement<br />
and streets are crowded with utilities and other infrastructure,<br />
a deeper foundation is virtually impossible.<br />
Even other “shallow” bollards that have been subjected<br />
to actual crash tests require deeper foundations than the<br />
minimal 9 inches for SecureUSA’s ASTM-M30 (15,000lb<br />
vehicle @ 30 mph) and M50 (15,000lb vehicle @ 50<br />
mph) product. The SideWALK ® Bollard Series consists<br />
<strong>of</strong> individual bollards that are easy to install even when
the terrain causes each <strong>of</strong> the bollards to change slope,<br />
grade and curvature. This is a unique design for shallow<br />
foundation crash rated bollards as other manufacturers<br />
use a fixed sled design comprising a number <strong>of</strong> bollards<br />
configured into less flexible bollard sets. The SecureUSA ®<br />
SideWALK ® Bollard allows installation spacing to be<br />
more flexible around typical obstructions, such as utility<br />
vents, drains and other typical roadway and sidewalk<br />
restrictions. This makes for cost effective protection in<br />
normally prohibitive environments. SecureUSA ® Side-<br />
WALK ® Bollards shallow foundation bollards provide<br />
ADA compliant, pedestrian friendly stand<strong>of</strong>f zones with<br />
the ability to restrict vehicular access without obstructing<br />
pedestrian access, while meeting ASTM standards.<br />
This is a major technological achievement. SecureUSA ®<br />
also pioneered the development and production <strong>of</strong><br />
all-electric retractable bollards that save time and money<br />
in installation and maintenance over the life <strong>of</strong> the<br />
system. No hydraulics minimize the potentially negative<br />
environmental impact <strong>of</strong> leaks and spills associated with<br />
hydraulic systems. I have found the staff at SecureUSA ®<br />
to be the highest quality pr<strong>of</strong>essionals dedicated to<br />
excellent “post-sale-installation” customer service. It has<br />
been a delight to work with them.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.secureUSA.net<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.secureusa.net/products/sidewalkshallow-bollards/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Dr. Stephen R. Crosby, Manager, Entrusted Creative<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(760) 333-7414 (both <strong>of</strong>fice and cell)<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
steve@entrustedcreative.org<br />
61
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
NICE Solutions –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Physical <strong>Security</strong> Information Management<br />
(PSIM) Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
NICE Situator<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
NICE remains at the forefront <strong>of</strong> PSIM technology’s<br />
evolution. With a focus on continued growth and expansion,<br />
we’ve extended Situator’s reach beyond the<br />
control room and into the field. Our new innovative<br />
mobile application addresses operational issues, as well<br />
as safety and security. Moreover, NICE Situator was<br />
selected to help secure some <strong>of</strong> the world’s most highpr<strong>of</strong>ile<br />
cities and events in <strong>2014</strong>, including the World<br />
Cup hosted in Brazil, the Winter Olympics in Sochi and<br />
Super Bowl XLVIII in East Rutherford, NJ.<br />
Why it’s the best PSIM solution<br />
New, Innovative Applications:<br />
We’ve extended NICE Situator’s capabilities out and into<br />
the field with a web-based GIS mobile application. First<br />
deployed by the Los Angeles International Airport (LAX),<br />
the NICE Situator Enterprise Geographical Information<br />
System (EGIS) Web application, enables field personnel<br />
to view all open incidents in Situator and log new incidents<br />
from a tablet. This creates a shared environment<br />
for managing incidents, enhanced team collaboration<br />
and increased situational awareness.<br />
NJ TRANSIT, the largest statewide public transportation<br />
system in the U.S. has also deployed a Mobile App. NJ<br />
TRANSIT used the solution for the first time during Super<br />
Bowl XLVII to streamline communications between<br />
the command center and 900 NJ TRANSIT Super Bowl<br />
ambassadors on the ground. In addition to reporting<br />
incidents, field personnel were able to use the App to<br />
62
look up schedules and other information to assist passengers.<br />
Following the successful Super Bowl rollout,<br />
NJ TRANSIT plans to deploy the solution in conjunction<br />
with other future large events and extend the Mobile<br />
App to its maintenance, customer service and transit<br />
police personnel.<br />
Successful Global Deployments:<br />
NICE Situator continues to improve operations and provide<br />
situational awareness, management and resolution<br />
capabilities to organizations across industries and urban<br />
centers around the world. Glasgow, Scotland is using<br />
NICE Situator to consolidate data from various city-wide<br />
services like Public Space CCTV and traffic control<br />
within a single operations center. In Sochi, Russia, NICE<br />
Situator was used to help secure the recent Winter<br />
Olympics in addition to heightening overall security and<br />
safety in the city known as a destination for winter sport<br />
enthusiasts. A large city in Brazil also deployed Situator,<br />
which was used to secure some <strong>of</strong> the World Cup games<br />
this summer – the largest sporting event in the world.<br />
Market Leadership Industry Recognition:<br />
For the third consecutive time, IHS (formerly IMS<br />
Research) has ranked NICE the global leader in PSIM<br />
solutions (Situator) and has named NICE the leading<br />
PSIM vendor worldwide. In addition, Frost & Sullivan<br />
has defined Situator as one <strong>of</strong> the few Tier 1 PSIM<br />
solutions available.<br />
63<br />
Comprehensive investigations:<br />
Through its integration with NICE Inform, NICE Situator<br />
provides the industry’s most comprehensive debriefing<br />
and investigation solution. The integrated reconstruction<br />
platform is the first such solution capable <strong>of</strong> capturing<br />
and synchronizing replay <strong>of</strong> multi-media sources including<br />
video, audio, GIS-based displays and key operational<br />
data. Step-by-step operator actions and 360-degree incident<br />
reconstructions can now be incorporated into the<br />
debriefing process for investigations, training, planning<br />
and prevention.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.nice.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
web page: http://www.nice.com/situation-management/nice-situator<br />
PSIM market leader: http://www.nice.com/niceranked-market-share-leader-global-psim-market<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Linda Haelsen, Marketing Communications Manager<br />
NICE Systems<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(203) 481-4168<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
linda.haelsen@nice.com
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
Hikvision –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Network IP Cameras<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
3MP 360 Fisheye Camera<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The first <strong>of</strong> its kind to <strong>of</strong>fer a true 30 FPS fisheye view range processing. The inclusion <strong>of</strong> bi-directional audio,<br />
in full resolution, Hikvision’s 3MP 360 Fisheye stands alarm I/O, and in-camera recording with a 64 GB SD<br />
out from its competitors. With five channels <strong>of</strong> video, it card allow the Hikvision Fisheye to become a virtually<br />
single-handedly captures high-quality images from every standalone system. Combined with the special features<br />
corner <strong>of</strong> a particular location, eliminates blind spots, <strong>of</strong> Hikvision’s Smart Series, such as line crossing and<br />
and dewarps the image to allow for multiple viewing intrusion detection, the Fisheye camera is an excellent<br />
modes: a panoramic (180 degree) view, a 360 degree choice for detailed coverage <strong>of</strong> wide, open areas. Airports,<br />
conference rooms, parking lots, building fore-<br />
view, and three virtual PTZ views. The Fisheye does<br />
more on its own than multiple cameras trying to do the courts, storage yards, loading bays, and classrooms are<br />
same thing. The camera’s 1/3” progressive scan CMOS perfect venues for the expansive coverage provided by<br />
sensor provides high resolution images <strong>of</strong> up to 2048 x the Fisheye. In addition, the unique attributes <strong>of</strong> this<br />
1536. Integrated IR allows for even disbursement over camera means that it lends itself to particularly creative<br />
the entire image, eliminating hot spots. In fact, the IR uses. One example involves an educational facility in<br />
functionality boasts up to 50 feet <strong>of</strong> visibility in low- or New Mexico, comprised <strong>of</strong> a middle school and a high<br />
zero-light conditions. Hikvision’s award-winning WDR school, which installed a Fisheye in their gymnasium.<br />
algorithms provide industry-leading 120dB <strong>of</strong> dynamic The Fisheye camera’s panoramic view covers the entire<br />
64
gym, and each <strong>of</strong> the digital PTZs are assigned to different<br />
school administrators. The digital PTZ system lets<br />
users use the camera like a conventional dome camera<br />
without any moving parts, improving reliability. Because<br />
there are different groups <strong>of</strong> students using the gym<br />
throughout the day, the principal <strong>of</strong> the high school has<br />
access to his own PTZ, as do the vice principal <strong>of</strong> the<br />
high school and the principal <strong>of</strong> the middle school. Each<br />
user can manipulate their PTZ remotely and autonomously<br />
without stepping on each other’s toes, while<br />
also viewing the 180 to see the big picture. With over<br />
3000 Hikvision engineers devoted to R&D, it’s no wonder<br />
that cutting-edge cameras such as the Hikvision 360<br />
Fisheye change the landscape <strong>of</strong> modern video surveillance.<br />
Hikvision’s commitment to innovation allows its<br />
customers to maximize surveillance with the Fisheye’s<br />
user-friendly features or incorporate the Fisheye into<br />
unique, unconventional, surveillance solutions.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.hikvision.com/en/us<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Fisheye spec sheet: http://www.hikvision.com/en/<br />
us/products_show.asp?id=9810<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Anna Boudinot, Content Manager<br />
Hikvision USA<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (909) 612-9034<br />
cell: (323) 470-7772<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
anna.boudinot@hikvisionusa.com<br />
65
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />
HID Global –<br />
<strong>2014</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Physical <strong>Security</strong> Access Control & Identification<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
pivCLASS 4.3<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Fully tested by the U.S. General Services Administration<br />
for compliance with FICAM, Federal Identity Credential<br />
and Access Management programs, pivCLASS ® 4.3 is the<br />
first GSA FICAM Certified Validation System available in<br />
the security market today. The extensive Government<br />
portfolio <strong>of</strong> credential authentication solutions enables<br />
customers to comply with government physical access<br />
control system (PACS) mandates, outlined in HSPD-12<br />
and FIPS 201, to PIV-enable a PACS. By providing an<br />
end-to-end solution that eliminates the need to rip and<br />
replace the existing access control infrastructures, the<br />
portfolio’s extensive range <strong>of</strong> Personal Identity Verification<br />
(PIV) solutions allow agencies to use PIV-enabled<br />
cards for strong PKI-based validation for physical access.<br />
With its addition <strong>of</strong> the pivCLASS MultiPACS s<strong>of</strong>tware to<br />
the pivCLASS portfolio it is significantly easier for large<br />
government agencies and organizations to provision<br />
identities across many different, unconnected access<br />
control systems located throughout geographically dis-<br />
persed operations. The s<strong>of</strong>tware is designed to streamline<br />
and simplify the process <strong>of</strong> registering Personal<br />
Identity Verification (PIV) credentials into multiple,<br />
disparate physical access control systems (PACS). A key<br />
element <strong>of</strong> HID Global’s expanded pivCLASS portfolio<br />
<strong>of</strong> FIPS 201-based credential registration and verification<br />
solutions, MultiPACS was created for government<br />
agencies that commonly operate in numerous buildings<br />
in several geographic areas, using many different PACS<br />
supplied by multiple vendors No other vendor currently<br />
<strong>of</strong>fers a complete portfolio that provides authentication<br />
at both the enrollment function and at the point <strong>of</strong><br />
access (e.g., door), registration <strong>of</strong> validated credentials<br />
into over 30 different PACS head-end products, and a<br />
variety <strong>of</strong> interoperable readers and reader form factors<br />
including mobile handhelds. Other vendors generally<br />
provide either the readers or s<strong>of</strong>tware for the PACS<br />
head-end enrollment function. HID is the only vendor<br />
that <strong>of</strong>fers this complete FIPS 201 solution from a single<br />
66
source. With the pivCLASS portfolio, customers can use<br />
a phased deployment approach designed to meet their<br />
immediate needs while staying within their budget. For<br />
example, an agency may want to initially enable their facility<br />
to accept PIV cards without moving immediately to<br />
strong authentication at each door. This can be achieved<br />
by deploying the pivCLASS Registration Engine, the<br />
pivCLASS Certificate Manager and pivCLASS Readers<br />
configured in Wiegand output mode. This will enable<br />
PIV cardholders to be registered into the PACS head-end<br />
and to use their cards to gain access. At some later time,<br />
strong authentication can be achieved by deploying the<br />
pivCLASS Reader Services s<strong>of</strong>tware at the PACS head-end<br />
and the pivCLASS Authentication Modules (PAMs) for<br />
the desired access points along with easily reconfiguring<br />
the existing installed pivCLASS readers. pivCLASS<br />
also supports the transition from legacy cards such as<br />
magnetic stripe, proximity and iCLASS, by allowing<br />
simultaneous use <strong>of</strong> these cards along with PIV cards.<br />
This is achieved by adding the PIV card as an additional<br />
credential to an existing PACS cardholder record. At the<br />
appropriate time, the system can be reconfigured to<br />
only accept PIV cards, seamlessly completing the transition.<br />
The pivCLASS best <strong>of</strong> breed federal identity solution<br />
also enables users to:<br />
• Register identification credentials into multiple similar<br />
or disparate PACS<br />
• Register credential and verify FIPS 201-based credentials<br />
• Harvest, validate and register credentials into over 30<br />
different PACS head end products<br />
• Provides strong one-, two- or three-factor authentication<br />
at the door<br />
• Verify cardholders identities and check the cards’<br />
revocation status<br />
• Revalidate the harvested certificates after registration<br />
and suspend the card in the PACS if the certificate is<br />
found to have been revoked<br />
• Via a PAM, cache validation status to deliver PKI-based<br />
high security at the door<br />
• Support both FIPS-201 PKI-based cards and legacy<br />
cards ( PIV, PIV-I, CIV, CAC, TWIC, iCLASS, HID Prox<br />
and others)<br />
67<br />
• Import credentials from an authoritative data source,<br />
card management system or human resource database<br />
and provision these credentials into the PACS<br />
pivCLASS meets FIPS 140 U.S. government computer<br />
security standards that specify requirements for cryptography<br />
modules.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.hidglobal.com/government/piv<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
HID Global’s pivCLASS Government Solutions portfolio<br />
is an extensive product family that makes it easy<br />
for U.S. Federal Government, government contractors<br />
and other facilities to comply with security regulations<br />
and to use their Personal Identity Verification (PIV)<br />
card and other smart cards for physical access control,<br />
resulting in compliance, interoperability and high<br />
security.<br />
New pivCLASS credentials: http://www.hidglobal.<br />
com/products/cards-and-credentials/pivclass/<br />
pivclass-smart-card<br />
New MultiPACS: http://www.hidglobal.com/products/s<strong>of</strong>tware/pivclass/pivclass-multipacs<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
HID Global<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Leah Washington: (917) 701-7601<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
lwashington@hidglobal.com
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
government agency awards<br />
69<br />
70<br />
Roster <strong>of</strong> <strong>2014</strong> Winners<br />
GSN Interview with Distinguished Judge <strong>of</strong> <strong>2014</strong> <strong>Awards</strong>,<br />
K. Denise Rucker Krepp<br />
74<br />
76<br />
78<br />
80<br />
82<br />
84<br />
86<br />
88<br />
90<br />
92<br />
94<br />
96<br />
98<br />
100<br />
Winning entries reproduced with permission <strong>of</strong>:<br />
Los Angeles International Airport (LAX)<br />
NAFTOPORT LTD<br />
Port Freeport<br />
NJ Transit<br />
Denver Regional Transportation District<br />
U.S. Army Garrison (USAG)<br />
Northern Command/Norad<br />
South Bend, Indiana Police Department<br />
City <strong>of</strong> Philadelphia, PA<br />
Community Safety Glasgow, Scotland<br />
New York State Criminal Justice (DCTS)<br />
Center for <strong>Homeland</strong> Defense and <strong>Security</strong><br />
U.S. Customs and Border Protection<br />
Government <strong>Security</strong> News<br />
68
Winners in the <strong>2014</strong><br />
<strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />
government agency awards<br />
Most Notable Airport/Aviation<br />
<strong>Security</strong> Program<br />
Los Angeles International Airport – Platinum Winner<br />
Most Notable Maritime/Seaport<br />
<strong>Security</strong> Program<br />
Port <strong>of</strong> Charleston – Platinum Winner<br />
Naftoport Ltd, Gdańsk, Poland – Gold Winner<br />
Port Freeport – Silver Winner<br />
Most Notable Railroad/Mass Transit<br />
<strong>Security</strong> Program<br />
NJ Transit – Gold Winner<br />
Denver Regional Transportation District – Silver Winner<br />
Most Notable Emergency Response<br />
Implementation – Federal, State or Local<br />
Northern Command/NORAD – Platinum Winner<br />
375th <strong>Security</strong> Forces Squadron – Gold Winner<br />
Most Notable<br />
Municipal/County <strong>Security</strong> Program<br />
South Bend, Indiana Police Department – Platinum Winner<br />
City <strong>of</strong> Philadelphia, PA – Gold Winner<br />
Community Safety Glasgow, Scotland – Gold Winner<br />
Orange County, CA Court System – Silver Winner<br />
Most Notable State Government<br />
<strong>Security</strong> Program<br />
New York State Criminal Justice (DCTS) – Gold Winner<br />
Most Notable<br />
Critical Infrastructure Program<br />
U.S. Army Garrison – Silver Winner<br />
Most Notable Federal Government<br />
<strong>Security</strong> Program<br />
Center for <strong>Homeland</strong> Defense and <strong>Security</strong> – Platinum Winner<br />
Pentagon Force Protection Agency – Platinum Winner<br />
U.S. Customs and Border Protection – Platinum Winner<br />
69
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
GSN INTERVIEW<br />
K. Denise Rucker Krepp, Distinguished Judge,<br />
GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />
Denise Krepp is a homeland security and transportation consultant who began her<br />
career as an active duty Coast Guard <strong>of</strong>ficer. After September 11, 2001, Denise was a<br />
member <strong>of</strong> the team that created the Transportation <strong>Security</strong> Administration and the<br />
U.S. Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>. Denise then worked for the House <strong>of</strong> Representatives’<br />
<strong>Homeland</strong> <strong>Security</strong> Committee and advised members on homeland defense,<br />
maritime security, and critical infrastructure issues. She also served as Maritime<br />
Administration Chief Counsel during the first Obama administration. In addition to<br />
consulting, Denise is currently a pr<strong>of</strong>essor at Pennsylvania State University; serves on the Board <strong>of</strong> Directors<br />
for The Infrastructure <strong>Security</strong> Partnership; is a commentator on Backroom Politics, a weekly radio show;<br />
and an Advisory Neighborhood Commissioner, a local elected position in Washington, DC.<br />
GSN: What should the Department <strong>of</strong><br />
<strong>Homeland</strong> <strong>Security</strong> focus on in the next<br />
ten years?<br />
KDRK: DHS should redefine its definition <strong>of</strong> transportation<br />
“stakeholder” and increase stakeholder involvement<br />
in the development <strong>of</strong> security plans and training exercises.<br />
Currently, stakeholders are defined as owners and<br />
operators. For example, freight and passenger rail stakeholders<br />
in Washington, DC are limited to Amtrak, CSX,<br />
Norfolk Southern, Washington Metropolitan Transit Authority<br />
(WMATA), DC <strong>Homeland</strong> <strong>Security</strong> and Emergency<br />
Management Agency, DC Department <strong>of</strong> Transportation,<br />
etc. Individuals who live and work next to the highways<br />
and rail lines that cut through the city are not included.<br />
Excluding local individuals from the definition<br />
<strong>of</strong> stakeholder means that they are not involved in the<br />
development <strong>of</strong> federal policies. When the federal government<br />
develops new regulations and initiatives, it seeks<br />
input from the government coordinating councils (GCCs)<br />
and sector coordinating councils (SCCs). The GCCs are<br />
comprised <strong>of</strong> federal and state agencies. The SCCs are<br />
comprised <strong>of</strong> owners and operators. There is no one at<br />
the table representing the individuals that live and work<br />
along transportation routes.<br />
Local neighbor representation is critical because<br />
these individuals are the ones that will be immediately<br />
impacted when an accident occurred. In 2013, forty-seven<br />
people died when a train derailed in Lac-Megantic, Cana-<br />
70
da. A similar accident could occur in the United States but<br />
neighbors along freight rail routes aren’t being formally<br />
consulted about ways to improve rail safety and security.<br />
The lack <strong>of</strong> stakeholder involvement in rail security<br />
plans was highlighted in a Council <strong>of</strong> the District <strong>of</strong><br />
Columbia hearing last year. According to the Washington<br />
Post, neighbors testified that they weren’t notified about<br />
the hazardous materials that are being routinely transported<br />
through the community. Local DC <strong>of</strong>ficials stated that<br />
they couldn’t share the data because it is sensitive information.<br />
At the same time, DC <strong>of</strong>ficials testified that they<br />
hadn’t conducted rail emergency exercises in several<br />
years. In addition, local <strong>of</strong>ficials also testified that they<br />
needed to update rail vulnerability assessments. The<br />
problem with these answers is that the Implementing Recommendations<br />
<strong>of</strong> the 9/11 Commission Act requires rail<br />
carriers to submit rail security plans to DHS for review and<br />
DHS is supposed to consult local <strong>of</strong>ficials when reviewing<br />
these plans. If local authorities don’t have an up-to-date<br />
list <strong>of</strong> vulnerabilities, how is DHS supposed to know if the<br />
security plans are adequate?<br />
Broadening the definition <strong>of</strong> transportation stakeholder<br />
to include local individuals who live and work next<br />
to transportation lines will ensure that local agencies are<br />
providing quality input. Neighbors know the area, they<br />
will be on-scene when the accident occurs, and including<br />
them in the planning stages will help post-incident<br />
recovery. Additionally, neighborhood involvement will put<br />
pressure on local agencies to maintain accurate risk assessment<br />
information.<br />
Please note that the situation in Washington, DC<br />
is not an anomaly. Neighbors around the country are<br />
expressing similar concerns and DHS should take the opportunity<br />
to change its processes.<br />
As an elected local <strong>of</strong>ficial, what guidance<br />
can you give to your fellow <strong>of</strong>ficials about<br />
working with the Department <strong>of</strong> <strong>Homeland</strong><br />
<strong>Security</strong>?<br />
KDRK: Local <strong>of</strong>ficials have jurisdiction over local agencies<br />
so its important to know what is happening at the<br />
local level before contacting DHS. In DC, there are significant<br />
problems within the DC <strong>Homeland</strong> <strong>Security</strong> and<br />
Emergency Management Agency and the DC Department<br />
<strong>of</strong> Transportation. The rail hearings last year highlighted<br />
appalling dis-functionality and as a result, Councilmembers<br />
Cheh, Allen, and Grosso introduced legislation last<br />
week that will significantly strengthen rail security in the<br />
city.<br />
One important aspect <strong>of</strong> the proposed DC legislation<br />
is increased local oversight over the federal rail security<br />
plans. The legislation requires local agencies to review<br />
them. This requirement is already in the 9/11 Act but by<br />
introducing legislation, local elected <strong>of</strong>ficials are sending<br />
a strong signal to local agencies that they must comply<br />
this requirement. The requirement to submit semi-annual<br />
reports to the DC Council also reinforces this message.<br />
When the DC Council receives the semi-annual reports,<br />
they should work with political appointees in DHS<br />
to address local concerns. From personal past experience,<br />
relying on local agencies and career federal <strong>of</strong>ficials to<br />
solve problems won’t work. Local elected <strong>of</strong>ficials have the<br />
71
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
GSN INTERVIEW<br />
K. Denise Rucker Krepp, Distinguished Judge,GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />
positional authority to overcome bureaucratic stumbling<br />
blocks and they should use it to best address the needs <strong>of</strong><br />
their constituencies.<br />
What keeps you up at night?<br />
KDRK: Mass transit security in Washington, DC. Eight<br />
years ago, the 9/11 Act mandated mass transit security<br />
plans. These requirements were put in place after the<br />
horrific London and Madrid bombings. I’m concerned that<br />
the Washington, DC plan isn’t sufficient.<br />
On January 12th, one individual died and seventy<br />
more were sent to hospitals when smoke filled a WMATA<br />
subway tunnel. It took almost 45 minutes for firefighters<br />
to begin evacuating stranded passengers. During these<br />
crucial minutes, riders had to depend on one another to<br />
survive. If properly drafted and implemented, the 9/11 Act<br />
mass transit security plan should have prevented this type<br />
<strong>of</strong> delay.<br />
I have personal knowledge about the vulnerabilities<br />
that continue to exist for handicapped passengers.<br />
Last spring, my nine year old daughter and I were forced<br />
to evacuate a WMATA subway train. We were in the last car<br />
and as such, we had to walk through all <strong>of</strong> the cars to get<br />
out. One <strong>of</strong> the individuals in the car with us was in a motorized<br />
wheel chair. The wheel chair could fit through the<br />
regular door openings but it couldn’t fit through the doors<br />
between the rail cars. This design flaw meant that someone<br />
would have to carry the handicapped gentleman out<br />
<strong>of</strong> the train. None <strong>of</strong> my fellow passengers did. Instead, he<br />
was forced to stay behind while my daughter and I went in<br />
search <strong>of</strong> a WMATA representative to help him. There was<br />
no fire that day but what would have happened if there<br />
had been one. Based on what happened on the January<br />
12th, I’m not confident he would have survived.<br />
72
GSN Announces the 2015<br />
Airport/Seaport/Boarder <strong>Security</strong> <strong>Awards</strong> Program<br />
GSN’s second annual awards program recognizing excellence in Airport/Aviation <strong>Security</strong>,<br />
Maritime/Port <strong>Security</strong> and Border <strong>Security</strong> will open for entries on Monday, March 2, 2015.<br />
The updated 2015 edition <strong>of</strong> this exciting program will once again cover basic technology<br />
groups, including Access Control/Identification, Detection Solutions, Air/Land and Sea<br />
Communications and Surveillance, Integrated <strong>Security</strong> Programs and Aviation/Maritime<br />
and Border <strong>Security</strong> Human Resource Development.<br />
In addition to the staples <strong>of</strong> Cargo Screening, Thermal Nightvision, Integrated Harbor<br />
<strong>Security</strong> and Perimeter Protection, you can expect many new categories in Satellite<br />
Communications, Aviation and Military Beacons and Air Traffic Control – plus new categories<br />
recommended by knowledgable vendors or outstanding operators or security teams.<br />
The last group <strong>of</strong> entries will once again be dedicated to the following three categories:<br />
* Most Notable Airport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />
* Most Notable Seaport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Upgrade<br />
* Most Notable Border <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />
AIRPORT | SEAPORT | BORDER<br />
SECURITY<br />
AWARDS PROGRAM<br />
43 73
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
Los Angeles International Airport<br />
(LAX) – <strong>2014</strong> Platinum Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Airport/Aviation <strong>Security</strong> Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
LAX Enterprise Geographical Information System<br />
(EGIS) Web application<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Los Angeles International Airport (LAX) is one <strong>of</strong> the<br />
busiest airports in the world. As such, it has invested<br />
heavily in technology, deploying new solutions to<br />
strengthen its safety, security, and operations. Keeping<br />
things running smoothly hinges on real-time collaboration<br />
and coordination, so LAX sought a faster and more<br />
efficient method for various stakeholders within the<br />
Airport Response Coordination Center (ARCC) and field<br />
operations to share information.<br />
LAX recently deployed an innovative new situational<br />
awareness tool that does exactly that. The airport has<br />
implemented the NICE Situator Enterprise Geographical<br />
Information System (EGIS), a web application that<br />
extends situation management capabilities from the<br />
control room to the field. The solution, jointly devel-<br />
oped by NICE and AECOM, provides real-time information<br />
about all aspects <strong>of</strong> the airport to airport operations<br />
field staff, the ARCC, and other airport <strong>of</strong>ficials, creating<br />
a shared environment for managing incidents as well as<br />
promoting collaboration and coordination. The system<br />
handles security, safety, and operations, including everything<br />
from emergency response to ensuring compliance<br />
with federal regulations.<br />
The Web application uses the sophisticated geospatial<br />
and mapping capabilities <strong>of</strong> Esri’s ArcGIS Server to<br />
provide customized, layered views <strong>of</strong> airport buildings,<br />
property and infrastructure. All relevant incident stakeholders<br />
can visualize the same incident on a map and<br />
74
engage in interactive dialogue via the comments log,<br />
enabling better communicate as events unfold. They can<br />
also share response plans, even an evacuation route, by<br />
drawing on the map, annotating it, and saving it to the<br />
system.<br />
Field personnel can also immediately pull up assets in<br />
an impact zone – for instance, a video camera within<br />
100 feet <strong>of</strong> the incident – or use the application’s robust<br />
search engine to search for nearby geospatial assets,<br />
like the exits closest to an incident location. They can<br />
also create new incidents, manage ongoing ones and<br />
complete specific tasks assigned to them, which reduces<br />
reliance on radio communications and enhances compliance.<br />
The Web application is also helping field operators more<br />
efficiently manage day-to-day tasks, such as Federal Aviation<br />
Administration-mandated Part 139 airfield inspections.<br />
Under Federal Aviation Regulations Part 139, United<br />
States commercial service airports are required to<br />
conduct various assessments <strong>of</strong> each runway; examine<br />
pavement markings, lighting, signs and safety areas; and<br />
oversee ground vehicle operations. If an issue arises,<br />
field operators can easily create a new incident on their<br />
mobile devices, which is resolved through Situator’s<br />
workflows and recorded for compliance purposes.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.lawa.org/welcomelax.aspx<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.nice.com/lax-extends-incident-management-field-operations-nice-situator-webapplication<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
News story: http://mobileenterprise.edgl.com/<br />
news/LAX-Ups-Situational-Awareness,-Mobilizing-Operations97734<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Linda Haelsen, Marketing Communications Manager<br />
NICE Systems<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(203) 481-4168<br />
“The NICE-AECOM solution is allowing us to transform<br />
the way we manage safety, security, and operations at<br />
LAX,” said Dominic Nessi, Deputy Executive Director/<br />
Chief Information Officer at Los Angeles World Airports.<br />
Based on our ongoing success with NICE Situator, we<br />
sought a way to apply these capabilities to our field<br />
operations. Now, not only are we able to maximize the<br />
use <strong>of</strong> our existing PSIM, situation management and GIS<br />
technologies, we are strengthening our entire security<br />
and operations apparatus.”<br />
75<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
linda.haelsen@nice.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
461 From Road<br />
Paramus NJ 07652<br />
USA
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
Naftoport Ltd, Gdańsk, Poland –<br />
<strong>2014</strong> Gold Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Maritime/Seaport <strong>Security</strong> Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Naftoport Port <strong>Security</strong> Initiative<br />
Reason this entry deserves to win:<br />
–––––––––––––––––––––––––––––––––––––––– and sensors for detection and physical security. This<br />
Naftoport is the only crude oil and liquid fuels terminal<br />
in Poland. It performs transhipments <strong>of</strong> crude oil and<br />
refined oil products in the Port <strong>of</strong> Gdańsk. The company<br />
is a critical part <strong>of</strong> the petroleum supply chain for Polish<br />
and German refineries and crude oil transit from Russia<br />
and Kazakhstan to the ports <strong>of</strong> Western Europe, the<br />
United States and the Far East.<br />
Due to Naftoport’s close proximity to Poland’s border<br />
and the nature <strong>of</strong> its activities, the port has heightened<br />
security needs that include the threat <strong>of</strong> terrorist and<br />
activist attacks as well as unauthorized entry into the<br />
Naftoport facility.<br />
As a result <strong>of</strong> expansion over the years Naftoport had a<br />
large number <strong>of</strong> non-integrated legacy security systems<br />
caused problems with the speed <strong>of</strong> reaction with each<br />
operator having to act manually to play back incidents<br />
in order to find out what took place.<br />
The primary purpose <strong>of</strong> this project was to integrate<br />
these siloed security systems and sensors, so that security<br />
<strong>of</strong>ficers could more effectively track and analyze<br />
information and respond to threats in real time. Naftoport<br />
also wanted to empower security operators with<br />
the ability to respond to events consistently, regardless<br />
<strong>of</strong> their experience or capabilities.<br />
The port has successfully deployed NICE Situator PSIM<br />
and NiceVision VMS with intrusion detection video analytics<br />
to protect its critical resources. “Our new video<br />
analytics greatly increases facility security. We’ve achieved<br />
our goal <strong>of</strong> being able to reliably detect intruders inside<br />
76
the perimeter,” said Cezary Jozwiak, Chief <strong>Security</strong><br />
Officer – Port Facilities <strong>Security</strong> Officer, Naftoport.<br />
integrates all <strong>of</strong> our security systems and processes,” he<br />
continued. “It has made us much more efficient.”<br />
NICE’s advanced situation management solution, NICE<br />
Situator, <strong>of</strong>fers a single, centralized interface and automated,<br />
adaptive workflows that are helping port authorities<br />
respond quicker and more efficiently to unfolding<br />
incidents.<br />
Working together, NICE and system integrator ISM EuroCenter<br />
S.A. leveraged PSIM to integrate nine security<br />
systems for enhanced situational awareness. These<br />
included: NiceVision intrusion detection analytics, surveillance<br />
cameras, radar, intruder and hold up alarms,<br />
passive infrared, ACS, GPS and automatic identification<br />
systems. Even sonar is being fed into Situator to detect<br />
intrusions from underwater. “Through our NICE Situator<br />
PSIM solution, we were able to successfully integrate<br />
nine security subsystems working in parallel, with mutual<br />
correlation and dedicated procedures,” explained<br />
Jozwiak.<br />
The NICE solutions are also being used by Naftoport<br />
to optimize day-to-day security operations, minimize<br />
downtime and ensure operations continuity. Roughly 40<br />
procedures have been automated through Situator.<br />
“Integrating our disparate security systems within NICE<br />
Situator has made our security team more efficient,<br />
effective, and agile by automating response processes<br />
and administration,” said Jozwiak. “It gives them a single<br />
operating platform through which they can proactively<br />
monitor, manage, and maintain the safety and security<br />
<strong>of</strong> the port, reduce risks and improve incident management.”<br />
“It has simplified our operations because our security<br />
operator is now able to interact with one interface that<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.naftoport.pl/en/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Press release: http://www.nice.com/naftoportprotects-global-petroleum-supply-chain-nicesecurity-solutions<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Naftoport video: https://www.youtube.com/<br />
watch?v=lkyQoodVYiY<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Linda Haelsen, Marketing Communications Manager<br />
NICE Systems<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(203) 481-4168<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
linda.haelsen@nice.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
461 From Road<br />
Paramus NJ 07652<br />
USA<br />
77
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
Port Freeport –<br />
<strong>2014</strong> Silver Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Maritime/Seaport <strong>Security</strong> Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Smart Safety & <strong>Security</strong> Alerts - Port Freeport<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Give staff the power to hit a duress button on their personal<br />
smart phone or tablet in case <strong>of</strong> emergency. This<br />
allows for emergency personnel to immediately find<br />
your location via GPS tracking and share your emergency<br />
event with other management personnel. The<br />
personnel at Freeport have referred to this as the “get<br />
me out <strong>of</strong> here” button where help is just one touch<br />
away – highlighting the importance <strong>of</strong> safeguarding all<br />
employees both remote and on-site. Push notifications<br />
on the smart application allow for reliable and speedy<br />
delivery times. No data-plan necessary.<br />
Specifically, Port Freeport utilizes:<br />
• Mobile Duress Buttons & Field Reporting, with GPS,<br />
for 50 Key Staff Members.<br />
• Push Notifications, SMS text, Email, & Phone calls<br />
for 100 Users.<br />
• Field reporting <strong>of</strong> incidents from smart apps<br />
• Accountability <strong>of</strong> staff by location and status.<br />
• Web-based & Smart App-based alert publishing for 6<br />
Operators.<br />
• 1-888-GO-ATHOC 24/7 support<br />
• Fully hosted service<br />
78
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.portfreeport.com/about.htm<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Fully integrated crisis communication capabilities for<br />
public safety –<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.pdfio.net/k-46504532.html<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (801) 373-7888<br />
cell: (801) 361-4610<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
sherriw@connectmarketing.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
881 West State Street, #140-102<br />
Pleasant Grove, UT 84062<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Sherri Walkenhorst, Senior Partner<br />
Connect Marketing<br />
79
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
NJ TRANSIT –<br />
<strong>2014</strong> Gold Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Railroad/Mass Transit <strong>Security</strong> Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
NJ TRANSIT Integrated Mobile App<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Video surveillance cameras can’t be everywhere, but<br />
people can. By extending an Integrated Mobile App to<br />
its field personnel for daily use and to transit ambassadors<br />
for large events, NJ TRANSIT is deploying innovative<br />
technology to ensure the highest levels <strong>of</strong> security,<br />
safety, operational efficiency and customer service for<br />
its passengers. It’s a model in mobile technology innovation<br />
that other transit agencies will surely want to<br />
emulate.<br />
NJ TRANSIT is the nation’s largest statewide public<br />
transportation system providing more than 915,900<br />
weekday trips on 262 bus routes, three light rail lines,<br />
12 commuter rail lines and through Access Link paratransit<br />
service. It is the third largest transit system in the<br />
country with 165 rail stations, 62 light rail stations and<br />
more than 19,000 bus stops linking major points in New<br />
Jersey, New York and Philadelphia.<br />
The Mobile App solution, created for NJ TRANSIT by<br />
NICE Systems and CloudScann, turns smartphones into<br />
reporting tools to document incidents as they happen,<br />
allowing <strong>of</strong>ficials to act faster to resolve them.<br />
The solution combines NICE’s situation management<br />
solution, Situator, with CloudScann’s hosted See It Send<br />
It Mobile App. By using the app on their smartphones,<br />
field personnel can report incidents, including sending<br />
video and photos, to a centralized command center<br />
through NICE Situator. Communication is bi-directional,<br />
so Situator can also push incident alerts, task lists, and<br />
links to live video feeds to the Mobile App. This will<br />
extend the real-time awareness <strong>of</strong> safety, security, and<br />
operational issues for the largest statewide public transportation<br />
system in the U.S.<br />
Situator pinpoints the GPS location <strong>of</strong> the sender’s<br />
80
phone or TETRA radio as the incident location, and<br />
can then pull up video feeds from nearby surveillance<br />
cameras. The command center operator immediately<br />
sees who’s sending the alert, where it originated, what’s<br />
happening, and what actions to take. The App is also<br />
equipped with a panic button.<br />
NJ TRANSIT used the solution for the first time during<br />
Super Bowl XLVII to streamline communications<br />
between the command center and NJ TRANSIT ambassadors.<br />
In addition to reporting incidents, ambassadors<br />
were able to use the App to look up<br />
schedules and other information to assist<br />
passengers. Following the successful<br />
Super Bowl rollout, NJ TRANSIT plans<br />
to deploy the solution during other<br />
major events.<br />
NJ TRANSIT will also extend the Ambassador Mobile<br />
App to its maintenance, customer service and transit<br />
police personnel. For example, maintenance staff will<br />
be able to view assigned work orders, their location,<br />
and related video, and report back to the control room<br />
when resolution is complete.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.njtransit.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.nice.com/situation-management/<br />
nice-situator http://www.cloudscann.com/<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Refers to NJ TRANSIT Ambassador Program:<br />
http://njtransit.com/AR/files/assets/basic-html/<br />
page7.html<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Linda Haelsen, Marketing Communications Manager<br />
NICE Systems<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(203) 481-4168<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
linda.haelsen@nice.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
461 From Road<br />
Paramus NJ 07652<br />
USA<br />
81
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
Denver Regional Transportation<br />
District – <strong>2014</strong> Silver Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Railroad/Mass Transit <strong>Security</strong> Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Denver RTD Mobile Video Surveillance Initiative<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The Denver Regional Transportation District (RTD)<br />
operates almost 1,100 buses, traveling over 100,000<br />
miles and serving an average <strong>of</strong> 330,000 passengers each<br />
day. To help keep passengers and operators safe, RTD<br />
Transit Police rely on mobile video cameras installed<br />
on RTD’s bus fleet. Video is a vital tool for investigating<br />
crime, claims, ADA complaints and other incidents that<br />
occur in transit.<br />
Unfortunately, RTD’s older analog video system had a<br />
30% failure rate. Even when the cameras were working,<br />
poor quality video sometimes made it difficult to reliably<br />
identify people or understand what really happened.<br />
The cameras also recorded to an analog digital video<br />
recorder (DVR) on the bus. This meant that every time<br />
video was needed for an investigation, a technician<br />
would need to drive to the assigned bus division and<br />
pull the hard drive to physically retrieve video.<br />
Given that RTD does thousands <strong>of</strong> investigations annually,<br />
this was a significant problem. Working with partners<br />
NICE Systems and Panasonic, RTD came up with an<br />
innovative solution. The result was a high-quality digital<br />
video system that enabled RTD to download video wirelessly<br />
<strong>of</strong>f a bus, so investigators could access it without<br />
leaving their desks. The first<br />
<strong>of</strong> a kind mobile video surveillance<br />
solution uses NiceVision<br />
s<strong>of</strong>tware. The NICE s<strong>of</strong>tware<br />
runs on hardware from Panasonic<br />
Corporation and includes<br />
specialty cameras and<br />
a mobile recording platform<br />
specially designed to withstand<br />
vibration and weather<br />
extremes.<br />
RTD has already retr<strong>of</strong>itted<br />
250 new buses, and over the<br />
course <strong>of</strong> the next three years,<br />
plans to retr<strong>of</strong>it about 800<br />
82
more buses with the innovative mobile video solution.<br />
What makes the solution unique is that it automatically<br />
downloads video via Wi-Fi whenever a bus pulls into a<br />
depot, passenger concourse, or RTD facility.<br />
The new system also gives RTD Transit Police investigators<br />
high definition video, which was not available before.<br />
RTD redesigned the camera layouts, and the new system<br />
can support up to nine cameras.<br />
But the biggest benefit, given the thousands <strong>of</strong> investigations<br />
RTD does annually, is the ability to access the video<br />
remotely through the NICE Inform solution. Instead<br />
<strong>of</strong> going to the depot to manually remove hard drives,<br />
investigators can just type in the bus number, date, and<br />
time range into Inform. When the bus pulls into the<br />
depot and connects with Wi-Fi, the video download<br />
process automatically starts. The mobile video recordings<br />
can also be combined with radio recordings, and<br />
fixed surveillance video to create a complete incident<br />
timeline. RTD can also email case file links to other law<br />
enforcement agencies involved in an investigation.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.rtd-denver.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.nice.com/nice-provides-denverregional-transportation-district-mobile-videorecording-and-investigation-solut<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
News story: http://www.securityinfowatch.com/<br />
article/11375266/nice-systems-provides-enhanced-mobile-surveillance-capabilities-to<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Linda Haelsen, Marketing Communications Manager<br />
NICE Systems<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(203) 481-4168<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
linda.haelsen@nice.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
461 From Road<br />
Paramus NJ 07652<br />
USA<br />
83
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
U.S. Army Garrison (USAG) in Bavaria –<br />
<strong>2014</strong> Silver Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Critical Infrastructure Protection Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Bavaria Interagency Deployment<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Founded in 1999, AtHoc pioneered interactive crisis<br />
communication. Today, the company protects millions<br />
<strong>of</strong> people around the world – including more than 75%<br />
<strong>of</strong> U.S. Military and <strong>Homeland</strong> <strong>Security</strong> personnel, as<br />
well as leading corporations and universities.<br />
The U.S. Army Garrison (USAG) in Bavaria provides protection<br />
to those in their community by utilizing AtHoc’s<br />
product. The USAG Bavaria strives to provide a quick,<br />
effective response to crisis in order to ensure the security<br />
<strong>of</strong> their infrastructure. They recognize that emergencies<br />
do not occur in isolation, and that efficient communication<br />
with the greater community is paramount in assuring<br />
the safety <strong>of</strong> the community in times <strong>of</strong> crisis. However,<br />
the Garrison had previously encountered many<br />
problems as it attempted to establish an effective way<br />
to communicate within a community <strong>of</strong> organizations<br />
that covers 180 miles. It lacked the efficiency to communicate<br />
between organizations, without having to alert<br />
external points <strong>of</strong> contact, in order to distribute alerts<br />
internally. In addition, USAG Bavaria was challenged<br />
with the prospect <strong>of</strong> maintaining an up-to-date list <strong>of</strong><br />
inter-organizational contacts, gathering them manually,<br />
a time consuming task at the very least.<br />
USAG Bavaria uses AtHoc’s cross-agency communication<br />
system or “Connect” to connect its numerous organizations<br />
via cloud. With this system in place, the commander<br />
responsible for safety and security will now be able<br />
to invite 13 tenant commands and components (such<br />
as the DoD school system, Morale Welfare and Recreation<br />
facilities, NATO schools, USO), as well as <strong>of</strong>f-site<br />
but contiguous affected organizations, to join a secure<br />
network <strong>of</strong> communication in which the tenants will<br />
“connect” with the host command. This allows them to<br />
communicate directly with all desired organizations and<br />
external contacts in times <strong>of</strong> crisis, without the timeconsuming<br />
task <strong>of</strong> relaying the alerts to key contacts in<br />
other organizations. Additionally, each organization has<br />
the ability to enter and manage their own personnel’s<br />
data. All <strong>of</strong> this allows USAGA Bavaria to communicate<br />
effectively and efficiently between their organizations,<br />
and ultimately, within their entire community.<br />
84
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.grafenwoehr.army.mil/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www2.athoc.com/connect<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
No media coverage yet. It hasn’t <strong>of</strong>ficially launched.<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Sherri Walkenhorst, Senior Partner<br />
Connect Marketing<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (801) 373-7888<br />
cell: (801) 361-4610<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
sherriw@connectmarketing.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
881 West State Street, #140-102<br />
Pleasant Grove, UT 84062<br />
85
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
Northern Command/NORAD –<br />
<strong>2014</strong> Platinum Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Emergency Response Implementation –<br />
Federal/State or Local<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Northern Command / NORAD Enterprise MNS<br />
Network Alert System<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
For the first time in the existence <strong>of</strong> Northern Command<br />
/ NORAD, the entire command is now retro fitted with<br />
network alerting to protect over 25,000 personnel. The<br />
system selected enables emergency operators to alert all<br />
25,000 personnel in ‘less than one minute’. The system<br />
is also integrated with the National Weather Service<br />
using the Common Alerting Protocol. During a severe<br />
weather event, all targeted personnel are alerted automatically<br />
without operator assistance in less than<br />
one minute. The system also integrates with the base<br />
on-premise phone system.<br />
With a single mouse click, in seconds personnel are<br />
reached by e-mail alerts, desktop popups, text messages,<br />
phone calls and mobile apps. The implementation has<br />
augmented emergency response capability substantially<br />
and was recently reviewed and lauded by Maj. Gen. Jack<br />
Briggs, currently the Director <strong>of</strong> Operations for Headquarters<br />
U.S Northern Command, Peterson Air Force<br />
Base, Colorado.<br />
86
The implementation <strong>of</strong> the Desktop Alert MNS enables<br />
interagency communication during an emergent domestic<br />
event between the following US 1st in line 1st<br />
Responders:<br />
• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K<br />
personnel)<br />
• ARMY AND AIR NATIONAL GUARD NATIONWIDE<br />
(500+K personnel)<br />
• NORTHERM COMMAND / NORAD (25K personnel)<br />
• U.S. Defense Threat Reduction Agency (DTRA)<br />
(10k Personnel)<br />
• U.S. Army Special Operations Command at<br />
Fort Bragg<br />
• AFDW Pentagon (confidential)<br />
The improved ability to attain actionable intelligence<br />
across all <strong>of</strong> these agencies in less than one minute<br />
during an emergent event provides immense dividends<br />
to the safety and protection <strong>of</strong> the homeland.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.northcom.mil/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.prweb.com/releases/NORAD/<br />
NORTHERNCOMMAND/prweb9115614.htm<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.northcom.mil/Portals/28/Documents/IA%20CND%20(33-141).pdf<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Howard Ryan, CEO<br />
Desktop Alert Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(973) 580-3447<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
howard@desktopalert.net<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Desktop Alert Inc.<br />
346 Main Street<br />
Chatham, NJ 07928<br />
87
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
South Bend, Indiana Police Dept. –<br />
<strong>2014</strong> Platinum Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Municipal/County <strong>Security</strong> Program,<br />
Project or Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
ShotSpotter in South Bend, Indiana<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
South Bend PD wrestled with how to best control an<br />
increasing amount <strong>of</strong> gunfire activity to reduce crime<br />
and make the community safe. To combat this problem,<br />
it implemented SST’s ShotSpotter technology SST. Now,<br />
police are alerted in seconds <strong>of</strong> authenticated gunfire<br />
incidents, and given location data pinpointed and reliable<br />
to within 25 meters – saving a tremendous amount<br />
<strong>of</strong> time responding. This time could be the difference<br />
that could save a victim’s life and greatly increases its<br />
chances <strong>of</strong> apprehending the perpetrator. After the first<br />
nine months <strong>of</strong> using SpotShotter, Chief Teachman has<br />
seen significant improvements in South Bend. First, the<br />
number <strong>of</strong> 911 calls in the hotspot area has increased<br />
from approximately 8% to 25%. This is a tremendous<br />
help to <strong>of</strong>ficers as the addition <strong>of</strong> citizen’s reporting<br />
helps bolster the effectiveness <strong>of</strong> SpotShotter in solving<br />
crime. Secondly, South Bend has seen an increase in evidence<br />
collection from just 5% <strong>of</strong> the 911 gunfire calls to<br />
50% <strong>of</strong> those calls when accompanied by a ShotSpotter<br />
alert. Thirdly, the summer season usually has the most<br />
incidents <strong>of</strong> gun activity in all cities, and in South Bend<br />
the past summer saw a marked decrease by some 38%<br />
from the average <strong>of</strong> the four years prior. Responding <strong>of</strong>ficers’<br />
safety is also improved as they can be better prepared<br />
when arriving on the scene knowing the number<br />
<strong>of</strong> gunshots, the locations <strong>of</strong> each, and the movement <strong>of</strong><br />
the suspect or suspects.<br />
88
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.southbendpolice.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.shotspotter.com<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.shotspotter.com<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Lisa Hendrickson, PR Consultant<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (516) 767-8390<br />
cell: (516) 643-1642<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
lisa@lchcommunications.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SST<br />
7979 Gateway Blvd,Suite 210<br />
Newark, CA 94560-1156<br />
89
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
Cit y <strong>of</strong> Philadelphia, PA –<br />
<strong>2014</strong> Gold Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Municipal/County <strong>Security</strong> Program,<br />
Project or Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Department <strong>of</strong> Parks and Recreation Video Surveillance<br />
Initiative<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Committed to its young people, the City <strong>of</strong> Philadelphia<br />
operates recreation centers all over the city that serve<br />
as gathering places for the community and venues for<br />
after-school activities including sports and the arts. To<br />
ensure the safety <strong>of</strong> those using the recreation centers,<br />
the City has installed hundreds <strong>of</strong> Hikvision cameras.<br />
Pedro Pinto, the city’s Chief Engineer, and Susan<br />
Slawson, Deputy Commissioner <strong>of</strong> Parks and Recreation,<br />
worked closely with Fidelity Alarm and Arora Engineers,<br />
Inc. to design a total security solution including IP cam-<br />
eras, NVRs, and VMS s<strong>of</strong>tware by Hikvision.<br />
The highly scalable system allows for a link into a central<br />
management system, and can remain intact as existing<br />
infrastructure is gradually upgraded. This flexibility<br />
ensures longevity <strong>of</strong> the video surveillance solution and<br />
ensures that the Department <strong>of</strong> Parks and Recreation is<br />
prepared for future upgrades as circumstances require.<br />
Since the cameras have been installed, incidents <strong>of</strong><br />
vandalism, loitering, and burglaries have decreased, and<br />
the range <strong>of</strong> the cameras is so broad they can even cover<br />
the surrounding streets, <strong>of</strong>fering support to the Philadelphia<br />
Police Department.<br />
“Fun Safe Philly Summer,” the slogan for Philadelphia’s<br />
Summer <strong>2014</strong> initiative that <strong>of</strong>fered free and low-cost<br />
summer activities to Philadelphia residents, may well be<br />
shortened to “Fun Safe Philly,” as the City has pledged<br />
to include video surveillance systems across all 140 rec<br />
centers by 2016.<br />
90
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.phila.gov/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
N/A<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://us.sourcesecurity.com/news/articles/co-<br />
3425-ga.15124.html<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Anna Boudinot, Content Manager<br />
Hikvision USA<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (909) 612-9034<br />
cell: (323) 470-7772<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
anna.boudinot@hikvisionusa.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Hikvision USA<br />
908 Canada Court<br />
City <strong>of</strong> Industry, CA 91748<br />
91
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
Communit y Safet y Glasgow, Scotland –<br />
<strong>2014</strong> Gold Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Municipal/County <strong>Security</strong> Program,<br />
Project or Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Community Safety Glasgow Initiative<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The Glasgow Operations Center is a state <strong>of</strong> the art facility<br />
that integrates a range <strong>of</strong> pivotal services designed<br />
to ensure the safety and security <strong>of</strong> the City. The Center<br />
is leading the way both nationally and internationally<br />
in redefining service delivery for the public and private<br />
sectors. The Glasgow security initiative involved the colocation<br />
<strong>of</strong> services, multi-agency functionality, tracking,<br />
monitoring and dispatching <strong>of</strong> assets in real time. These<br />
factors, along with the collection <strong>of</strong> intelligence, were<br />
all driving principles throughout the project.<br />
The Operation Center combines Public Space CCTV,<br />
<strong>Security</strong> for the City council’s museums, art galleries,<br />
schools, as well as Traffic Management and Police Intelligence.<br />
Integration <strong>of</strong> council services and Police Scotland<br />
enables a seamless approach as part <strong>of</strong> a smart city<br />
92<br />
management strategy.<br />
NICE Systems was chosen as<br />
the technology partner for<br />
this project for its innovative<br />
PSIM solution (NICE Situator),<br />
Video Management System<br />
(NiceVision) and cutting<br />
edge Video Analytics (NICE<br />
Suspect Search). The resulting<br />
intuitive and scalable<br />
technology platform uses NICE’s market leading PSIM<br />
solution to integrate multiple fragmented systems into a<br />
single user interface.<br />
The project has delivered:<br />
• Cutting edge technology including intelligent<br />
detection video analytics<br />
• Renewal <strong>of</strong> 500 cameras to HD<br />
• Asset management, monitoring and dispatch<br />
• A swifter, safer system for handling images and<br />
integration <strong>of</strong> data
• Live vehicle streaming <strong>of</strong> CCTV<br />
• Secure sharing <strong>of</strong> data for effective intelligent<br />
management <strong>of</strong> security<br />
“Our operators can pull up and display 10 – 500<br />
images, seamlessly from across our integrated camera<br />
network,” said Kalim Uddin, Operations Manager at the<br />
Glasgow Operations Center. “You can never replace an<br />
operator, but what we can do is to make the operator a<br />
lot more efficient, and we have achieved that with this<br />
project. The new functions we have facilitate ease <strong>of</strong><br />
access to a much broader suite <strong>of</strong> cameras, communication<br />
with key partners, tracking <strong>of</strong> individuals, and the<br />
ability to look at incidents from a traffic point <strong>of</strong> view.”<br />
“Community Safety Glasgow’s vision, combined with<br />
the latest technology from NICE Systems, makes the<br />
Glasgow Operations Center the most advanced Safe City<br />
control room in the UK,” said Philip Walker, Managing<br />
Director <strong>of</strong> Community Safety Glasgow. “Technology<br />
is the future for smart cities in terms <strong>of</strong> delivering<br />
better and more effective services and Glasgow is a<br />
benchmark and a role model for other cities around<br />
the world. Working in partnership with NICE we were<br />
able to address a broad spectrum <strong>of</strong> safety and security<br />
requirements across the city <strong>of</strong> Glasgow. What’s more,<br />
the solution can be further scaled in the coming months<br />
and years to help us further improve city services and<br />
bolster crime prevention.”<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.saferglasgow.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Glasgow Case Study video: http://www.nice.com/<br />
nice-situator-video-case-study-communitysafety-glasgow<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Linda Haelsen, Marketing Communications Manager<br />
NICE Systems<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(203) 481-4168<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
linda.haelsen@nice.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
461 From Road<br />
Paramus NJ 07652<br />
USA<br />
Through this initiative, Glasgow has demonstrated how<br />
a Smart City Operations Center can look and function.<br />
In fact, the operation center served the strategic hub<br />
and Tactical command for City Operations during the<br />
“best Commonwealth Games ever” this year in Glasgow.<br />
The Center is also future pro<strong>of</strong>ed to add functions such<br />
as intelligent lighting and flood prevention as part <strong>of</strong><br />
Glasgow’s future city program.<br />
93
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
New York State Criminal Justice<br />
(DCTS) – <strong>2014</strong> Gold Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable State Government <strong>Security</strong> Program/<br />
Project or Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
New York State Division <strong>of</strong> Criminal Justice Services<br />
(DCJS) – Crime Analysis Centers<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The New York State Division <strong>of</strong> Criminal Justice Services<br />
(DCJS) organized the N.Y. Crime Analysis Centers in<br />
order to assist law enforcement efforts to target, solve<br />
and prevent crime, enhance public safety and build safe<br />
communities.<br />
The purpose <strong>of</strong> the Crime Analysis Centers – and the<br />
technology deployed--is to aid in the reduction <strong>of</strong><br />
violent and property crimes and to promote safe communities.<br />
The establishment <strong>of</strong> Crime Analysis Centers<br />
combined with powerful search and analytic tools<br />
provides a powerful new platform for intelligence-based<br />
policing and inter-jurisdictional cooperation. With the<br />
impetus created by this project, information sharing has<br />
become a policy, not an informal practice.<br />
This program connects the data sources previously not<br />
available or primarily used separately by police departments<br />
and law enforcement; 64 agencies now participate<br />
in data sharing across the Centers’ communities. It promotes<br />
greater success in crime prevention, deterrence<br />
and <strong>of</strong>ficer safety by providing nearly all-source information<br />
access and analysis.<br />
The centers support the work <strong>of</strong> nearly 90 crime analysts<br />
throughout the state – analysts who are responsible for<br />
the strategic, tactical and administrative management <strong>of</strong><br />
law-enforcement data to serve nearly six million New<br />
Yorkers in the participating counties.<br />
Since the centers launched in 2009, total incidents in<br />
94
these communities are down by 12%, and violent crime<br />
is down by 11%.<br />
But the outcomes go far beyond numbers as the state <strong>of</strong><br />
New York has greatly augmented the overall sophistication<br />
<strong>of</strong> its public safety presence.<br />
The Centers use a customized browser-based search<br />
tool, called <strong>Digital</strong> Information Gateway (DIG), designed<br />
for investigative agencies to quickly compile<br />
information on a single subject from all sources. It deploys<br />
DIG and other solutions at the centers to pursue<br />
intelligence-led policing, which is grounded in principles<br />
<strong>of</strong> risk assessment, pattern analysis, community visibility<br />
and continuous improvement. For New York, this<br />
drills down into the three core components <strong>of</strong> incident<br />
prevention: description (identifying what the problems<br />
are), prediction (determining when and where they’ll<br />
happen) and prescription (coming up with strategies<br />
and tactics to deter crime).<br />
With regard to solving (and closing) cases, here’s just<br />
a small sampling <strong>of</strong> both quantitative and anecdotal<br />
highlights:<br />
in the state <strong>of</strong> Virginia. DIG and other center re<br />
sources were able to help police conclude that the<br />
suspect was on his way back to Virginia on a Grey<br />
hound bus. Police stopped the bus in Rochester and<br />
detained the suspect, who confessed to the murder.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.criminaljustice.ny.gov/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
N/A<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
N/A<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Claudia Berth, Product Marketing Manager, Analytics<br />
Raytheon Cyber Products<br />
• Since the DIG implementation, DCJS has reported<br />
a 300 percent gain in efficiency with respect to the<br />
time it takes to gather all information sought for a<br />
person <strong>of</strong> interest in a case.<br />
• In Syracuse, DIG has helped analysts cross-reference<br />
large lists <strong>of</strong> pawn shops with incident reports,<br />
resulting in the successful recovery <strong>of</strong> stolen property<br />
in 47 investigations since Jan. 1, 2013 – and the<br />
majority <strong>of</strong> those cases have produced arrests.<br />
• In Buffalo, DIG played a lead role in the capture<br />
<strong>of</strong> a suspect in a stabbing death. It flagged a series<br />
<strong>of</strong> domestic incidents between the suspect and the<br />
victim, and revealed that he had an arrest record<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(703) 537-7565<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
cberth@trustedcs.com<br />
(backup - evan@w2comm.com)<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
12950 Worldgate Drive, Suite 600<br />
Herndon, VA 20170<br />
95
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
Center for <strong>Homeland</strong> Defense &<br />
Securit y – <strong>2014</strong> Platinum Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Federal Government <strong>Security</strong> Program/<br />
Project or Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Center for <strong>Homeland</strong> Defense & <strong>Security</strong> (CHDS)<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The Center for <strong>Homeland</strong> Defense and <strong>Security</strong> (CHDS)<br />
is located at the Naval Postgraduate School (NPS) in<br />
Monterey, California. Since 2002, CHDS has conducted<br />
a wide range <strong>of</strong> graduate-level educational programs focused<br />
on assisting homeland security leaders to address<br />
current and emerging threats to the nation’s security.<br />
The programs are developed in partnership with and<br />
are sponsored by the National Preparedness Directorate,<br />
FEMA.<br />
CHDS consistently develops critical thinkers who<br />
implement their education within their agencies. Unlike<br />
other graduate institutions, CHDS only accepts applicants<br />
who are in a position to impart change and are<br />
capable <strong>of</strong> forming new partnerships and reevaluating<br />
their organization’s strategies and policies. The success<br />
<strong>of</strong> CHDS is realized through the student, alumni, and<br />
program involvement in national events such as the<br />
Oso, Washington, landslide, the Washington, D.C., Navy<br />
Yard shooting, and the Boston Marathon bombing. The<br />
CHDS fingerprint is seen in the response to these types<br />
<strong>of</strong> events through critical thinking, cross-disciplinary<br />
knowledge, and multi-agency relationships cultivated by<br />
CHDS.<br />
The CHDS Master’s degree program is the first <strong>of</strong> its<br />
kind, having been established as the first accredited<br />
homeland security degree program in the U.S. Students<br />
are selected from a pool <strong>of</strong> highly qualified candidates<br />
representing a diversified group <strong>of</strong> homeland security<br />
disciplines. Courses are taught by faculty and SMEs who<br />
administer a constantly evolving curriculum in the form<br />
<strong>of</strong> classroom discussions, projects, and network-based<br />
learning. Students develop theses that are directly applicable<br />
to the problems and challenges <strong>of</strong> their respective<br />
organizations.<br />
As the definition <strong>of</strong> homeland security has expanded, so<br />
too has CHDS course <strong>of</strong>ferings. The Executive Leaders<br />
Program (ELP) connects senior local, state, tribal,<br />
territorial, federal, and private sector leaders to create<br />
96
elationships across jurisdictional and disciplinary lines.<br />
An outgrowth <strong>of</strong> the ELP program called the Pacific<br />
Executive Leaders Program (PELP) was designed to<br />
meet homeland security challenges in the Pacific region.<br />
Lastly, the Fusion Center Leaders Program (FCLP) was<br />
created to enhance practices <strong>of</strong> fusion center leaders to<br />
collect, analyze and distribute information pertaining to<br />
crime and terrorism related activities.<br />
CHDS has led homeland security education through numerous<br />
additional initiatives. The University and Agency<br />
Partnership Initiative Program (UAPI) freely shares the<br />
Center’s programs and resources with educational institutions<br />
nationwide. This “multiplier effect” has created<br />
a network <strong>of</strong> over 300 partner institutions and expands<br />
the Center’s academic programs beyond the institution<br />
and across the nation. Additionally, CHDS has conducted<br />
280 Mobile Education Team (MET) seminars, which<br />
are tailored to senior leadership at state and local levels<br />
to address homeland security challenges unique to their<br />
jurisdictions.<br />
While not a large institution, CHDS has a pr<strong>of</strong>ound<br />
national influence on homeland security education<br />
with minimal operational overhead. Its overall reach<br />
includes 700 Master’s alumni, 450 ELP alumni, 10,500<br />
MET program participants, 12,000 Self Study program<br />
participants, 338 UAPI partners, and 136,000 <strong>Homeland</strong><br />
<strong>Security</strong> <strong>Digital</strong> Library documents to date.<br />
97<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.chds.us/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.youtube.com/watch?v=-6TbDti-<br />
FacQ<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.boston.com/news/nation/washington/articles/2005/05/01/in_war_on_terrorism_<br />
us_government_finds_allies_on_campus/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Heather Issvoran,<br />
Director <strong>of</strong> Strategic Communications<br />
CHDS<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (831) 656-2003<br />
cell: (831) 402-4672<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
hissvora@nps.edu<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
1 University Circle<br />
Building 220, Room 64<br />
Monterey, CA 93943
GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />
Government Agency <strong>Awards</strong><br />
U.S. Customs and Border Protection<br />
– <strong>2014</strong> Platinum Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Federal Government <strong>Security</strong> Program/<br />
Project or Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Securing America’s Borders: The Non-Intrusive<br />
Inspection (NII) Systems Program, Southwestern Ports<br />
<strong>of</strong> Entry<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
There are many challenges to CBP’s mission <strong>of</strong> securing<br />
America’s borders, including smuggling <strong>of</strong> drugs, currency,<br />
weapons, ammunition, illegal goods, and humans.<br />
The Southwestern border is extremely difficult to<br />
protect, 2,000 miles long and one <strong>of</strong> the world’s busiest<br />
borders, with more than 5 million trucks and 166 million<br />
people crossing each year*. Drug trafficking organizations<br />
pose a grave threat to border security, as Mexico is<br />
the source and/or transit country for heroin and most <strong>of</strong><br />
the cocaine, marijuana, and methamphetamine illegally<br />
imported into the U.S. Those same organizations also<br />
attempt to smuggle currency and weapons back into<br />
Mexico.<br />
To address these threats, CBP has implemented a<br />
layered security strategy which involves thousands<br />
<strong>of</strong> personnel, canine teams, and air/maritime/remote<br />
surveillance, and state-<strong>of</strong>-the-art detection technology.<br />
One component, the Non-Intrusive Inspection (NII)<br />
Systems Program, utilizes advanced inspection technology<br />
to more effectively screen conveyances/cargo while<br />
improving processing time. As <strong>of</strong> 2013, 310 large-scale<br />
NII systems were deployed on U.S. borders.** Many NII<br />
systems are deployed along the Southwestern border,<br />
including 26 Z Portal ® cargo and vehicle inspection<br />
systems and 61 Z Backscatter ® Van (ZBV ® ) mobile cargo<br />
and vehicle inspection systems, both manufactured by<br />
American Science and Engineering, Inc. (AS&E).<br />
In order to bolster its detection capabilities without<br />
98
impeding the flow <strong>of</strong> legal traffic, CBP added Z Portals<br />
to the Southwestern border starting in 2011. The NII<br />
Program Office worked closely with the Interdiction<br />
Technology Office to ensure an efficient, well-managed<br />
project, averaging one deployment per month. Both the<br />
Z Portal and ZBV systems have proven very successful,<br />
expediting operations and using low-energy Z Backscatter<br />
technology to quickly detect organic materials (e.g.<br />
explosives, drugs, currency, etc.). By expanding NII<br />
operations to include more Z Portal systems, CBP can<br />
now inspect cars much more rapidly, enabling scanning<br />
<strong>of</strong> almost 100% <strong>of</strong> cars designated for secondary inspection.<br />
“[Z Portal/ZBV technology] has been a tremendously<br />
effective tool for us in identifying and seizing additional<br />
illicit drugs … [The Z Portal/ZBV systems] are more<br />
efficient because they work faster and they have a lower<br />
energy level that allows us to put more vehicles through<br />
them … we have been able to benefit from an improving<br />
continual technology.”***<br />
Notable Z Portal/ZBV detections along the Southwestern<br />
border include: $1.1 million <strong>of</strong> heroin inside an SUV’s<br />
hidden compartment; more than $900,000 <strong>of</strong> cocaine<br />
hidden in a truck bed; and more than $500,000 (656<br />
lbs) <strong>of</strong> marijuana concealed in the floor and bed area <strong>of</strong><br />
a pickup truck.<br />
Overall, the NII Systems Program has had a significant<br />
impact on the detection <strong>of</strong> drugs, currency, and weapons<br />
along the Southwestern border. For example, during<br />
FY 2009-12, CBP seized 71% more currency, 39% more<br />
drugs, and 189% more weapons along the Southwestern<br />
Border than FY 2006-8.**<br />
* U.S. Department <strong>of</strong> Transportation, Research and Innovative<br />
Technology Administration, Bureau <strong>of</strong> Transportation Statistics<br />
**CBP testimony to the House Committee on <strong>Homeland</strong> <strong>Security</strong>,<br />
Subcommittee on Border and Maritime <strong>Security</strong>, 2/26/2013<br />
***CBP testimony to the House Committee on <strong>Homeland</strong> <strong>Security</strong>,<br />
Subcommittee on Border and Maritime <strong>Security</strong>, 3/20/2013<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.cbp.gov/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.cbp.gov/border-security/portsentry<br />
http://www.cbp.gov/sites/default/files/<br />
documents/z_portal_2.pdf<br />
Link to Web page or Document with independent<br />
media coverage, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.as-e.com/uploads/media/CBP_Z_<br />
Portal_and_ZBV_Seizures_<strong>2014</strong>.pdf<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Laura Berman<br />
Vice President, Corporate Communications<br />
AS&E<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(978) 262-8700<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
lberman@as-e.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
American Science and Engineering, Inc.<br />
829 Middlesex Turnpike<br />
Billerica, MA 01821<br />
99
The News Leader in Physical, IT and <strong>Homeland</strong> <strong>Security</strong><br />
Publisher:<br />
Michael Madsen<br />
(O) 212-344-0759, X1<br />
(C) 732-233-8119<br />
mmadsen@gsnmagazine.com<br />
Executive Editor:<br />
John Wagley<br />
(O) 212-344-0759, X2<br />
(C) 202-425-0196<br />
wagley.jr@gmail.com<br />
Senior Writer:<br />
Lorrie Barclay<br />
(O) 212-344-0759, X5<br />
(C) 508-685-0652<br />
lorriebarclay@gmail.com<br />
Columnist:<br />
John Convy<br />
Convy on Netcentric <strong>Security</strong><br />
john@convyassociates.com<br />
Columnist:<br />
John Romanowich<br />
Romanowich on Video Surveillance<br />
jromanowich@sightloxic.com<br />
Guest Expert Contributor:<br />
Denise Rucker Krepp<br />
(C) 202-546-2533<br />
kdrkrepp@hotmail.com<br />
Art Director:<br />
Gerry O’Hara<br />
OHDesign3<br />
(C) 203-249-0626<br />
gerry@ohd3.com<br />
Production/Design Specialist:<br />
Brenden Hitt<br />
(C) 315-723-6203<br />
brenden@ihitt.com<br />
Editorial Director/CEO:<br />
Adrian Courtenay<br />
(O) 212-344-0759, X3<br />
(C) 917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Mailing Address:<br />
Government <strong>Security</strong> News<br />
P.O. Box 7608<br />
Greenwich, CT 06836<br />
Government <strong>Security</strong> News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />
six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />
Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing <strong>of</strong>fices. POSTMASTER: Send address<br />
changes to GSN: Government <strong>Security</strong> News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />
decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />
GSN: Government <strong>Security</strong> News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />
foreign subscribers are charged $140 International Airmail. Copyright 2015 by GSN: Government <strong>Security</strong> News. All rights reserved.<br />
Printed in the U.S.A. GSN: Government <strong>Security</strong> News assumes resonsibility for validity <strong>of</strong> claims in items reported.<br />
100