19.02.2015 Views

2014 Digital Yearbook of Homeland Security Awards

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The GSN <strong>2014</strong><br />

<strong>Digital</strong><br />

<strong>Yearbook</strong><br />

<strong>of</strong><br />

<strong>Homeland</strong><br />

<strong>Security</strong><br />

<strong>Awards</strong>


Thanks to our<br />

generous sponsors<br />

for making this<br />

important program<br />

possible.<br />

Thanks to our<br />

generous sponsors<br />

for making this<br />

yearbook possible<br />

About the GSN <strong>Homeland</strong><br />

<strong>Security</strong> <strong>Awards</strong> Program<br />

The Government <strong>Security</strong> News <strong>Awards</strong> Program was<br />

organized in 2009 to honor the distinguished vendors <strong>of</strong><br />

IT and Physical <strong>Security</strong> products and solutions, and the<br />

dedicated <strong>of</strong>ficials in federal, state, county and municipal<br />

government, whose combined efforts keep our nation<br />

safe and secure 24/7.<br />

We are also pleased to honor the vendors and government<br />

<strong>of</strong>ficials <strong>of</strong> other nations that have chosen to participate in<br />

this year’s program with their prize-winning entries.<br />

<strong>Homeland</strong> <strong>Security</strong> in many nations benefits from remarkable<br />

technology breakthroughs and ever-more sophisticated<br />

programs from government agencies, <strong>of</strong>ten produced in<br />

productive collaboration with private industry.<br />

We hope you find our awards program’s findings regarding<br />

the great achievements <strong>of</strong> the past year in the field <strong>of</strong><br />

<strong>Homeland</strong> <strong>Security</strong> to be interesting and informative.<br />

Adrian Courtenay, CEO<br />

Government <strong>Security</strong> News<br />

2


TABLE OF CONTENTS<br />

4<br />

6<br />

8<br />

10<br />

12<br />

16-37<br />

39<br />

42<br />

46-67<br />

68<br />

70<br />

74-99<br />

100<br />

Meet the Sponsors: Tenable<br />

Meet the Sponsors: HID Global<br />

Meet the Sponsors: Agiliance<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Solutions<br />

GSN Interview – Chuck Brooks,<br />

Distinguished Judge<br />

Winners in IT <strong>Security</strong> Categories<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Solutions<br />

GSN Interview – Scott Greiper,<br />

Distinguished Judge<br />

Winners in Physical <strong>Security</strong> Solutions<br />

Government Agency <strong>Awards</strong><br />

GSN Interview – K. Denise Krepp,<br />

Distinguished Judge<br />

Winners <strong>of</strong> Government Agency <strong>Awards</strong><br />

Government <strong>Security</strong> News<br />

About the Statute:<br />

The Statue <strong>of</strong> Liberty, a symbol<br />

<strong>of</strong> freedom and the United<br />

States, was designed by the<br />

French sculptor Frederic<br />

Auguste Bartholdi, given to the<br />

United States by the people<br />

<strong>of</strong> France and dedicated on<br />

October 28, 1886. The robed<br />

female figure representing the<br />

Roman goddess Libertas bears<br />

a torch and a tablet evoking<br />

the law, on which is inscribed<br />

the date <strong>of</strong> the American<br />

Declaration <strong>of</strong> Independence,<br />

July 4, 1776. The statue is an<br />

icon <strong>of</strong> freedom and a welcoming<br />

signal to immigrations<br />

arriving from abroad.<br />

3


MEET THE SPONSORS<br />

Continuous Network Monitoring for<br />

Government Agencies<br />

by Jennifer Collis, Government Solutions Marketing<br />

Manager, Tenable Network <strong>Security</strong><br />

When Tenable Network <strong>Security</strong> ® was founded in 2002, its<br />

founders knew that there were no quick and easy solutions<br />

for solving complex security problems. Tenable’s first<br />

product, Nessus ® , went on to become the most widely deployed<br />

vulnerability scanner in the world and is acknowledged<br />

as the global standard in detecting and assessing<br />

network data.<br />

4<br />

But a lot has changed since 2002. The modern IT landscape<br />

has expanded to include laptops, mobile devices,<br />

virtual systems, and cloud-based applications. In a BYOD<br />

(“bring your own device”) environment, employees use<br />

their own personal devices for work, introducing a significant<br />

risk into the traditional IT infrastructure. While these<br />

devices increase the agility <strong>of</strong> an organization, they also<br />

introduce visibility and security gaps, leaving the organization<br />

open to vulnerabilities and breaches. Periodic scanning<br />

helps, but it can miss devices that are not connected<br />

to the network 100% <strong>of</strong> the time. And if those devices have<br />

been surfing the Internet or shopping online, they may be<br />

completely unprotected from exploits and attacks.<br />

Another significant risk on the modern IT network is the<br />

prevalence <strong>of</strong> cloudbased<br />

applications<br />

and virtual systems.<br />

IT security managers<br />

may not be aware <strong>of</strong><br />

all virtual machines,<br />

many <strong>of</strong> which might<br />

be created and used<br />

for transient purposes.<br />

And the security<br />

team may also be unaware <strong>of</strong> the many cloud-based<br />

hosted services used by various departments.<br />

This is why Tenable has been pioneering continuous<br />

network monitoring since 2004: to ensure that your entire<br />

security program is aligned and working 24/7 to assess<br />

and protect today’s hybrid network systems. Continuous,


automated testing <strong>of</strong> a network’s defenses against a security<br />

policy is the best method to monitor the health and<br />

assurance <strong>of</strong> your network.<br />

NIST defines continuous network monitoring as “maintaining<br />

ongoing awareness <strong>of</strong> information security, vulnerabilities,<br />

and threats to support organizational risk management<br />

decisions.”<br />

Continuous network monitoring is one <strong>of</strong> the most<br />

promising developments in Next Generation Vulnerability<br />

Management (NGVM). Instead <strong>of</strong> scanning periodically,<br />

agencies can now implement real-time scanning to<br />

eliminate blind spots. A well-run network should include<br />

solutions that accurately measure security risks in real<br />

time and bring together the processes <strong>of</strong> asset discovery,<br />

vulnerability detection and configuration auditing.<br />

Tenable’s <strong>Security</strong>Center Continuous View (<strong>Security</strong>-<br />

Center CV) includes innovative continuous network<br />

monitoring tools, such<br />

as passive vulnerability<br />

scanning on devices<br />

that are not always<br />

connected to the<br />

network, log correlation<br />

and analysis, tight<br />

integrations with the<br />

security ecosystem, and<br />

advanced threat detection<br />

technologies. <strong>Security</strong>Center CV’s centralized console<br />

manages distributed Nessus vulnerability scanners for<br />

agency-wide security and compliance visibility. Sensors<br />

automatically discover and assess traditional IT systems,<br />

mobile users, virtual networks, and cloud-based applications.<br />

Advanced analytics, including extensive dashboards<br />

and customizable reports, aggregate scan data to help<br />

5<br />

you identify and remediate security and compliance<br />

issues.<br />

In today’s IT environment, an unknown risk can compromise<br />

your agency and put your executive management<br />

at the center <strong>of</strong> media attention. Continuous<br />

network monitoring provides peace <strong>of</strong> mind by reporting<br />

against any number <strong>of</strong> compliance standards and<br />

your own security policy. Only a well-run, carefully managed<br />

network can achieve security that is “obtainable<br />

and defendable,” which is the very meaning <strong>of</strong> the word<br />

tenable.<br />

About Tenable Network <strong>Security</strong><br />

Tenable Network <strong>Security</strong> provides continuous network<br />

monitoring to identify vulnerabilities, reduce risk and<br />

ensure compliance. Our family <strong>of</strong> products includes<br />

<strong>Security</strong>Center Continuous View, which provides the<br />

most comprehensive and integrated view <strong>of</strong> network<br />

health, and Nessus ® , the global standard in detecting<br />

and assessing network data. Tenable is relied upon by<br />

many <strong>of</strong> the world’s largest corporations, not-for-pr<strong>of</strong>it<br />

organizations and public sector agencies, including the<br />

entire U.S. Department <strong>of</strong> Defense. For more information,<br />

please visit tenable.com.


MEET THE SPONSORS<br />

HID Global completes consolidation<br />

at its Austin, TX, world headquarters<br />

and North American operations center<br />

Austin, TX-based HID Global, a worldwide provider <strong>of</strong><br />

secure identity solutions, has announced it has completed<br />

the consolidation <strong>of</strong> its world headquarters and North<br />

American Operations Center. The company has also<br />

achieved recognition by three organizations for successfully<br />

implementing some <strong>of</strong> the industry’s most stringent<br />

sustainability guidelines in the design, construction and<br />

operation <strong>of</strong> its 250,000 square feet <strong>of</strong> manufacturing, <strong>of</strong>fice<br />

and warehouse space.<br />

“We are very proud <strong>of</strong> our accomplishments, and grateful<br />

for the tremendous support we’ve received from the<br />

Austin community during this process,” said Jason Bohrer,<br />

vice president and general manager for HID Global’s<br />

North American Operations Center. “This facility has<br />

become our focal point for worldwide manufacturing<br />

excellence and a showcase for operational quality and<br />

sustainability that will enable us to strengthen and expand<br />

6<br />

our leadership <strong>of</strong>fering <strong>of</strong> world-class secure identity solutions.”<br />

Since opening its Austin facility in January <strong>2014</strong>, HID<br />

Global has successfully achieved the following:<br />

• Hired 310 employees.<br />

• Completed consolidation <strong>of</strong> all North American manufacturing<br />

operations, with 45 percent <strong>of</strong> all global<br />

revenue now being generated out <strong>of</strong> the new facility.<br />

The facility is also expected to become the cornerstone<br />

for manufacturing government ID credentials that will<br />

be shipped around the globe. HID Global will be pursuing<br />

a number <strong>of</strong> additional security certifications for its<br />

operation in the coming 12 to 18 months.<br />

• Earned recognition as the only industrial manufacturing<br />

facility in the state <strong>of</strong> Texas to achieve the highest, platinum-level<br />

distinction in the U.S. Green Building Council<br />

(USGBC) LEED rating program.<br />

• Received a four- out <strong>of</strong> five-star rating from Austin Energy<br />

Green Building (AEGB), which focuses on the city’s<br />

more stringent energy, water and indoor environmental<br />

quality requirements.


• Was named one <strong>of</strong> the city’s best new buildings in<br />

Austin Business Journal’s 15th annual Commercial Real<br />

Estate <strong>Awards</strong> competition.<br />

HID Global is a trusted source for innovative products,<br />

services, solutions, and know-how related to the creation,<br />

management, and use <strong>of</strong> secure identities for millions <strong>of</strong><br />

customers around the world. The company’s served markets<br />

include physical and logical access control, including<br />

strong authentication and credential management; card<br />

printing and personalization; visitor management systems;<br />

highly secure government and citizen ID; and identification<br />

RFID technologies used in animal ID and industry<br />

and logistics applications. The company’s primary brands<br />

include ActivID, EasyLobby, FARGO, IdenTrust, LaserCard,<br />

Lumidigm, and HID. HID Global has over 2,200 employees<br />

worldwide and operates international <strong>of</strong>fices that<br />

support more than 100 countries. HID Global is an ASSA<br />

ABLOY Group brand. For more information, visit http://<br />

www.hidglobal.com.<br />

7


MEET THE SPONSORS<br />

GSN INTERVIEW<br />

Joe Fantuzzi, President and CEO, Agiliance, Inc.<br />

– <strong>2014</strong> Winner, Best Compliance / Vulnerability Assessment Solution<br />

– <strong>2014</strong> Finalist, Best Big Data Analytics Solution<br />

– <strong>2014</strong> Finalist, Best Continuous Monitoring Solution<br />

Joe Fantuzzi has been president and CEO <strong>of</strong> Agiliance since January 2010. He drives the company’s business direction,<br />

strategy, and execution. His team successfully pioneered and delivered the first massively scaled, real-time Cyber <strong>Security</strong><br />

Operational Risk solution in the market. Bringing 25 years <strong>of</strong> s<strong>of</strong>tware experience to Agiliance, Joe is an expert in<br />

creating high-growth, venture-backed businesses in emerging technology markets, and has helped building over<br />

$3 billion in market valuation as an executive for industry leading companies throughout his career.<br />

GSN: Tell us a little bit more about Agiliance.<br />

JF: Agiliance is known as the Big Data Risk Management<br />

Company. We deliver integrated Cyber <strong>Security</strong> and Operational<br />

Risk Intelligence via cloud-managed services and<br />

s<strong>of</strong>tware. Agiliance solutions automate how Global 2000<br />

companies and government agencies achieve continuous<br />

monitoring <strong>of</strong> big data across financial, operations, and IT<br />

domains to orchestrate incident, threat, and vulnerability<br />

actions. RiskVision customers demonstrate automation use<br />

cases within 30 days on-demand, and within 60 days onpremise,<br />

made possible by a configurable, purpose-built<br />

platform and applications, leveraging over 70 data integrations<br />

to <strong>of</strong>f-the-shelf s<strong>of</strong>tware, and mapping content from<br />

over 300 domains and regulations. RiskVision scales with<br />

organizations, effectively managing assets, data, people,<br />

and processes to achieve 100 percent risk and compliance<br />

coverage. Its real-time risk analysis leads executives<br />

8<br />

to optimized business performance and better investment<br />

decisions.<br />

What key issues does RiskVision resolve<br />

for organizations?<br />

JF: RiskVision delivers real-time ‘data-to-command’ risk<br />

intelligence. Customer use cases are Incident Risk Response<br />

(IRR), Threat and Vulnerability Mitigation (TVM),<br />

Third-Party Risk (TPR), and Operational Risk Management<br />

(ORM). Previous approaches cost $10s <strong>of</strong> millions to piece<br />

together data from the mission, security, and IT operations,<br />

only to learn the data was obsolete once presented,<br />

and cyber-attackers had been inside the infrastructure for<br />

months. RiskVision’s integrated data model and massively<br />

scalable architecture change the game on cyber-attackers<br />

by speeding up the process to make cyber risks visible,<br />

measureable, and actionable. Inaccuracies are reduced


and legacy systems are retired, saving both time and money.<br />

Some production clients manage over 1 million assets<br />

and have over 10,000 daily users. Benefits are incident<br />

reduction, 5 – 10x faster time-to-remediation, less audit<br />

failures, and 2 – 3x operational efficiency gains.<br />

Please describe a major federal agency<br />

using the Agiliance RiskVision approach.<br />

JF: The U.S. Department <strong>of</strong> Veterans Affairs (VA) is one<br />

such example. They were experiencing major operational<br />

efficiency issues stemming from their Assessment and<br />

Authorization (A&A) procedures. Per FISMA law, every<br />

online system must maintain an Authority to Operate<br />

(ATO) certification, and FISMA subjects must renew their<br />

ATOs for every major<br />

system change. For the<br />

agency, this meant manual<br />

gathering and assessing<br />

millions <strong>of</strong> check results<br />

generated by third-party<br />

security monitoring tools.<br />

The problem with this approach<br />

was the vast amounts <strong>of</strong> data it produced and great<br />

difficulty understanding the real meaning <strong>of</strong> the collected<br />

data and correlating it to the agency’s compliance posture.<br />

And by time the data was processed and analyzed, it<br />

was no longer actionable. All the time and money spent<br />

collecting it, was wasted. As a result, completing each<br />

ATO was a labor- and time-intense process, inhibiting the<br />

agency’s ability to meet their audit deadlines.<br />

The agency implemented RiskVision to collect data<br />

from their IT and security tools and perform real-time<br />

diagnostics and mitigation using NIST SP 800-137 and the<br />

NIST IR 7756 (CEASARS) risk frameworks. The VA project<br />

is the largest cyber security risk project in the world, conducting<br />

daily control checks for 1+ million systems for<br />

more than 130 technical controls at the VA centers in DC<br />

and Austin, Texas; providing access to 4,000 workflow and<br />

reporting users, as well as 400,000 policy attestation users.<br />

9<br />

Now the VA can cross-verify controls between federal regulatory<br />

risk management frameworks such as FISMA, NIST<br />

SP 800-53, and CyberScope. After deploying RiskVision, the<br />

agency achieved significant cost and time saving. Rather<br />

than collecting each bit <strong>of</strong> data generated by more than 1<br />

million data collection points, the IT personnel now gathers<br />

and stores highly relevant information and attends to<br />

high-risk issues in a timely manner.<br />

How does Agiliance see the future <strong>of</strong> Cyber<br />

<strong>Security</strong> Operational Risk?<br />

JF: Notwithstanding better analytics and decision-making<br />

from use <strong>of</strong> big data technologies, cloud-managed services<br />

is the new way to informed risk management. In<br />

<strong>2014</strong> alone, our clouddelivered<br />

clients grew<br />

over 600 percent versus<br />

2013, led by customers in<br />

the Financial Services and<br />

Healthcare industries.<br />

One <strong>of</strong> our Financial Services<br />

customers is already<br />

managing 200,000 critical assets with an end-to-end threat,<br />

vulnerability, and ticketing solution delivered on the<br />

RiskVision platform and several connected technologies,<br />

all in the cloud. We’ve developed RiskVision’s managed<br />

services to be cloud security hardened and ready for cloud<br />

risk programs that are deploying in the DoD, IC, and civilian<br />

agencies. With pioneering efforts <strong>of</strong> CSA, FedRAMP,<br />

NIST, and others on cloud security, and the need to stand<br />

up solutions with operational efficiency, over 70% <strong>of</strong> cyber<br />

security operation risk management will be centered in<br />

the cloud by 2018.<br />

I can be reached by Twitter: @joe_fantuzzi and<br />

by email: jfantuzzi@agiliance.com<br />

On behalf <strong>of</strong> Agiliance and our customers, thank<br />

you for an opportunity to share our perspectives with<br />

your readers.


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

VENDORS OF IT SECURITY SOLUTIONS<br />

11<br />

12<br />

Roster <strong>of</strong> <strong>2014</strong> Winners<br />

GSN Interview with Distinguished Judge <strong>of</strong> <strong>2014</strong> <strong>Awards</strong>,<br />

Chuck Brooks<br />

16<br />

18<br />

22<br />

24<br />

26<br />

28<br />

30<br />

32<br />

34<br />

36<br />

38<br />

Winning entries reproduced with permission <strong>of</strong>:<br />

Blue Ridge Networks<br />

Agiliance<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC<br />

Encryptics<br />

NICE Systems<br />

Solar Wind<br />

Tenable Network <strong>Security</strong><br />

Event Tracker<br />

Applied Visions, Inc. / Secure Decisions Division<br />

10


Winners in the <strong>2014</strong><br />

<strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

VENDORS OF IT SECURITY SOLUTIONS<br />

Best Anti-Malware Solution<br />

Blue-Ridge Networks – Winner<br />

Palo Alto Networks – Finalist<br />

Cyphort Inc – Finalist<br />

Best Identity Management Platform<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />

NetIQ – Winner<br />

Real Time Technology Network – Finalist<br />

Best Compliance/Vulnerability Solutions<br />

Agiliance Inc – Winner<br />

Solar Winds – Finalist<br />

Pro<strong>of</strong>point, Inc – Finalist<br />

Applied Visions, Inc <strong>Security</strong> Division – Finalist<br />

RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Finalist<br />

TSA Advantage – Finalist<br />

Best Data <strong>Security</strong>/Loss<br />

Management Solution<br />

Imperva – Winner<br />

RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />

Waratec – Finalist<br />

Power Amin LLC – Finalist<br />

Watchful S<strong>of</strong>tware – Finalist<br />

Best Email <strong>Security</strong> &<br />

Integration Solution<br />

Encryptics – Winner<br />

Good Technology – Finalist<br />

Pro<strong>of</strong>point, Inc – Finalist<br />

Best Endpoint Securty Systems<br />

Bromium – Winner<br />

RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Finalist<br />

11<br />

Best Forensic S<strong>of</strong>tware<br />

NICE Systems – Winner<br />

RSA, Division <strong>of</strong> EMC – Finalist<br />

Big Data Analytics Solution<br />

Splunk – Winner<br />

RSA Division <strong>of</strong> EMC – Finalist<br />

Agiliance – Finalist<br />

Best Intrusion Detection/Prevention Solution<br />

Venyu Solutions – Winner<br />

Best Network <strong>Security</strong>/Enterprise Firewall<br />

Palo Alto Networks – Winner<br />

Black Lotus Communications – Finalist<br />

Firemon – Finalist<br />

Forescout – Winner – Finalist<br />

Best Privileged Access<br />

Management Solution<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />

Beyond Trust – Winner<br />

Best Continuous Monitoring Solution<br />

Solarwinds – Winner<br />

Tenable Network <strong>Security</strong> – Winner<br />

Agiliance – Finalist<br />

Firemon –<br />

Lancope – Finalist<br />

Power Admin – Finalist<br />

Best <strong>Security</strong> Incident &<br />

Event Management Solution (SIEM)<br />

Event Tracker – Winner<br />

RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />

NetIQ – Finalist<br />

LogRhythm, Inc – Finalist<br />

Solarwinds – Finalist


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

Chuck Brooks, Distinguished Judge,<br />

GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

Charles (Chuck) Brooks serves as Vice President/Client Executive for DHS at Xerox. Chuck<br />

served as the first Director <strong>of</strong> Legislative Affairs for the Science & Technology Directorate within<br />

the Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>. He was an Adjunct Faculty Member at Johns Hopkins<br />

University, where he taught a graduate course on “Congress and <strong>Homeland</strong> <strong>Security</strong>.” He also<br />

spent 6 years on Capitol Hill as a Senior Advisor on national security issues to the late Senator<br />

Arlen Specter. Chuck has an MA in International Relations from the University <strong>of</strong> Chicago and<br />

a BA in Political Science from DePauw University. He has served in several senior executive<br />

corporate roles and is widely published as a thought leader on subjects relating to homeland security, technology,<br />

innovation, CBRNE, and cybersecurity. He also operates two <strong>of</strong> the largest homeland security groups on LinkedIn<br />

and is a featured speaker at government and industry conferences. Chuck has also served as a judge for three recent<br />

Government <strong>Security</strong> News industry homeland security awards events.<br />

GSN: What is the threat landscape for the<br />

Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> as it<br />

enters its second decade <strong>of</strong> operations?<br />

CB: DHS has made great progress over the last decade<br />

but the current threat level is now heightened for DHS,<br />

the intelligence community, and law enforcement as a<br />

result <strong>of</strong> evolving threats. The most immediate threat is<br />

posed by ISIS and affiliated Islamic extremists who have<br />

gained combat experience in Iraq and Syria and have access<br />

to Western passports. Rep. Michael McCaul (R-Texas),<br />

chairman <strong>of</strong> the House <strong>Homeland</strong> <strong>Security</strong> Committee,<br />

said these terrorists “present the greatest threat we’ve<br />

seen since 9/11.” Also, a decade ago terrorists’ ability to<br />

12<br />

organize and mobilize was more limited because <strong>of</strong> communication<br />

capabilities. The exponential growth in smart<br />

phones (there are now 14B smartphones worldwide) and<br />

the terrorists’ use <strong>of</strong> social media has made surveillance<br />

and monitoring <strong>of</strong> those who might threaten the homeland<br />

a bigger challenge.<br />

The defense against CBRNE (chemical, biological,<br />

radiological, nuclear, and explosive) threats will continue<br />

to be priorities <strong>of</strong> DHS because <strong>of</strong> the asymmetrical terror<br />

consequences they present. The recent Ebola outbreak<br />

illustrates our vulnerability to pandemics and infectious<br />

disease outbreaks. The potential for bio-terrorism directed<br />

by non-state actors is a frightening but real scenario. Right-


fully so, countering biological threats remains a high priority<br />

at DHS. As our experiences in Afghanistan and Iraq<br />

have shown, man portable improvised explosive devices<br />

(IEDS) and vehicle-borne IEDS are still a major concern,<br />

especially against s<strong>of</strong>t targets.<br />

Other threats such as chemical and radiological<br />

substance releases, and natural disasters from floods, hurricanes<br />

and earthquakes all still pose plausible and dire<br />

threats to the homeland. Unfortunately, it is likely that the<br />

nation’s preparedness will be tested again in the coming<br />

decade.<br />

One area where DHS has taken on an increasingly<br />

larger role is in cybersecurity. Presidential Directives have<br />

mandated DHS to play the primary role in the civilian side<br />

<strong>of</strong> government for cybersecurity. A major reason for the<br />

new focus on cybersecurity has been the rapid changes<br />

in the information technology landscape. Since 2003, the<br />

capabilities and connectivity <strong>of</strong> cyber devices and communications<br />

has grown exponentially. Concurrently, so<br />

have the cyber intrusions and threats from malware and<br />

hackers. This has required restructuring <strong>of</strong> priorities and<br />

the cybersecurity missions at DHS. The cyber threat to the<br />

homeland reaches far beyond terrorists and includes various<br />

criminal enterprises and adversarial nation states.<br />

What do government and industry perceive<br />

to be the main cybersecurity threats and<br />

required responses?<br />

CB: Both government and industry have prioritized<br />

critical infrastructure as a focus <strong>of</strong> threat and hardened<br />

response. There is a growing understanding <strong>of</strong> the seriousness<br />

and sophistication <strong>of</strong> the cyber threats, especially<br />

denial <strong>of</strong> service. In terms <strong>of</strong> preparation, the financial and<br />

13<br />

retail communities have been at the forefront <strong>of</strong> addressing<br />

these threats with significant investment in technologies<br />

and in training. However, 43% <strong>of</strong> companies had<br />

breaches last year (including companies such as Home<br />

Depot, JPMorgan, and Target) and the intrusion threats<br />

are not diminishing.<br />

According to the think tank Center For Strategic<br />

and International Studies (CSIS), cyber related crime now<br />

costs the global economy about $445-billion every year.<br />

These breaches demonstrate that there is a continued<br />

need for protocols and enhanced collaboration between<br />

government and industry.<br />

Last year, The Council on Cyber<strong>Security</strong>, an influential<br />

not-for–pr<strong>of</strong>it organization, formed a “20 Critical <strong>Security</strong><br />

Controls list” with collaboration between the public<br />

and private sectors. The list provides an emerging working<br />

framework for protecting the critical infrastructure and<br />

provides a recommended set <strong>of</strong> actions for cyber defense<br />

that includes specific and actionable ways to stop today’s<br />

most pervasive attacks. I was honored to participate in<br />

that working group.<br />

Indeed, cyber security controls are very important.<br />

In the U.S., most (approximately 85%) <strong>of</strong> the cybersecurity<br />

critical infrastructure including defense, oil and gas,<br />

electric power grids, healthcare, utilities, communications,<br />

transportation, banking, and finance is owned by the<br />

private sector and regulated by the public sector. DHS has<br />

recognized the importance for private sector input into<br />

cybersecurity requirements across these verticals and has<br />

played a major part in bringing government and industry<br />

together to develop a strategy to protect critical infrastructure.


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

Chuck Brooks, Distinguished Judge,GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

There will always be a need for better encryption,<br />

biometrics, analytics, and automated network security to<br />

protect critical infrastructure in all categories. Also, cyber<br />

resilience is an area that must be further developed both<br />

in processes and technologies. In the future, cybersecurity<br />

for the “Internet <strong>of</strong> Things,” consisting <strong>of</strong> hundreds <strong>of</strong> millions<br />

connected IP enabled smart devices, will certainly be<br />

a main priority<br />

What would be on your own master list<br />

<strong>of</strong> cybersecurity priorities and emerging<br />

trends?<br />

Emerging Technology Areas:<br />

• Internet <strong>of</strong> Things (society on new verge <strong>of</strong><br />

exponential interconnectivity)<br />

• Wearables<br />

• Drones and Robots<br />

• Artificial intelligence<br />

• Smart Cities<br />

• Connected transportation<br />

Priorities:<br />

• Protecting critical infrastructure through technologies<br />

and Public/Private cooperation<br />

• Better encryption and biometrics (quantum encryp<br />

tion, keyless authentication)<br />

• Automated network-security correcting systems (selfencrypting<br />

drives)<br />

14<br />

• Technologies for “real time” horizon scanning and<br />

monitoring <strong>of</strong> networks<br />

• Diagnostics and forensics (network traffic analysis,<br />

payload analysis, and endpoint behavior analysis)<br />

• Advanced defense for framework layers (network,<br />

payload, endpoint, firewalls, and anti-virus)<br />

• Mobility and BYOD security<br />

• Big data<br />

• Predictive analytics<br />

• Interoperability<br />

Trends:<br />

• Informed risk management<br />

• Emergence <strong>of</strong> Public/Private sector partnerships<br />

• More information sharing and collaboration<br />

between the public and private sectors<br />

• Shared R & D spending<br />

• Increased spending for cloud computing<br />

• Consolidation <strong>of</strong> data centers<br />

• Expansion <strong>of</strong> hiring and training <strong>of</strong> cybersecurity<br />

workforce<br />

• Tech foraging<br />

What is Xerox’s focus in the homeland security<br />

space?<br />

CB: Xerox has a great tradition <strong>of</strong> innovation and has<br />

become a world leader in digitization, contact centers,<br />

document management, IT, and data analytics. Xerox is


a recognized leader in “digitization” <strong>of</strong> documents in the<br />

Federal government. The company has been providing<br />

mailroom, scanning, imaging, indexing, and data capture<br />

for nearly three decades, including with DHS. Xerox uses<br />

innovative technologies, including Optical Character<br />

Recognition (OCR). OCR automatically extracts data from<br />

scanned images and makes those data available for electronic<br />

processing for millions <strong>of</strong> images each day. Having<br />

electronic access to data and files provides for more<br />

efficient planning and operations in the security environment.<br />

Xerox is also known for its contact center expertise.<br />

The company uses multi-channel contact technology<br />

tools via phone, email, web, and mobility to optimize,<br />

automate, and help scale customer service agent response.<br />

Contact center management solutions are designed to<br />

minimize impact, assure end-user incidents are addressed<br />

quickly, and prevent reoccurrence that is important for a<br />

public safety mission.<br />

Xerox has also developed and deployed a disease<br />

surveillance and outbreak management s<strong>of</strong>tware called<br />

Maven that is <strong>of</strong> interest to homeland security and public<br />

health agencies. It is configured to provide “contact<br />

tracing” for Ebola and other communicable diseases. The<br />

s<strong>of</strong>tware manages the identification and diagnosis <strong>of</strong> those<br />

who may have come in contact with an infected person.<br />

Federal government employees who regularly use LinkedIn,<br />

including over 65,000 from DHS. Social media has become<br />

part <strong>of</strong> the fabric <strong>of</strong> how we communicate, operate,<br />

and conduct business. The two homeland security groups<br />

I run on LinkedIn –“U.S. Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>”<br />

and “<strong>Homeland</strong> <strong>Security</strong>”– have grown to over 50,000<br />

members. (Please look them up and join and post!) I have<br />

become active now on Twitter too. Please follow me:<br />

@ChuckDBrooks<br />

I have also been active on the speaking circuit at<br />

conferences, including recent presentations at the National<br />

Press Club, <strong>Homeland</strong> <strong>Security</strong> Week, Secure Cities,<br />

George Washington University, Bowie State University,<br />

and CyberMaryland. Please check out my recent article<br />

in The Hill newspaper called “Navigating the Four Pillars<br />

<strong>of</strong> Washington, DC” that explores the interplay between<br />

government, industry, media, and policy organizations in<br />

the nation’s capitol.<br />

Thank you for speaking to me and letting me<br />

share my perspectives. GSN serves as an excellent media<br />

resource for all those active in the homeland security and<br />

national security fields. I strongly encourage others to<br />

become regular readers <strong>of</strong> your publication online and in<br />

print.<br />

Can you update us on your social media<br />

and thought leadership activities?<br />

CB: Many senior level executives in the Federal government<br />

are on social sites such as LinkedIn, GovLoop,<br />

Facebook, and Twitter. There are an estimated 1.4 million 15


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Blue Ridge Net works –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Anti-Malware Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

AppGuard<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

It is evident with all the reported breaches in government,<br />

retail, banking, and consumers that there is a<br />

need for an innovative security solution that will protect<br />

computers. AppGuard is a patented solution that<br />

would have absolutely blocked all the reported breaches<br />

including Target, JP Morgan, community health systems,<br />

and all the cyber espionage that is happening at all<br />

levels <strong>of</strong> government. AppGuard’s unique approach is<br />

simple, cost effective, and stops the advanced threats<br />

that no other security capability has been able to defeat.<br />

AppGuard is proven technology, deployed in over 100<br />

countries, and is the best line <strong>of</strong> defense when malware<br />

strikes. It protects the endpoint from malvertising, mal-<br />

John Higginbotham<br />

Chairman and CEO<br />

Mike Fumai<br />

COO and Director<br />

warized documents, drive by downloads, watering hole<br />

attacks, phishing attacks, ransomware, advanced volatile<br />

threats, and others. It provides in-depth host-based<br />

threat intelligence complementing network based threat<br />

intelligence. All <strong>of</strong> this is accomplished with an easy to<br />

use, easy to deploy client with out-<strong>of</strong>-the box settings.<br />

16


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.appguardus.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.blueridge.com/index.php/products/<br />

appguard/enterprise<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Maureen Gray, VP <strong>of</strong> Operations<br />

Blue Ridge Networks<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (703) 631-9713<br />

cell: (571) 259-8428<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

maureen@blueridge.com<br />

17


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Agiliance –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Compliance/Vulnerability Assessment Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RiskVision 7<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The biggest inhibitor <strong>of</strong> effective security and vulnerability<br />

management lies in the fact that the number <strong>of</strong><br />

threats to organizations has grown exponentially over nal resources. As a result, government organizations are<br />

the past few years. This is largely due to the increasing<br />

number <strong>of</strong> IT assets under management, which are tion, normalization, and business impact correlation.<br />

seeking technical solutions to automate data aggrega-<br />

creating a big data challenge. To ensure proper coverage,<br />

government organizations in many cases are relying ers have to exploit a s<strong>of</strong>tware flaw, thereby reducing the<br />

The ultimate objective is to shorten the window attack-<br />

on multiple tools to produce the necessary vulnerability overall risk <strong>of</strong> cyber-attacks and insider threats. Agiliance<br />

assessment data. This only adds to the volume, velocity,<br />

and complexity <strong>of</strong> data feeds that must be analyzed, achieving continuous monitoring and enabling them to<br />

is assisting civilian, defense, and intelligence agencies in<br />

normalized, and prioritized. Relying on human labor report on their organizations risk and security posture<br />

to comb through mountains <strong>of</strong> data logs is one <strong>of</strong> the in near real time. The company’s RiskVision s<strong>of</strong>tware<br />

main reasons that critical vulnerabilities are not being gathers data feeds from otherwise silo-based security<br />

addressed in a timely fashion. According to the Verizon and IT tools such as SIEMs, configuration management<br />

Data Breach Investigations Report, 92% <strong>of</strong> breaches databases, vulnerability scanners, threat data feeds and<br />

were discovered by a third party and not through inter- advisory services, database security management, etc.<br />

18


and then aggregates, normalizes, and correlates this<br />

information based on business criticality. This enables<br />

a near real time snap shot <strong>of</strong> an organization’s security<br />

posture. In addition, RiskVision automates an organization’s<br />

governance processes, providing insight into the<br />

agency’s compliance posture. The final result is a riskbased<br />

assessment <strong>of</strong> the organization’s infrastructure<br />

which prioritizes remediation actions based on business<br />

criticality. If needed, RiskVision can also assist with automatic<br />

ticket creation. By using the Agiliance ticketing<br />

system or integrating with leading ticketing and patch<br />

management systems, an organization’s security operations<br />

team can shadow the progress the IT team makes<br />

in mitigating the vulnerabilities. This eliminates the<br />

traditional approach best described as throwing something<br />

over the fence and praying for the best outcome.<br />

For one major government agency, using RiskVision<br />

resulted in a dramatic increase in operational efficiency.<br />

Prior to using Agiliance, it took 60 full-time employees<br />

working 24 x 7 for a month to manually create 180,000<br />

remediation tickets. With RiskVision, the agency was<br />

able to reduce the headcount required to oversee ticket<br />

creation by more than 80% and shrink the processing<br />

time from one month to a couple <strong>of</strong> days. RiskVision<br />

is considered by many to be the best compliance and<br />

vulnerability management solution on the market for<br />

its ability to combine risk intelligence, using big data<br />

gathered and correlated from security operations tools,<br />

with automated remediation that establishes bi-directional<br />

workflows with IT operations. The end result is<br />

improved operational efficiency through automated<br />

continuous monitoring and ticketing to remediate only<br />

business critical risks.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.agiliance.com<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Torsten George, Vice President <strong>of</strong> Worldwide<br />

Marketing and Products<br />

Agiliance, Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (408) 200-0461<br />

cell: (408) 431-3250<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

tgeorge@agiliance.com<br />

Links to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Agiliance Named Most Innovative Tech Company for <strong>2014</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0916_American_<br />

Business_<strong>Awards</strong>_Stevie_Competition.html<br />

Agiliance Wins Three <strong>2014</strong> Golden Bridge <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0911_Agiliance_<br />

Wins_3_Golden_Bridge_<strong>Awards</strong>.html<br />

RiskVision Shortlisted for CIR Risk Management Award<br />

<strong>2014</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0904_CIR_Risk_<br />

Management_Award_<strong>2014</strong>.html<br />

Agiliance Named Finalist for Two <strong>2014</strong> Computing <strong>Security</strong><br />

<strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0821_<strong>2014</strong>_Computing_<strong>Security</strong>_<strong>Awards</strong>.html<br />

Agiliance Receives International Recognition from Stevie<br />

<strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0815_Stevie_<br />

<strong>Awards</strong>_Winner_<strong>2014</strong>.html<br />

19<br />

Links continued on next page


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Agiliance – <strong>2014</strong> Winner<br />

Best Compliance/Vulnerability Assessment Solution<br />

Links to additional information, continued:<br />

Agiliance Expands Threat-Based, Real-Time Risk Remediation<br />

with CrowdStrike Falcon Intelligence:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0624_Crowd-<br />

Strike_Falcon_Intelligence.html<br />

RiskVision Earns Gold in the <strong>2014</strong> Network Products<br />

Guide <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0624_<strong>2014</strong>_Networks_Products_Guide.html<br />

Agiliance Introduces First NIST Cybersecurity Framework<br />

<strong>Security</strong> Checklist Content Pack:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0623_NIST_Cybersecurity_Framework.html<br />

RiskVision is Platinum Winner in the <strong>2014</strong> Govies Government<br />

<strong>Security</strong> <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0514_RV_Platinum_Winner_<strong>2014</strong>_Govies_<strong>Awards</strong>.html<br />

RiskVision Architecture and Cloud Services Set New Standard:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0505_RV_Architecture_Cloud_Services.html<br />

Agiliance Issues Updated ISO Information <strong>Security</strong> Management<br />

Process Controls Content:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0304_ISO_Content_Packs.html<br />

RiskVision Scores Big at Info <strong>Security</strong> Product Guide’s<br />

<strong>2014</strong> <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0225_Info_<strong>Security</strong>_Products_Guide_<strong>2014</strong>.html<br />

RiskVision 7 Ushers New Era <strong>of</strong> Big Data Risk Management:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0224_RV7_Ushers_New_Era.html<br />

20


Cyber Defense Magazine Names RiskVision Most Innovative<br />

Risk Management Product:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0224_Cyber_Defense_Magazine.html<br />

RiskVision Helps Retailers to Strengthen their Cyber Defenses:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0131_Retailers_<br />

Strengthen_Cyber_Defenses.html<br />

Agiliance to Showcase Continuous Diagnostics and Mitigation<br />

Capabilities:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0124_Cybersecruity_Innovation_Forum.html<br />

RiskVision Assists Financial Services Organizations Raise<br />

Quality <strong>of</strong> Third-Party Risk Management:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0123_Financial_<br />

Services_Organization.html<br />

Agiliance / ESG White Paper: Beyond GRC: SRM and the<br />

Move to Integrated Risk Management:<br />

http://www.agiliance.com/forms/WhitePaperReg.<br />

html?doc=Beyond_GRC<br />

Agiliance White Paper: How to Achieve a Continuous<br />

Monitoring Framework:<br />

http://www.agiliance.com/infocenter/whitepaper.html<br />

Agiliance Data Sheets:<br />

http://www.agiliance.com/infocenter/ Agiliance<br />

Case Studies:<br />

http://www.agiliance.com/infocenter/casestudy.html<br />

Agiliance Recorded Webcasts:<br />

http://www.agiliance.com/news/webcasts.html<br />

Agiliance Product Tours:<br />

http://www.agiliance.com/infocenter/tour.html<br />

21


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

RSA Securit y Division <strong>of</strong> EMC –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Identity Management Platform<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA SecurID<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA SecurID has a long and successful history in protecting<br />

sensitive information <strong>of</strong> the government. Go-<br />

changes every 60 seconds. By requiring users to provide<br />

rithms available) to generate a one-time password that<br />

ing back to before the Internet and continuing with a combination <strong>of</strong> something they know (their password)<br />

innovations that strengthen passwords in new and and something they have (the RSA SecurID one-time<br />

emerging infrastructures including cloud and mobility, password), RSA SecurID allows users gain secure access<br />

RSA SecurID is the industry’s most trusted two-factor to VPNs, wireless access points, cloud applications, web<br />

authentication solution. With government being an early applications, mobile applications and network operating<br />

innovator in interconnected networking (i.e. DARPA and systems – ensuring that private information is protected<br />

ARPANET) RSA SecurID was the first solution there to and the the identities <strong>of</strong> people, devices and applications<br />

exchanging that information are legitimate. Build-<br />

protect sensitive government information and applications.<br />

Used by more than 40 million users within 30,000 ing on its market-leading capabilities, RSA introduced<br />

organizations worldwide, RSA SecurID is the standard the industry’s first authentication platform that combines<br />

strong two-factor authentication with intelligence-<br />

for two-factor authentication solutions, reliably assuring<br />

the identities <strong>of</strong> users, devices and applications by driven, risk-based authentication. RSA Authentication<br />

using a proven algorithm (AES-128 which is recognized Manager (the brains behind RSA SecurID) uses Big Data<br />

by NIST as one <strong>of</strong> the strongest symmetric key algo- analytics to increase identity assurance by transparently<br />

22


uilding rich user pr<strong>of</strong>iles based on device and behavioral<br />

characteristics. Leveraging dozens <strong>of</strong> risk factors<br />

in near infinite combinations, it detects and permits<br />

normal behavior, and challenges or blocks anomalous<br />

activity to provide secure access control that exceeds<br />

stand-alone multifactor authentication methods. User<br />

login processes are fast, familiar and simple and yet<br />

still provides secure access control that goes well beyond<br />

stand-alone two- and multi-factor authentication<br />

methods giving organizations a higher level <strong>of</strong> identity<br />

assurance without compromising user convenience or<br />

productivity. What’s more the risk-based authentication<br />

is tokenless and invisible, greatly aiding in the protection<br />

<strong>of</strong> government portals and online benefits and<br />

health information and enables tens <strong>of</strong> thousands <strong>of</strong><br />

organizations to maintain various regulations and compliance<br />

needs including HIPPA, FACTA, FISMA, FFIEC,<br />

HSPD-12, CJIS, PCI-DSS and more. RSA SecurID includes<br />

management and administration tools that lower<br />

an organization’s overall TCO and make the solution<br />

easy to manage. Complementing RSA SecurID’s intuitive<br />

browser-based management console, RSA Authentication<br />

Manager’s single-pane view dashboard enables Help<br />

Desk administrators to quickly address common user<br />

inquiries. Also, a customizable Self-Service Console empowers<br />

users to manage their authentication needs and<br />

methods, and various aspects <strong>of</strong> their token lifecycles,<br />

enabling IT teams to apply time and resources – typically<br />

dedicated to managing a traditional authentication<br />

deployment – to other critical tasks. And, available as a<br />

VMware Virtual Appliance, RSA Authentication Manager<br />

enables customers to leverage existing virtual infrastructures<br />

and accelerate time to value.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA SecurID Homepage:<br />

www.emc.com/security/rsa-securid.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Shannon Todesca, Account Executive<br />

CHEN PR, Inc. (for RSA)<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (781) 672-3147<br />

cell: (508) 494-4607<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

stodesca@chenpr.com<br />

23


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

RSA Securit y Division <strong>of</strong> EMC –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Data <strong>Security</strong>/Loss Management Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Data Loss Prevention (DLP)<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In this era <strong>of</strong> knowledge economy, the most valuable<br />

asset for organizations, after people, is information. We<br />

are seeing, nearly every day, headlines focused on data<br />

breaches and loss <strong>of</strong> sensitive information. Organizations<br />

need to adequately protect this information – not<br />

only for the well being <strong>of</strong> the business and brand, but<br />

also that <strong>of</strong> their customers and partners. RSA DLP is<br />

used by over 3,500 organizations to gain visibility into<br />

risk and prevent the loss <strong>of</strong> sensitive data from accidents,<br />

malicious insiders and external attackers. RSA<br />

DLP discovers and monitors the location and flow <strong>of</strong><br />

sensitive data, including regulated data or corporate IP,<br />

across the infrastructure including cloud, virtual and<br />

mobile devices. Through real-time alerts and enforcement<br />

controls including encryption, quarantine, block<br />

and notify, RSA DLP prevents the loss <strong>of</strong> sensitive data<br />

24<br />

via email, web, mobile devices, etc. The web-based<br />

management console allows organizations to set up a<br />

single DLP policy to protect sensitive data across the<br />

network, endpoints (connected or disconnected including<br />

mobile) and datacenter, with centralized incident<br />

management for complete visibility into risk. What sets<br />

RSA DLP apart is that it is protocol-and port-agnostic<br />

and can analyze traffic from all network layers and is the<br />

only DLP <strong>of</strong>fering that has exceptionally customizable<br />

workflows for incident management and investigations.<br />

RSA DLP can also be extended into GRC use cases for<br />

managing risk and audits, features native encryption<br />

functionality and open APIs for partners, and provides<br />

a single pane <strong>of</strong> glass view with native integrations with<br />

Big Data analytical tools.


Offering the lowest TCO on the market, RSA DLP provides:<br />

• The lowest number <strong>of</strong> false positives, significantly<br />

reducing the number <strong>of</strong> FTEs required and<br />

operational costs.<br />

• 170+ out-<strong>of</strong>-the-box policies based on industry/<br />

regional regulations, dramatically reducing set-up<br />

and tuning time.<br />

• A distributed architecture that easily scales to the<br />

largest environments, with the ability to run on<br />

virtual machines to reduce implementation costs.<br />

• The most extensive ecosystem <strong>of</strong> partners, enabling<br />

customers to leverage their existing infrastructure<br />

and built-in infrastructure integrations to further<br />

reduce deployment costs.<br />

By centralizing incident management, integrating with<br />

existing infrastructure, automating the enforcement<br />

<strong>of</strong> controls to protect data and establishing repeatable<br />

incident workflows, RSA DLP improves cost effectiveness<br />

for customers’ ongoing operations. In addition, with the<br />

RSA DLP Risk Remediation Manager module, customers<br />

can remediate tens <strong>of</strong> thousands <strong>of</strong> sensitive files in a<br />

matter <strong>of</strong> weeks – a manual process that previously took<br />

more than nine months to complete, with resources<br />

being pulled from other projects or hired as contractors.<br />

RSA DLP has also helped prevent loss <strong>of</strong> tens <strong>of</strong> thousands<br />

<strong>of</strong> customer records which would have resulted<br />

in millions <strong>of</strong> dollars in losses. In one example, RSA DLP<br />

prevented two contracted employees attempting to steal<br />

trade secrets and alerted the appropriate security teams<br />

to prevent damage, saving millions <strong>of</strong> dollars. RSA DLP<br />

also helps organizations prevent fines and pass audits<br />

more efficiently. Customers have reported audit savings<br />

<strong>of</strong> more than 25% thanks to the ability <strong>of</strong> RSA DLP to<br />

scan the infrastructure and auto-remediate violations.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA DLP Homepage:<br />

www.emc.com/security/rsa-data-loss-prevention.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Shannon Todesca, Account Executive<br />

CHEN PR, Inc. (for RSA)<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (781) 672-3147<br />

cell: (508) 494-4607<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

stodesca@chenpr.com<br />

25


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

RSA Securit y Division <strong>of</strong> EMC –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Privileged Access Management Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Identity Management and Governance<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In the era <strong>of</strong> big data, mobile, cloud, and social media,<br />

identity and access management (IAM) has become a<br />

significant challenge for many organizations. Add on<br />

heightened threats, strict regulatory requirements, and<br />

a growing and demanding population <strong>of</strong> business users,<br />

securing access and enabling trusted interactions between<br />

users and resources can feel like a never ending<br />

game <strong>of</strong> whack-a-mole. The RSA Identity Management<br />

and Governance (IMG) solution helps organizations<br />

transform IAM into an enabler for a faster and more<br />

secure network by taking aim at three key ways in which<br />

organizations can deliver a strong Identity Management<br />

program:<br />

1. Identity Lifecycle Management — Streamlined selfservice<br />

user registration allows users to create accounts<br />

and choose access rights for themselves, new employees<br />

and contractors. The UI automatically enforces policies<br />

while suggesting entitlements based on similar users.<br />

Automated approval workflows and provisioning<br />

ensures that user access is delivered rapidly, while maintaining<br />

compliance with process and policy requirements.<br />

2. Data Access Governance. – With an increase in both<br />

data breaches and compliance requirements, it is critical<br />

to extend access governance to data as well as applications.<br />

RSA IMG is designed to provide ubiquitous support<br />

across all major file systems, providing one place to<br />

centrally manage and govern the access to all data. RSA<br />

IMG leverages identity context and data attributes (such<br />

as user access frequency) to establish a line-<strong>of</strong>-business<br />

owner for data resources.<br />

26


3. Provisioning 2.0 – RSA IMG is engineered to take a<br />

governance-driven approach, dramatically simplifying<br />

application onboarding, and enabling organizations to<br />

automate many more applications. For example, one<br />

customer in the transportation industry reduced<br />

application onboarding time by approximately 75%. The<br />

RSA IMG platform enables organizations to meet their<br />

security, regulatory and business access needs through<br />

a collaborative set <strong>of</strong> business processes. By automating<br />

manual tasks, providing evidence <strong>of</strong> compliance, reducing<br />

access-related business risk, and efficiently delivering<br />

business access, enterprises can confidently manage,<br />

control and enforce access to applications and data<br />

across the enterprise and the cloud. Beyond the immediate<br />

benefits seen after implementation, RSA IMG aids<br />

organizations by improving security, visibility, and compliance.<br />

By deploying the RSA IMG platform organizations<br />

experience significant reduction in effort for access<br />

reviews and audits, faster time to value with reduced<br />

deployment times from installation to production and<br />

orphaned accounts become a thing <strong>of</strong> the past. Without<br />

an automated approach to IAM, organizations are more<br />

susceptible to regulatory compliance violations and data<br />

breaches, some <strong>of</strong> which can cost millions <strong>of</strong> dollars<br />

in lost revenue and fines as well as significant brand<br />

damage. RSA IMG establishes increased security over<br />

sensitive information, visibility into the complete user<br />

access lifecycle, and ensured compliance to increasingly<br />

stringent regulations, potentially saving millions and<br />

protecting long-term vitality.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Identity Management and Governance Homepage:<br />

http://www.emc.com/security/rsa-identity-management-and-governance.htm#<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Shannon Todesca, Account Executive<br />

CHEN PR, Inc. (for RSA)<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (781) 672-3147<br />

cell: (508) 494-4607<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

stodesca@chenpr.com<br />

27


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Encryptics –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Email <strong>Security</strong> and Integrity Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Encryptics for Email<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Encryptics’ flagship product, Encryptics for Email,<br />

showcases this data protection company’s commitment<br />

to true end-to-end data protection. This product<br />

utilizes a hybrid security model unlike any other on the<br />

market today. By eliminating the flaws inherent in existing<br />

models, Encryptics <strong>of</strong>fers the most innovative and<br />

effective solution for the email security space. Most data<br />

protection solutions utilize one <strong>of</strong> two standard security<br />

models: trusted server or peer-to-peer. In a trusted<br />

server model, encryption and authentication take place<br />

at a centralized location (a server, gateway, or router).<br />

This model makes it easy to manage authentication<br />

and control who has access to data once it’s encrypted.<br />

Unfortunately, data is not encrypted until it leaves the<br />

device it was created on and travels to an external appliance<br />

where the encryption will occur. Furthermore,<br />

if the encrypted data and the keys to unlock that data<br />

are stored in the same location, this single point within<br />

the transmission constitutes a serious security risk. The<br />

peer-to-peer model attempts to counter these drawbacks<br />

by decentralizing the process. Because encryption<br />

occurs at the user device level, this model addresses the<br />

security gap between the user’s device and an external<br />

appliance. However, in this model, authentication and<br />

key exchange are also handled at the user device level<br />

and are difficult to manage. Unfortunately, this model<br />

does not eliminate the potential for a single point <strong>of</strong><br />

failure: if the encryption keys travel alongside the encrypted<br />

data at any time, there is always risk <strong>of</strong> interception<br />

and exposure. Rather than choosing between these<br />

existing security models, Encryptics resolved to blend<br />

the best <strong>of</strong> both models in a patented, Trusted Peer-to-<br />

28


Peer platform. This innovative approach resulted in<br />

a superior solution designed to protect data over the<br />

course <strong>of</strong> its entire lifecycle, leaving no security gaps<br />

and no single points at risk <strong>of</strong> failure to secure the data.<br />

Taking it even further, Encryptics devised Data Rights<br />

Management (DRM) tools to empower data owners and<br />

preserve document integrity. With DRM, data owners<br />

can manage and maintain control <strong>of</strong> their data in real<br />

time, even when it resides on remote email servers<br />

and recipient devices. As its email product is gaining<br />

momentum, Encryptics hopes not only to shed light<br />

on the significance <strong>of</strong><br />

data security and Policy-<br />

Based Protection (PBP),<br />

an add-on that works<br />

with Encryptics for Email<br />

to prevent data loss, but<br />

also to revolutionize the<br />

way in which we protect<br />

important information in<br />

an increasingly unsecure<br />

technological landscape.<br />

With an easy-to-use product that brings convenience<br />

to our busy lives, Encryptics ensures that we can share<br />

and store almost any data without ever having to worry<br />

about leaks, hacks, or theft.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.encryptics.com/default.aspx<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Texas Department <strong>of</strong> Information Resources Case Study: Overview<br />

<strong>of</strong> how Encryptics empowered the first ever email security<br />

plan for Texas Department <strong>of</strong> Information Resources, home to<br />

the state’s technology solutions for government and education.<br />

https://www.encryptics.com/case_studies/DIR-EncrypticsCaseStudy.pdf<br />

Law Enforcement Association Case Study: Summary<br />

<strong>of</strong> a successful 30-day trial, resulting in a prominent state law<br />

enforcement association adopting Encryptics for Email to protect<br />

the personal identifiable information (PII) <strong>of</strong> its members.<br />

https://www.encryptics.com/case_studies/<br />

Law_Enforcement_Association.pdf<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Erika Swanner, Vice President <strong>of</strong> Marketing<br />

Encryptics<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (512) 657-2685<br />

cell: (214) 864-7486<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

eswanner@encryptics.com<br />

29


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

NICE Systems –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Forensic S<strong>of</strong>tware<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NICE Suspect Search<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

An active shooter is on the loose. An airport checkpoint<br />

has just been breached. Police are frantically searching<br />

for a lost child amid a crowded location. A suspicious<br />

bag is left behind in a busy transit station. In each <strong>of</strong><br />

these situations, time is <strong>of</strong> the essence. Surveillance<br />

video can provide clues to finding a suspect, but will<br />

you be able to pinpoint the exact video you need in<br />

time? Here’s where NICE Suspect Search can help.<br />

Suspect Search is a patent-pending video analytics<br />

technology that helps you quickly locate and retrace<br />

the movements <strong>of</strong> a person <strong>of</strong> interest within a video<br />

surveillance network. It can scan an hour <strong>of</strong> video in<br />

less than a minute, automatically filtering out 95 percent<br />

<strong>of</strong> irrelevant images. Suspect searches can be initiated<br />

using a recorded image, an uploaded full body photo,<br />

or a suspect composite. As the search reveals snapshots<br />

<strong>of</strong> the suspect over time across different cameras, it<br />

evolves into a history <strong>of</strong> their movements before and potentially<br />

after the incident. Timely situational awareness<br />

is critical so snapshots are presented on an actual map.<br />

This answers questions like how did the suspect get<br />

here? Where did he go? Did he meet up with anyone or<br />

was he alone? And is he<br />

still on premise? Suspect<br />

Search revolutionizes<br />

video forensics, both<br />

for real-time use and for<br />

after-the-fact investigations.<br />

<strong>Digital</strong>ly stamped<br />

images, video, and location<br />

information associated<br />

with each search<br />

can easily be shared with<br />

police departments and<br />

district attorneys for<br />

forensic investigations.<br />

WHAT SETS SUSPECT SEARCH APART<br />

There are technologies on the market that can search<br />

for a specific color, but until now, none <strong>of</strong> them could<br />

search for a specific person, especially not in real-time.<br />

30


Suspect Search takes into account three parameters -- a<br />

full body image, the unique human signature <strong>of</strong> a person<br />

(e.g. size and the way they walk), and the textures<br />

and colors associated with that person like their clothes,<br />

accessories, hair, or skin. The Suspect Search algorithm<br />

analyzes, tags, sorts, and stores images in a database according<br />

to these parameters, increasing search accuracy.<br />

Furthermore, calculations are done in real-time. Video is<br />

analyzed as it is captured, so searches can begin immediately<br />

and results are available within seconds. Another<br />

differentiator is Suspect Search’s ability to simultaneously<br />

search across multiple camera feeds. Once the<br />

target has been located, Suspect Search’s geo-spacial<br />

capabilities allow operators to trace and retrace the suspect’s<br />

route to predict patterns <strong>of</strong> movement for quick<br />

apprehension.<br />

SUSPECT SEARCH BENEFITS<br />

By providing near real-time, actionable information<br />

about the whereabouts<br />

and movements <strong>of</strong><br />

persons <strong>of</strong> interest,<br />

Suspect Search can<br />

accelerate response<br />

times and effect positive<br />

outcomes, whether<br />

that means finding<br />

a lost child faster,<br />

apprehending suspects<br />

quicker, or avoiding<br />

costly shutdowns.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.nice.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/nice-suspect-search<br />

https://www.youtube.com/watch?v=PD-hSXOt5<br />

FA&index=54&list=PLC3F1BBC80EE0AA53<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

31


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Solar Winds –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds User Device Tracker<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds User Device Tracker (UDT) delivers automated<br />

user and device tracking with powerful switch<br />

port management capabilities empowering federal IT<br />

Pros with strong continuous monitoring capabilities and<br />

visibility into who or what is connected to their network.<br />

Highlights include:<br />

• Automatically discovers, maps and monitors switches,<br />

ports and network devices<br />

• Quickly finds devices and retrievers user name, port<br />

details, connection history and more<br />

• Enables searching on IP address, user name, hostname<br />

or MAC address to track endpoints<br />

• Allows whitelisting and watch lists with automatic<br />

alerts and click-<strong>of</strong>-a-button port shutdown<br />

• Provides detailed switch port usage data, capacity<br />

analysis and built-in reporting<br />

With the ever-increasing use <strong>of</strong> personal devices and<br />

applications, SolarWinds UDT provides federal IT Pros<br />

with peace <strong>of</strong> mind about the security <strong>of</strong> their network<br />

and the devices on it by continuously monitoring who<br />

and what connects to their network. Additionally,<br />

SolarWinds UDT can track down lost or rogue devices<br />

with a simple search <strong>of</strong> a user name, IP address, hostname<br />

or MAC address ensuring that all devices that can<br />

connect to federal networks stay in the right hands.<br />

SolarWinds UDT also features alerting that signifies<br />

unauthorized network access<br />

and provides the ability to<br />

quickly shut down switch<br />

ports to secure access to sensitive<br />

information. Updates<br />

to SolarWinds UDT coincide<br />

with the latest issues being<br />

tackled by IT Pros such as<br />

BYOD. In the latest update<br />

to scalability and additional<br />

support and optimization for<br />

varying devices and vendors<br />

was a priority. And, by work-<br />

32


ing closely with and listening to its user community,<br />

SolarWinds is able to gain real-time and candid feedback<br />

from IT practitioners, so its products can address the<br />

problems and challenges prevalent in IT security today.<br />

SolarWinds UDT provides three critical capabilities for<br />

network and systems managers. First, it makes it possible<br />

to physically locate an end-user device or user on<br />

the network extremely quickly. Second, it allows for<br />

rapid quarantine <strong>of</strong> users or systems by remotely shutting<br />

down a switch port. Finally, it supports watch-lists<br />

and can alert when certain types <strong>of</strong> devices or specific<br />

users connect to the network and even take pre-defined<br />

actions to help protect information and other assets. SolarWinds<br />

s<strong>of</strong>tware is built to scale and can support an IT<br />

environment <strong>of</strong> any size and is used by nearly every U.S.<br />

federal civilian agency, DoD branch and intelligence<br />

agency. SolarWinds UDT complements other products,<br />

such as SolarWinds Network Configuration Monitor,<br />

SolarWinds Log & Event Manager, SolarWinds Firewall<br />

<strong>Security</strong> Manager and SolarWinds Server & Application<br />

Monitor, to name a few, providing additional breadth<br />

and depth for continuous monitoring. SolarWinds s<strong>of</strong>tware<br />

can “collect once and report to many,” which gives<br />

IT, information assurance, and security departments<br />

the unique functionality they each need from a single,<br />

cost-effective set <strong>of</strong> tools.<br />

SolarWinds UDT licensing<br />

is based on the number <strong>of</strong><br />

switch ports to being monitored.<br />

The licensing model<br />

features large jumps in<br />

switch port count allowing<br />

for rapid growth <strong>of</strong> an organization<br />

before an additional<br />

licensing level is reached and<br />

can scale to an unlimited<br />

number <strong>of</strong> switch ports.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.solarwinds.com/user-device-tracker.aspx<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.youtube.com/watch?v=s4G_<br />

yPZq7Jc<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rebecca Orr, Corporate Communications Associate<br />

SolarWinds<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(512) 498-6372<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rebecca.orr@solarwinds.com<br />

33


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Tenable Net work Securit y –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>Security</strong>Center<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Founded in 2002, Tenable Network <strong>Security</strong> provides<br />

continuous network monitoring to identify vulnerabilities,<br />

reduce risk and ensure compliance. Relied<br />

upon by more than 20,000 organizations around the<br />

world, Tenable’s key clients include Fortune Global 500<br />

companies across industries as well as the entire U.S.<br />

Department <strong>of</strong> Defense (DoD) and many <strong>of</strong> the world’s<br />

leading governments. With the largest install base and<br />

best expertise in the industry, Tenable gives customers<br />

the ability to identify their biggest threats and respond<br />

quickly. Through its work with the DoD, Tenable’s<br />

technology is meeting the vulnerability, compliance and<br />

real-time risk management requirements <strong>of</strong> one <strong>of</strong> the<br />

largest, most demanding government organizations in<br />

the world. The Defense Information System Agency was<br />

confronted with a limited capability to quickly and accu-<br />

rately assess the network security <strong>of</strong> Department <strong>of</strong> Defense<br />

(DoD) enterprise networks. To address this, DISA<br />

established Tenable Network <strong>Security</strong> as the foundation<br />

<strong>of</strong> its Assured Compliance Assessment Solution (ACAS)<br />

which replaced the Secure Configuration Compliance<br />

Validation Initiative (SCCVI) suite <strong>of</strong> s<strong>of</strong>tware previously<br />

acquired by the DoD.<br />

ACAS was created to fulfill a combination <strong>of</strong> operational<br />

and strategic objectives, including:<br />

• Provide an innovative technical solution with a flexible<br />

cost structure.<br />

• Employ a commercial solution that could be easily<br />

ordered and quickly deployed across the DoD infrastructure.<br />

• Support enterprise-wide deployment across the<br />

34


Department <strong>of</strong> Defense, with the ability to tier system<br />

evaluation and management throughout the<br />

organization.<br />

Ultimately, DISA wanted fast and accurate enterprisewide<br />

network security assessment that could satisfy the<br />

goal <strong>of</strong> increasing the accuracy <strong>of</strong> risk assessment and<br />

standards compliance verification. They wanted realtime<br />

risk assessment across DoD networks to provide essential<br />

situational awareness and enable true, risk-based<br />

management decisions consistent with existing and<br />

emerging federal guidelines for continuous monitoring.<br />

DISA’s selection <strong>of</strong> Tenable<br />

followed an extensive evaluation<br />

process culminating with<br />

a 6-month, multi-site implementation.<br />

As part <strong>of</strong> Tenable’s<br />

solution, DISA implemented<br />

Tenable <strong>Security</strong>Center, which<br />

provided continuous assetbased<br />

security and compliance<br />

monitoring, bringing together<br />

the processes <strong>of</strong> asset discovery, vulnerability detection<br />

and configuration auditing. The <strong>Security</strong>Center console<br />

works with Tenable’s Nessus vulnerability scanners, the<br />

global standard in detecting and assessing network data,<br />

to look for policy changes every time a scan is requested.<br />

This provides the ability to assess an organization’s<br />

vulnerability and compliance posture, as well as deliver<br />

analysis and workflow tools that allow the user to easily<br />

perform reporting, auditing and remediation tasks. Tenable<br />

<strong>Security</strong>Center streamlines vulnerability scanning,<br />

administration and reporting. For organizations with<br />

large and complex networks, <strong>Security</strong>Center provides a<br />

comprehensive view <strong>of</strong> enterprise security, compliance<br />

and risk, combining the power <strong>of</strong> Nessus scanning with<br />

an enterprise-class vulnerability and threat management<br />

platform. <strong>Security</strong>Center simplifies administration<br />

35<br />

using a single console that manages distributed Nessus<br />

scanners for enterprise-wide security and compliance<br />

visibility. It also accelerates scans with a distributed and<br />

load balanced scanning, and delivers advanced analytics<br />

including extensive dashboard and built-in and customizable<br />

reports that aggregate scan data to help you<br />

identify and respond to security and compliance issues.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.tenable.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Continuous Monitoring:<br />

http://www.tenable.com/solutions/continuousmonitoring<br />

Whitepaper:<br />

http://www.tenable.com/whitepapers/continuous-monitoring-for-the-new-it-landscape<br />

Blog:<br />

http://www.tenable.com/blog<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Chris Petty, Communications Coordinator<br />

Tenable Network <strong>Security</strong><br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(410) 872-0555 ext. 522<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cpetty@tenable.com


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

EventTracker –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best <strong>Security</strong> Incident & Event Management (SIEM)<br />

Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

EventTracker Enterprise<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

EventTracker <strong>of</strong>fers a suite <strong>of</strong> award-winning products<br />

for <strong>Security</strong> Information and Event Management (SIEM)<br />

and event log management including EventTracker<br />

Enterprise. EventTracker Enterprise enables organizations<br />

to be constantly aware <strong>of</strong> potential security risks<br />

and internal or external threats can be identified and<br />

eliminated before they are exploited. Increasingly, Department<br />

<strong>of</strong> Defense, state and local government departments<br />

are deploying EventTracker’s (SIEM) solutions<br />

to meet their cyber security needs and to comply with<br />

FISMA and SCAP/FDCC initiatives by supporting NIST<br />

800-X and other regulatory guidelines.<br />

ments, including:<br />

• Real time collection and secure storage <strong>of</strong> all network<br />

system and device logs for as long as you require<br />

• Reporting & analytics<br />

• Powerful FISMA compliance reporting<br />

• Correlation and alerting on all event log sources<br />

• Behavior analysis and anomaly detection<br />

• FIPS 140-2 compliant transmission <strong>of</strong> event data<br />

Going beyond simple SIEM, EventTracker’s continuous<br />

monitoring solutions provide unequalled network visibility<br />

with integrated:<br />

• Registry and file integrity monitoring<br />

• User activity monitoring<br />

• Advanced USB monitoring<br />

• SCAP certified Configuration Assessment<br />

EventTracker <strong>of</strong>fers a unique, flexible and cost effective<br />

automated continuous monitoring solution that meets<br />

government information and network security require-<br />

These combined features enable security personnel<br />

to continuously monitor your environment in either<br />

real time, for a preventative approach, or in a forensic<br />

36


capacity to analyze what activity has occurred. The end<br />

result is a robust, customizable monitoring solution that<br />

utilizes best practices for determining risk and preventing<br />

incidents to give you the confidence that your<br />

organization is secure, all while helping demonstrate<br />

compliance.<br />

Other Benefits to government agencies and contractors<br />

include:<br />

• Simple Straight-forward Licensing<br />

• S<strong>of</strong>tware Only Solution – fully virtual ready<br />

• Flexible, Component-based Architecture<br />

• All Compliance Packs Included SIEM Simplified,<br />

EventTracker’s award winning services <strong>of</strong>fering, augments<br />

IT security teams and provides additional resources<br />

to effectively extract actionable information<br />

about the IT infrastructure. As an option, our experienced<br />

staff assumes responsibility for all SIEM related<br />

tasks including daily incident reviews, daily/weekly log<br />

reviews, configuration assessments, incident investigation<br />

support and audit support. EventTracker Enterprise<br />

empowers organizations to maintain regulatory compliance<br />

and simplifies the audit process, reducing audit<br />

times by up to 90%. Detailed reporting minimizes the<br />

time and effort to determine potential gaps in compliance<br />

requirements, and address them efficiently. Event-<br />

Tracker Enterprise processes hundreds <strong>of</strong> millions <strong>of</strong><br />

discrete log messages to distill critical information to the<br />

organization and provides a 360o view <strong>of</strong> the entire IT<br />

infrastructure, <strong>of</strong>fering real-time alerting and reporting.<br />

EventTracker Enterprise allows organizations to maintain<br />

continuous compliance.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.eventtracker.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.eventtracker.com/eventtracker/enterprise/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dina Petrosky<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (860) 495-5566<br />

cell: (860) 912-3201<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

dina@smartconnectionspr.com<br />

37


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Applied Visions, Inc. / Secure Decisions<br />

Division – <strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Compliance/Vulnerability Assessment Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Code Dx ®<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Corporate and government enterprises are all potential<br />

victims <strong>of</strong> cyber-attacks that can adversely impact a<br />

company’s bottom line, damage public reputation,<br />

compromise sensitive government data, and diminish<br />

the public trust. Industry experts and the Department<br />

<strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> (DHS) have traced most compromises<br />

to poorly written s<strong>of</strong>tware. 70-80% <strong>of</strong> security<br />

breaches occur because <strong>of</strong> poorly written code containing<br />

numerous security vulnerabilities. Consequently,<br />

s<strong>of</strong>tware development and acquisition organizations<br />

are under increased pressure to find and fix s<strong>of</strong>tware<br />

vulnerabilities before they are deployed. DHS, NASA,<br />

DoD and commercial businesses have begun to use<br />

static application security testing (SAST) tools to find<br />

s<strong>of</strong>tware vulnerabilities during the development cycle<br />

and as part <strong>of</strong> the acquisition process. One problem,<br />

however, is that no single source code analysis tool finds<br />

most <strong>of</strong> the vulnerabilities in an application. Different<br />

tools identify different vulnerabilities. Benchmark tests<br />

by NIST and NSA reveal that, on average, a single static<br />

analysis tool will detect only 14% <strong>of</strong> all <strong>of</strong> the s<strong>of</strong>tware<br />

weaknesses in code. Consequently, one needs to use<br />

multiple source code analysis tools to find a majority <strong>of</strong><br />

the vulnerabilities. A second problem is that each tool<br />

outputs its results in a different format with different<br />

severity scales, making it difficult to combine the results<br />

and present them in a unified report. A third problem<br />

is related to expense: each commercial tool added to<br />

the vulnerability analysis adds significant cost; and each<br />

open-source SAST tool requires additional resources to<br />

find and configure them. Code Dx ® finds, prioritizes,<br />

and visualizes s<strong>of</strong>tware vulnerabilities – fast and afford-<br />

38


ably. Code Dx ® makes it easy for s<strong>of</strong>tware developers<br />

and security analysts to start checking their s<strong>of</strong>tware for<br />

vulnerabilities without a significant investment <strong>of</strong> time<br />

or money. It embeds, automatically selects, and runs the<br />

appropriate open-source static application security testing<br />

(SAST) tools for each language in a s<strong>of</strong>tware code<br />

base. It also adds in results from commercial analysis<br />

tools and manual code analyses, combines these with<br />

the results <strong>of</strong> the open-source tools, and unifies the<br />

results into a common severity scale and display. Its<br />

visual analytics help to triage and prioritize s<strong>of</strong>tware<br />

vulnerabilities so that the most important vulnerabilities<br />

are fixed first, and false positives are removed from<br />

future vulnerability scans. Code Dx provides advanced<br />

collaboration and reporting tools to ensure expeditious<br />

communication <strong>of</strong> findings and remediation recommendations.<br />

Compliance reports can be customized to<br />

show which vulnerabilities are potential violations <strong>of</strong><br />

regulations such as PCI or HIPAA. Code Dx removes the<br />

most prominent barriers to finding and fixing s<strong>of</strong>tware<br />

vulnerabilities: time to get started, complexity, and expense.<br />

Its entry point <strong>of</strong> $2,500 for an annual subscription<br />

makes it affordable even for small businesses.<br />

39<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.codedx.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Code Dx finds, prioritizes, and visualizes s<strong>of</strong>tware<br />

vulnerabilities fast and affordably: http://securedecisions.com/products/codedx/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dr. Anita D’Amico / Director Secure Decisions<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Applied Visions, Inc. Secure Decisions Division<br />

<strong>of</strong>fice: (631) 759-3909<br />

cell: (516) 702-7706<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Anita.Damico@SecureDecisions.com


GSN Announces the 2015<br />

Airport/Seaport/Boarder <strong>Security</strong> <strong>Awards</strong> Program<br />

GSN’s second annual awards program recognizing excellence in Airport/Aviation <strong>Security</strong>,<br />

Maritime/Port <strong>Security</strong> and Border <strong>Security</strong> will open for entries on Monday, March 2, 2015.<br />

The updated 2015 edition <strong>of</strong> this exciting program will once again cover basic technology<br />

groups, including Access Control/Identification, Detection Solutions, Air/Land and Sea<br />

Communications and Surveillance, Integrated <strong>Security</strong> Programs and Aviation/Maritime<br />

and Border <strong>Security</strong> Human Resource Development.<br />

In addition to the staples <strong>of</strong> Cargo Screening, Thermal Nightvision, Integrated Harbor<br />

<strong>Security</strong> and Perimeter Protection, you can expect many new categories in Satellite<br />

Communications, Aviation and Military Beacons and Air Traffic Control – plus new categories<br />

recommended by knowledgable vendors or outstanding operators or security teams.<br />

The last group <strong>of</strong> entries will once again be dedicated to the following three categories:<br />

* Most Notable Airport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />

* Most Notable Seaport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Upgrade<br />

* Most Notable Border <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />

AIRPORT | SEAPORT | BORDER<br />

SECURITY<br />

AWARDS PROGRAM<br />

43 38


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products & Solutions<br />

40<br />

42<br />

Roster <strong>of</strong> <strong>2014</strong> Winners<br />

GSN Interview with Distinguished Judge <strong>of</strong> <strong>2014</strong> <strong>Awards</strong>,<br />

Scott Greiper<br />

46<br />

48<br />

50<br />

52<br />

54<br />

56<br />

58<br />

60<br />

62<br />

64<br />

66<br />

Winning entries reproduced with permission <strong>of</strong>:<br />

IRIS ID<br />

EID Passport<br />

Alert Enterprise<br />

Desktop Alert<br />

Desktop Alert<br />

NICE Systems<br />

Automative Systems<br />

SecureUSA<br />

NICE Systems<br />

HIKVISION<br />

HID Global<br />

39


Winners in the <strong>2014</strong><br />

<strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products & Solutions<br />

PHYSICAL ACCESS CONTROL<br />

AND IDENTIFICATION<br />

Best Biometric Identification Solution<br />

IRIS ID – Winner<br />

Best Intergrated System<br />

for HSPF-12/FIPS 201 Compliance<br />

Eid Passport – Winner<br />

Best Smart Card Solution<br />

WAVE Systems – Winner<br />

Best Platform for Physical/Logical Access<br />

Viscount Systems – Winner<br />

Alert Enterprise – Finalist<br />

HID – Finalist<br />

Honeywell – Finalist<br />

COMMUNICATION PRODUCTS<br />

Best Interoperable First Responder<br />

Communications<br />

Desktop Alert –Winner<br />

AtHoc – Finalist<br />

Best Mass Notification Systems<br />

Desktop Alert – Winner<br />

AtHoc – Finalist<br />

Best Regional or National Public Safety<br />

Communications Deployment<br />

AtHoc – Winner<br />

Alastar S<strong>of</strong>tware – Finalist<br />

DETECTION PRODUCTS<br />

Best Explosive Detection Product or Solution<br />

Implant Sciences – Winner<br />

American Science and Engineering (AS&E) – Finalist<br />

Best Long Range Detection Product,<br />

Service or System<br />

Rapiscan – Winner<br />

Pure Tech Systems – Finalist<br />

VIDEO SURVEILLANCE PRODUCTS<br />

Best Intelligent Video Surveillance Solution<br />

NICE Systems – Winner<br />

AXIS Communications – Finalist<br />

Panasonic – Finalist<br />

Puretech Systems – Finalist<br />

Best Network IP Cameras<br />

AXIS Communications – Winner<br />

Bosch – Finalist<br />

Hikvision – Finalist<br />

40


OTHER PRODUCTS<br />

Best Perimeter Protection System<br />

Automatic Systems – Winner<br />

Best Crash Barriers<br />

(Gates, Fences, Bollards, Guard Booths)<br />

Secure USA – Winner<br />

Best Physical <strong>Security</strong><br />

Information Management Solution (PSIM)<br />

NICE Systems – Winner<br />

Best Crash Barriers<br />

(Gates, Fences, Bollards, Guard Booths)<br />

Secure USA -- #609 – Winner<br />

SERVICES<br />

Best Disaster Preparedness and/or<br />

Disaster Recovery and Clean-up Services<br />

High Rise Esacape – [win status?]<br />

Best <strong>Homeland</strong> <strong>Security</strong> Training,<br />

Higher Education Program<br />

Bellevue University – Winner<br />

41


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

Scott Greiper, Distinguished Judge,<br />

GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

Mr. Greiper is the President and Founding Partner <strong>of</strong> Secure Strategy Group (SSG), a boutique<br />

advisory and investment banking platform in the physical and cyber security sectors. He has<br />

had a distinguished 15-year career in the security and technology sectors as both a research<br />

analyst and investment banker, and is known as a thought leader in the industry. Before<br />

forming Secure Strategy Group, he was a Managing Director at Legend Merchant Group and<br />

Head <strong>of</strong> the firm’s Convergent <strong>Security</strong> Group, which provided capital, strategic advisory and<br />

M&A services to growth companies in the security and defense technology markets. Previously,<br />

Mr. Greiper was a Principal and Senior Analyst at C. E. Unterberg, Towbin, where he covered public companies in the<br />

Global <strong>Security</strong> industry and was consistently ranked as one <strong>of</strong> the top analysts in the sector. He has worked with a<br />

range <strong>of</strong> industry leaders and is a frequent guest speaker and moderator at conferences and seminars across the country.<br />

Mr. Greiper attended the Executive MBA program at Columbia University and holds a B. A. in Economics from The<br />

University <strong>of</strong> Chicago. He is a member <strong>of</strong> the FBI InfraGard program, BENS (Business Executives for National <strong>Security</strong>),<br />

ASIS (American Society for Industrial <strong>Security</strong>) and NYSSA (New York Society for <strong>Security</strong> Analysts).<br />

GSN: What is the key trend you’re seeing in<br />

the security industry as we enter 2015?<br />

SG: The massive global security industry is being transformed<br />

from “guns, guards and gates” into highly integrated<br />

technology solutions that must protect against both<br />

physical and cyber threats while at the same time demonstrating<br />

ROI. The distinction between cyber and physical<br />

security is blurring and the requirement for unified<br />

management <strong>of</strong> threats in different domains growing. This<br />

“unification” is in my mind the most important transformation<br />

impacting the security industry.<br />

42<br />

What is “Unified <strong>Security</strong>”? It is the growing integration<br />

<strong>of</strong> security and resilience solutions – themselves<br />

increasingly digital – across the full spectrum <strong>of</strong> requirements<br />

and threats, from cyber to physical. It is the integration<br />

<strong>of</strong> physical security solutions – surveillance, access<br />

control, fire alarms – onto the same common operating<br />

platform <strong>of</strong> cyber security solutions – anti-virus, intrusion<br />

detection. This in an effort to create full situational awareness<br />

<strong>of</strong> an organizations security systems and sensors, and<br />

to more readily coordinate response.<br />

More and more building automation systems,


such as HVAC, access control, utilities, and communications,<br />

and being monitored and driven by an enterprise’s<br />

network. As such, these systems provide an easier route<br />

to hack into the network, because they <strong>of</strong>ten sit in front<br />

<strong>of</strong> the firewall and don’t contain the same level <strong>of</strong> security<br />

as network systems do. The theft <strong>of</strong> over one hundred<br />

million customer accounts during the Target Stores breach<br />

was enabled by the theft <strong>of</strong> a password from an HVAC<br />

technician that was subsequently used to breach the Target<br />

network.<br />

What are the drivers <strong>of</strong> demand for Unified <strong>Security</strong><br />

Solutions?<br />

Improved Technology & ROI:<br />

• Technology and ROI: analog to digital video surveil<br />

lance; new capabilities in simulation, ROIP, etc –<br />

better security and ROI?<br />

• New capabilities to combine physical and digital<br />

access control and identity management<br />

• “S<strong>of</strong>tware trumps hardware”<br />

• Requirements for security technology to keep up with<br />

“smart buildings”<br />

• M2M/Internet <strong>of</strong> Things/smart sensors<br />

• Securing the “last mile”<br />

• <strong>Security</strong> integration with external partners (from<br />

warning to video sharing, a la Boston)<br />

• Critical Infrastructure Regulations like FERC, PPD-21<br />

• Federal specific regs (eg, FIPS 201-2) and new security<br />

requirements for products sold to the U.S. Government<br />

How does the investment community perceive<br />

the opportunities in the security market?<br />

SG: Investment returns in the security sector were strong<br />

in <strong>2014</strong>, mirroring the healthy growth in the industry. Secure<br />

Strategy Group publishes the SSG Small Cap <strong>Homeland</strong><br />

<strong>Security</strong> Report and Index, which tracks the top small<br />

and mid-sized public companies in the security industry,<br />

categorized across 11 different technology sectors.<br />

As you can see in the table below, our SSG Small<br />

Cap <strong>Security</strong> Industry Index returned 22.5% for <strong>2014</strong>,<br />

handily beating the Dow Jones Industrial Average (up<br />

10.0%), the S&P 500 (up 13.7%), the Nasdaq Composite<br />

(up 14.7%) and the Russell 2000 (up 4.9%). Moreover, 7 <strong>of</strong><br />

our 11 sectors showed positive returns.<br />

Regulations:<br />

• SEC cyber reporting guidance; Sarbanes Oxley<br />

requirements<br />

• Federal regulations such as FICAM and HSPD-12 that<br />

mandate improved security for federal buildings by<br />

implementing “cyber pro<strong>of</strong> ” access control systems<br />

43


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

Scott Greiper, Distinguished Judge,GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

You act as both advisor and banker to your<br />

client companies. What are the key variables<br />

you look for before taking on a new<br />

client?<br />

SG: There are three key variables we measure when<br />

evaluating a new potential client assignment. We don’t<br />

assign a specific ranking to each, but at the end <strong>of</strong> the day<br />

the quality, integrity and experience <strong>of</strong> the management<br />

team is the tipping point between success and failure.<br />

Since we act in a capital raising capacity for our clients, we<br />

always position ourselves in the mind <strong>of</strong> an investor as we<br />

do our due diligence.<br />

Technology:<br />

• Does the technology fill a market gap and have real<br />

functional differentiation vs. the competition?<br />

• Does the technology <strong>of</strong>fer an ROI to the end user,<br />

either in terms <strong>of</strong> upfront acquisition cost or the total<br />

life cycle cost <strong>of</strong> ownership?<br />

• Does the technology <strong>of</strong>fer flexibility in terms <strong>of</strong> size,<br />

portability, weight, and mobility?<br />

• Can the technology be easily and cost-effectively up<br />

graded over time?<br />

• Can the technology maintain its functional and/or cost<br />

advantages over time?<br />

Management:<br />

• What is management’s background and experience in<br />

the specific technology sector?<br />

• Has management previously taken a company from<br />

early-stage, to growth stage to a successful exit in the<br />

past?<br />

• Is there a strong Board <strong>of</strong> Directors that brings exper<br />

tise in governance, operations and management?<br />

• Is there a strong ethical culture in the organization<br />

that starts “at the top”?<br />

• Has there been continuity in the core management<br />

team over time?<br />

Business Model:<br />

• Is there sustainability in the Company’s pricing model?<br />

• Can gross and operating margins be sustained or<br />

increased over time?<br />

• Is there both a direct and channel sales model in<br />

order to cost-effectively access end-user opportunities?<br />

• Is there a component <strong>of</strong> a recurring revenue or SaaS<br />

revenue model?<br />

• Are there customer concentration issues/is the sales<br />

cycle elongated?<br />

44


Tell us about some <strong>of</strong> the recent additions<br />

to your team.<br />

SG: We made a number <strong>of</strong> important additions to our<br />

team and our advisory board in <strong>2014</strong> to prepare us for<br />

growth in 2015.<br />

We added Mark Sauter as our Head <strong>of</strong> M&A. Mark<br />

was a co-founder <strong>of</strong> America’s first business accelerator for<br />

national security technology and manager <strong>of</strong> its contract<br />

with the NSA. Just prior to joining SSG, Mark was a principal<br />

in the Spectrum Group, one <strong>of</strong> the country’s leading<br />

M&A due diligence firms. He served as an Army <strong>of</strong>fice<br />

in Special Forces and infantry units and is a graduate <strong>of</strong><br />

Harvard University and the Columbia University Graduate<br />

School <strong>of</strong> Journalism. He is also co-author <strong>of</strong> McGraw<br />

Hill’s leading university textbook, “<strong>Homeland</strong> <strong>Security</strong>: A<br />

Complete Guide.”<br />

We added Tom DiNanno as our Head <strong>of</strong> Government<br />

Affairs. Tom served as Deputy Assistant Secretary for<br />

Critical Infrastructure Protection at the U.S. Department <strong>of</strong><br />

<strong>Homeland</strong> <strong>Security</strong>, served as Special Assistant to the Chief<br />

<strong>of</strong> Staff in the Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>, and in<br />

the White House Office <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> as Director<br />

<strong>of</strong> Corporate Relations. He received his MS in Business<br />

and Urban Planning from MIT, and an MA in Government<br />

Administration from the University <strong>of</strong> Pennsylvania.<br />

We added Brian Tuskan to our advisory board late<br />

last year. Brian serves as Senior Director <strong>of</strong> Micros<strong>of</strong>t Global<br />

<strong>Security</strong>, where he oversees global strategic development,<br />

integration and growth for Technology, Showcase,<br />

Investigations, and Communications for the Micros<strong>of</strong>t<br />

Global <strong>Security</strong> team. He joined Micros<strong>of</strong>t in 2000, after<br />

serving more than 12 years in law enforcement with the<br />

City <strong>of</strong> Redmond Police (Washington) and the Honolulu<br />

Police Department. During his distinguished law enforcement<br />

career he served as a metropolitan police <strong>of</strong>ficer,<br />

patrol, SWAT tactical team member, undercover narcotics<br />

detective, major crimes detective, and <strong>of</strong>ficer-in-charge.<br />

45


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

IRIS ID –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Biometric Identification Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

IrisAccess - Iris Recognition Systems<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Iris ID ® (formerly LG Iris) has been active in the development<br />

and deployment <strong>of</strong> iris recognition technology<br />

since 1997. The IrisAccess ® platform has been widely<br />

deployed around the world. Iris ID’s first generation<br />

product was the IrisAccess ® 2200 iris recognition system<br />

released in 1999, which paved the way for the first successful<br />

commercialization <strong>of</strong> iris<br />

recognition. This generation was<br />

subsequently followed by the releases<br />

<strong>of</strong> the IrisAccess 3000, iCAM<br />

4000, iCAM 7000 series, iCAM<br />

TD100, iCAM D1000, iCAM T10,<br />

iData ® EAC s<strong>of</strong>tware, IrisAccelerator<br />

® and iData ® S<strong>of</strong>tware Development<br />

tools. Twentieth-century security<br />

infrastructures are straining<br />

against the demand <strong>of</strong> twenty-first<br />

46<br />

century security implementation. The crushing pressure<br />

<strong>of</strong> an unpredictable global threats, stringent regulatory<br />

constrains increasing exceptions and escalating security<br />

threats are stressing facilities, and IT systems to the<br />

breaking point. In this volatile business environment,<br />

the world over are confronting extraordinary challenges<br />

including the inherent contradiction between improving<br />

operational efficiency, customer service, and the overall<br />

“experience” while anticipating and combating a broad<br />

range <strong>of</strong> security threats. This dual high service/high security<br />

challenge has created significant operational gaps<br />

in the homeland environment that require innovative<br />

process reengineering and comprehensive operational<br />

improvements. IrisAccess iris-based access control is one<br />

<strong>of</strong> an array <strong>of</strong> new and innovate<br />

business processes and automated<br />

technology solutions homeland<br />

security agencies are adopting to<br />

close these gaps, remain vegilant,<br />

and breakthrough to the customer<br />

experience. Secure access control<br />

is critical to addressing existing<br />

airport security/service operational<br />

gaps. This is particularly<br />

true for managing staff and third


party vendor access to restricted zones within a facility.<br />

IrisAccess ® solutions most effectively and reliably balance<br />

a number <strong>of</strong> seemingly irreconcilable constraints,<br />

including:<br />

• Regulatory Compliance<br />

• Cost minimization and reduction<br />

• Leveraging security infrastructure and investments<br />

• Comprehensive, multi-layered security<br />

• Balancing security with speed <strong>of</strong> access<br />

• Uniform access to multiple locations and facilities<br />

• Flexible solutions that evolve with planning process<br />

• User friendly, easily adopted, and accepted solutions<br />

• Integrating access control with existing and planned<br />

airport ID systems<br />

• Unique facility/location issues – environmental, local<br />

rules/regulation, end-user concerns<br />

IrisAccess highly reliable identification process can be a<br />

key component <strong>of</strong> any homeland security access control<br />

solution that successfully balancing these requirements.<br />

Iris ID IrisAccess solution is uniquely suited to quickly<br />

and accurately establish and verify identity enabling<br />

secure and reliable access control in the highly sensitive<br />

places. Iris ID IrisAccess systems provide high integrity<br />

mass enrolment applications, physical access security<br />

for airports, national ID programs, secure border crossings,<br />

data centers, biotech labs and HAZMAT environments,<br />

as well as other critical infrastructures. The only<br />

biometric technology designed for operation in oneto-many<br />

search mode, the technology also integrates<br />

with traditional system architectures which may include<br />

smart-cards as well as other tokens or PINs. Readily<br />

accommodating expansion and scalability in terms <strong>of</strong><br />

system and database size requirements, Iris ID continues<br />

to advance the “doorway to desktop” and global<br />

security solution that enterprise and governments seek<br />

today, as well as <strong>of</strong>fering the robust authentication<br />

47<br />

that will be required in an increasingly wireless world.<br />

IrisAccelerator and associated development tools have<br />

been proven to provide highly accurate and fast identification<br />

<strong>of</strong> individuals. Iris ID has been providing iris<br />

technology solutions for <strong>Homeland</strong> <strong>Security</strong> for past<br />

14 years. Iris ID products and solutions are currently<br />

used in more than 50 airports, high value assets such as<br />

nuclear power plants, critical infrastructure government<br />

or commercial security around the world for employee<br />

access control and homeland security. Recently Iris ID<br />

was awarded the honor <strong>of</strong> providing a border security<br />

solution for Canada Border <strong>Security</strong> Agency (CBSA) and<br />

Hammad International Airport, Doha Qatar.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.irisid.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Mohammed Murad<br />

Vice President, Iris ID Systems Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(609) 819-4747<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

murad@irisid.com


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Eid Passport –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Integrated System for HSP D-12/FIPS 201<br />

Compliance<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The RAPIDGate Program<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The RAPIDGate ® Program, from Eid Passport, Inc., is<br />

an end-to-end high assurance identity management<br />

and installation access control solution for vendors,<br />

contractors, and service providers. This field-proven,<br />

accredited, and widely-accepted credentialing and<br />

vetting program has been deployed at more than 450<br />

federal facility access control points across the United<br />

States and its territories, helping the U.S. military guard<br />

against such threats as unauthorized access, identity<br />

theft, fraud and cyber-crime. These threats put the safety<br />

<strong>of</strong> military personnel, critical infrastructure, and other<br />

valuable assets at risk every day. This DIACAP ATOcertified<br />

program was specifically designed to enhance<br />

installation safety and security and improve operational<br />

efficiency and effectiveness in aligning with HSPD-12/<br />

FIPS 201 requirements by utilizing our proprietary,<br />

48<br />

self-contained physical access control system for card<br />

validation, authentication, and registration. Since 2004,<br />

the RAPIDGate Program has identity-pro<strong>of</strong>ed, performed<br />

suitability risk analysis and credentialed more<br />

than 790,000 vendor/contractor employees representing<br />

approximately 59,000 companies doing business<br />

with the U.S. Navy, Army, Marine Corps, and Coast<br />

Guard. Over 130,000,000 authentication events have<br />

been recorded, the majority <strong>of</strong> which are vendors and<br />

contractors requiring identity verification and access to<br />

military and government bases/buildings. As a result,<br />

Eid Passport is the leading commercial provider <strong>of</strong> U.S<br />

Department <strong>of</strong> Defense recognized vendor credentials.<br />

The time required to screen and verify vendors and<br />

contractors for base access cuts deeply into productivity,<br />

particularly for smaller companies who can least


afford to wait in line. This results in higher vendor costs,<br />

which ends up increasing military costs. To significantly<br />

reduce the time it takes for thousands <strong>of</strong> personnel to<br />

gain needed access to military facilities, the RAPID-RCx ®<br />

Program was developed. It seamlessly integrates access<br />

control point systems and biometric identity verification<br />

into a single, RAPIDGate credential. Additionally,<br />

Eid Passport is currently implementing its RAPIDGate<br />

Premier credentialing program for the U.S. Navy.<br />

This advanced program adds Personal Identity Verification<br />

Interoperable (PIV-I) credentials to the RAPIDGate<br />

Program. These enhanced, tamper-resistant credentials<br />

meets PIV-I credentialing standards and are in accordance<br />

with HSPD-12 and FIPS 201. RAPIDGate Premier<br />

PIV-I credentials contain: a unique ID code; a color<br />

photograph; the credential holder’s full name; organizational<br />

affiliation/company name; issued and expiration<br />

dates; and program seal <strong>of</strong> authenticity. Furthermore,<br />

the RAPIDGate Premier Program credentials are the<br />

only PIV-I credentials with integrated background vetting.<br />

Incorporating this enhanced credential with PIV-I<br />

compliant PACS systems provides participants with a<br />

single, interoperable credential granting them access to<br />

controlled areas such as flight lines, secure buildings,<br />

spaces, vaults, and other areas where authorized access<br />

is required. Once RAPIDGate has been deployed,<br />

security personnel can verify that anyone arriving with<br />

a RAPIDGate badge has been Registered And Previously<br />

ID’d. That means they’ve passed a thorough background<br />

screen, been photographed, fingerprinted and badged.<br />

Vendors like RAPIDGate because it saves them hours<br />

<strong>of</strong> time and improves worker productivity by providing<br />

rapid base access. Force Protection likes RAPIDGate<br />

because it allows security personnel to spend less time<br />

and resources screening “Registered And Previously<br />

ID’d” visitors who have already been vetted and allows<br />

them to meet security policy requirements.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

High-assurance identity management for vendors, contractors,<br />

suppliers, & service providers<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Eid Passport, Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

John Nee : (503) 924-5293<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

jnee@eidpassport.com<br />

49


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Alert Enterprise –<br />

<strong>2014</strong> Finalist<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Platform for Physical and Logical Access<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Enterprise Guardian<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Companies are faced with the daunting task <strong>of</strong> reconciling<br />

employee, contractor and visitor lists against HR that are working fine. AlertEnterprise has developed a<br />

resorting to cost prohibitive replacement <strong>of</strong> systems<br />

Management Systems, Manual Contractor acquisition solution to bridge the security gaps across these silos <strong>of</strong><br />

processes and the list <strong>of</strong> electronic access cards that are Physical and Logical systems with a Converged Identity<br />

actually active. Add to that the complexity <strong>of</strong> monitoring Governance and Management solution that extends<br />

the system access that they have in enterprise and legacy beyond IT and enables you to manage and control user<br />

applications. Organizations are living with the risk that access risks across the entire enterprise. As an example<br />

terminated employees or contractors still have physical<br />

access to facilities. As companies grow and acquire is an Operator who works in the Transmission Control<br />

use case for this capability, let us consider Tom. Tom<br />

other facilities and merge with other companies, Access<br />

Control systems from multiple vendors need to be Tom must complete certain on-going training require-<br />

Room for a regulated Utility company we call Utilco.<br />

accounted for. A single command and control console ments to maintain his license to operate. Utilco has a<br />

that can consolidate identities and access rules across Learning Management System (LMS) in place that is<br />

multi-vendor badging systems can eliminate the overlap, linked to the company HR system. AlertEnterprise is<br />

cost burden and manual processes needed to centrally integrated with the HR systems, the Identity Management<br />

as well as the Badge Access system. During the<br />

manage physical access across all these systems without<br />

50


onboarding process, AlertEnterprise automates the<br />

background check process prescribed by Utilco and<br />

proceeds to make sure that all the certification requirements<br />

are met. If the requisite Continuing Education is<br />

not completed, the application reminds Tom that he has<br />

two more weeks to complete it. Tom may want to access<br />

the computer-based training in the evenings to make<br />

up for lost time. If additional reminders don’t have the<br />

desired effect, finally on the last day, when Tom uses his<br />

electronic access badge to get into the control room, it<br />

will automatically lock him out, enforcing the company<br />

policy and avoiding the possibility <strong>of</strong> costly compliance<br />

violations.<br />

With Enterprise Guardian from AlertEnterprise, organizations<br />

can:<br />

• Manage a Common <strong>Digital</strong> Identity for employees,<br />

contractors, etc. for IT and Physical<br />

• Unlike other solutions, provision to both IT Applications<br />

and Physical Access Control<br />

• Meet regulatory compliance requirements and automatically<br />

generate reporting<br />

• Actively enforce termination and transfers<br />

• Have a single console that operates across multiple<br />

vendor Access Control systems<br />

• Single interface to create identity and badge for multiple<br />

Access Control Systems<br />

• Enhanced risk analysis and training validation with<br />

Active Policy Enforcement<br />

• Powerful reporting across physical access vendors<br />

consolidating access and usage<br />

• Support PIV-I and PIV-C for Government and High<br />

<strong>Security</strong> FICAM; HSPD-12; OMB M-11-11<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.alertenterprise.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Enterprise Guardian Data Sheet:<br />

https://alertenterprise.box.com/s/roeqtb8p-<br />

473pf9kz286b<br />

AlertEnterprise Video:<br />

https://www.youtube.com/<br />

watch?v=1GdXEgntzgM<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Pan Kamal,Vice President, Marketing<br />

AlertEnterprise, Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (510) 897-6712<br />

cell: (650) 793-5992<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

pan.kamal@alertenterprise.com<br />

51


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Desktop Alert –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Interoperable First Responder Communications<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert Inter-agency Mass Notification Platform<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert provides early warning mass notification<br />

alerts to over 1 million federal, military and civilian hardware and burdensome configuration logistics. For<br />

personnel daily with ‘less than one minute alerting’ as the first time in the existence <strong>of</strong> Northern Command /<br />

certified by our customer base. After an extensive worldwide<br />

vetting <strong>of</strong> vendors, the world’s most crucial peace network alerting to protect over 25,000 personnel.<br />

NORAD, the entire command is now retro fitted with<br />

keeping organization NATO selected Desktop Alert! Buttressed<br />

by this selection is that <strong>of</strong> the Institute <strong>of</strong> Peace alert all 25,000 personnel in ‘less than one minute’.<br />

The system selected enables emergency operators to<br />

2012 selection <strong>of</strong> Desktop Alert. http://www.virtual-strat-<br />

The system is also integrated with the National Weather<br />

egy.com/2012/04/17/united-states-institute-peace-selects-<br />

desktop-alert-mass-notification-system#axzz3IbIAv3c4 severe weather event, all targeted personnel are alerted<br />

Service using the Common Alerting Protocol. During a<br />

Desktop Alert was chosen over all vendors in this GSN automatically without operator assistance in less than<br />

competition for the coveted mass notification requirements<br />

by NATO HQ in Brussels Belgium. Key in our on-premise phone system. With a single mouse click, in<br />

one minute. The system also integrates with the base<br />

selection by NATO was the platforms ability to operate seconds personnel are reached by e-mail alerts, desktop<br />

popups, text messages, phone calls and mobile<br />

on the customer’s existing computational infrastructure<br />

thus saving several hundred thousand dollars in both apps. The implementation has augmented emergency<br />

52


esponse capability substantially and was recently<br />

reviewed and lauded by Maj. Gen. Jack Briggs, currently<br />

the Director <strong>of</strong> Operations for Headquarters U.S Northern<br />

Command, Peterson Air Force Base, Colorado. The<br />

implementation <strong>of</strong> the Desktop Alert MNS enables interagency<br />

communication during an emergent domestic<br />

event between the following US 1st in line 1st Responders:<br />

• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K personnel)<br />

• ARMY AND AIR NATIONAL GUARD NATIONWIDE<br />

(500+K personnel)<br />

• NORTHERM COMMAND / NORAD (25K personnel)<br />

• U.S. Defense Threat Reduction Agency (DTRA) (10k<br />

Personnel)<br />

• U.S. Army Special Operations Command at Fort Bragg<br />

• AFDW Pentagon (confidential)<br />

• 200+ Army and Air Force locations worldwide<br />

DTA is currently the second largest provider to DoD<br />

and continue to build market share year by year. The<br />

unification <strong>of</strong> alerting between these agencies provides<br />

formidable actionable intelligence during emergent<br />

homeland events. The nation’s most top tier 1st agency<br />

responders are all owners <strong>of</strong> the DTA MNS. NO other<br />

vendor can boast these credentials; especially with these<br />

numerous ‘key’ nation leading 1st inline 1st responder<br />

defense agencies as it relates to not only border security;<br />

but all other security concerns to the nation. While<br />

other vendors may claim more seat licenses within DoD;<br />

only Desktop Alert has unified the nation’s most critical<br />

security agencies with the Military and DHS with one<br />

de-facto system. Desktop Alert is far and away the leading<br />

MNS in use by the <strong>Homeland</strong>s Most Crucial Defense<br />

Agencies! The improved ability to attain actionable<br />

intelligence across all <strong>of</strong> these agencies in less than one<br />

minute during an emergent event provides immense<br />

dividends to the safety and protection <strong>of</strong> the homeland.<br />

53<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.prweb.com/releases/NORAD/<br />

NORTHERNCOMMAND/prweb9115614.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Howard Ryan, CEO<br />

Desktop Alert Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (973) 727-0066<br />

cell: (973) 580-3447<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

howard@desktopalert.net


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Desktop Alert –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Mass Notification Systems<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert Global Connect - Interagency Mass<br />

Notification Platform<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert provides early warning mass notification<br />

alerts to over 1 million federal, military and civilian<br />

personnel daily with ‘less than one minute alerting’ as<br />

certified by our customer base. After an extensive worldwide<br />

vetting <strong>of</strong> vendors, the world’s most crucial peace<br />

keeping organization NATO selected Desktop Alert! Buttressed<br />

by this selection is that <strong>of</strong> the Institute <strong>of</strong> Peace<br />

2012 selection <strong>of</strong> Desktop Alert. http://www.virtual-strategy.com/2012/04/17/united-states-institute-peace-selectsdesktop-alert-mass-notification-system#axzz3IbIAv3c4<br />

Desktop Alert was chosen over all vendors in this GSN<br />

competition for the coveted mass notification requirements<br />

by NATO HQ in Brussels Belgium. Key in our<br />

selection by NATO was the platforms ability to operate<br />

on the customer’s existing computational infrastructure<br />

thus saving several hundred thousand dollars in both<br />

hardware and burdensome configuration logistics.<br />

RECENT NEWS: DTA commended for its platform during<br />

Recent Shooter event at Fort Hood. (The Backup<br />

ARMY EM2P MNS Program alerted several minutes later<br />

than the DTA system!) Reference: http://www.desktopalert.net/News/fort-hood-update/<br />

DTA / Primary MNS at:<br />

• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K personnel)<br />

• ARMY AND AIR NATIONAL GUARD NATIONWIDE<br />

(500+K personnel)<br />

• NORTHERM COMMAND / NORAD (25K personnel)<br />

• U.S. Defense Threat Reduction Agency (DTRA) (10k<br />

Personnel)<br />

• AFDW Pentagon (confidential)<br />

• 200+ Army and Air Force locations worldwide<br />

DTA is currently the second largest provider to DoD<br />

and continue to build market share year by year. The<br />

unification <strong>of</strong> alerting between these agencies provides<br />

formidable actionable intelligence during emergent<br />

homeland events. Desktop Alert is the largest provider<br />

<strong>of</strong> MNS to the US Army Worldwide. Desktop Alert is<br />

the Primary MNS used at over 90% <strong>of</strong> US Army installations<br />

including Fort Hood. (NOTE! The US ARMY EM2P<br />

MNS Program is a BACKUP system only!). The nation’s<br />

54


most top tier 1st agency responders are all owners <strong>of</strong><br />

the DTA MNS. The Desktop Alert System sends desktop<br />

alert popups, text messages (SMS), e-mail and phone<br />

call alerts to all <strong>of</strong> these agencies personnel instantly<br />

in all 50 states and beyond. NO other vendor can boast<br />

these credentials; especially with these numerous ‘key’<br />

nation leading border defense agencies as it relates to<br />

not only border security; but all other security concerns<br />

to the nation. While other vendors may claim more seat<br />

licenses within DoD; only Desktop Alert has unified the<br />

nation’s most critical security agencies with the Military<br />

and DHS with one de-facto system. Desktop Alert is far<br />

and away the leading MNS in use by the <strong>Homeland</strong>s<br />

Most Crucial Defense Agencies! We hang our hat on the<br />

recent NATO selection, our usage by the National Guard<br />

Nationwide, our usage by FEMA HQ locations nationwide<br />

and <strong>of</strong> course the irrefutable fact that Desktop<br />

Alert is the ONLY proven vendor in this competition that<br />

delivers alerts in less than one minute. As a result <strong>of</strong> the<br />

NATO selection our company has also been contacted to<br />

REPLACE the incumbent for the entire US Marines Enterprise!<br />

When lives are at stake, seconds count. Numerous<br />

DoD agencies are unsatisfied with alerts received in<br />

5 to 10 minutes. The best is yet to come! Thank you for<br />

your review and consideration.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.desktopalert.net<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.prweb.com/releases/<strong>2014</strong>/11/<br />

prweb12296096.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Howard Ryan, CEO<br />

Desktop Alert Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(973) 580-3447<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

howard@desktopalert.net<br />

55


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

NICE Systems –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Intelligent Video Surveillance Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NICE Suspect Search<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

An active shooter is on the loose. An airport checkpoint<br />

has just been breached. Police are frantically searching<br />

for a lost child amid a crowded location. A suspicious<br />

bag is left behind in a busy transit station. In each <strong>of</strong><br />

these situations, time is <strong>of</strong> the essence. Surveillance video<br />

can provide clues to finding a suspect, but will you<br />

be able to pinpoint the exact video you need in time?<br />

Here’s where NICE Suspect Search can help. Suspect<br />

Search is a patent-pending video analytics technology<br />

that helps you quickly locate and retrace the movements<br />

<strong>of</strong> a person <strong>of</strong> interest within a video surveillance network.<br />

It can scan an hour <strong>of</strong> video in less than a minute,<br />

automatically filtering out 95 percent <strong>of</strong> irrelevant images.<br />

Suspect searches can be initiated using a recorded<br />

image, an uploaded full body photo, or a suspect composite.<br />

As the search reveals snapshots <strong>of</strong> the suspect<br />

56<br />

over time across different cameras, it evolves into a<br />

history <strong>of</strong> their movements before and potentially after<br />

the incident. Timely situational awareness is critical so<br />

snapshots are presented on an actual map. This answers<br />

questions like how did the suspect get here? Where did<br />

he go? Did he meet up with anyone or was he alone?<br />

And is he still on premise? Suspect Search revolutionizes<br />

video forensics, both for real-time use and for after-thefact<br />

investigations. <strong>Digital</strong>ly stamped images, video, and<br />

location information associated with each search can<br />

easily be shared with police departments and district<br />

attorneys for forensic investigations.


WHAT SETS SUSPECT SEARCH APART<br />

There are technologies on the market that can search<br />

for a specific color, but until now, none <strong>of</strong> them could<br />

search for a specific person, especially not in real-time.<br />

Suspect Search takes into account three parameters -- a<br />

full body image, the unique human signature <strong>of</strong> a person<br />

(e.g. size and the way they walk), and the textures<br />

and colors associated with that person like their clothes,<br />

accessories, hair, or skin. The Suspect Search algorithm<br />

analyzes, tags, sorts, and stores images in a database according<br />

to these parameters, increasing search accuracy.<br />

Furthermore, calculations are done in real-time. Video is<br />

analyzed as it is captured, so searches can begin immediately<br />

and results are available within seconds. Another<br />

differentiator is Suspect Search’s ability to simultaneously<br />

search across multiple camera feeds. Once the<br />

target has been located, Suspect Search’s geo-spacial<br />

capabilities allow operators to trace and retrace the suspect’s<br />

route to predict patterns <strong>of</strong> movement for quick<br />

apprehension.<br />

SUSPECT SEARCH BENEFITS<br />

By providing near real-time, actionable information<br />

about the whereabouts and movements <strong>of</strong> persons <strong>of</strong> interest,<br />

Suspect Search can accelerate response times and<br />

effect positive outcomes, whether that means finding a<br />

lost child faster, apprehending<br />

suspects quicker, or avoiding<br />

costly shutdowns.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.nice.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/nice-suspect-search<br />

https://www.youtube.com/watch?v=PD-hSXOt5<br />

FA&index=54&list=PLC3F1BBC80EE0AA53<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

57


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Automatic Systems –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Perimeter Protection Product/System (Excluding<br />

Video)<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SlimLane Short - Swing Barrier Optical Turnstile<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SlimLane Short swing door optical turnstiles combine<br />

high speed bidirectional throughput with the highest reliability,<br />

security, and footprint variations <strong>of</strong> any barrier<br />

type optical turnstile. Available in narrow or wide lane<br />

versions and single or double swing doors in 24 or 120 able with either low glass height (35”), medium (47”),<br />

volt power configuration, SlimLane is already widely or high (67”) glass versions. The shorter cabinet length<br />

known as the most versatile swinging glass turnstile. allows for easier implementation into most elevator<br />

SlimLane <strong>of</strong>fers IP connectivity – and was the first security<br />

entrance control lane to boast this feature. SlimLane architectural demands in many front lobbies. Automatic<br />

bank openings, as well as to more readily adapt to strict<br />

is UL 2593 listed to help satisfy the most stringent <strong>of</strong> Systems is a leading manufacturer <strong>of</strong> pedestrian and<br />

building and safety codes. The standard and unique vehicle entrance control equipment, with North American<br />

headquarters/manufacturing in Brossard, Quebec,<br />

“SecuriSafe” mode prevents forced entry attempts while<br />

still allowing emergency egress at any time, and Slim- Canada. Under GSA Schedule Contract #GS-07F-0109Y,<br />

Lane is the only lane <strong>of</strong> its kind to <strong>of</strong>fer such a feature. Automatic Systems <strong>of</strong>fers both their full range <strong>of</strong> pedestrian<br />

and vehicle entrance control systems to federal<br />

This new SlimLane <strong>of</strong>fers a 48” cabinet length (existing<br />

standard length is 62”). Both product lengths are avail- government security buyers.<br />

58


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.automatic-systems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Martha Tsiritas, Marketing Manager<br />

Automatic Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(800) 263-6548 xt234<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

mtsiritas@automatic-systems.com<br />

59


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Secure USA –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Crash Barrier (Gates, Fences, Bollards, Guard<br />

Booths)<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SideWALK Shallow Foundation Bollards<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The homeland security threat to urban and corporate<br />

campus facilities makes bollards a necessity for protetive<br />

stand<strong>of</strong>f zones for at-risk structures. SecureUSA ®<br />

invented shallow foundation bollard solutions that<br />

meet stringent ASTM performance specifications in<br />

circumstances which would normally preclude the use<br />

<strong>of</strong> “standard” deep foundation bollards. They do it with<br />

aesthetic style and design sensitivity, without sacrificing<br />

performance. T The SecureUSA ® SideWALK ® Bollard<br />

was developed to overcome the installation challenges<br />

commonly found in any location where underground<br />

infrastructure and utilities prevent deeper excavation.<br />

They carry ASTM-C40 to M50 crash ratings/zero penetration<br />

with a single bollard strike in as little as 6 inch<br />

foundation depths and a footprint designed to fit in virtually<br />

any sidewalk pavement. Standard crash rated bol-<br />

60<br />

lards typically require foundation depths <strong>of</strong> up to three<br />

feet or more to achieve desired crash ratings. In major<br />

metropolitan cities where the area under the pavement<br />

and streets are crowded with utilities and other infrastructure,<br />

a deeper foundation is virtually impossible.<br />

Even other “shallow” bollards that have been subjected<br />

to actual crash tests require deeper foundations than the<br />

minimal 9 inches for SecureUSA’s ASTM-M30 (15,000lb<br />

vehicle @ 30 mph) and M50 (15,000lb vehicle @ 50<br />

mph) product. The SideWALK ® Bollard Series consists<br />

<strong>of</strong> individual bollards that are easy to install even when


the terrain causes each <strong>of</strong> the bollards to change slope,<br />

grade and curvature. This is a unique design for shallow<br />

foundation crash rated bollards as other manufacturers<br />

use a fixed sled design comprising a number <strong>of</strong> bollards<br />

configured into less flexible bollard sets. The SecureUSA ®<br />

SideWALK ® Bollard allows installation spacing to be<br />

more flexible around typical obstructions, such as utility<br />

vents, drains and other typical roadway and sidewalk<br />

restrictions. This makes for cost effective protection in<br />

normally prohibitive environments. SecureUSA ® Side-<br />

WALK ® Bollards shallow foundation bollards provide<br />

ADA compliant, pedestrian friendly stand<strong>of</strong>f zones with<br />

the ability to restrict vehicular access without obstructing<br />

pedestrian access, while meeting ASTM standards.<br />

This is a major technological achievement. SecureUSA ®<br />

also pioneered the development and production <strong>of</strong><br />

all-electric retractable bollards that save time and money<br />

in installation and maintenance over the life <strong>of</strong> the<br />

system. No hydraulics minimize the potentially negative<br />

environmental impact <strong>of</strong> leaks and spills associated with<br />

hydraulic systems. I have found the staff at SecureUSA ®<br />

to be the highest quality pr<strong>of</strong>essionals dedicated to<br />

excellent “post-sale-installation” customer service. It has<br />

been a delight to work with them.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.secureUSA.net<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.secureusa.net/products/sidewalkshallow-bollards/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dr. Stephen R. Crosby, Manager, Entrusted Creative<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(760) 333-7414 (both <strong>of</strong>fice and cell)<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

steve@entrustedcreative.org<br />

61


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

NICE Solutions –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical <strong>Security</strong> Information Management<br />

(PSIM) Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NICE Situator<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NICE remains at the forefront <strong>of</strong> PSIM technology’s<br />

evolution. With a focus on continued growth and expansion,<br />

we’ve extended Situator’s reach beyond the<br />

control room and into the field. Our new innovative<br />

mobile application addresses operational issues, as well<br />

as safety and security. Moreover, NICE Situator was<br />

selected to help secure some <strong>of</strong> the world’s most highpr<strong>of</strong>ile<br />

cities and events in <strong>2014</strong>, including the World<br />

Cup hosted in Brazil, the Winter Olympics in Sochi and<br />

Super Bowl XLVIII in East Rutherford, NJ.<br />

Why it’s the best PSIM solution<br />

New, Innovative Applications:<br />

We’ve extended NICE Situator’s capabilities out and into<br />

the field with a web-based GIS mobile application. First<br />

deployed by the Los Angeles International Airport (LAX),<br />

the NICE Situator Enterprise Geographical Information<br />

System (EGIS) Web application, enables field personnel<br />

to view all open incidents in Situator and log new incidents<br />

from a tablet. This creates a shared environment<br />

for managing incidents, enhanced team collaboration<br />

and increased situational awareness.<br />

NJ TRANSIT, the largest statewide public transportation<br />

system in the U.S. has also deployed a Mobile App. NJ<br />

TRANSIT used the solution for the first time during Super<br />

Bowl XLVII to streamline communications between<br />

the command center and 900 NJ TRANSIT Super Bowl<br />

ambassadors on the ground. In addition to reporting<br />

incidents, field personnel were able to use the App to<br />

62


look up schedules and other information to assist passengers.<br />

Following the successful Super Bowl rollout,<br />

NJ TRANSIT plans to deploy the solution in conjunction<br />

with other future large events and extend the Mobile<br />

App to its maintenance, customer service and transit<br />

police personnel.<br />

Successful Global Deployments:<br />

NICE Situator continues to improve operations and provide<br />

situational awareness, management and resolution<br />

capabilities to organizations across industries and urban<br />

centers around the world. Glasgow, Scotland is using<br />

NICE Situator to consolidate data from various city-wide<br />

services like Public Space CCTV and traffic control<br />

within a single operations center. In Sochi, Russia, NICE<br />

Situator was used to help secure the recent Winter<br />

Olympics in addition to heightening overall security and<br />

safety in the city known as a destination for winter sport<br />

enthusiasts. A large city in Brazil also deployed Situator,<br />

which was used to secure some <strong>of</strong> the World Cup games<br />

this summer – the largest sporting event in the world.<br />

Market Leadership Industry Recognition:<br />

For the third consecutive time, IHS (formerly IMS<br />

Research) has ranked NICE the global leader in PSIM<br />

solutions (Situator) and has named NICE the leading<br />

PSIM vendor worldwide. In addition, Frost & Sullivan<br />

has defined Situator as one <strong>of</strong> the few Tier 1 PSIM<br />

solutions available.<br />

63<br />

Comprehensive investigations:<br />

Through its integration with NICE Inform, NICE Situator<br />

provides the industry’s most comprehensive debriefing<br />

and investigation solution. The integrated reconstruction<br />

platform is the first such solution capable <strong>of</strong> capturing<br />

and synchronizing replay <strong>of</strong> multi-media sources including<br />

video, audio, GIS-based displays and key operational<br />

data. Step-by-step operator actions and 360-degree incident<br />

reconstructions can now be incorporated into the<br />

debriefing process for investigations, training, planning<br />

and prevention.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.nice.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

web page: http://www.nice.com/situation-management/nice-situator<br />

PSIM market leader: http://www.nice.com/niceranked-market-share-leader-global-psim-market<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Hikvision –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Network IP Cameras<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

3MP 360 Fisheye Camera<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The first <strong>of</strong> its kind to <strong>of</strong>fer a true 30 FPS fisheye view range processing. The inclusion <strong>of</strong> bi-directional audio,<br />

in full resolution, Hikvision’s 3MP 360 Fisheye stands alarm I/O, and in-camera recording with a 64 GB SD<br />

out from its competitors. With five channels <strong>of</strong> video, it card allow the Hikvision Fisheye to become a virtually<br />

single-handedly captures high-quality images from every standalone system. Combined with the special features<br />

corner <strong>of</strong> a particular location, eliminates blind spots, <strong>of</strong> Hikvision’s Smart Series, such as line crossing and<br />

and dewarps the image to allow for multiple viewing intrusion detection, the Fisheye camera is an excellent<br />

modes: a panoramic (180 degree) view, a 360 degree choice for detailed coverage <strong>of</strong> wide, open areas. Airports,<br />

conference rooms, parking lots, building fore-<br />

view, and three virtual PTZ views. The Fisheye does<br />

more on its own than multiple cameras trying to do the courts, storage yards, loading bays, and classrooms are<br />

same thing. The camera’s 1/3” progressive scan CMOS perfect venues for the expansive coverage provided by<br />

sensor provides high resolution images <strong>of</strong> up to 2048 x the Fisheye. In addition, the unique attributes <strong>of</strong> this<br />

1536. Integrated IR allows for even disbursement over camera means that it lends itself to particularly creative<br />

the entire image, eliminating hot spots. In fact, the IR uses. One example involves an educational facility in<br />

functionality boasts up to 50 feet <strong>of</strong> visibility in low- or New Mexico, comprised <strong>of</strong> a middle school and a high<br />

zero-light conditions. Hikvision’s award-winning WDR school, which installed a Fisheye in their gymnasium.<br />

algorithms provide industry-leading 120dB <strong>of</strong> dynamic The Fisheye camera’s panoramic view covers the entire<br />

64


gym, and each <strong>of</strong> the digital PTZs are assigned to different<br />

school administrators. The digital PTZ system lets<br />

users use the camera like a conventional dome camera<br />

without any moving parts, improving reliability. Because<br />

there are different groups <strong>of</strong> students using the gym<br />

throughout the day, the principal <strong>of</strong> the high school has<br />

access to his own PTZ, as do the vice principal <strong>of</strong> the<br />

high school and the principal <strong>of</strong> the middle school. Each<br />

user can manipulate their PTZ remotely and autonomously<br />

without stepping on each other’s toes, while<br />

also viewing the 180 to see the big picture. With over<br />

3000 Hikvision engineers devoted to R&D, it’s no wonder<br />

that cutting-edge cameras such as the Hikvision 360<br />

Fisheye change the landscape <strong>of</strong> modern video surveillance.<br />

Hikvision’s commitment to innovation allows its<br />

customers to maximize surveillance with the Fisheye’s<br />

user-friendly features or incorporate the Fisheye into<br />

unique, unconventional, surveillance solutions.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.hikvision.com/en/us<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Fisheye spec sheet: http://www.hikvision.com/en/<br />

us/products_show.asp?id=9810<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Anna Boudinot, Content Manager<br />

Hikvision USA<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (909) 612-9034<br />

cell: (323) 470-7772<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

anna.boudinot@hikvisionusa.com<br />

65


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

HID Global –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Physical <strong>Security</strong> Access Control & Identification<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

pivCLASS 4.3<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Fully tested by the U.S. General Services Administration<br />

for compliance with FICAM, Federal Identity Credential<br />

and Access Management programs, pivCLASS ® 4.3 is the<br />

first GSA FICAM Certified Validation System available in<br />

the security market today. The extensive Government<br />

portfolio <strong>of</strong> credential authentication solutions enables<br />

customers to comply with government physical access<br />

control system (PACS) mandates, outlined in HSPD-12<br />

and FIPS 201, to PIV-enable a PACS. By providing an<br />

end-to-end solution that eliminates the need to rip and<br />

replace the existing access control infrastructures, the<br />

portfolio’s extensive range <strong>of</strong> Personal Identity Verification<br />

(PIV) solutions allow agencies to use PIV-enabled<br />

cards for strong PKI-based validation for physical access.<br />

With its addition <strong>of</strong> the pivCLASS MultiPACS s<strong>of</strong>tware to<br />

the pivCLASS portfolio it is significantly easier for large<br />

government agencies and organizations to provision<br />

identities across many different, unconnected access<br />

control systems located throughout geographically dis-<br />

persed operations. The s<strong>of</strong>tware is designed to streamline<br />

and simplify the process <strong>of</strong> registering Personal<br />

Identity Verification (PIV) credentials into multiple,<br />

disparate physical access control systems (PACS). A key<br />

element <strong>of</strong> HID Global’s expanded pivCLASS portfolio<br />

<strong>of</strong> FIPS 201-based credential registration and verification<br />

solutions, MultiPACS was created for government<br />

agencies that commonly operate in numerous buildings<br />

in several geographic areas, using many different PACS<br />

supplied by multiple vendors No other vendor currently<br />

<strong>of</strong>fers a complete portfolio that provides authentication<br />

at both the enrollment function and at the point <strong>of</strong><br />

access (e.g., door), registration <strong>of</strong> validated credentials<br />

into over 30 different PACS head-end products, and a<br />

variety <strong>of</strong> interoperable readers and reader form factors<br />

including mobile handhelds. Other vendors generally<br />

provide either the readers or s<strong>of</strong>tware for the PACS<br />

head-end enrollment function. HID is the only vendor<br />

that <strong>of</strong>fers this complete FIPS 201 solution from a single<br />

66


source. With the pivCLASS portfolio, customers can use<br />

a phased deployment approach designed to meet their<br />

immediate needs while staying within their budget. For<br />

example, an agency may want to initially enable their facility<br />

to accept PIV cards without moving immediately to<br />

strong authentication at each door. This can be achieved<br />

by deploying the pivCLASS Registration Engine, the<br />

pivCLASS Certificate Manager and pivCLASS Readers<br />

configured in Wiegand output mode. This will enable<br />

PIV cardholders to be registered into the PACS head-end<br />

and to use their cards to gain access. At some later time,<br />

strong authentication can be achieved by deploying the<br />

pivCLASS Reader Services s<strong>of</strong>tware at the PACS head-end<br />

and the pivCLASS Authentication Modules (PAMs) for<br />

the desired access points along with easily reconfiguring<br />

the existing installed pivCLASS readers. pivCLASS<br />

also supports the transition from legacy cards such as<br />

magnetic stripe, proximity and iCLASS, by allowing<br />

simultaneous use <strong>of</strong> these cards along with PIV cards.<br />

This is achieved by adding the PIV card as an additional<br />

credential to an existing PACS cardholder record. At the<br />

appropriate time, the system can be reconfigured to<br />

only accept PIV cards, seamlessly completing the transition.<br />

The pivCLASS best <strong>of</strong> breed federal identity solution<br />

also enables users to:<br />

• Register identification credentials into multiple similar<br />

or disparate PACS<br />

• Register credential and verify FIPS 201-based credentials<br />

• Harvest, validate and register credentials into over 30<br />

different PACS head end products<br />

• Provides strong one-, two- or three-factor authentication<br />

at the door<br />

• Verify cardholders identities and check the cards’<br />

revocation status<br />

• Revalidate the harvested certificates after registration<br />

and suspend the card in the PACS if the certificate is<br />

found to have been revoked<br />

• Via a PAM, cache validation status to deliver PKI-based<br />

high security at the door<br />

• Support both FIPS-201 PKI-based cards and legacy<br />

cards ( PIV, PIV-I, CIV, CAC, TWIC, iCLASS, HID Prox<br />

and others)<br />

67<br />

• Import credentials from an authoritative data source,<br />

card management system or human resource database<br />

and provision these credentials into the PACS<br />

pivCLASS meets FIPS 140 U.S. government computer<br />

security standards that specify requirements for cryptography<br />

modules.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.hidglobal.com/government/piv<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

HID Global’s pivCLASS Government Solutions portfolio<br />

is an extensive product family that makes it easy<br />

for U.S. Federal Government, government contractors<br />

and other facilities to comply with security regulations<br />

and to use their Personal Identity Verification (PIV)<br />

card and other smart cards for physical access control,<br />

resulting in compliance, interoperability and high<br />

security.<br />

New pivCLASS credentials: http://www.hidglobal.<br />

com/products/cards-and-credentials/pivclass/<br />

pivclass-smart-card<br />

New MultiPACS: http://www.hidglobal.com/products/s<strong>of</strong>tware/pivclass/pivclass-multipacs<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

HID Global<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Leah Washington: (917) 701-7601<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

lwashington@hidglobal.com


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

government agency awards<br />

69<br />

70<br />

Roster <strong>of</strong> <strong>2014</strong> Winners<br />

GSN Interview with Distinguished Judge <strong>of</strong> <strong>2014</strong> <strong>Awards</strong>,<br />

K. Denise Rucker Krepp<br />

74<br />

76<br />

78<br />

80<br />

82<br />

84<br />

86<br />

88<br />

90<br />

92<br />

94<br />

96<br />

98<br />

100<br />

Winning entries reproduced with permission <strong>of</strong>:<br />

Los Angeles International Airport (LAX)<br />

NAFTOPORT LTD<br />

Port Freeport<br />

NJ Transit<br />

Denver Regional Transportation District<br />

U.S. Army Garrison (USAG)<br />

Northern Command/Norad<br />

South Bend, Indiana Police Department<br />

City <strong>of</strong> Philadelphia, PA<br />

Community Safety Glasgow, Scotland<br />

New York State Criminal Justice (DCTS)<br />

Center for <strong>Homeland</strong> Defense and <strong>Security</strong><br />

U.S. Customs and Border Protection<br />

Government <strong>Security</strong> News<br />

68


Winners in the <strong>2014</strong><br />

<strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

government agency awards<br />

Most Notable Airport/Aviation<br />

<strong>Security</strong> Program<br />

Los Angeles International Airport – Platinum Winner<br />

Most Notable Maritime/Seaport<br />

<strong>Security</strong> Program<br />

Port <strong>of</strong> Charleston – Platinum Winner<br />

Naftoport Ltd, Gdańsk, Poland – Gold Winner<br />

Port Freeport – Silver Winner<br />

Most Notable Railroad/Mass Transit<br />

<strong>Security</strong> Program<br />

NJ Transit – Gold Winner<br />

Denver Regional Transportation District – Silver Winner<br />

Most Notable Emergency Response<br />

Implementation – Federal, State or Local<br />

Northern Command/NORAD – Platinum Winner<br />

375th <strong>Security</strong> Forces Squadron – Gold Winner<br />

Most Notable<br />

Municipal/County <strong>Security</strong> Program<br />

South Bend, Indiana Police Department – Platinum Winner<br />

City <strong>of</strong> Philadelphia, PA – Gold Winner<br />

Community Safety Glasgow, Scotland – Gold Winner<br />

Orange County, CA Court System – Silver Winner<br />

Most Notable State Government<br />

<strong>Security</strong> Program<br />

New York State Criminal Justice (DCTS) – Gold Winner<br />

Most Notable<br />

Critical Infrastructure Program<br />

U.S. Army Garrison – Silver Winner<br />

Most Notable Federal Government<br />

<strong>Security</strong> Program<br />

Center for <strong>Homeland</strong> Defense and <strong>Security</strong> – Platinum Winner<br />

Pentagon Force Protection Agency – Platinum Winner<br />

U.S. Customs and Border Protection – Platinum Winner<br />

69


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

K. Denise Rucker Krepp, Distinguished Judge,<br />

GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

Denise Krepp is a homeland security and transportation consultant who began her<br />

career as an active duty Coast Guard <strong>of</strong>ficer. After September 11, 2001, Denise was a<br />

member <strong>of</strong> the team that created the Transportation <strong>Security</strong> Administration and the<br />

U.S. Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>. Denise then worked for the House <strong>of</strong> Representatives’<br />

<strong>Homeland</strong> <strong>Security</strong> Committee and advised members on homeland defense,<br />

maritime security, and critical infrastructure issues. She also served as Maritime<br />

Administration Chief Counsel during the first Obama administration. In addition to<br />

consulting, Denise is currently a pr<strong>of</strong>essor at Pennsylvania State University; serves on the Board <strong>of</strong> Directors<br />

for The Infrastructure <strong>Security</strong> Partnership; is a commentator on Backroom Politics, a weekly radio show;<br />

and an Advisory Neighborhood Commissioner, a local elected position in Washington, DC.<br />

GSN: What should the Department <strong>of</strong><br />

<strong>Homeland</strong> <strong>Security</strong> focus on in the next<br />

ten years?<br />

KDRK: DHS should redefine its definition <strong>of</strong> transportation<br />

“stakeholder” and increase stakeholder involvement<br />

in the development <strong>of</strong> security plans and training exercises.<br />

Currently, stakeholders are defined as owners and<br />

operators. For example, freight and passenger rail stakeholders<br />

in Washington, DC are limited to Amtrak, CSX,<br />

Norfolk Southern, Washington Metropolitan Transit Authority<br />

(WMATA), DC <strong>Homeland</strong> <strong>Security</strong> and Emergency<br />

Management Agency, DC Department <strong>of</strong> Transportation,<br />

etc. Individuals who live and work next to the highways<br />

and rail lines that cut through the city are not included.<br />

Excluding local individuals from the definition<br />

<strong>of</strong> stakeholder means that they are not involved in the<br />

development <strong>of</strong> federal policies. When the federal government<br />

develops new regulations and initiatives, it seeks<br />

input from the government coordinating councils (GCCs)<br />

and sector coordinating councils (SCCs). The GCCs are<br />

comprised <strong>of</strong> federal and state agencies. The SCCs are<br />

comprised <strong>of</strong> owners and operators. There is no one at<br />

the table representing the individuals that live and work<br />

along transportation routes.<br />

Local neighbor representation is critical because<br />

these individuals are the ones that will be immediately<br />

impacted when an accident occurred. In 2013, forty-seven<br />

people died when a train derailed in Lac-Megantic, Cana-<br />

70


da. A similar accident could occur in the United States but<br />

neighbors along freight rail routes aren’t being formally<br />

consulted about ways to improve rail safety and security.<br />

The lack <strong>of</strong> stakeholder involvement in rail security<br />

plans was highlighted in a Council <strong>of</strong> the District <strong>of</strong><br />

Columbia hearing last year. According to the Washington<br />

Post, neighbors testified that they weren’t notified about<br />

the hazardous materials that are being routinely transported<br />

through the community. Local DC <strong>of</strong>ficials stated that<br />

they couldn’t share the data because it is sensitive information.<br />

At the same time, DC <strong>of</strong>ficials testified that they<br />

hadn’t conducted rail emergency exercises in several<br />

years. In addition, local <strong>of</strong>ficials also testified that they<br />

needed to update rail vulnerability assessments. The<br />

problem with these answers is that the Implementing Recommendations<br />

<strong>of</strong> the 9/11 Commission Act requires rail<br />

carriers to submit rail security plans to DHS for review and<br />

DHS is supposed to consult local <strong>of</strong>ficials when reviewing<br />

these plans. If local authorities don’t have an up-to-date<br />

list <strong>of</strong> vulnerabilities, how is DHS supposed to know if the<br />

security plans are adequate?<br />

Broadening the definition <strong>of</strong> transportation stakeholder<br />

to include local individuals who live and work next<br />

to transportation lines will ensure that local agencies are<br />

providing quality input. Neighbors know the area, they<br />

will be on-scene when the accident occurs, and including<br />

them in the planning stages will help post-incident<br />

recovery. Additionally, neighborhood involvement will put<br />

pressure on local agencies to maintain accurate risk assessment<br />

information.<br />

Please note that the situation in Washington, DC<br />

is not an anomaly. Neighbors around the country are<br />

expressing similar concerns and DHS should take the opportunity<br />

to change its processes.<br />

As an elected local <strong>of</strong>ficial, what guidance<br />

can you give to your fellow <strong>of</strong>ficials about<br />

working with the Department <strong>of</strong> <strong>Homeland</strong><br />

<strong>Security</strong>?<br />

KDRK: Local <strong>of</strong>ficials have jurisdiction over local agencies<br />

so its important to know what is happening at the<br />

local level before contacting DHS. In DC, there are significant<br />

problems within the DC <strong>Homeland</strong> <strong>Security</strong> and<br />

Emergency Management Agency and the DC Department<br />

<strong>of</strong> Transportation. The rail hearings last year highlighted<br />

appalling dis-functionality and as a result, Councilmembers<br />

Cheh, Allen, and Grosso introduced legislation last<br />

week that will significantly strengthen rail security in the<br />

city.<br />

One important aspect <strong>of</strong> the proposed DC legislation<br />

is increased local oversight over the federal rail security<br />

plans. The legislation requires local agencies to review<br />

them. This requirement is already in the 9/11 Act but by<br />

introducing legislation, local elected <strong>of</strong>ficials are sending<br />

a strong signal to local agencies that they must comply<br />

this requirement. The requirement to submit semi-annual<br />

reports to the DC Council also reinforces this message.<br />

When the DC Council receives the semi-annual reports,<br />

they should work with political appointees in DHS<br />

to address local concerns. From personal past experience,<br />

relying on local agencies and career federal <strong>of</strong>ficials to<br />

solve problems won’t work. Local elected <strong>of</strong>ficials have the<br />

71


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

K. Denise Rucker Krepp, Distinguished Judge,GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

positional authority to overcome bureaucratic stumbling<br />

blocks and they should use it to best address the needs <strong>of</strong><br />

their constituencies.<br />

What keeps you up at night?<br />

KDRK: Mass transit security in Washington, DC. Eight<br />

years ago, the 9/11 Act mandated mass transit security<br />

plans. These requirements were put in place after the<br />

horrific London and Madrid bombings. I’m concerned that<br />

the Washington, DC plan isn’t sufficient.<br />

On January 12th, one individual died and seventy<br />

more were sent to hospitals when smoke filled a WMATA<br />

subway tunnel. It took almost 45 minutes for firefighters<br />

to begin evacuating stranded passengers. During these<br />

crucial minutes, riders had to depend on one another to<br />

survive. If properly drafted and implemented, the 9/11 Act<br />

mass transit security plan should have prevented this type<br />

<strong>of</strong> delay.<br />

I have personal knowledge about the vulnerabilities<br />

that continue to exist for handicapped passengers.<br />

Last spring, my nine year old daughter and I were forced<br />

to evacuate a WMATA subway train. We were in the last car<br />

and as such, we had to walk through all <strong>of</strong> the cars to get<br />

out. One <strong>of</strong> the individuals in the car with us was in a motorized<br />

wheel chair. The wheel chair could fit through the<br />

regular door openings but it couldn’t fit through the doors<br />

between the rail cars. This design flaw meant that someone<br />

would have to carry the handicapped gentleman out<br />

<strong>of</strong> the train. None <strong>of</strong> my fellow passengers did. Instead, he<br />

was forced to stay behind while my daughter and I went in<br />

search <strong>of</strong> a WMATA representative to help him. There was<br />

no fire that day but what would have happened if there<br />

had been one. Based on what happened on the January<br />

12th, I’m not confident he would have survived.<br />

72


GSN Announces the 2015<br />

Airport/Seaport/Boarder <strong>Security</strong> <strong>Awards</strong> Program<br />

GSN’s second annual awards program recognizing excellence in Airport/Aviation <strong>Security</strong>,<br />

Maritime/Port <strong>Security</strong> and Border <strong>Security</strong> will open for entries on Monday, March 2, 2015.<br />

The updated 2015 edition <strong>of</strong> this exciting program will once again cover basic technology<br />

groups, including Access Control/Identification, Detection Solutions, Air/Land and Sea<br />

Communications and Surveillance, Integrated <strong>Security</strong> Programs and Aviation/Maritime<br />

and Border <strong>Security</strong> Human Resource Development.<br />

In addition to the staples <strong>of</strong> Cargo Screening, Thermal Nightvision, Integrated Harbor<br />

<strong>Security</strong> and Perimeter Protection, you can expect many new categories in Satellite<br />

Communications, Aviation and Military Beacons and Air Traffic Control – plus new categories<br />

recommended by knowledgable vendors or outstanding operators or security teams.<br />

The last group <strong>of</strong> entries will once again be dedicated to the following three categories:<br />

* Most Notable Airport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />

* Most Notable Seaport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Upgrade<br />

* Most Notable Border <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />

AIRPORT | SEAPORT | BORDER<br />

SECURITY<br />

AWARDS PROGRAM<br />

43 73


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Los Angeles International Airport<br />

(LAX) – <strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Airport/Aviation <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LAX Enterprise Geographical Information System<br />

(EGIS) Web application<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Los Angeles International Airport (LAX) is one <strong>of</strong> the<br />

busiest airports in the world. As such, it has invested<br />

heavily in technology, deploying new solutions to<br />

strengthen its safety, security, and operations. Keeping<br />

things running smoothly hinges on real-time collaboration<br />

and coordination, so LAX sought a faster and more<br />

efficient method for various stakeholders within the<br />

Airport Response Coordination Center (ARCC) and field<br />

operations to share information.<br />

LAX recently deployed an innovative new situational<br />

awareness tool that does exactly that. The airport has<br />

implemented the NICE Situator Enterprise Geographical<br />

Information System (EGIS), a web application that<br />

extends situation management capabilities from the<br />

control room to the field. The solution, jointly devel-<br />

oped by NICE and AECOM, provides real-time information<br />

about all aspects <strong>of</strong> the airport to airport operations<br />

field staff, the ARCC, and other airport <strong>of</strong>ficials, creating<br />

a shared environment for managing incidents as well as<br />

promoting collaboration and coordination. The system<br />

handles security, safety, and operations, including everything<br />

from emergency response to ensuring compliance<br />

with federal regulations.<br />

The Web application uses the sophisticated geospatial<br />

and mapping capabilities <strong>of</strong> Esri’s ArcGIS Server to<br />

provide customized, layered views <strong>of</strong> airport buildings,<br />

property and infrastructure. All relevant incident stakeholders<br />

can visualize the same incident on a map and<br />

74


engage in interactive dialogue via the comments log,<br />

enabling better communicate as events unfold. They can<br />

also share response plans, even an evacuation route, by<br />

drawing on the map, annotating it, and saving it to the<br />

system.<br />

Field personnel can also immediately pull up assets in<br />

an impact zone – for instance, a video camera within<br />

100 feet <strong>of</strong> the incident – or use the application’s robust<br />

search engine to search for nearby geospatial assets,<br />

like the exits closest to an incident location. They can<br />

also create new incidents, manage ongoing ones and<br />

complete specific tasks assigned to them, which reduces<br />

reliance on radio communications and enhances compliance.<br />

The Web application is also helping field operators more<br />

efficiently manage day-to-day tasks, such as Federal Aviation<br />

Administration-mandated Part 139 airfield inspections.<br />

Under Federal Aviation Regulations Part 139, United<br />

States commercial service airports are required to<br />

conduct various assessments <strong>of</strong> each runway; examine<br />

pavement markings, lighting, signs and safety areas; and<br />

oversee ground vehicle operations. If an issue arises,<br />

field operators can easily create a new incident on their<br />

mobile devices, which is resolved through Situator’s<br />

workflows and recorded for compliance purposes.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lawa.org/welcomelax.aspx<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/lax-extends-incident-management-field-operations-nice-situator-webapplication<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

News story: http://mobileenterprise.edgl.com/<br />

news/LAX-Ups-Situational-Awareness,-Mobilizing-Operations97734<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

“The NICE-AECOM solution is allowing us to transform<br />

the way we manage safety, security, and operations at<br />

LAX,” said Dominic Nessi, Deputy Executive Director/<br />

Chief Information Officer at Los Angeles World Airports.<br />

Based on our ongoing success with NICE Situator, we<br />

sought a way to apply these capabilities to our field<br />

operations. Now, not only are we able to maximize the<br />

use <strong>of</strong> our existing PSIM, situation management and GIS<br />

technologies, we are strengthening our entire security<br />

and operations apparatus.”<br />

75<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Naftoport Ltd, Gdańsk, Poland –<br />

<strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Maritime/Seaport <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Naftoport Port <strong>Security</strong> Initiative<br />

Reason this entry deserves to win:<br />

–––––––––––––––––––––––––––––––––––––––– and sensors for detection and physical security. This<br />

Naftoport is the only crude oil and liquid fuels terminal<br />

in Poland. It performs transhipments <strong>of</strong> crude oil and<br />

refined oil products in the Port <strong>of</strong> Gdańsk. The company<br />

is a critical part <strong>of</strong> the petroleum supply chain for Polish<br />

and German refineries and crude oil transit from Russia<br />

and Kazakhstan to the ports <strong>of</strong> Western Europe, the<br />

United States and the Far East.<br />

Due to Naftoport’s close proximity to Poland’s border<br />

and the nature <strong>of</strong> its activities, the port has heightened<br />

security needs that include the threat <strong>of</strong> terrorist and<br />

activist attacks as well as unauthorized entry into the<br />

Naftoport facility.<br />

As a result <strong>of</strong> expansion over the years Naftoport had a<br />

large number <strong>of</strong> non-integrated legacy security systems<br />

caused problems with the speed <strong>of</strong> reaction with each<br />

operator having to act manually to play back incidents<br />

in order to find out what took place.<br />

The primary purpose <strong>of</strong> this project was to integrate<br />

these siloed security systems and sensors, so that security<br />

<strong>of</strong>ficers could more effectively track and analyze<br />

information and respond to threats in real time. Naftoport<br />

also wanted to empower security operators with<br />

the ability to respond to events consistently, regardless<br />

<strong>of</strong> their experience or capabilities.<br />

The port has successfully deployed NICE Situator PSIM<br />

and NiceVision VMS with intrusion detection video analytics<br />

to protect its critical resources. “Our new video<br />

analytics greatly increases facility security. We’ve achieved<br />

our goal <strong>of</strong> being able to reliably detect intruders inside<br />

76


the perimeter,” said Cezary Jozwiak, Chief <strong>Security</strong><br />

Officer – Port Facilities <strong>Security</strong> Officer, Naftoport.<br />

integrates all <strong>of</strong> our security systems and processes,” he<br />

continued. “It has made us much more efficient.”<br />

NICE’s advanced situation management solution, NICE<br />

Situator, <strong>of</strong>fers a single, centralized interface and automated,<br />

adaptive workflows that are helping port authorities<br />

respond quicker and more efficiently to unfolding<br />

incidents.<br />

Working together, NICE and system integrator ISM EuroCenter<br />

S.A. leveraged PSIM to integrate nine security<br />

systems for enhanced situational awareness. These<br />

included: NiceVision intrusion detection analytics, surveillance<br />

cameras, radar, intruder and hold up alarms,<br />

passive infrared, ACS, GPS and automatic identification<br />

systems. Even sonar is being fed into Situator to detect<br />

intrusions from underwater. “Through our NICE Situator<br />

PSIM solution, we were able to successfully integrate<br />

nine security subsystems working in parallel, with mutual<br />

correlation and dedicated procedures,” explained<br />

Jozwiak.<br />

The NICE solutions are also being used by Naftoport<br />

to optimize day-to-day security operations, minimize<br />

downtime and ensure operations continuity. Roughly 40<br />

procedures have been automated through Situator.<br />

“Integrating our disparate security systems within NICE<br />

Situator has made our security team more efficient,<br />

effective, and agile by automating response processes<br />

and administration,” said Jozwiak. “It gives them a single<br />

operating platform through which they can proactively<br />

monitor, manage, and maintain the safety and security<br />

<strong>of</strong> the port, reduce risks and improve incident management.”<br />

“It has simplified our operations because our security<br />

operator is now able to interact with one interface that<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.naftoport.pl/en/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Press release: http://www.nice.com/naftoportprotects-global-petroleum-supply-chain-nicesecurity-solutions<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Naftoport video: https://www.youtube.com/<br />

watch?v=lkyQoodVYiY<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA<br />

77


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Port Freeport –<br />

<strong>2014</strong> Silver Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Maritime/Seaport <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Smart Safety & <strong>Security</strong> Alerts - Port Freeport<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Give staff the power to hit a duress button on their personal<br />

smart phone or tablet in case <strong>of</strong> emergency. This<br />

allows for emergency personnel to immediately find<br />

your location via GPS tracking and share your emergency<br />

event with other management personnel. The<br />

personnel at Freeport have referred to this as the “get<br />

me out <strong>of</strong> here” button where help is just one touch<br />

away – highlighting the importance <strong>of</strong> safeguarding all<br />

employees both remote and on-site. Push notifications<br />

on the smart application allow for reliable and speedy<br />

delivery times. No data-plan necessary.<br />

Specifically, Port Freeport utilizes:<br />

• Mobile Duress Buttons & Field Reporting, with GPS,<br />

for 50 Key Staff Members.<br />

• Push Notifications, SMS text, Email, & Phone calls<br />

for 100 Users.<br />

• Field reporting <strong>of</strong> incidents from smart apps<br />

• Accountability <strong>of</strong> staff by location and status.<br />

• Web-based & Smart App-based alert publishing for 6<br />

Operators.<br />

• 1-888-GO-ATHOC 24/7 support<br />

• Fully hosted service<br />

78


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.portfreeport.com/about.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Fully integrated crisis communication capabilities for<br />

public safety –<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.pdfio.net/k-46504532.html<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (801) 373-7888<br />

cell: (801) 361-4610<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

sherriw@connectmarketing.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

881 West State Street, #140-102<br />

Pleasant Grove, UT 84062<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Sherri Walkenhorst, Senior Partner<br />

Connect Marketing<br />

79


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

NJ TRANSIT –<br />

<strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Railroad/Mass Transit <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NJ TRANSIT Integrated Mobile App<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Video surveillance cameras can’t be everywhere, but<br />

people can. By extending an Integrated Mobile App to<br />

its field personnel for daily use and to transit ambassadors<br />

for large events, NJ TRANSIT is deploying innovative<br />

technology to ensure the highest levels <strong>of</strong> security,<br />

safety, operational efficiency and customer service for<br />

its passengers. It’s a model in mobile technology innovation<br />

that other transit agencies will surely want to<br />

emulate.<br />

NJ TRANSIT is the nation’s largest statewide public<br />

transportation system providing more than 915,900<br />

weekday trips on 262 bus routes, three light rail lines,<br />

12 commuter rail lines and through Access Link paratransit<br />

service. It is the third largest transit system in the<br />

country with 165 rail stations, 62 light rail stations and<br />

more than 19,000 bus stops linking major points in New<br />

Jersey, New York and Philadelphia.<br />

The Mobile App solution, created for NJ TRANSIT by<br />

NICE Systems and CloudScann, turns smartphones into<br />

reporting tools to document incidents as they happen,<br />

allowing <strong>of</strong>ficials to act faster to resolve them.<br />

The solution combines NICE’s situation management<br />

solution, Situator, with CloudScann’s hosted See It Send<br />

It Mobile App. By using the app on their smartphones,<br />

field personnel can report incidents, including sending<br />

video and photos, to a centralized command center<br />

through NICE Situator. Communication is bi-directional,<br />

so Situator can also push incident alerts, task lists, and<br />

links to live video feeds to the Mobile App. This will<br />

extend the real-time awareness <strong>of</strong> safety, security, and<br />

operational issues for the largest statewide public transportation<br />

system in the U.S.<br />

Situator pinpoints the GPS location <strong>of</strong> the sender’s<br />

80


phone or TETRA radio as the incident location, and<br />

can then pull up video feeds from nearby surveillance<br />

cameras. The command center operator immediately<br />

sees who’s sending the alert, where it originated, what’s<br />

happening, and what actions to take. The App is also<br />

equipped with a panic button.<br />

NJ TRANSIT used the solution for the first time during<br />

Super Bowl XLVII to streamline communications<br />

between the command center and NJ TRANSIT ambassadors.<br />

In addition to reporting incidents, ambassadors<br />

were able to use the App to look up<br />

schedules and other information to assist<br />

passengers. Following the successful<br />

Super Bowl rollout, NJ TRANSIT plans<br />

to deploy the solution during other<br />

major events.<br />

NJ TRANSIT will also extend the Ambassador Mobile<br />

App to its maintenance, customer service and transit<br />

police personnel. For example, maintenance staff will<br />

be able to view assigned work orders, their location,<br />

and related video, and report back to the control room<br />

when resolution is complete.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.njtransit.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/situation-management/<br />

nice-situator http://www.cloudscann.com/<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Refers to NJ TRANSIT Ambassador Program:<br />

http://njtransit.com/AR/files/assets/basic-html/<br />

page7.html<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA<br />

81


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Denver Regional Transportation<br />

District – <strong>2014</strong> Silver Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Railroad/Mass Transit <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Denver RTD Mobile Video Surveillance Initiative<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The Denver Regional Transportation District (RTD)<br />

operates almost 1,100 buses, traveling over 100,000<br />

miles and serving an average <strong>of</strong> 330,000 passengers each<br />

day. To help keep passengers and operators safe, RTD<br />

Transit Police rely on mobile video cameras installed<br />

on RTD’s bus fleet. Video is a vital tool for investigating<br />

crime, claims, ADA complaints and other incidents that<br />

occur in transit.<br />

Unfortunately, RTD’s older analog video system had a<br />

30% failure rate. Even when the cameras were working,<br />

poor quality video sometimes made it difficult to reliably<br />

identify people or understand what really happened.<br />

The cameras also recorded to an analog digital video<br />

recorder (DVR) on the bus. This meant that every time<br />

video was needed for an investigation, a technician<br />

would need to drive to the assigned bus division and<br />

pull the hard drive to physically retrieve video.<br />

Given that RTD does thousands <strong>of</strong> investigations annually,<br />

this was a significant problem. Working with partners<br />

NICE Systems and Panasonic, RTD came up with an<br />

innovative solution. The result was a high-quality digital<br />

video system that enabled RTD to download video wirelessly<br />

<strong>of</strong>f a bus, so investigators could access it without<br />

leaving their desks. The first<br />

<strong>of</strong> a kind mobile video surveillance<br />

solution uses NiceVision<br />

s<strong>of</strong>tware. The NICE s<strong>of</strong>tware<br />

runs on hardware from Panasonic<br />

Corporation and includes<br />

specialty cameras and<br />

a mobile recording platform<br />

specially designed to withstand<br />

vibration and weather<br />

extremes.<br />

RTD has already retr<strong>of</strong>itted<br />

250 new buses, and over the<br />

course <strong>of</strong> the next three years,<br />

plans to retr<strong>of</strong>it about 800<br />

82


more buses with the innovative mobile video solution.<br />

What makes the solution unique is that it automatically<br />

downloads video via Wi-Fi whenever a bus pulls into a<br />

depot, passenger concourse, or RTD facility.<br />

The new system also gives RTD Transit Police investigators<br />

high definition video, which was not available before.<br />

RTD redesigned the camera layouts, and the new system<br />

can support up to nine cameras.<br />

But the biggest benefit, given the thousands <strong>of</strong> investigations<br />

RTD does annually, is the ability to access the video<br />

remotely through the NICE Inform solution. Instead<br />

<strong>of</strong> going to the depot to manually remove hard drives,<br />

investigators can just type in the bus number, date, and<br />

time range into Inform. When the bus pulls into the<br />

depot and connects with Wi-Fi, the video download<br />

process automatically starts. The mobile video recordings<br />

can also be combined with radio recordings, and<br />

fixed surveillance video to create a complete incident<br />

timeline. RTD can also email case file links to other law<br />

enforcement agencies involved in an investigation.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.rtd-denver.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/nice-provides-denverregional-transportation-district-mobile-videorecording-and-investigation-solut<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

News story: http://www.securityinfowatch.com/<br />

article/11375266/nice-systems-provides-enhanced-mobile-surveillance-capabilities-to<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA<br />

83


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

U.S. Army Garrison (USAG) in Bavaria –<br />

<strong>2014</strong> Silver Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Critical Infrastructure Protection Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Bavaria Interagency Deployment<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Founded in 1999, AtHoc pioneered interactive crisis<br />

communication. Today, the company protects millions<br />

<strong>of</strong> people around the world – including more than 75%<br />

<strong>of</strong> U.S. Military and <strong>Homeland</strong> <strong>Security</strong> personnel, as<br />

well as leading corporations and universities.<br />

The U.S. Army Garrison (USAG) in Bavaria provides protection<br />

to those in their community by utilizing AtHoc’s<br />

product. The USAG Bavaria strives to provide a quick,<br />

effective response to crisis in order to ensure the security<br />

<strong>of</strong> their infrastructure. They recognize that emergencies<br />

do not occur in isolation, and that efficient communication<br />

with the greater community is paramount in assuring<br />

the safety <strong>of</strong> the community in times <strong>of</strong> crisis. However,<br />

the Garrison had previously encountered many<br />

problems as it attempted to establish an effective way<br />

to communicate within a community <strong>of</strong> organizations<br />

that covers 180 miles. It lacked the efficiency to communicate<br />

between organizations, without having to alert<br />

external points <strong>of</strong> contact, in order to distribute alerts<br />

internally. In addition, USAG Bavaria was challenged<br />

with the prospect <strong>of</strong> maintaining an up-to-date list <strong>of</strong><br />

inter-organizational contacts, gathering them manually,<br />

a time consuming task at the very least.<br />

USAG Bavaria uses AtHoc’s cross-agency communication<br />

system or “Connect” to connect its numerous organizations<br />

via cloud. With this system in place, the commander<br />

responsible for safety and security will now be able<br />

to invite 13 tenant commands and components (such<br />

as the DoD school system, Morale Welfare and Recreation<br />

facilities, NATO schools, USO), as well as <strong>of</strong>f-site<br />

but contiguous affected organizations, to join a secure<br />

network <strong>of</strong> communication in which the tenants will<br />

“connect” with the host command. This allows them to<br />

communicate directly with all desired organizations and<br />

external contacts in times <strong>of</strong> crisis, without the timeconsuming<br />

task <strong>of</strong> relaying the alerts to key contacts in<br />

other organizations. Additionally, each organization has<br />

the ability to enter and manage their own personnel’s<br />

data. All <strong>of</strong> this allows USAGA Bavaria to communicate<br />

effectively and efficiently between their organizations,<br />

and ultimately, within their entire community.<br />

84


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.grafenwoehr.army.mil/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www2.athoc.com/connect<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

No media coverage yet. It hasn’t <strong>of</strong>ficially launched.<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Sherri Walkenhorst, Senior Partner<br />

Connect Marketing<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (801) 373-7888<br />

cell: (801) 361-4610<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

sherriw@connectmarketing.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

881 West State Street, #140-102<br />

Pleasant Grove, UT 84062<br />

85


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Northern Command/NORAD –<br />

<strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Emergency Response Implementation –<br />

Federal/State or Local<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Northern Command / NORAD Enterprise MNS<br />

Network Alert System<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

For the first time in the existence <strong>of</strong> Northern Command<br />

/ NORAD, the entire command is now retro fitted with<br />

network alerting to protect over 25,000 personnel. The<br />

system selected enables emergency operators to alert all<br />

25,000 personnel in ‘less than one minute’. The system<br />

is also integrated with the National Weather Service<br />

using the Common Alerting Protocol. During a severe<br />

weather event, all targeted personnel are alerted automatically<br />

without operator assistance in less than<br />

one minute. The system also integrates with the base<br />

on-premise phone system.<br />

With a single mouse click, in seconds personnel are<br />

reached by e-mail alerts, desktop popups, text messages,<br />

phone calls and mobile apps. The implementation has<br />

augmented emergency response capability substantially<br />

and was recently reviewed and lauded by Maj. Gen. Jack<br />

Briggs, currently the Director <strong>of</strong> Operations for Headquarters<br />

U.S Northern Command, Peterson Air Force<br />

Base, Colorado.<br />

86


The implementation <strong>of</strong> the Desktop Alert MNS enables<br />

interagency communication during an emergent domestic<br />

event between the following US 1st in line 1st<br />

Responders:<br />

• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K<br />

personnel)<br />

• ARMY AND AIR NATIONAL GUARD NATIONWIDE<br />

(500+K personnel)<br />

• NORTHERM COMMAND / NORAD (25K personnel)<br />

• U.S. Defense Threat Reduction Agency (DTRA)<br />

(10k Personnel)<br />

• U.S. Army Special Operations Command at<br />

Fort Bragg<br />

• AFDW Pentagon (confidential)<br />

The improved ability to attain actionable intelligence<br />

across all <strong>of</strong> these agencies in less than one minute<br />

during an emergent event provides immense dividends<br />

to the safety and protection <strong>of</strong> the homeland.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.northcom.mil/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.prweb.com/releases/NORAD/<br />

NORTHERNCOMMAND/prweb9115614.htm<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.northcom.mil/Portals/28/Documents/IA%20CND%20(33-141).pdf<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Howard Ryan, CEO<br />

Desktop Alert Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(973) 580-3447<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

howard@desktopalert.net<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert Inc.<br />

346 Main Street<br />

Chatham, NJ 07928<br />

87


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

South Bend, Indiana Police Dept. –<br />

<strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Municipal/County <strong>Security</strong> Program,<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ShotSpotter in South Bend, Indiana<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

South Bend PD wrestled with how to best control an<br />

increasing amount <strong>of</strong> gunfire activity to reduce crime<br />

and make the community safe. To combat this problem,<br />

it implemented SST’s ShotSpotter technology SST. Now,<br />

police are alerted in seconds <strong>of</strong> authenticated gunfire<br />

incidents, and given location data pinpointed and reliable<br />

to within 25 meters – saving a tremendous amount<br />

<strong>of</strong> time responding. This time could be the difference<br />

that could save a victim’s life and greatly increases its<br />

chances <strong>of</strong> apprehending the perpetrator. After the first<br />

nine months <strong>of</strong> using SpotShotter, Chief Teachman has<br />

seen significant improvements in South Bend. First, the<br />

number <strong>of</strong> 911 calls in the hotspot area has increased<br />

from approximately 8% to 25%. This is a tremendous<br />

help to <strong>of</strong>ficers as the addition <strong>of</strong> citizen’s reporting<br />

helps bolster the effectiveness <strong>of</strong> SpotShotter in solving<br />

crime. Secondly, South Bend has seen an increase in evidence<br />

collection from just 5% <strong>of</strong> the 911 gunfire calls to<br />

50% <strong>of</strong> those calls when accompanied by a ShotSpotter<br />

alert. Thirdly, the summer season usually has the most<br />

incidents <strong>of</strong> gun activity in all cities, and in South Bend<br />

the past summer saw a marked decrease by some 38%<br />

from the average <strong>of</strong> the four years prior. Responding <strong>of</strong>ficers’<br />

safety is also improved as they can be better prepared<br />

when arriving on the scene knowing the number<br />

<strong>of</strong> gunshots, the locations <strong>of</strong> each, and the movement <strong>of</strong><br />

the suspect or suspects.<br />

88


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.southbendpolice.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.shotspotter.com<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.shotspotter.com<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Lisa Hendrickson, PR Consultant<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (516) 767-8390<br />

cell: (516) 643-1642<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

lisa@lchcommunications.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SST<br />

7979 Gateway Blvd,Suite 210<br />

Newark, CA 94560-1156<br />

89


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Cit y <strong>of</strong> Philadelphia, PA –<br />

<strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Municipal/County <strong>Security</strong> Program,<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Department <strong>of</strong> Parks and Recreation Video Surveillance<br />

Initiative<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Committed to its young people, the City <strong>of</strong> Philadelphia<br />

operates recreation centers all over the city that serve<br />

as gathering places for the community and venues for<br />

after-school activities including sports and the arts. To<br />

ensure the safety <strong>of</strong> those using the recreation centers,<br />

the City has installed hundreds <strong>of</strong> Hikvision cameras.<br />

Pedro Pinto, the city’s Chief Engineer, and Susan<br />

Slawson, Deputy Commissioner <strong>of</strong> Parks and Recreation,<br />

worked closely with Fidelity Alarm and Arora Engineers,<br />

Inc. to design a total security solution including IP cam-<br />

eras, NVRs, and VMS s<strong>of</strong>tware by Hikvision.<br />

The highly scalable system allows for a link into a central<br />

management system, and can remain intact as existing<br />

infrastructure is gradually upgraded. This flexibility<br />

ensures longevity <strong>of</strong> the video surveillance solution and<br />

ensures that the Department <strong>of</strong> Parks and Recreation is<br />

prepared for future upgrades as circumstances require.<br />

Since the cameras have been installed, incidents <strong>of</strong><br />

vandalism, loitering, and burglaries have decreased, and<br />

the range <strong>of</strong> the cameras is so broad they can even cover<br />

the surrounding streets, <strong>of</strong>fering support to the Philadelphia<br />

Police Department.<br />

“Fun Safe Philly Summer,” the slogan for Philadelphia’s<br />

Summer <strong>2014</strong> initiative that <strong>of</strong>fered free and low-cost<br />

summer activities to Philadelphia residents, may well be<br />

shortened to “Fun Safe Philly,” as the City has pledged<br />

to include video surveillance systems across all 140 rec<br />

centers by 2016.<br />

90


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.phila.gov/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

N/A<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://us.sourcesecurity.com/news/articles/co-<br />

3425-ga.15124.html<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Anna Boudinot, Content Manager<br />

Hikvision USA<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (909) 612-9034<br />

cell: (323) 470-7772<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

anna.boudinot@hikvisionusa.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hikvision USA<br />

908 Canada Court<br />

City <strong>of</strong> Industry, CA 91748<br />

91


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Communit y Safet y Glasgow, Scotland –<br />

<strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Municipal/County <strong>Security</strong> Program,<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Community Safety Glasgow Initiative<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The Glasgow Operations Center is a state <strong>of</strong> the art facility<br />

that integrates a range <strong>of</strong> pivotal services designed<br />

to ensure the safety and security <strong>of</strong> the City. The Center<br />

is leading the way both nationally and internationally<br />

in redefining service delivery for the public and private<br />

sectors. The Glasgow security initiative involved the colocation<br />

<strong>of</strong> services, multi-agency functionality, tracking,<br />

monitoring and dispatching <strong>of</strong> assets in real time. These<br />

factors, along with the collection <strong>of</strong> intelligence, were<br />

all driving principles throughout the project.<br />

The Operation Center combines Public Space CCTV,<br />

<strong>Security</strong> for the City council’s museums, art galleries,<br />

schools, as well as Traffic Management and Police Intelligence.<br />

Integration <strong>of</strong> council services and Police Scotland<br />

enables a seamless approach as part <strong>of</strong> a smart city<br />

92<br />

management strategy.<br />

NICE Systems was chosen as<br />

the technology partner for<br />

this project for its innovative<br />

PSIM solution (NICE Situator),<br />

Video Management System<br />

(NiceVision) and cutting<br />

edge Video Analytics (NICE<br />

Suspect Search). The resulting<br />

intuitive and scalable<br />

technology platform uses NICE’s market leading PSIM<br />

solution to integrate multiple fragmented systems into a<br />

single user interface.<br />

The project has delivered:<br />

• Cutting edge technology including intelligent<br />

detection video analytics<br />

• Renewal <strong>of</strong> 500 cameras to HD<br />

• Asset management, monitoring and dispatch<br />

• A swifter, safer system for handling images and<br />

integration <strong>of</strong> data


• Live vehicle streaming <strong>of</strong> CCTV<br />

• Secure sharing <strong>of</strong> data for effective intelligent<br />

management <strong>of</strong> security<br />

“Our operators can pull up and display 10 – 500<br />

images, seamlessly from across our integrated camera<br />

network,” said Kalim Uddin, Operations Manager at the<br />

Glasgow Operations Center. “You can never replace an<br />

operator, but what we can do is to make the operator a<br />

lot more efficient, and we have achieved that with this<br />

project. The new functions we have facilitate ease <strong>of</strong><br />

access to a much broader suite <strong>of</strong> cameras, communication<br />

with key partners, tracking <strong>of</strong> individuals, and the<br />

ability to look at incidents from a traffic point <strong>of</strong> view.”<br />

“Community Safety Glasgow’s vision, combined with<br />

the latest technology from NICE Systems, makes the<br />

Glasgow Operations Center the most advanced Safe City<br />

control room in the UK,” said Philip Walker, Managing<br />

Director <strong>of</strong> Community Safety Glasgow. “Technology<br />

is the future for smart cities in terms <strong>of</strong> delivering<br />

better and more effective services and Glasgow is a<br />

benchmark and a role model for other cities around<br />

the world. Working in partnership with NICE we were<br />

able to address a broad spectrum <strong>of</strong> safety and security<br />

requirements across the city <strong>of</strong> Glasgow. What’s more,<br />

the solution can be further scaled in the coming months<br />

and years to help us further improve city services and<br />

bolster crime prevention.”<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.saferglasgow.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Glasgow Case Study video: http://www.nice.com/<br />

nice-situator-video-case-study-communitysafety-glasgow<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA<br />

Through this initiative, Glasgow has demonstrated how<br />

a Smart City Operations Center can look and function.<br />

In fact, the operation center served the strategic hub<br />

and Tactical command for City Operations during the<br />

“best Commonwealth Games ever” this year in Glasgow.<br />

The Center is also future pro<strong>of</strong>ed to add functions such<br />

as intelligent lighting and flood prevention as part <strong>of</strong><br />

Glasgow’s future city program.<br />

93


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

New York State Criminal Justice<br />

(DCTS) – <strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable State Government <strong>Security</strong> Program/<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

New York State Division <strong>of</strong> Criminal Justice Services<br />

(DCJS) – Crime Analysis Centers<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The New York State Division <strong>of</strong> Criminal Justice Services<br />

(DCJS) organized the N.Y. Crime Analysis Centers in<br />

order to assist law enforcement efforts to target, solve<br />

and prevent crime, enhance public safety and build safe<br />

communities.<br />

The purpose <strong>of</strong> the Crime Analysis Centers – and the<br />

technology deployed--is to aid in the reduction <strong>of</strong><br />

violent and property crimes and to promote safe communities.<br />

The establishment <strong>of</strong> Crime Analysis Centers<br />

combined with powerful search and analytic tools<br />

provides a powerful new platform for intelligence-based<br />

policing and inter-jurisdictional cooperation. With the<br />

impetus created by this project, information sharing has<br />

become a policy, not an informal practice.<br />

This program connects the data sources previously not<br />

available or primarily used separately by police departments<br />

and law enforcement; 64 agencies now participate<br />

in data sharing across the Centers’ communities. It promotes<br />

greater success in crime prevention, deterrence<br />

and <strong>of</strong>ficer safety by providing nearly all-source information<br />

access and analysis.<br />

The centers support the work <strong>of</strong> nearly 90 crime analysts<br />

throughout the state – analysts who are responsible for<br />

the strategic, tactical and administrative management <strong>of</strong><br />

law-enforcement data to serve nearly six million New<br />

Yorkers in the participating counties.<br />

Since the centers launched in 2009, total incidents in<br />

94


these communities are down by 12%, and violent crime<br />

is down by 11%.<br />

But the outcomes go far beyond numbers as the state <strong>of</strong><br />

New York has greatly augmented the overall sophistication<br />

<strong>of</strong> its public safety presence.<br />

The Centers use a customized browser-based search<br />

tool, called <strong>Digital</strong> Information Gateway (DIG), designed<br />

for investigative agencies to quickly compile<br />

information on a single subject from all sources. It deploys<br />

DIG and other solutions at the centers to pursue<br />

intelligence-led policing, which is grounded in principles<br />

<strong>of</strong> risk assessment, pattern analysis, community visibility<br />

and continuous improvement. For New York, this<br />

drills down into the three core components <strong>of</strong> incident<br />

prevention: description (identifying what the problems<br />

are), prediction (determining when and where they’ll<br />

happen) and prescription (coming up with strategies<br />

and tactics to deter crime).<br />

With regard to solving (and closing) cases, here’s just<br />

a small sampling <strong>of</strong> both quantitative and anecdotal<br />

highlights:<br />

in the state <strong>of</strong> Virginia. DIG and other center re<br />

sources were able to help police conclude that the<br />

suspect was on his way back to Virginia on a Grey<br />

hound bus. Police stopped the bus in Rochester and<br />

detained the suspect, who confessed to the murder.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.criminaljustice.ny.gov/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

N/A<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

N/A<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Claudia Berth, Product Marketing Manager, Analytics<br />

Raytheon Cyber Products<br />

• Since the DIG implementation, DCJS has reported<br />

a 300 percent gain in efficiency with respect to the<br />

time it takes to gather all information sought for a<br />

person <strong>of</strong> interest in a case.<br />

• In Syracuse, DIG has helped analysts cross-reference<br />

large lists <strong>of</strong> pawn shops with incident reports,<br />

resulting in the successful recovery <strong>of</strong> stolen property<br />

in 47 investigations since Jan. 1, 2013 – and the<br />

majority <strong>of</strong> those cases have produced arrests.<br />

• In Buffalo, DIG played a lead role in the capture<br />

<strong>of</strong> a suspect in a stabbing death. It flagged a series<br />

<strong>of</strong> domestic incidents between the suspect and the<br />

victim, and revealed that he had an arrest record<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(703) 537-7565<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cberth@trustedcs.com<br />

(backup - evan@w2comm.com)<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

12950 Worldgate Drive, Suite 600<br />

Herndon, VA 20170<br />

95


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Center for <strong>Homeland</strong> Defense &<br />

Securit y – <strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Federal Government <strong>Security</strong> Program/<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Center for <strong>Homeland</strong> Defense & <strong>Security</strong> (CHDS)<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The Center for <strong>Homeland</strong> Defense and <strong>Security</strong> (CHDS)<br />

is located at the Naval Postgraduate School (NPS) in<br />

Monterey, California. Since 2002, CHDS has conducted<br />

a wide range <strong>of</strong> graduate-level educational programs focused<br />

on assisting homeland security leaders to address<br />

current and emerging threats to the nation’s security.<br />

The programs are developed in partnership with and<br />

are sponsored by the National Preparedness Directorate,<br />

FEMA.<br />

CHDS consistently develops critical thinkers who<br />

implement their education within their agencies. Unlike<br />

other graduate institutions, CHDS only accepts applicants<br />

who are in a position to impart change and are<br />

capable <strong>of</strong> forming new partnerships and reevaluating<br />

their organization’s strategies and policies. The success<br />

<strong>of</strong> CHDS is realized through the student, alumni, and<br />

program involvement in national events such as the<br />

Oso, Washington, landslide, the Washington, D.C., Navy<br />

Yard shooting, and the Boston Marathon bombing. The<br />

CHDS fingerprint is seen in the response to these types<br />

<strong>of</strong> events through critical thinking, cross-disciplinary<br />

knowledge, and multi-agency relationships cultivated by<br />

CHDS.<br />

The CHDS Master’s degree program is the first <strong>of</strong> its<br />

kind, having been established as the first accredited<br />

homeland security degree program in the U.S. Students<br />

are selected from a pool <strong>of</strong> highly qualified candidates<br />

representing a diversified group <strong>of</strong> homeland security<br />

disciplines. Courses are taught by faculty and SMEs who<br />

administer a constantly evolving curriculum in the form<br />

<strong>of</strong> classroom discussions, projects, and network-based<br />

learning. Students develop theses that are directly applicable<br />

to the problems and challenges <strong>of</strong> their respective<br />

organizations.<br />

As the definition <strong>of</strong> homeland security has expanded, so<br />

too has CHDS course <strong>of</strong>ferings. The Executive Leaders<br />

Program (ELP) connects senior local, state, tribal,<br />

territorial, federal, and private sector leaders to create<br />

96


elationships across jurisdictional and disciplinary lines.<br />

An outgrowth <strong>of</strong> the ELP program called the Pacific<br />

Executive Leaders Program (PELP) was designed to<br />

meet homeland security challenges in the Pacific region.<br />

Lastly, the Fusion Center Leaders Program (FCLP) was<br />

created to enhance practices <strong>of</strong> fusion center leaders to<br />

collect, analyze and distribute information pertaining to<br />

crime and terrorism related activities.<br />

CHDS has led homeland security education through numerous<br />

additional initiatives. The University and Agency<br />

Partnership Initiative Program (UAPI) freely shares the<br />

Center’s programs and resources with educational institutions<br />

nationwide. This “multiplier effect” has created<br />

a network <strong>of</strong> over 300 partner institutions and expands<br />

the Center’s academic programs beyond the institution<br />

and across the nation. Additionally, CHDS has conducted<br />

280 Mobile Education Team (MET) seminars, which<br />

are tailored to senior leadership at state and local levels<br />

to address homeland security challenges unique to their<br />

jurisdictions.<br />

While not a large institution, CHDS has a pr<strong>of</strong>ound<br />

national influence on homeland security education<br />

with minimal operational overhead. Its overall reach<br />

includes 700 Master’s alumni, 450 ELP alumni, 10,500<br />

MET program participants, 12,000 Self Study program<br />

participants, 338 UAPI partners, and 136,000 <strong>Homeland</strong><br />

<strong>Security</strong> <strong>Digital</strong> Library documents to date.<br />

97<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.chds.us/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.youtube.com/watch?v=-6TbDti-<br />

FacQ<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.boston.com/news/nation/washington/articles/2005/05/01/in_war_on_terrorism_<br />

us_government_finds_allies_on_campus/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Heather Issvoran,<br />

Director <strong>of</strong> Strategic Communications<br />

CHDS<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (831) 656-2003<br />

cell: (831) 402-4672<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hissvora@nps.edu<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1 University Circle<br />

Building 220, Room 64<br />

Monterey, CA 93943


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

U.S. Customs and Border Protection<br />

– <strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Federal Government <strong>Security</strong> Program/<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Securing America’s Borders: The Non-Intrusive<br />

Inspection (NII) Systems Program, Southwestern Ports<br />

<strong>of</strong> Entry<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

There are many challenges to CBP’s mission <strong>of</strong> securing<br />

America’s borders, including smuggling <strong>of</strong> drugs, currency,<br />

weapons, ammunition, illegal goods, and humans.<br />

The Southwestern border is extremely difficult to<br />

protect, 2,000 miles long and one <strong>of</strong> the world’s busiest<br />

borders, with more than 5 million trucks and 166 million<br />

people crossing each year*. Drug trafficking organizations<br />

pose a grave threat to border security, as Mexico is<br />

the source and/or transit country for heroin and most <strong>of</strong><br />

the cocaine, marijuana, and methamphetamine illegally<br />

imported into the U.S. Those same organizations also<br />

attempt to smuggle currency and weapons back into<br />

Mexico.<br />

To address these threats, CBP has implemented a<br />

layered security strategy which involves thousands<br />

<strong>of</strong> personnel, canine teams, and air/maritime/remote<br />

surveillance, and state-<strong>of</strong>-the-art detection technology.<br />

One component, the Non-Intrusive Inspection (NII)<br />

Systems Program, utilizes advanced inspection technology<br />

to more effectively screen conveyances/cargo while<br />

improving processing time. As <strong>of</strong> 2013, 310 large-scale<br />

NII systems were deployed on U.S. borders.** Many NII<br />

systems are deployed along the Southwestern border,<br />

including 26 Z Portal ® cargo and vehicle inspection<br />

systems and 61 Z Backscatter ® Van (ZBV ® ) mobile cargo<br />

and vehicle inspection systems, both manufactured by<br />

American Science and Engineering, Inc. (AS&E).<br />

In order to bolster its detection capabilities without<br />

98


impeding the flow <strong>of</strong> legal traffic, CBP added Z Portals<br />

to the Southwestern border starting in 2011. The NII<br />

Program Office worked closely with the Interdiction<br />

Technology Office to ensure an efficient, well-managed<br />

project, averaging one deployment per month. Both the<br />

Z Portal and ZBV systems have proven very successful,<br />

expediting operations and using low-energy Z Backscatter<br />

technology to quickly detect organic materials (e.g.<br />

explosives, drugs, currency, etc.). By expanding NII<br />

operations to include more Z Portal systems, CBP can<br />

now inspect cars much more rapidly, enabling scanning<br />

<strong>of</strong> almost 100% <strong>of</strong> cars designated for secondary inspection.<br />

“[Z Portal/ZBV technology] has been a tremendously<br />

effective tool for us in identifying and seizing additional<br />

illicit drugs … [The Z Portal/ZBV systems] are more<br />

efficient because they work faster and they have a lower<br />

energy level that allows us to put more vehicles through<br />

them … we have been able to benefit from an improving<br />

continual technology.”***<br />

Notable Z Portal/ZBV detections along the Southwestern<br />

border include: $1.1 million <strong>of</strong> heroin inside an SUV’s<br />

hidden compartment; more than $900,000 <strong>of</strong> cocaine<br />

hidden in a truck bed; and more than $500,000 (656<br />

lbs) <strong>of</strong> marijuana concealed in the floor and bed area <strong>of</strong><br />

a pickup truck.<br />

Overall, the NII Systems Program has had a significant<br />

impact on the detection <strong>of</strong> drugs, currency, and weapons<br />

along the Southwestern border. For example, during<br />

FY 2009-12, CBP seized 71% more currency, 39% more<br />

drugs, and 189% more weapons along the Southwestern<br />

Border than FY 2006-8.**<br />

* U.S. Department <strong>of</strong> Transportation, Research and Innovative<br />

Technology Administration, Bureau <strong>of</strong> Transportation Statistics<br />

**CBP testimony to the House Committee on <strong>Homeland</strong> <strong>Security</strong>,<br />

Subcommittee on Border and Maritime <strong>Security</strong>, 2/26/2013<br />

***CBP testimony to the House Committee on <strong>Homeland</strong> <strong>Security</strong>,<br />

Subcommittee on Border and Maritime <strong>Security</strong>, 3/20/2013<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.cbp.gov/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.cbp.gov/border-security/portsentry<br />

http://www.cbp.gov/sites/default/files/<br />

documents/z_portal_2.pdf<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.as-e.com/uploads/media/CBP_Z_<br />

Portal_and_ZBV_Seizures_<strong>2014</strong>.pdf<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Laura Berman<br />

Vice President, Corporate Communications<br />

AS&E<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(978) 262-8700<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

lberman@as-e.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

American Science and Engineering, Inc.<br />

829 Middlesex Turnpike<br />

Billerica, MA 01821<br />

99


The News Leader in Physical, IT and <strong>Homeland</strong> <strong>Security</strong><br />

Publisher:<br />

Michael Madsen<br />

(O) 212-344-0759, X1<br />

(C) 732-233-8119<br />

mmadsen@gsnmagazine.com<br />

Executive Editor:<br />

John Wagley<br />

(O) 212-344-0759, X2<br />

(C) 202-425-0196<br />

wagley.jr@gmail.com<br />

Senior Writer:<br />

Lorrie Barclay<br />

(O) 212-344-0759, X5<br />

(C) 508-685-0652<br />

lorriebarclay@gmail.com<br />

Columnist:<br />

John Convy<br />

Convy on Netcentric <strong>Security</strong><br />

john@convyassociates.com<br />

Columnist:<br />

John Romanowich<br />

Romanowich on Video Surveillance<br />

jromanowich@sightloxic.com<br />

Guest Expert Contributor:<br />

Denise Rucker Krepp<br />

(C) 202-546-2533<br />

kdrkrepp@hotmail.com<br />

Art Director:<br />

Gerry O’Hara<br />

OHDesign3<br />

(C) 203-249-0626<br />

gerry@ohd3.com<br />

Production/Design Specialist:<br />

Brenden Hitt<br />

(C) 315-723-6203<br />

brenden@ihitt.com<br />

Editorial Director/CEO:<br />

Adrian Courtenay<br />

(O) 212-344-0759, X3<br />

(C) 917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Mailing Address:<br />

Government <strong>Security</strong> News<br />

P.O. Box 7608<br />

Greenwich, CT 06836<br />

Government <strong>Security</strong> News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing <strong>of</strong>fices. POSTMASTER: Send address<br />

changes to GSN: Government <strong>Security</strong> News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />

decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />

GSN: Government <strong>Security</strong> News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />

foreign subscribers are charged $140 International Airmail. Copyright 2015 by GSN: Government <strong>Security</strong> News. All rights reserved.<br />

Printed in the U.S.A. GSN: Government <strong>Security</strong> News assumes resonsibility for validity <strong>of</strong> claims in items reported.<br />

100

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!