The GSN 2015 Digital Yearbook of Awards
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>The</strong> <strong>GSN</strong><br />
<strong>2015</strong> <strong>Digital</strong> <strong>Yearbook</strong><br />
OF<br />
Airport/Seaport/<br />
Border Security <strong>Awards</strong><br />
AND<br />
Homeland Security <strong>Awards</strong>
MEET THE SPONSORS<br />
AppGuard uses prevention to keep cyberattacks from<br />
harming businesses, government agencies<br />
When it comes to handling cyberattacks, a small Virginia-based<br />
company <strong>of</strong>fers an innovative solution that<br />
borrows from an old adage: an ounce <strong>of</strong> prevention is<br />
worth a pound <strong>of</strong> cure.<br />
Blue Ridge Networks has been in the cybersecurity<br />
business for more than 15 years, <strong>of</strong>fering its solutions<br />
to government agencies and businesses. Its AppGuard<br />
solution enables a client’s workforce to log in – even<br />
from remote locations – and know they will not be at<br />
risk <strong>of</strong> being infiltrated or inadvertently exposing their<br />
colleagues to a hack.<br />
AppGuard stops such destructive files as malware,<br />
ransomware, weaponized documents and phishing attempts<br />
from entering a user’s system. Those are the files<br />
used by hackers through a user’s trusted applications to<br />
4<br />
launch destructive cyberattacks.<br />
“AppGuard is the only solution<br />
on the market because it is not a<br />
detection capability,” said Mike<br />
Fumai, president and chief operating<br />
<strong>of</strong>ficer for Blue Ridge. “We’re<br />
blocking.”<br />
Cyberattacks are not like traditional<br />
robberies where the bad<br />
guys arrive in dramatic fashion and<br />
take their loot in one fell swoop.<br />
Instead, they get small bites – or<br />
Mike Fumai<br />
President and COO<br />
Blue Ridge Networks<br />
bytes, mind you – at a time, usually when routine events<br />
like reports are generated or updates are released. As<br />
the attacks linger for weeks and months because the file<br />
has not been detected, the little things begin to add up<br />
to huge losses for the victims.<br />
In the past year, the public has become more aware<br />
<strong>of</strong> the damage hackers can wreak. Millions <strong>of</strong> customers<br />
were affected by the attacks on such companies as<br />
Anthem, Home Depot and Target. In Target’s case, it was<br />
only discovered after customers called their banks and<br />
credit card companies to complain about fraudulent
purchases, Fumai said. And the government was hit hard<br />
too, as the Office for Personnel Management reported<br />
that attacks made the records for millions <strong>of</strong> federal<br />
workers and contractors vulnerable.<br />
“It’ll take a generation before we find out what the<br />
effects <strong>of</strong> OPM will be,” said Fumai, who has worked for<br />
more than 25 years in the communications and technology<br />
industries.<br />
And the attacks will only become more sophisticated<br />
in the future, according to industry experts, as the hackers<br />
find ways to infiltrate without leaving a trace or<br />
signature behind.<br />
“Past infections always deposited a small binary<br />
somewhere on disk, but the newest evasion techniques<br />
used by fileless malware—Kovter,<br />
Powelike, and XswKit, for<br />
example—leave no trace on<br />
disk, thus making detection,<br />
which generally relies on<br />
static files on disk, more difficult,”<br />
McAfee Labs wrote in its<br />
threats report last November.<br />
This is where AppGuard<br />
becomes very useful, Fumai<br />
said. <strong>The</strong>re is no need to<br />
try and detect malware that<br />
might not have any signature or binary present because<br />
AppGuard prevents the first stage attack so malware<br />
will never get its foothold in the enterprise. That ability<br />
makes the solution very attractive to Blue Ridge’s<br />
partners and clients.<br />
“AppGuard is American Cyber’s ONLY solution for<br />
zero-day malware prevention, as well as the easiest and<br />
most cost-effective malware protection available,” said<br />
Gary Winkler, president <strong>of</strong> American Cyber and a former<br />
program executive <strong>of</strong>ficer with the U.S. Army. “It simply<br />
5<br />
prevents any malware from executing, without needing<br />
to know what the malware is, and then AppGuard<br />
reports the details <strong>of</strong> the attempt. AppGuard has absolutely<br />
no impact to system/application performance or<br />
user experience. It should be part <strong>of</strong> the Army’s Gold<br />
Master configuration for every end-point.”<br />
AOL serves as another partner for Blue Ridge. <strong>The</strong><br />
multimedia company <strong>of</strong>fers its subscribers, which were<br />
more than 2 million last year, AOL Tech Fortress. <strong>The</strong><br />
service uses AppGuard to block viruses and other suspicious<br />
files from harming a<br />
user’s computer.<br />
AppGuard does not just<br />
prevent attacks, Fumai said.<br />
Its proactive defense keeps<br />
clients from having to spend<br />
millions – or more – <strong>of</strong> dollars<br />
to assess the impact <strong>of</strong> a<br />
breech, to make repairs and to cover liabilities from<br />
the attack. That means corporate clients can invest<br />
more in research and development and public<br />
sector agencies can be better stewards <strong>of</strong> taxpayer<br />
funds.<br />
And Blue Ridge is working on new ways to protect<br />
its clients. Fumai noted the company is working<br />
an “Internet <strong>of</strong> Things” guard that would secure<br />
various cloud networks, including those run by Amazon<br />
and Micros<strong>of</strong>t. This would allow any networked device<br />
to be protected from attack.<br />
“IoT Guard will be able to secure whatever clouds<br />
they’re working at the same time with multiple devices,”<br />
Fumai said. “This will not break the IT or compliance<br />
standards already established. We don’t break things.<br />
We’re just an overlay.”
ABOUT THE <strong>GSN</strong> AWARDS PROGRAMS<br />
<strong>The</strong> Government Security News <strong>Awards</strong> Programs, first appearing in 2009, were organized<br />
to honor the distinguished vendors <strong>of</strong> IT, Physical and Integrated security solutions, and<br />
the dedicated <strong>of</strong>ficials in federal, state, county and municipal government whose combined<br />
efforts protect us from all threats.<br />
<strong>The</strong> <strong>2015</strong> <strong>Yearbook</strong> covers the results <strong>of</strong> two <strong>GSN</strong> awards programs – the <strong>GSN</strong> <strong>2015</strong><br />
Airport, Seaport, Border Security <strong>Awards</strong> and the <strong>GSN</strong> <strong>2015</strong> Homeland Security <strong>Awards</strong>.<br />
We are also please to honor the vendors and <strong>of</strong>ficials <strong>of</strong> other nations that have chosen to<br />
participant in this year’s programs, <strong>of</strong>ten with prize-winning entries.<br />
In our humble opinion, the technological advances from vendors and the ever-more<br />
sophisticated programs and strategies <strong>of</strong> government agencies are mind-boggling in their<br />
excellence. We hope you’ll find our awards programs to be interesting and informative.<br />
We know you’ll find them to be very reassuring!<br />
Adrian Courtenay, CEO/Editorial Director<br />
Government Security News<br />
6
TABLE OF CONTENTS<br />
4<br />
6<br />
7<br />
8<br />
12<br />
60<br />
122<br />
Message from <strong>2015</strong> <strong>Awards</strong> Sponsor<br />
About the <strong>GSN</strong> <strong>Awards</strong> Programs<br />
Table <strong>of</strong> Contents<br />
Interview with Chuck Brooks, Distinguished Judge, <strong>2015</strong> <strong>GSN</strong> <strong>Awards</strong> Program<br />
Winners in <strong>2015</strong> Airport, Seaport, Border Security <strong>Awards</strong> Program<br />
Winners in <strong>2015</strong> Homeland Security <strong>Awards</strong> Program<br />
Government Security News, <strong>The</strong> News Leader in IT, Physical and Homeland Security<br />
7
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY<br />
and<br />
AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />
<strong>GSN</strong> INTERVIEW<br />
Chuck Brooks, Distinguished Judge<br />
<strong>GSN</strong> <strong>2015</strong> Homeland Security and<br />
Airport, Seaport, Border Security <strong>Awards</strong> programs<br />
<strong>GSN</strong>: What are your general thoughts on the<br />
<strong>2015</strong> awards?<br />
CB: For me it was a real pleasure judging this year’s<br />
annual Homeland Security and Airport, Seaport, Border<br />
Security <strong>Awards</strong> programs. <strong>The</strong> submissions this year<br />
were frankly quite amazing. <strong>The</strong> capabilities and technical<br />
merits <strong>of</strong> the IT and Physical security products/solutions<br />
<strong>of</strong> all the vendors made it especially difficult to judge. In<br />
my opinion they were all winners because they are leading<br />
technological contributors to the current and future<br />
security <strong>of</strong> our nation. It is good to know that very talented<br />
people in industry and government are continually<br />
designing and upgrading security solutions to fill gaps as<br />
adversaries are becoming more hostile and sophisticated.<br />
<strong>GSN</strong>: You spent many years on Capitol Hill and<br />
also at the Department <strong>of</strong> Homeland Security.<br />
As we head into 2016, what do you envision as<br />
homeland security spending priorities?<br />
CB: Macro spending will increase across the board on<br />
homeland security products and services In accordance<br />
to the new threats we are especially facing from ISIS and<br />
from other terrorist actors, and global instabilities. This<br />
was reflected in the recent passage <strong>of</strong> the 2016 omnibus<br />
spending Bill recently passed by Congress by Congress.<br />
<strong>The</strong> bill provides DHS with $40.96 billion, which is an<br />
increase <strong>of</strong> $1.33 billion over the fiscal year <strong>2015</strong> enacted<br />
levels. It included increased funding levels for Customs<br />
and Border Protection, Immigration and Customs Enforcement<br />
and for DHS Cybersecurity programs in the DHS<br />
8
National Programs and Protection Directorate.<br />
Global spending also parallels the DHS spending raise.<br />
A new market research report, “Global Homeland Security<br />
and Emergency Management Market, 2013–2018”,<br />
published by MarketsandMarkets is expected to reach<br />
$544.02 Billion by 2018. Unfortunately, those numbers<br />
could go even higher if there are more incidents similar to<br />
what happened in Paris, Mali, and San Bernardino, CA.<br />
<strong>GSN</strong>: What area/issue pending trends do you<br />
see as priorities for the homeland security<br />
community?<br />
CB: Counterterrorism and the counter CBRNE (chemical<br />
, biological, Radiological, Nuclear, and Explosive) mission<br />
will always be fundamental to homeland planning and<br />
spending. Those are the most catastrophic threats. In<br />
addition to CBRNE DHS has assumed more and more <strong>of</strong> a<br />
leadership role in cybersecurity derived from both Presidential<br />
mandates and congressional legislation.<br />
Cybersecurity is indeed a top priority as government agencies<br />
and mega corporations experience more data breaches<br />
with each passing year. I recently published an article<br />
in <strong>The</strong> Federal Times on Key homeland security priorities<br />
to watch in 2016 (http://www.federaltimes.com/story/<br />
government/dhs/blog/<strong>2015</strong>/12/15/key-homeland-securitypriorities-watch-2016/77368604/)<br />
My thoughts in regards<br />
to cybersecurity verbatim:<br />
“<strong>The</strong> <strong>2015</strong> DHS budget directed more than $1.25 billion<br />
to cybersecurity and that trend will continue in 2016.<br />
Cybersecurity and IT have moved to the forefront since<br />
DHS’s inception as we have become a more interconnected<br />
world. New legislation pending in Congress formalizes<br />
the increased DHS role in public/private partnering.<br />
New legislation also would update the 12-year-old Federal<br />
Information Security Management Act (FISMA) and delineate<br />
DHS’s role in guarding government networks and<br />
websites.<br />
A priority for 2016 will be to accelerate rollout <strong>of</strong><br />
Einstein III Accelerated (E3A), the latest phase <strong>of</strong> DHS’s<br />
automated network-security correcting systems. DHS has<br />
established memoranda <strong>of</strong> agreement with 55 federal<br />
agencies to implement Einstein to provide horizon scanning<br />
and automated monitoring, detection, and remediation<br />
<strong>of</strong> government networks. DHS is also planning for<br />
new cyber technologies that provide advanced defense <strong>of</strong><br />
network framework layers, including authentication, better<br />
encryption, biometrics, and data analytical tools”.<br />
<strong>GSN</strong>: What future areas <strong>of</strong> homeland security<br />
interest would you advise companies to explore?<br />
CB: <strong>The</strong> key word really is “future” and it is already<br />
around the corner with the Internet <strong>of</strong> Things (IoT).<br />
Recently both the FBI and DHS issued warnings about IoT<br />
and pending threats. <strong>The</strong> reality is that we have become<br />
immersed in a new digital era comprised <strong>of</strong> more than 50<br />
billion interfaced devices. Anything connected is vulnerable.<br />
Expect significant investments in smart cities, smart<br />
homes, smart businesses, and smart governments in the<br />
next decade. For the security community this conveys<br />
opportunities in developing and integrating new sensors<br />
for threat detection, surveillance, predictive data analytics,<br />
Continued on next page<br />
9
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY<br />
and<br />
AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />
<strong>GSN</strong> INTERVIEW<br />
Chuck Brooks, Distinguished Judge<br />
<strong>GSN</strong> <strong>2015</strong> Homeland Security and Airport, Seaport, Border Security <strong>Awards</strong> programs<br />
biometrics, interoperable communications, and geo-mapping<br />
(to name a few). Also, the implications for forensics,<br />
including cyber-forensics are evident and will be a real<br />
growth industry for law enforcement and industry. It is<br />
interesting to note that DHS’s Science & Directory Directorate<br />
recently announced that it is seeking to help fund<br />
small businesses who may have innovative IoT technologies<br />
to help the homeland security mission.<br />
Crime Mapping<br />
<strong>GSN</strong>: Can you tell us about your new role at<br />
Sutherland Government Solutions?<br />
CB: I serve as the Vice President for Government Relations<br />
& Marketing for Sutherland Government Solutions<br />
(SGSI). I lead the Federal and State & Local Government<br />
relations activities and I am also responsible for the Marketing<br />
portfolio (Media, PR, <strong>Digital</strong> Outreach, Thought<br />
Leadership, Strategic Partnering, Branding) for the Federal<br />
and State & Local markets. SGSI is a recognized provider<br />
<strong>of</strong> business process and technology management services<br />
for the public sector. <strong>The</strong> company also <strong>of</strong>fers integrated<br />
portfolios <strong>of</strong> analytics-driven back-<strong>of</strong>fice and citizen facing<br />
solutions that support entire government missions. I am<br />
also an Advisor to the Bill and Melinda Gates Technology<br />
Partner network, and serve as Vice Chairman <strong>of</strong> CompTIA’s<br />
New & Emerging Technology Committee.<br />
For those who are active on social media, I also run<br />
two <strong>of</strong> the most influential homeland security groups on<br />
LinkedIn –“U.S. Department <strong>of</strong> Homeland Security” and<br />
“Homeland Security” that have combined membership <strong>of</strong><br />
over 50,000 members. Please look them up and join!<br />
Thanks and Happy, Healthy, Prosperous, and Safe 2016<br />
to all <strong>of</strong> Government Security News readers!<br />
Chuck can be reached at:<br />
Charles.brooks@sutherlandglobal.com<br />
On Twitter: @ChuckDBrooks<br />
Linkedin Pr<strong>of</strong>ile: http://www.linkedin.com/in/chuckbrooks<br />
10
11
<strong>The</strong> <strong>GSN</strong> <strong>2015</strong><br />
Airport/Seaport/<br />
Border Security <strong>Awards</strong>
Winners in the <strong>2015</strong><br />
Airport/Seaport/Border Security <strong>Awards</strong> Program<br />
Best Access Control/Identification<br />
Best Biometric Identification Solution<br />
Crossmatch – Winner<br />
Best ePassport Solution<br />
Securiport – Winner<br />
Best Physical/Logical<br />
Priviledged Access Solution<br />
Honeywell Security – Winner<br />
STANLEY Access Technologies – Winner<br />
Best Detection Solutions<br />
Best Cargo/Vehicle Screening<br />
Advanced Detection Technology, LLC – Winner<br />
Best Explosives/Narcotics/Contraband<br />
Detection<br />
SureScan Corporation – Winner<br />
Best Nuclear/Radiation Detection<br />
Rapiscan Systems – Winner<br />
Best Communications Solutions<br />
Best MOB Tracking and/or Wrist Devices<br />
PureTech Systems – Winner<br />
Best Mass Notification System<br />
LRAD Corporation – Winner<br />
Best Acoustic Hailing Service<br />
LRAD Corporation – Winner<br />
Best Surveillance Systems<br />
Best Coastal Surveillance Solution<br />
TCOM, LP – Winner<br />
Best Video Analytics/Intrusion Detection<br />
Honeywell Security – Winner<br />
Best Long-Range/Day-Night Surveillance<br />
CohuHD Costar – Winner<br />
Best Perimeter Protection, Fencing,<br />
Gates, Guard Booths<br />
Best Fencing, Barriers, Bollards, Gates<br />
Betafence USA – Winner<br />
Tilt-A-WAy – Winner<br />
Best Guard Service, Facility Protection Service<br />
Global Elite Group – Winner<br />
Best Integrated Security Programs<br />
Best Physical Security Information<br />
Management System - PSIM<br />
Network Harbor, Inc. – Winner<br />
Honeywell Security – Winner<br />
Best Integrated Harbor Security Program<br />
Emergency Response Technology, LLC – Winner<br />
13
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Crossmatch<br />
<strong>2015</strong> Winner<br />
Best Access Control/Identification<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Biometric Identification Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Crossmatch<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Crossmatch is a world leader in biometric identity<br />
management solutions. With deployments in over 80<br />
countries worldwide, Crossmatch biometric capture<br />
devices are used daily to identify individuals and authenticate<br />
claimed identities. Our latest compact, mobile,<br />
handheld solution, the Verifier ® Sentry, is a highly flexible<br />
Android-based device designed to rapidly identify/<br />
authenticate an individual using their fingerprint or<br />
secure credential, such as contact and contactless cards.<br />
<strong>The</strong> handheld enables government and enterprise<br />
personnel to perform identity and credential checks and<br />
initiate workflows anywhere, anytime. Incorporating a<br />
FAP30 fingerprint sensor, the Verifier Sentry captures<br />
more data points than FAP10 sensors found in many<br />
mobile devices. This is imperative when matching an<br />
unknown subject’s fingerprint to a backend database or<br />
watchlist. A March 2014 report from the National Institute<br />
<strong>of</strong> Standards and Technology (NIST)* states FAP10<br />
submissions fail to identify their target approximately<br />
twice as <strong>of</strong>ten as FAP20 or FAP30 – a situation that could<br />
lead to missed apprehensions, compromised safety, denied<br />
benefits or unauthorized access in commercial or<br />
government use cases. While FAP10 may be sufficient on<br />
personal devices or one-to-one matching <strong>of</strong> a cooperative<br />
subject, a FAP30 is the best solution for identifying<br />
unknown or uncooperative persons. <strong>The</strong> Verifier Sentry<br />
is <strong>of</strong>fered with <strong>Digital</strong>Persona ® Commander, a mobile<br />
device management tool that provides the secure communications<br />
tunnel to the handheld and remote matching<br />
databases, protecting data integrity and personal<br />
14
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.crossmatch.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.crossmatch.com/verifier-sentry/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
John Hinmon, Vice President, Worldwide Marketing<br />
Crossmatch<br />
privacy. Match requests from multiple Verifier Sentry<br />
devices are aggregated by the secure server-based Commander<br />
application for centralized administration and<br />
submission to one or more matching databases. Administrators<br />
using Commander have the ability to efficiently<br />
manage and configure deployed devices and perform<br />
watchlist management tasks. <strong>The</strong>y can also locate, lock<br />
or even wipe Verifier Sentry devices in the field, as well<br />
as control who logs in and at what times.<br />
Solution Benefits:<br />
• Listed on FBI Approved Products List<br />
• Superior FAP30 PIV certified fingerprint sensor<br />
• Ergonomic one-handed operation<br />
• Wide range <strong>of</strong> supported credentials, including PIV,<br />
and PIV derivatives such as CAC, TWIC, and FRAC and<br />
RFID cards.<br />
• PIV specified facial image capture<br />
• Wireless (Wi-Fi, Bluetooth, 3G GSM)<br />
• On-device matching for autonomous operation<br />
• Centralized administration capabilities via <strong>Digital</strong>Persona<br />
Commander Reference:<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 561-493-7401<br />
cell: 561-346-5862<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
john.hinmon@crossmatch.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
3950 RCA Boulevard, Suite 5001<br />
Palm Beach Gardens, FL 33410<br />
* NIST IR 7950<br />
15
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Securiport<br />
<strong>2015</strong> Winner<br />
Best Access Control/Identification<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best ePassport Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Securiport<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In today’s globalized world, international travel is essential<br />
to business success. Trade and tourism depend<br />
on safe and efficient immigration controls. However,<br />
terrorism, identity theft and human trafficking pose<br />
grave risks to border security. Securiport solves border<br />
security challenges with innovative technology solutions<br />
that keep citizens and travelers safe. At Securiport, we<br />
leverage cutting-edge ultrasound biometric technologies<br />
and advanced data analytics tools to provide authorities<br />
with the knowledge and assurance to ensure order and<br />
efficiency across transnational borders. With solutions<br />
currently in place across dozens <strong>of</strong> countries around<br />
the world, and a dedicated team <strong>of</strong> pr<strong>of</strong>essionals developing<br />
innovative tools to meet emerging challenges,<br />
Securiport is the global leader in intelligent immigration<br />
controls solutions.<br />
Securiport’s innovative eVisa Solutions Provide a<br />
Faster, Smarter, Safer Way To Travel, Benefitting<br />
Tourism and Local Economies<br />
Section 1 – Introduction to Visa Challenges<br />
A visa is an <strong>of</strong>ficial mark or stamp on a passport that<br />
allows someone to enter or leave a country usually for<br />
a particular reason [1] . Historically, immigration <strong>of</strong>ficials<br />
would grant a visa when a visitor arrived in a foreign<br />
country, but today, a traveler wishing to enter another<br />
country must apply for a visa in advance. This causes<br />
numerous challenges for both civilians and government<br />
<strong>of</strong>ficials all over the world. <strong>The</strong> first obvious disadvan-<br />
16
tage <strong>of</strong> applying for or issuing a visa is the time required<br />
to process the application. Under normal circumstances,<br />
a traveler seeking to apply for a visa would need to<br />
fill out the necessary paperwork and then either mail<br />
or hand deliver the paperwork to the desired nation’s<br />
local embassy or consulate. After this time-consuming<br />
procedure, the embassy will process the documents<br />
and then mail the visa back to the applicant if approved.<br />
As a result, the life cycle <strong>of</strong> receiving a visa could take<br />
anywhere from two weeks to two months. This can be<br />
very costly and time consuming for immigration <strong>of</strong>ficials<br />
and can cause problems if a traveler needs to apply for a<br />
visa last minute. Another obstacle travelers and <strong>of</strong>ficials<br />
face is the lack <strong>of</strong> infrastructure and personnel available.<br />
Many developing nations are simply not equipped with<br />
the proper personnel, technology and infrastructure<br />
needed to issue these documents in a timely and efficient<br />
manner without compromising safety or security.<br />
Long queues build up at immigration desks at airports,<br />
embassies and consulates, further increasing the document<br />
process time. This increased workload for the immigration<br />
staff can hinder their ability to work efficiently<br />
and securely. Governments should look to improve<br />
their immigration processes, starting with the system for<br />
issuing visas. Many <strong>of</strong> the challenges caused by the visa<br />
application process can be overcome by simply transitioning<br />
to an electronic visa system, which streamlines<br />
the process and ensures accountability for both governments<br />
and travelers. By transitioning to an electronic<br />
visa system, governments will improve and ease the process<br />
<strong>of</strong> applying for a visa, which can lead to a multitude<br />
<strong>of</strong> benefits for the country. For example, a country such<br />
as Honduras could benefit greatly from implementing<br />
an electronic visa system. Honduras, located in Central<br />
America, is home to some <strong>of</strong> the world’s best beaches,<br />
coral reefs and diving locations in addition to the world<br />
famous Mayan city <strong>of</strong> Copan and Rio Platano Biosphere.<br />
<strong>The</strong>se attractions make Honduras a great location for<br />
travelers who wish to experience the wonders <strong>of</strong> Central<br />
America. However, the long process for applying for a<br />
visa can be a major deterrent to tourism in the country.<br />
Just recently, the Honduran government has made<br />
tourism a national priority, believing that the tourism<br />
industry will not only benefit the country by stimulating<br />
the economy, but also by strengthening the national<br />
identity, increasing development and providing Hondurans<br />
with a higher standard <strong>of</strong> living. By implementing<br />
an electronic visa system, like Securiport’s eVisa Management<br />
System, countries, such as Honduras, could<br />
save time and money by operating more efficiently to<br />
improve the way they communicate and engage with<br />
citizens. By addressing key challenges and streamlining<br />
the process it takes to apply and receive a visa, the<br />
number <strong>of</strong> total visa applications and number <strong>of</strong> visitors<br />
will inevitably increase, improving revenue generated<br />
from tourism. Government <strong>of</strong>ficials, business travelers,<br />
and tourists alike will benefit from a more convenient<br />
and efficient visa application process.<br />
Section 2 – Features and Benefits <strong>of</strong> the eVisa System<br />
Securiport’s eVisa Management System is a modern,<br />
comprehensive ICAO-compliant system that provides<br />
travelers with a quick, convenient and completely<br />
secure way to apply for a visa. It can be easily integrated<br />
and deployed to preexisting visa procedures and systems<br />
such as national centers and consulates, providing<br />
immediate support to immigration <strong>of</strong>ficials. Securiport’s<br />
s<strong>of</strong>tware engineers and cyber security pr<strong>of</strong>essionals have<br />
invested a substantial amount <strong>of</strong> time and resources<br />
into developing an absolutely secure system. When dealing<br />
with such sensitive information, it is imperative that<br />
proper research and precautions regarding security are<br />
taken. Securiport’s advanced proprietary systems and<br />
superior cyber security methods ensure that both travelers<br />
and government <strong>of</strong>ficials can use the eVisa Manage-<br />
Continued on next page<br />
17
ment System with full confidence. <strong>The</strong> system provides<br />
travelers with a secure application portal, which can<br />
be accessed at any time <strong>of</strong> day from virtually anywhere<br />
in the world via a web browser. This innovative system<br />
provides a multitude <strong>of</strong> benefits for both travelers and<br />
governments by providing an alternate method <strong>of</strong> applying<br />
for a visa. Not only does this new, virtual application<br />
method save government <strong>of</strong>ficials time and money by<br />
decreasing employee workloads and reducing lines at<br />
consulates and embassies, but it allows travelers to apply<br />
for a visa up to one day before travelling. This timeframe<br />
is a massive improvement over the current, erratic<br />
method that could leave travelers waiting two months<br />
for a visa. <strong>The</strong>re are many different circumstances in<br />
which someone may need to travel without an extended<br />
notice, and this new system will allow travelers to do so<br />
with ease. <strong>The</strong> eVisa system also provides travelers with<br />
an alternate application method if they are unable to<br />
mail in or hand deliver their application to the appropriate<br />
consulate or embassy. <strong>The</strong> eVisa Management System<br />
utilizes Securiport’s secure application portal, which<br />
can be accessed from any browser-based system. This<br />
includes, but is not limited to: computers, tablets, smart<br />
phones and kiosks conveniently located at consulates,<br />
embassies and immigration checkpoints. <strong>The</strong> system<br />
includes real-time background checks and watch-list vetting<br />
against national security and INTERPOL databases<br />
for all applicants and leverages Securiport’s Intelligent<br />
Information Management System (IIMS), which creates<br />
intelligent information reports based on traveler information<br />
and statistical data. <strong>The</strong> system is linked to a central<br />
visa database through a secure Internet connection<br />
and provides governments and immigration <strong>of</strong>ficials<br />
with the proper data and information needed to confirm<br />
a traveler’s identity with confidence at each stage <strong>of</strong> the<br />
immigration process. <strong>The</strong> eVisa Management System<br />
also pairs perfectly with Securiport’s Integrated Immigration<br />
Control System (IICS), which empowers border<br />
management and immigration <strong>of</strong>ficers by utilizing<br />
advanced biometric identification systems and providing<br />
proprietary intelligent information used to identify<br />
potential security risks and criminal activity. This can be<br />
very beneficial for countries such as Honduras, who are<br />
working towards improving the country’s tourism. By<br />
integrating these advanced security solutions, countries<br />
will be communicating to the world that they are taking<br />
an active role in enhancing traveler safety by investing<br />
into advanced security solutions for immigration ports.<br />
Securiport’s eVisa Management System is more timely,<br />
cost-effective, and efficient than the current application<br />
process. By saving travelers’ time and eliminating many<br />
<strong>of</strong> the hassles associated with obtaining a visa today,<br />
the system streamlines the visa application process,<br />
and inevitably increases the amount <strong>of</strong> visitors to countries,<br />
helping international business and boosting local<br />
economies.<br />
Section 3 – Details and Applications <strong>of</strong> eVisa Technolog<br />
y<br />
Securiport’s eVisa Management System provides travelers<br />
with a web-based application portal that <strong>of</strong>fers a<br />
quick, convenient, and secure way to apply for a visa.<br />
<strong>The</strong> system can be easily integrated and deployed to<br />
preexisting visa procedures and systems such as national<br />
centers and consulates. <strong>The</strong> traveler’s sole task is<br />
to fill out the application and submit a payment. Once<br />
an application and payment have been submitted, the<br />
applicant’s information is submitted to the IICS for<br />
background validation and vetted against IIMS Pr<strong>of</strong>iles<br />
to detect a Person <strong>of</strong> Interest. <strong>The</strong> applicant is compared<br />
against local watch lists, INTERPOL Notices and Stolen<br />
& Lost Travel Documents, as well as all previous traveler<br />
data. Once the applicant’s information has been processed<br />
and crosschecked, they will receive a notification<br />
depending on whether the application was approved or<br />
rejected. If the application is approved, an attachment<br />
18
will be sent with the notification that must be shown on<br />
arrival. On arrival, the Immigration Workstation Application<br />
provides the immigration <strong>of</strong>ficial with an extremely<br />
easy-to-use interface to process the traveler. <strong>The</strong> immigration<br />
<strong>of</strong>ficial scans the barcode <strong>of</strong> the attachment,<br />
which is then sent to the server for validation. If successfully<br />
validated, the immigration <strong>of</strong>ficial will continue the<br />
immigration process and begin to capture the traveler’s<br />
biometric information. <strong>The</strong> biometrics are stored with<br />
the traveler’s visa and immigration record and are validated<br />
when the travelers enter or leave the country. All<br />
<strong>of</strong> the traveler data and information collected is stored<br />
securely in Securiport’s IICS servers. Travelers who<br />
arrive to a country without a visa can utilize either the<br />
automated eVisa kiosks or the eVisa Application that is<br />
integrated with the Immigration Workstation Application<br />
to submit their information, biometrics and payment. All<br />
the information submitted is sent to the IICS and IIMS<br />
servers for validation and once complete, the approved<br />
visa is printed and the traveler is directed to immigration<br />
processing. eVisa applications can also be configured<br />
to be manually approved or rejected. Once the<br />
background validation has been completed, the application<br />
is ready for manual approval or rejection via the<br />
Visa Review Application. If approved, a notification is<br />
sent to the traveler with an attachment for them to provide<br />
on arrival. If the application is rejected, a notification<br />
is sent to the traveler informing them a visa cannot<br />
be issued and to contact the embassy or consulate for<br />
guidance. If more information is needed, a notification<br />
is sent to the traveler requesting them to update their<br />
application with the specific information needed.<br />
Section 4 – Strategic Benefits to Governments<br />
With an increase in the demand for international travel<br />
in our evolving global marketplace, it is necessary to<br />
have an efficient and effective system that simplifies<br />
the visa application process. Utilizing an eVisa system<br />
such as Securiport’s eVisa Management System, governments<br />
can prevent excessive hours waiting at visa desks,<br />
reduce the workload <strong>of</strong> staff working at airports, embassies<br />
and consulates, and provide easier facilitation for<br />
tourists and business travelers. By reducing the time and<br />
money it takes to apply for and issue visas, governments<br />
can only expect to see an increase in visa applications as<br />
well as the number <strong>of</strong> visitors, tourism and foreign trade<br />
revenue. Just recently, the Turkish government launched<br />
an e-Visa application system similar to Securiport’s eVisa<br />
Management System. Just weeks after implementing the<br />
e-Visa system, the Turkish government saw an increase<br />
in visa applications, going from a weekly average <strong>of</strong> 400<br />
applications to receiving more than 1,500 in just a few<br />
days [2] . <strong>The</strong> Turkish government hopes to develop and<br />
improve Turkey’s tourism and increase foreign trade<br />
with this eVisa reformation. By utilizing Securiport’s<br />
eVisa Management System that leverages their Integrated<br />
Immigration Control System (IICS) and Intelligent<br />
Information Management System (IIMS), governments<br />
and immigration <strong>of</strong>ficials can equip themselves with<br />
the actionable data and information needed to confirm<br />
a traveler’s identity at ports <strong>of</strong> entry and exit as well<br />
as at each stage <strong>of</strong> the immigration process. And with<br />
dynamic configurations, government <strong>of</strong>ficials can issue<br />
and manage any number <strong>of</strong> visa types required by their<br />
country.<br />
Section 5 – Summary and Conclusion<br />
Governments can derive great benefit from updating<br />
visa and immigration processes to leverage new technology<br />
that provides enhanced security and improved<br />
efficiency. Currently, the visa application process takes<br />
time, money and a high workload <strong>of</strong> the staff at airports,<br />
immigration checkpoints, embassies and consulates.<br />
Additionally, the time constraints <strong>of</strong> the current application<br />
process create multiple challenges and roadblocks<br />
for travelers who may need to apply for a visa very<br />
Continued on next page<br />
19
quickly. Securiport’s eVisa Management System can help<br />
governments, such as Honduras, better serve citizens<br />
and solve these challenges. By transitioning to an eVisa<br />
Management System, governments will be able to provide<br />
travelers with a quick and convenient way to apply<br />
for a visa and initiate their travel to the country while<br />
ensuring absolute security <strong>of</strong> sensitive information. By<br />
simplifying the visa application process, governments<br />
can expect the volume <strong>of</strong> visa applications and visitors<br />
will inevitably increase, further increasing the revenue<br />
generated from tourism. In addition, by implementing<br />
these advanced security solutions, governments will<br />
be showcasing to the rest <strong>of</strong> the world that they are<br />
invested in improving their security and immigration<br />
processes. With the ability to seamlessly integrate with<br />
preexisting visa procedures or systems, as well as Securiport’s<br />
Integrated Immigration Control System (IICS),<br />
the eVisa Management System provides governments<br />
and immigration <strong>of</strong>ficials with the necessary traveler<br />
data and information needed to confirm the traveler’s<br />
identity throughout the immigration process. This innovative<br />
system creates safer travels and a more secure<br />
nation that when coupled with Securiport’s IICS and<br />
IIMS; provide a complete immigration control system<br />
that is tailored to provide benefits to both travelers and<br />
governments.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.securiport.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.securiport.com/improving-travelersafety-with-advanced-security-immigrationsolutions-to-create-safer-nations/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Gal Borenstein, CEO<br />
Borenstein Group<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 703-385-8178 x28<br />
cell: 703-597-1610<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
gal@borensteingroup.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Borenstein Group, Inc.<br />
11240 Waples Mill Road Suite 420<br />
Fairfax, VA 22030<br />
20
Improving Traveler Safety with Advanced Security & Immigration Solutions to Create Safer Nations<br />
21
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Honeywell Security<br />
<strong>2015</strong> Winner<br />
Best Access Control/Identification<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Physical/Logical Priviledged Access Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Pro-Watch 4.2<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In high-security areas like government agencies, airports<br />
and major technology companies, many people<br />
come and go throughout the premises each day. With<br />
so many people in such high-pr<strong>of</strong>ile areas, safety is <strong>of</strong><br />
the utmost importance. Honeywell’s Pro-Watch 4.2 is<br />
a visitor management, access control, IP-video surveillance<br />
and intrusion system that enable security personnel<br />
to quickly and easily protect people and property.<br />
Designed to meet the challenges <strong>of</strong> today’s demanding<br />
environments, the Pro-Watch security management suite<br />
provides the flexibility, scalability and control required<br />
for comprehensive security management. Pro-Watch is<br />
fully compatible with a wide range <strong>of</strong> biometric readers<br />
and wireless locks, including options from Allegion (AD-<br />
400 Series), Assa Abloy (Aperio line) and Salto (Sallis<br />
and SVN). Its wireless lockset technology allows security<br />
personnel to install readers in typically hard-to-reach<br />
locations. <strong>The</strong> wireless readers are also less expensive to<br />
install, allowing users to implement access control in locations<br />
that may have been previously passed-over due<br />
to costs, resulting in a more-secure facility. <strong>The</strong> openplatform<br />
system makes it possible for security personnel<br />
to leverage existing hardware as the system expands.<br />
This allows users to save time and money as they upgrade<br />
their security systems. Pro-Watch is also capable<br />
<strong>of</strong> system conversions. A drop-in board replacement<br />
for Mercury-based systems allow for easy transitions<br />
from legacy readers and access equipment over to the<br />
updated platform without replacing existing hardware.<br />
Pro-Watch also lets security personnel access and man-<br />
22
age the system from any computer. <strong>The</strong> Pro-Watch Web<br />
Client uses existing network infrastructure to provide<br />
remote security management for badging, reporting<br />
and alarm and event monitoring. This flexible security<br />
management allows security personnel to provide<br />
remote security management across buildings, across<br />
campuses and even across the country to governmental<br />
sites like border controls. Pro-Watch is compatible with<br />
Honeywell’s Vindicator ® Intrusion Detection systems<br />
–commonly used at high-pr<strong>of</strong>ile, critical infrastructure<br />
government sites – and gives users control <strong>of</strong> intrusion,<br />
access control and video surveillance systems through<br />
one common interface. By equipping buildings systems<br />
with Pro-Watch 4.2, time and money, which were previously<br />
allocated to repairs and s<strong>of</strong>tware upgrades, can be<br />
eradicated. From airport campuses to government agencies,<br />
Pro-Watch 4.2 gives security managers the advanced<br />
security management platform they need to protect<br />
their premises from any security threat.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.honeywellsecurity.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.honeywellintegrated.com/products/<br />
integrated-security/sms/7757...<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Solveig Hommema, Assistant Account Executive<br />
Weber Shandwick<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 952-346-6050<br />
cell: 612-501-0949<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
shommema@webershandwick.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
8000 Norman Center Drive, Suite 400<br />
Bloomington, MN 55437<br />
23
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Best Access Control/Identification<br />
STANLEY Access Technologies<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Physical/Logical Priviledged Access Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
4900 ASR Security Revolver<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
If you want to beat a criminal, you have to think like<br />
one. That’s exactly what the STANLEY engineers and<br />
product designers did when they conceptualized the<br />
4900 ASR Security Revolver. To bring our vision to<br />
life, we pulled together unparalleled industry-leading<br />
technology that ultimately created the new standard <strong>of</strong><br />
secure entryways, allowing our customers a safe environment<br />
and peace <strong>of</strong> mind. <strong>The</strong> 4900 ASR provides<br />
anti-tailgating and optional anti-piggybacking detection<br />
through the use <strong>of</strong> Time-<strong>of</strong>-Flight (TOF) technology.<br />
This anti-piggybacking detection is achieved through the<br />
self-contained infrared light sources and camera capturing<br />
the reflected light. An internal processor measures<br />
the time <strong>of</strong> reflected light and creates a depth image<br />
to analyze the objects within the revolving door. This<br />
allows the built-in processor to determine if one or two<br />
persons have entered into the security revolving door.<br />
<strong>The</strong> processor compares the images with image stored<br />
in memory to detect security violations.<br />
FEATURES AND BENEFITS<br />
• Prevents unauthorized entry, ensures a safe and secure<br />
internal environment for employees and property<br />
• Anti-Piggybacking TOF technology detects if two<br />
people are trying to enter into the secured facility at the<br />
same time using one door quadrant with a single authorization<br />
• Anti-Tailgating - TOF technology detects if an unauthorized<br />
person or persons are trying to enter into the<br />
secured facility using an empty quadrant without a valid<br />
24
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
StanleyAccess.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––:<br />
http://www.stanleyaccess.com/4900-automaticthree-wing<br />
authorization<br />
• TOF technology provides higher resolution and accuracy<br />
than other sensing systems and is not affected by<br />
ambient light or dark shadows and heavy dark objects<br />
(coats, carts, luggage, etc.) which can give false signals<br />
• Automatic operation, providing either one-way or<br />
two-way security options<br />
• STANLEY Rush collapsing mechanism for emergency<br />
egress from the building<br />
• PLC based programmable control integrates with all<br />
access systems<br />
• Collapsing wings release on activation <strong>of</strong> (fire) alarm<br />
(security) signal<br />
• Factory preset program provides safe, reliable door<br />
operation<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Adria Boyle, Brand Marketing Manager<br />
STANLEY Access Technologies<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (860) 679-6473<br />
cell: (860) 919-5279<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
adria.boyle@sbdinc.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Adria.Boyle@sbdinc.com<br />
25
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Best Detection Solutions<br />
Advanced Detection Technology, LLC<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Cargo/Vehicle Screening<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
LowCam under-vehicle inspection systems (UVIS)<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Although there are others within our realm <strong>of</strong> manufacturing,<br />
our LowCam under-vehicle inspection systems<br />
(UVIS) are very unique in their approach to inspecting<br />
the undercarriage <strong>of</strong> incoming and outgoing vehicles.<br />
Basically, just as an overview, our UVIS technology<br />
replaces the mirrors that are commonly used when circling<br />
a vehicle and looking at the undercarriage. Instead<br />
we provide a camera system (much like CCTV) that a<br />
vehicle simply drives over, then the undercarriage image<br />
is instantly displayed on a monitor in a central control<br />
room or in a safe stand-<strong>of</strong>f location for a thorough, yet<br />
quick, inspection. While other solutions available on the<br />
market <strong>of</strong>fer only a black and white static, single image<br />
(imagine a photocopy), the LowCam UVIS <strong>of</strong>fers not<br />
only the single image viewing, but also full-color, real-<br />
time video so that the inspecting operator can view the<br />
vehicle’s undercarriage using play, pause, zoom, fastforward<br />
and rewind - much like a CCTV camera allows<br />
in other security operations. All vehicle data - including<br />
license plate information and/or driver image - gathered<br />
by the LowCam UVIS is stored in a centralized database<br />
for future review. All facilities can easily pull historical<br />
information to inquire on who is entering or leaving<br />
their facility, and if any security measures or breaches<br />
were detected. Besides capturing license plate and<br />
driver information, the most advanced UVIS are now<br />
equipped with a video-analytical tool known as “Foreign<br />
object Detection”. This s<strong>of</strong>tware scans quickly the approaching<br />
vehicle’s undercarriage for abnormal colors,<br />
sizes/shapes <strong>of</strong> objects and variations made to the<br />
26
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://advanced-detection-technology.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://advanced-detection-technology.com/resources/downloads<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Candace Carpenter, Gobal Marketing Director<br />
Advanced Detection Technology<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (704) 696-0708<br />
cell: (828) 308-2580<br />
undercarriage in order to automatically highlighting and<br />
alerting (using on-screen and visual queues) the operator<br />
<strong>of</strong> the potential danger these detected items could<br />
represent. Often used in conjunction with other vehicle<br />
screening and access control devices, such as bollards,<br />
stoplights and even the larger vehicle X-Ray inspection<br />
systems, our LowCam UVIS have been battle-tested<br />
and proven globally for over 12 years. Our company is<br />
proud to serve airports, seaports and border crossings<br />
around the world!<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
cancarpenter@advanced-detection.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
215-1 Overhill Drive<br />
Mooresville, NC 28117<br />
27
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
SureScan Corporation<br />
<strong>2015</strong> Winner<br />
Best Detection Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Explosives/Narcotics/Contraband Detection<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
x1000 Multi-Energy Stationary Gantry CT Explosives<br />
Detection System for Checked Baggage Screening<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
TSA Certified x1000 Multi-Energy Stationary Gantry<br />
CT Explosives Detection System for Checked Baggage<br />
Screening SureScan Corporation Brings NEW Technology<br />
to the Market, Focused on Lower Life Cycle Costs <strong>The</strong><br />
SureScan x1000 checked baggage-screening solution,<br />
is engineered and designed with innovative technology<br />
and low maintenance and lifecycle costs. Built from the<br />
ground up for checked baggage screening rather than<br />
an adaptation <strong>of</strong> medical technology, the x1000 is suited<br />
to the airport environment and designed with a baggage-handling<br />
interface in mind. Unlike a medical environment,<br />
baggage-handling areas in airports are constrained,<br />
dusty environments with operation every day,<br />
365 days a year. <strong>The</strong> x1000 is designed to install and<br />
function seamlessly in this environment. <strong>The</strong> x1000 is<br />
TSA certified and currently being utilized in Department<br />
<strong>of</strong> Homeland Security research projects and undergoing<br />
ECAC Standard 3 approval. Features include: Stationary<br />
Gantry: No moving parts, low maintenance and replacement<br />
costs Large Rectangular Tunnel throughout: Fits<br />
tall and wide baggage, preventing costly bag jams and<br />
system downtime Multi-Energy Detection: For atomic<br />
number analysis detects current and emerging threats<br />
such as home made explosives (HMEs) with a high level<br />
<strong>of</strong> accuracy and low false alarm rates Efficient Platform:<br />
Easy to set up and self-calibrates Decreased Power Usage:<br />
50 percent lower operating power consumption<br />
and simple air-cooling eliminates pricey air condition<br />
operation and fees Upgradable Processing and Algorithm<br />
Engines: Field-upgradeable options to address<br />
28
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.surescaneds.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
TDS:http://surescaneds.com/pdf/<strong>2015</strong>0401_<br />
SSx1000TDSE.pdf; FOX NEWS REPORThttp://<br />
video.foxnews.com/v/4072808566001/new-technology-set-to-revolutio...<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Susan Cooper, Director <strong>of</strong> Marketing<br />
SureScan Corporation<br />
future requirements, such as increased belt speeds,<br />
lower false alarm rates, and future threats SureScan<br />
Corporation is an emerging leader and global company<br />
bringing advanced, explosive detection technology and<br />
superior manufacturing to the homeland security marketplace.<br />
SureScan sits firmly as a leading edge developer<br />
<strong>of</strong> security technology, providing solutions that meet<br />
the most rigorous quality and performance standards<br />
while remaining efficient and cost-effective.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 973-830-6798<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
susan.cooper@surescaneds.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
PO Box 210, 2507 Wayne Street, Endicott, NY 13760<br />
Visit www.surescaneds.com for the full technical data<br />
sheet download and to contact us for an overview <strong>of</strong> the<br />
x1000 solution.<br />
info@surescaneds.com<br />
+1 (607) 321-0042<br />
www.surescaneds.com<br />
29
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Rapiscan Systems<br />
<strong>2015</strong> Winner<br />
Best Detection Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Nuclear/Radiation Detection<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rapiscan Systems<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rapiscan Systems, a leading provider <strong>of</strong> security screening<br />
solutions, is well known for the high quality, reliability<br />
and affordability <strong>of</strong> its solutions. With products<br />
sold into four market segments, including Baggage and<br />
Parcel Inspection, Cargo and Vehicle Inspection, Hold<br />
Baggage Screening and People Screening, the company<br />
has a solution for the most demanding threat detection<br />
situations its customers could face. An important<br />
part <strong>of</strong> Rapiscan’s product portfolio is its radiation<br />
detection product line, which addresses the need for<br />
global governments and organizations to monitor and<br />
locate radioactive threat materials that can be used in<br />
atomic weapons and dirty bombs. <strong>The</strong> product line is<br />
comprised <strong>of</strong> s<strong>of</strong>tware and hardware based solutions<br />
for inspecting vehicles, packages and people. Radiation<br />
detection products can be used in a standalone deployment<br />
or integrated with Rapiscan’s X-ray and metalbased<br />
threat detection solutions. <strong>The</strong> newest addition to<br />
Rapiscan’s radiation detection product line is the Rapiscan<br />
MP100 Backpack Radiation Detection system. A high<br />
performance, easy to use radiation monitor combining<br />
gamma and optional neutron detection is housed in<br />
a lightweight, compact commercial backpack, making<br />
the system perfect for covert inspection situations. <strong>The</strong><br />
MP100 is ideal for supporting security operations and<br />
performing radiation surveys in a variety <strong>of</strong> markets –<br />
including critical infrastructure, customs and border<br />
control, event security, defense and law enforcement<br />
applications. All <strong>of</strong> the features required for radiation<br />
detection are integrated in the MP100 so it can be used<br />
30
as a standalone device and connected wirelessly to a<br />
Rapiscan oversight system for remote data collection<br />
and display. Using the MP100 is as easy as slipping<br />
the backpack on and walking around. Weighing just<br />
18 pounds, the MP100 is lightweight and easy to use.<br />
Additionally, the onboard battery enables 16 hours <strong>of</strong><br />
continuous operation in a wide range <strong>of</strong> environments.<br />
<strong>The</strong> Rapiscan RadviewerTM Android app displays the<br />
operator’s current position and direction toward the<br />
radiation source. <strong>The</strong> design <strong>of</strong> the MP100’s radiation<br />
detectors provides increased directional sensitivity <strong>of</strong><br />
the radiation detection. A radiation alarm is signaled audibly<br />
via a headphone jack on the backpack or visually<br />
via RadviewerTM. In this way, the MP100 enables users<br />
to effectively detect and locate radioactive threats. <strong>The</strong><br />
MP100 is manufactured by Rapiscan’s Radiation Detection<br />
Products division, which has supplied thousands <strong>of</strong><br />
radiation monitors that are deployed at border crossings,<br />
seaports, airports and facilities around the world.<br />
<strong>The</strong> MP100 uses Rapiscan’s proven radiation detection<br />
technology adapted for a backpack deployment. <strong>The</strong><br />
radiation detection performance meets the requirements<br />
<strong>of</strong> ANSI N42.53. <strong>The</strong> MP100 <strong>of</strong>fers customers<br />
efficient, easy to use and reliable man-portable radiation<br />
detection with high performance at an affordable cost <strong>of</strong><br />
acquisition and operation.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.rapiscansystems.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.rapiscansystems.com/en/products/<br />
radiation_detection<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Jennifer Edgerly, Senior Account Director,<br />
SpeakerBox Communications<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 703-287-7809<br />
cell: 202-486-0518<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
jedgerly@speakerboxpr.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
7900 Westpark Drive, Suite T410, McLean, VA<br />
31
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
PureTech Systems<br />
<strong>2015</strong> Winner<br />
Best Communications Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best MOB Tracking and/or Wrist Devices<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Man Overboard Detection System<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Man Overboard events continue to be a common occurrence<br />
in the cruise industry and other related markets.<br />
<strong>The</strong> problem is compounded by the fact that when<br />
these events occur the timely availability <strong>of</strong> important<br />
data is missing. Accurate confirmation <strong>of</strong> the event<br />
including time <strong>of</strong> occurrence, location on the ship and<br />
location in the sea is critical, but <strong>of</strong>ten unavailable for<br />
hours following an occurrence, if at all. Fortunately,<br />
proactive detection systems such as the Man Overboard<br />
Detection System from PureTech Systems, accurately<br />
detects man overboard events and provides immediate,<br />
actionable data to response personnel. We feel such a<br />
system deserves award consideration for its potential<br />
to save lives within the cruise line and ocean platform<br />
industries.<br />
ACCURATE VIDEO DETECTION<br />
<strong>The</strong> system utilizes commercially available infrared imagers<br />
combined with PureTech’s geospatial video analytics,<br />
which not only provide instant visual pro<strong>of</strong> <strong>of</strong> an event,<br />
but also achieves detection rates over 99% in various<br />
ranges <strong>of</strong> sea states and weather conditions. Detection<br />
coverage encompasses the length <strong>of</strong> ship, including all<br />
passenger floor levels and is accurate for both cold and<br />
warm water cruise routes.<br />
FIELD PROVEN FOR LOW FALSE ALARMS<br />
Almost as important as detection accuracy, false alarms<br />
from weather conditions and cruise operations can minimize<br />
the effectiveness <strong>of</strong> detection systems. <strong>The</strong> Man<br />
Overboard Detection System from PureTech Systems was<br />
32
subjected to hundreds <strong>of</strong> hours <strong>of</strong> real world environmental<br />
and operational conditions on actual cruise<br />
ships and the results demonstrated accurate detection<br />
(i.e. approaching 100%) with little to no false alarms.<br />
SITUATIONALLY AWARE USER INTERFACE<br />
Use <strong>of</strong> geospatial data within the detection algorithms<br />
allows for a user interface that is easy to understand and<br />
simple to use. In situations, such as a man overboard<br />
events, providing a high level <strong>of</strong> situational awareness<br />
aids first responders in gaining a full understanding<br />
<strong>of</strong> the event as quickly as possible. This is achieved<br />
through geolocation <strong>of</strong> the alarm location, instant access<br />
to detection images, looping videos <strong>of</strong> the event, as well<br />
as audio notification. <strong>The</strong> system includes a full alarm<br />
database and video playback capability.<br />
HIGHLIGHTS<br />
• Automatic Detection <strong>of</strong> Man Overboard Events<br />
• 99%+ detection rates over wide variations in sea state<br />
and weather conditions.<br />
• Very Low False Alarm rate<br />
• Instant video validation <strong>of</strong> event for immediate action<br />
• Reporting <strong>of</strong> event latitude and longitude (i.e. location<br />
in the sea)<br />
• Fall origin guidance (i.e. location on the ship)<br />
• Alarm and Video Retention and Review<br />
• Situational presentation <strong>of</strong> incident data to decision<br />
makers<br />
• In Service Installation<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.puretechsystems.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.puretechsystems.com/man-overboard-detection.html<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Eric Olson, VP <strong>of</strong> Marketing<br />
PureTech Systems,<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 602-424-9842 X112<br />
cell: 480-522-6331<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Eric.olson@PuretechSystems.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
1950 W Rose Garden Lane #140<br />
Phoenix, AZ 85027<br />
33
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
LRAD Corporation<br />
<strong>2015</strong> Winner<br />
Best Communications Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Mass Notification System<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
LRAD 360X<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
During large events or area emergencies, the ability<br />
to broadcast crystal clear voice messages is crucial for<br />
communicating to, and ensuring the safety <strong>of</strong>, those attending<br />
events and the public. <strong>The</strong> LRAD 360X delivers<br />
LRAD ® ’s renowned, highly intel¬ligible voice broadcasts<br />
and warning siren with uniform 360° coverage.<br />
Each lightweight, power efficient LRAD 360X emitter<br />
array broadcasts uninterrupted clear voice messages<br />
and warning sirens over a 1.3-kilometer radius. Featuring<br />
LRAD’s optimized driver and waveguide technology,<br />
LRAD 360X ONE VOICE mass notification &<br />
communication systems ensure every voice broadcast<br />
cuts through wind, engine and crowd noise, and is<br />
clearly heard and understood throughout an event or<br />
emergency. Featuring the industry’s highest level <strong>of</strong><br />
intelligibility and quality <strong>of</strong> sound, the LRAD 360X <strong>of</strong>fers<br />
true continuous activation and maintains a smooth<br />
frequency response with an intensity variation <strong>of</strong> less<br />
than 5 dB over in the range between 300 Hz and 6.5<br />
kHz. <strong>The</strong> 360X avoids audio fading and <strong>of</strong>fers clear communication<br />
across all frequencies over distance. LRAD<br />
360X systems can be mounted on buildings and/or<br />
stand-alone poles, and are rugged enough to withstand<br />
up to 200 mph winds. <strong>The</strong> 360X is field upgradeable for<br />
added area coverage and features flexible power options<br />
including AC only, AC/DC for true UPS, generator, and/<br />
or solar. Single or multiple systems can be integrated<br />
for remote activation and operation via TCP/IP, satellite,<br />
GPRS/GSM, and/or redundant analog or digital radio<br />
control interface. LRAD ONE VOICE systems can be<br />
34
activated on site or remotely. LRAD 360X - Highly Intelligible<br />
Mass Notification & Communication Until recently,<br />
voice communication had been an afterthought for most<br />
mass notification systems. While high power speaker<br />
arrays sound sirens to alert <strong>of</strong> approaching danger,<br />
most are incapable <strong>of</strong> broadcasting specific information<br />
about the severity <strong>of</strong> the situation or recommended<br />
actions that could protect and save lives. LRAD 360X<br />
systems broadcast with exceptional intelligibility and<br />
vocal clarity to provide authorities ONE VOICE to communicate<br />
potentially lifesaving information over local<br />
or large areas before, during, and in the aftermath <strong>of</strong> an<br />
emergency or disaster. LRAD systems are self-contained<br />
and do not rely on external power or communication<br />
infrastructure. LRAD 360X systems and accessories have<br />
been installed in a number <strong>of</strong> Asian countries replacing<br />
and upgrading their mass notification systems to include<br />
LRAD’s highly intelligible voice capability.<br />
FEATURES<br />
• Fully ruggedized space saving 1RU amplifier modules<br />
• Low power consumption for continuous operation<br />
during extended power outages<br />
• Unparalleled vocal clarity and intelligibility<br />
• Combined P.A. and mass notification in one system<br />
• Safely alerts, communicates and calms the public during<br />
emergency situations<br />
• Audio output easily modulated<br />
• Does not require heavy equipment for installation,<br />
reducing installation costs<br />
• Comes standard with LRAD’s hardened MP3 Controller/Player<br />
for recording, storing and playing back messages,<br />
and push button system control<br />
• All-weather microphone to record and playback messages<br />
on the fly<br />
LRAD Corporation www.LRADX.com<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.lradx.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.lradx.com/lrad_products/lrad-360x/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
E. Brian Harvey, Director Capital Markets and Investor<br />
Relations<br />
LRAD Corporation<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 858-676-0519<br />
cell: 858-753-8974<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
ebharvey@lradx.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
LRAD Corporation<br />
16990 Goldentop Road, Suite A<br />
San Diego, CA 92127<br />
35
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
LRAD Corporation<br />
<strong>2015</strong> Winner<br />
Best Communications Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Acoustic Hailing Service<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
LRAD ® 450XL<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> Industry’s Loudest, Most Intelligible AHD for its<br />
Size & Weight LRAD Corporation’s LRAD 450XL is the<br />
communication industry’s loudest, most intelligible<br />
acoustic hailing device (AHD) for its size and weight.<br />
Low pr<strong>of</strong>ile, lightweight and designed for temporary<br />
or fixed mounting on tripods, vehicles and vessels, the<br />
LRAD 450XL uses an enhanced, patent pending technology<br />
to generate the audio output <strong>of</strong> a unit almost twice<br />
its size and weight with the same high level <strong>of</strong> clarity<br />
and intelligibility consistent with the LRAD product<br />
line. <strong>The</strong> LRAD 450XL is easily transported to provide a<br />
highly effective, long range communication and warning<br />
capability where required, and is rapidly being adopted<br />
for public safety and national defense applications<br />
around the world. Featuring LRAD’s optimized driver<br />
and waveguide technology, the LRAD 450XL ensures<br />
every broadcast cuts through wind, engine and background<br />
noise and is clearly heard and understood even<br />
inside vehicles and buildings. Through the use <strong>of</strong> live<br />
or pre-recorded multilingual voice messages and alert<br />
tones, LRAD systems establish large safety zones, unequivocally<br />
determine intent, favorably resolve uncertain<br />
situations and save lives on both sides <strong>of</strong> the Long<br />
Range Acoustic Device ® . <strong>The</strong> LRAD 450XL provides<br />
highly intelligible communication up to 1,700 meters<br />
and safely communicates beyond stand<strong>of</strong>f distances to<br />
determine intent, create an instant acoustic stand<strong>of</strong>f<br />
perimeter, and provide time for appropriate responses.<br />
<strong>The</strong> LRAD 450XL also uses variable beam width for extended<br />
coverage, providing clear, long range, directional<br />
36
communication. As part <strong>of</strong> field and special response<br />
team operations, the LRAD 450XL safely extends the<br />
perimeter in friendly or escalated environments keeping<br />
the public, law enforcement and national defense<br />
personnel out <strong>of</strong> harm’s way.<br />
<strong>The</strong> LRAD 450XL is also used to:<br />
• Communicate to large crowds during parades, festivals,<br />
concerts and sports events<br />
• Establish safety zones and humanely enforce perimeters<br />
• Control traffic congestion<br />
• Conduct SWAT operations<br />
• Disperse crowds<br />
• End hostage and barricaded subject situations<br />
• Serve high risk warrants<br />
• Extract inmates safely from cells<br />
• Secure jails, prison yards and facility perimeters<br />
• Communicate to protesters<br />
• Stop threatened suicides<br />
• Evacuate neighborhoods during emergencies and<br />
disasters<br />
• Conduct search & rescue operations from the land<br />
and air<br />
• Communicate potentially lifesaving information to<br />
affected populations throughout disasters<br />
Law enforcement agencies and first responders around<br />
the world, including over 100 U.S. cities, counties and<br />
states, are currently using LRAD systems and support<br />
equipment. LRAD Corporation www.LRADX.com<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.lradx.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.lradx.com/lrad_products/lrad-450xl/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
E. Brian Harvey, Director Capital Markets and Investor<br />
Relations<br />
LRAD Corporation<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 858-676-0519<br />
cell: 858-753-8974<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
ebharvey@lradx.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
LRAD Corporation<br />
16990 Goldentop Road, Suite A<br />
San Diego, CA 92127<br />
37
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
TCOM, LP<br />
<strong>2015</strong> Winner<br />
Best Surveillance Systems<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Coastal Surveillance Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
71M Low Altitude Surveillance System<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Maintaining continuous aerial security is a daunting information needed to secure the skies.<br />
task. Threats such as low-flying, extremely fast aircraft<br />
can take advantage <strong>of</strong> the earth’s curvature and exploit SURVEILANCE FOR COASTS OF THE U.S.<br />
terrain obstructions. This renders ground-based radars AND ITS ALLIES VIA AEROSTATS<br />
unable to provide target information in time to take Now, specifically, given the recent terroristic threats<br />
appropriate action. Slow, low flying missiles with a small from terrorists attacking with small suicide boats large<br />
cross section may also avoid early detection and pose a U.S. ships, pirates taking over commercial fleets, to<br />
significant threat. Manned aerial surveillance can decrease<br />
the risk for short periods <strong>of</strong> heightened alert, but immigration and drug smuggling via oceans and wa-<br />
protecting the borders <strong>of</strong> the United States from illegal<br />
the operational costs are much too high for extended terways, to detecting threats, persistent surveillance <strong>of</strong><br />
use. To meet this airborne coverage challenge effectively TCOM’s aerostats have become a staple in what Homeland<br />
Security and US Military have been using here and<br />
and inexpensively, TCOM developed the 71M Low<br />
Altitude Surveillance System. With over 1,000,000 hours in the Gulf. Monitoring territorial waters on a round-theclock<br />
basis while providing intelligence in time to take<br />
<strong>of</strong> operation these systems are the only operational<br />
airborne defense assets to routinely provide the continuous<br />
round-the-clock, low altitude target detection Ground-based and shipboard systems have a limited<br />
appropriate action is a major challenge to many nations.<br />
38
ange against surface targets, while continuous use<br />
<strong>of</strong> aircraft is prohibitively expensive. Nations need an<br />
effective and affordable system that <strong>of</strong>fers continuous,<br />
wide-area maritime surveillance and timely provision <strong>of</strong><br />
target information. TCOM Sea surveillance systems use<br />
persistent surveillance medium-class tethered aerostats,<br />
equipped with an advanced maritime radar, thermal<br />
imaging and optical sensors, and communications payloads<br />
that detect and track maritime targets at distances<br />
<strong>of</strong> 60 nautical miles and beyond. A single sea surveillance<br />
system can cover thousands <strong>of</strong> square miles for<br />
weeks at a time at the lowest possible hourly cost for an<br />
airborne asset. <strong>The</strong> early detection and direct communications<br />
with air and sea assets affords the critical window<br />
<strong>of</strong> time to evaluate the situation, coordinate forces<br />
and engage, if required. <strong>The</strong> versatility <strong>of</strong> the sea surveillance<br />
system makes it ideal for responding to requirements<br />
or threats that change rapidly. <strong>The</strong> system is fully<br />
transportable and can be easily relocated with no site<br />
preparation. Although fully mature, the system can be<br />
shaped to better meet the needs <strong>of</strong> the client. Additional<br />
capabilities such as passive surveillance and remote data<br />
linking can be included. View TCOM’s innovative solution<br />
video right here: https://youtu.be/6KkZCycrdkU<br />
About TCOM<br />
With headquarters in Columbia, Maryland and operations<br />
in over 12 countries around the world, TCOM is<br />
the global authority in airborne persistent surveillance<br />
solutions. For over 40 years, TCOM innovations have<br />
defined the industry, and our pioneering achievements<br />
continue to revolutionize the design, manufacture and<br />
deployment <strong>of</strong> LTA systems. With corporate headquarters<br />
in Columbia, MD and manufacturing and testing<br />
facilities in Elizabeth City, NC, TCOM is the world’s<br />
only company solely devoted to the design, fabrication,<br />
installation and operation <strong>of</strong> persistent surveillance<br />
aerostat systems. Our complete platform solutions<br />
include numerous classes <strong>of</strong> aerostats that can each be<br />
equipped with a broad selection <strong>of</strong> proven payloads that<br />
are customizable for specific customer requirements.<br />
View TCOM’s corporate capability: https://youtu.be/<br />
i_7GjO9iH7g An illustration <strong>of</strong> the expanding maritime<br />
threat in U.S. allied countries, is in this release: http://<br />
www.tcomlp.com/tcom-president-ron-bendlin-signsmou-with-bintang-kencana-in-presence-<strong>of</strong>-malaysianprime-minister-dato-sri-mohd-najib-tun-hj-abdul-razakin-providing-aerostat-systems-to-improve-maritime-sec/<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.tcomlp.com/our-company/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.tcomlp.com/sea-surveillance-systems/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Gal Borenstein, CEO<br />
Borenstein Group<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 703-385-8178 x28<br />
cell: 703-597-1610<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
gal@borensteingroup.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Borenstein Group 11240 Waples Mill Road Suite 420<br />
Fairfax, VA 22030<br />
39
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Honeywell Security<br />
<strong>2015</strong> Winner<br />
Best Surveillance Systems<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Video Analytics/Intrusion Detection<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
MAXPRO Cloud<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
National security efforts keep citizens safe and secure,<br />
whether in airports or at sea. With multiple sites, locations<br />
and checkpoints, it’s important to recognize how<br />
complex national security can be; as such, airports,<br />
and seaports need even-more intuitive and streamlined<br />
ways to manage their security systems. MAXPRO Cloud<br />
is an integrated, cloud-based video and access management<br />
system that enables organizations to significantly<br />
streamline multi-site management, providing access<br />
from anywhere, anytime. Designed for multi-site facilities,<br />
it allows owners to easily manage their facilities’<br />
security system all through one user-friendly interface.<br />
In these high-security areas, it’s imperative that security<br />
procedures are strong enough to keep threats at bay but<br />
easy enough to seamlessly manage multiple areas at the<br />
same time. Honeywell’s user experience design team<br />
crafted the MAXPRO Cloud interface to streamline ease<br />
<strong>of</strong> use. <strong>The</strong> single sign-on enables control <strong>of</strong> all facets<br />
<strong>of</strong> the system after entering one set <strong>of</strong> credentials. <strong>The</strong><br />
smart dashboard allows users to easily manage their<br />
systems, from granting or rescinding access permissions<br />
and unlocking site-specific doors to reviewing access<br />
logs and captured video to evaluate a potential alarm<br />
event. MAXPRO Cloud also integrates with Google Maps<br />
to provide a visual, map-based depiction <strong>of</strong> physical<br />
sites. This enhances ease <strong>of</strong> use by simplifying multisite<br />
management. For example, an airport operations and<br />
security manager can access a map <strong>of</strong> every building on<br />
an airport campus and inspect which airport employees<br />
have credentials for which checkpoints (perhaps an<br />
40
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.honeywellsecurity.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.maxprocloud.com/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Solveig Hommema, Assistant Account Executive<br />
Weber Shandwick<br />
airline security screener is given access to ten <strong>of</strong> the 15<br />
checkpoints but an aircraft mechanic only needs access<br />
to a single checkpoint). <strong>The</strong> ability to visually manage<br />
multisite locations removes the need for the manager to<br />
remember which location is assigned to which system<br />
ID and lets the manager quickly view and modify access<br />
permissions to specific sites. <strong>The</strong> flexibility and scalability<br />
<strong>of</strong> MAXPRO Cloud makes it applicable to a wide range<br />
<strong>of</strong> applications, from a maritime port <strong>of</strong> two buildings to<br />
a major international airport. This customization allows<br />
aviation, maritime and other national security facilities<br />
to use access and video surveillance services proportionate<br />
to the size <strong>of</strong> their precincts. MAXPRO Cloud<br />
provides proactive system health reports and alerts to<br />
the dealer and user, enabling the dealer to actively address<br />
issues as they arise instead <strong>of</strong> reactively responding<br />
to failed hard drives, cameras that have lost video<br />
or equipment that has stopped working. This constant<br />
vigilance helps to prevent security breaches before they<br />
have a chance to occur, resulting in improved security.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 952-346-6050<br />
cell: 612-501-0949<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
shommema@webershandwick.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
8000 Norman Center Drive, Suite 400<br />
Bloomington, MN 55437<br />
41
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
CohuHD Costar<br />
<strong>2015</strong> Winner<br />
Best Surveillance Systems<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Long-Range/Day-Night Surveillance<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CohuHD Costar’s 8800HD Series<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CohuHD is a leader in rugged, outdoor video surveillance<br />
cameras for critical infrastructure environments.<br />
<strong>The</strong> 8800HD Series combines full HD image resolution<br />
with high-powered performance lens optics for delivering<br />
unprecedented image quality and detail for longrange<br />
surveillance applications.<br />
<strong>The</strong> 8800HD Series long-range camera system <strong>of</strong>fers an<br />
unprecedented feature set:<br />
• First truly long-range high-definition camera positioner<br />
• Powerful HD optical zoom magnification, up to 137x<br />
• Industry’s narrowest HAFOV with HD resolution, as<br />
low as 0.17° degrees<br />
• Boresighted optics with programmable day/night<br />
focusing<br />
• Greatest detection distances on the market, humansized<br />
objects detected at distances up to 30 miles (based<br />
on Johnson Criteria with optimum conditions)<br />
• First long-range HD camera positioner with built-in<br />
H.264 compression and web server, operating over standard<br />
digital networks<br />
• Precision positioning with speed range <strong>of</strong> 0.05° to<br />
45°/second, and with built-in brakes for stability<br />
• Highest environmental standards: IP67, ASTM-B117,<br />
TS-2 Shock & Vibe, and MIL-STD-810F for salt/fog, immersion<br />
and sand/dust CohuHD’s 8800HD Series can<br />
deliver up to 6 times the resolution and detail <strong>of</strong> traditional<br />
standard-definition long-range camera systems.<br />
42
With this exceptional performance, the 8800HD is ideal<br />
for:<br />
• Border patrol<br />
• Airports<br />
• Seaports<br />
• Military<br />
• Perimeter security<br />
• Maritime<br />
• Other critical infrastructure environments<br />
In addition to superior image quality and excellent longrange<br />
zoom optics, the 8800HD system delivers its HD<br />
video across standard digital network infrastructures. It<br />
does this by using H.264 image compression technology,<br />
which requires a fraction <strong>of</strong> the bandwidth traditional<br />
MPEG4 or MJPEG requires. <strong>The</strong> 8800HD superior<br />
image quality is generated by a 1/2.7” CMOS 1080p30<br />
progressive scan day/night sensor. Image performance<br />
and color reproduction are superb even under challenging<br />
lighting conditions. In night mode, the camera<br />
enhances low light viewing by automatically switching<br />
the IR filter out <strong>of</strong> the optical path, delivering a monochrome<br />
image. Long-range surveillance is achieved by<br />
the integrated 60x HD-quality zoom lens optics, with<br />
focal length ranging from 16.7 mm to 1,000mm. <strong>The</strong><br />
lens includes a remotely controlled 2x optical extender<br />
which can be inserted in the optical path, increasing the<br />
maximum focal length to 2,000mm. Horizontal Angular<br />
Field Of View as low as 0.17 is achieved at full zoom<br />
with extender inserted. <strong>The</strong> 8800HD provides a fullfunction<br />
web server, enabling complete administrative<br />
and operator control. Administrative features include<br />
configuring network settings, assigning user passwords,<br />
setting video streaming properties, defining camera<br />
positioning presets and tours, and assigning camera ID<br />
labels. <strong>The</strong> 8800HD is designed to operate in extreme<br />
weather, with its IP67 sealed and pressurized enclosure<br />
Continued on next page<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.Cohuhd.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CohuHD Costar’s 8800HD Series:<br />
http://www.cohuhd.com/content/8800hd<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Dana Varga, Marketing Manager<br />
CohuHD Costar<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 858-391-1712<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
dvarga@cohuhd.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
12367 Crosthwaite Circle<br />
Poway, CA 92064<br />
43
protection. This eliminates the effects <strong>of</strong> water intrusion,<br />
pollutants and corrosives. It is designed to operate<br />
in a broad temperature range, from winter in the Arctic<br />
to summer in the desert, with heaters and fans, and<br />
electrical and mechanical components that are rated<br />
for the full range. CohuHD has proudly manufactured<br />
its products in the USA for more than 50 years. <strong>The</strong><br />
8800HD is installed and protecting marquee projects<br />
around the world including the Port <strong>of</strong> Corpus Christi,<br />
Integrated Fixed Towers (IFTs) at the Jordan Border and<br />
the USS Ponce.<br />
<strong>The</strong> 8800HD Series long-range camera system <strong>of</strong>fers an<br />
unprecedented feature set:<br />
• First truly ultra long-range high-definition camera<br />
positioner<br />
• Powerful HD zoom magnification <strong>of</strong> up to 2,000mm<br />
• Industry’s narrowest HAFOV with HD resolution, as<br />
low as 0.17 degrees<br />
• Boresighted optics with programmable day/night<br />
focusing<br />
• Greatest detection distances on the market, humansized<br />
objects detected at distances up to 30 miles (based<br />
on Johnson Criteria with optimum conditions)<br />
• First long-range HD camera positioner with built-in<br />
H.264 compression and web server, operating over standard<br />
digital networks<br />
• Precision positioning with speed range <strong>of</strong> 0.05 to 45/<br />
second, and with built-in brakes for stability<br />
• Highest environmental standards: IP67, ASTM-B117,<br />
TS-2 Shock & Vibe, and MIL-STD-810F for salt/fog, immersion<br />
and sand/dust<br />
44
45
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Betafence USA<br />
<strong>2015</strong> Winner<br />
Best Perimeter Protection, Fencing, Gates, Guard Booths<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Fencing<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Guardian Fence System ®<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> reason Betafence USA should win the Best Fencing,<br />
Barriers, Bollards, Gates award is due to the Guardian<br />
Fence System ® . It is the original modular steel security<br />
fence solution, providing high strength protection.<br />
<strong>The</strong> patented design allows a variety <strong>of</strong> configurations,<br />
from medium security to high security fencing and<br />
partitions. We also <strong>of</strong>fer more than 40 available security<br />
mesh panel styles. <strong>The</strong> Guardian Fence System ® also<br />
<strong>of</strong>fers the greatest range <strong>of</strong> security solutions, from<br />
perimeter fencing, partitioning, visual screening barriers<br />
and pedestrian and vehicular gates. <strong>The</strong> Guardian<br />
Fence System ® configurations include: Guardian 5000<br />
(high security) and Guardian 7000 (ultra-high security).<br />
For high security fencing applications, the Guardian<br />
Fence System ® features an exceptional “Smart Fence”<br />
trenchless integration design, providing a steel conduit/<br />
raceway within the fence system for intrusion detection,<br />
surveillance, access control and communication, fiber<br />
optics and cabling, shielding them from view, weathering<br />
and vandalism. <strong>The</strong> system is also capable <strong>of</strong> incorporating<br />
restrictive components such as barbed tape<br />
concertina and either cable-based or rail-based vehicular<br />
anti-crash resistance. Fences can be easily upgraded<br />
without removing existing posts; exact spacing <strong>of</strong> posts<br />
is not a requirement <strong>of</strong> the Guardian Fence System ® .<br />
This system is also capable <strong>of</strong> employing a dual layer <strong>of</strong><br />
46
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.betafenceusa.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.betafenceusa.com/ProductLine.<br />
aspx?Id_ProductLine=24&Tab=Intro<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Debbie Corkin, Controller<br />
Betafence USA<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 972-878-7000<br />
security mesh panels - either the same type, or two different<br />
types that may be complementary in nature based<br />
on the application. <strong>The</strong> Guardian system can also use<br />
one type mesh style at the bottom <strong>of</strong> the barrier, and an<br />
alternate type arranged vertically based on a particular<br />
purpose. By design, the Guardian Fence System ® can<br />
also be installed more quickly, and at less expense, than<br />
other fence solutions providing similar levels <strong>of</strong> security.<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
dcorkin@betafenceusa.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
3309 SW Interstate 45 Ennis<br />
TX 75119<br />
47
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Tilt-A-Way<br />
<strong>2015</strong> Winner<br />
Best Perimeter Protection, Fencing, Gates, Guard Booths<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Perimeter Protection, Fencing, Gates, Guard<br />
Booths<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Tilt-A-Way vertical pivot gates<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Tilt-A-Way vertical pivot gate is a perfect fit in the Airport,<br />
Seaport and Border security industry. <strong>The</strong> Tilt-A-<br />
Way gate is installed in many <strong>of</strong> the gated areas <strong>of</strong> the<br />
Airport, Seaport and Border Patrol facilities. with it’s<br />
quick open and close activation cycle time. Tilt-A-way<br />
keeps any facility a safer place preventing tailgating <strong>of</strong><br />
multiple vehicles. Another great feature <strong>of</strong> a Tilt-A-Way<br />
gate. Being that it pivots from a horizontal position into<br />
itself in the vertical position so it requires a smaller footprint<br />
therefore leaving more real estate for structures<br />
or more parking spaces. Tilt-A-Way also <strong>of</strong>fers a full line<br />
<strong>of</strong> anti-Terrorist crash gates such as the M-50, M-40 and<br />
M-30 crash tested gates. Tested at the Texas Transportation<br />
institute. <strong>The</strong> M-50 is tested with a 15,000 pound<br />
truck traveling 50 MPH. At this weight and speed the<br />
gate is engineered to withstand the hit and not let the<br />
vehicle penetrate through the gate.<br />
48
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.tiltaway.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.idealmanufacturing.biz<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Ideal Manufacturing<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 406-656-4360<br />
cell: 406-670-3746<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
daveh@idealmfginc.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
2011 Harnish Blvd<br />
Billings, Mt 59101<br />
49
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Best Perimeter Protection, Fencing, Gates, Guard Booths<br />
Global Elite Group<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Guard Service, Facility Protection Service<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Global Elite Group<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Since its inception, Global Elite Group (GEG) has been<br />
committed to providing security services and solutions<br />
to the aviation industry. GEG recognizes potential<br />
threats to aviation security before they occur, providing<br />
guidance with programs to develop secure operational<br />
processes and procedures, both on the ground and in<br />
the air. Ever since the events that occurred on September<br />
11, 2001, threats against the airline industry have<br />
been highly publicized, and concerns continue to be<br />
raised over the safety at our nation’s airports. Assisting<br />
airports and carriers in developing their own unique security<br />
initiatives and processes is accomplished through<br />
a comprehensive security management program developed<br />
by GEG covering internal and external operations.<br />
<strong>The</strong> customized program tackles not only the security<br />
lapses but provides a thorough review <strong>of</strong> current operations<br />
and implementation <strong>of</strong> specifically designed practices.<br />
Each location has unique requirements, therefore,<br />
an assessment would be recommended. Most locations<br />
benefit from having security systems reviewed, updated<br />
if necessary, and adding physical security components.<br />
<strong>The</strong> combination <strong>of</strong> this approach will act as a deterrent<br />
and a security solution should the unthinkable happen.<br />
<strong>The</strong> service <strong>of</strong>ferings from GEG are always evolving<br />
to meet the demand <strong>of</strong> changing security threats,<br />
these include utilizing guard posts, inspection patrols,<br />
proper placement <strong>of</strong> fencing and barricades as well as<br />
perimeter security monitoring and lighting. Technology<br />
incorporated into the security plan adds another layer<br />
<strong>of</strong> protection through access control, video monitor-<br />
50
ing and analytics, integration <strong>of</strong> security systems with a<br />
dispatch center and alarm monitoring. Aviation readiness<br />
also encompasses the ability to address weather<br />
related emergencies that have the potential to disrupt<br />
service. Contingency planning for weather events, GEG<br />
assists with focusing in on the company’s ability to have<br />
the infrastructure in place to address emergencies <strong>of</strong><br />
any kind. An area <strong>of</strong> concern for most companies in the<br />
aftermath <strong>of</strong> an emergency is communications. GEG<br />
establishes an <strong>of</strong>f-site area to provide the hub for these<br />
services with satellite and landline communications as<br />
well as a place where all backup computer data would<br />
be stored. A seamless operation from emergency back<br />
to a functioning is the goal <strong>of</strong> all contingency plans.<br />
GEG’s diverse security and consulting experience has<br />
proven that in order to be successful, there is an inherent<br />
need for taking a customized approach to security<br />
in order to mitigate risks. This formula has since been<br />
adapted to service multiple industries. For instance,<br />
GEG provided security for World Cup delegates during<br />
site visits to Brazil for the World Cup games, as well as<br />
during the games themselves. <strong>The</strong> security preparations<br />
for the world’s most anticipated rivalry, required<br />
numerous visits to ensure the safety <strong>of</strong> the players and<br />
visitors who arrived to the games in Brazil. GEG, known<br />
for its protection services around the globe, provided<br />
security services for the World Cup personnel, in charge<br />
<strong>of</strong> planning the security for the upcoming games in a<br />
country known for its beauty and its crime. <strong>The</strong> scope<br />
<strong>of</strong> the service, which included in-depth threat assessment<br />
and risk mitigation plan, was to ensure the safety<br />
and security <strong>of</strong> all persons traveling to and from Rio,<br />
and various destinations while travelling within the<br />
country. <strong>The</strong> closely guarded group required the use<br />
<strong>of</strong> translators, protective services and drivers as some<br />
support services needed for the trip. This trip required<br />
a regional staff that knew the country in every sense.<br />
Continued on next page<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.globaleliteinc.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.prweb.com/releases/2013/3/<br />
prweb10546252.htm<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Victor Anderes, Executive Vice President<br />
Global Elite Group<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (516) 393-3538<br />
cell: (516) 507-8812<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
vanderes@globaleliteinc.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
825 East Gate Blvd Suite 301<br />
Garden City, NY 11530<br />
51
Once this was in place, extensive background investigations<br />
were carried out. When the details for the trip<br />
were addressed the group was able to travel to the most<br />
recognized and scenic landscapes in South America.<br />
Many <strong>of</strong> the locations visited while famous and beautiful,<br />
were also located near crime-ridden communities<br />
known as Favelas. It was an early indicator as to some<br />
<strong>of</strong> the possible challenges to security these games could<br />
face. To prepare for a large group, visiting a region <strong>of</strong><br />
the world with known security risks, takes a great deal<br />
<strong>of</strong> arrangements. GEG places a premium on advance site<br />
visits. During the planning phase we reach out to local<br />
and federal authorities, when reliable, in advance <strong>of</strong> the<br />
trip. <strong>The</strong>re is also a strict schedule to adhere to taking<br />
advantage <strong>of</strong> daylight hours, optimal travel times and<br />
to ensure there are enough vehicles for the duration<br />
<strong>of</strong> the trip. All <strong>of</strong> this attention to detail takes time and<br />
skill. Other considerations because foreign visitors can<br />
become a target is to map out routes away from high<br />
crime areas, thorough inspections <strong>of</strong> vehicles, multiple<br />
egress routes, pre inspection <strong>of</strong> facilities and secured<br />
communications are just some <strong>of</strong> the procedures used<br />
to mitigate the risks associated with high pr<strong>of</strong>ile security<br />
protection services. Contingency planning is an invalu-<br />
able asset to any assignment and having multi-layered<br />
preparations will ensure the likelihood <strong>of</strong> a successful<br />
outcome. GEG staff is steeped in experience at every<br />
level <strong>of</strong> law enforcement and military experience earned<br />
in the most civilized and roughest regions <strong>of</strong> the world.<br />
Our programs incorporate experience with superior<br />
communications and technology usage.<br />
52
53
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Network Harbor, Inc.<br />
<strong>2015</strong> Winner<br />
Best Integrated Security Programs<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Physical Security Information Management<br />
System - PSIM<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
LightHouse<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Network Harbor’s LightHouse platform delivers<br />
unified security management for enterprise organizations,<br />
extending the capabilities <strong>of</strong> physical security<br />
incident management (PSIM) to include geographical<br />
information system (GIS) and non-physical products in<br />
a truly comprehensive safety and security management<br />
environment. LightHouse is unique in that it integrates<br />
every security system, physical or non-physical, into a<br />
single, seamless oversight system. Its intuitive interface<br />
drives faster recognition <strong>of</strong> potential threats, as well<br />
as gives first responders the information they need to<br />
make better informed, more appropriate decisions.<br />
LightHouse is designed to support the IT side <strong>of</strong> inci-<br />
dent management, too. Its click-and-go ability to adopt<br />
the full functionality <strong>of</strong> any security system’s API within<br />
its own capabilities means that there’s no “dumbing<br />
down” <strong>of</strong> features or functions – just a seamless, consistent<br />
user interface, anywhere across the enterprise.<br />
It installs easily, and is quickly mastered by administrators<br />
and end users alike. LightHouse supports almost<br />
all major security product manufacturers including<br />
access control, video, audio, mass notification, IDS,<br />
RTLS and more. LightHouse has been designed to add<br />
additional system integration’s to the platform without<br />
disruption or encumbrance <strong>of</strong> any existing integration<br />
in an expedient, stable and secure process. LightHouse<br />
54
IPM (integrated process management) provides an<br />
additional element <strong>of</strong> extensibility and power for policy<br />
management and workflow processing that is virtually<br />
unlimited in its capabilities. <strong>The</strong> end result is an intuitive,<br />
comprehensive automated security management<br />
platform that operates identically, anywhere within the<br />
organization. <strong>The</strong>re’s no need to retrain staff when they<br />
move from one facility to another, or when new components<br />
are connected to the platform, which in turn saves<br />
customers significant amounts <strong>of</strong> time and money.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.networkharbor.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://youtu.be/-ucfAR5psac<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
John Convy, Principal<br />
Convy Associates<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 202-421-3777<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
john@convyassociates.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
8380 Greensboro Drive Suite 514<br />
McLean, VA 22102<br />
55
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Honeywell Security<br />
<strong>2015</strong> Winner<br />
Best Integrated Security Programs<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Physical Security Information Management<br />
System - PSIM<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Vindicator Keypad Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Protecting entities such as airports, seaports and government<br />
regulated critical infrastructure sites such as border<br />
controls can be a difficult task. A primary reason for<br />
this is that technology designed for these markets must<br />
meet rigorous regulatory standards, such as the ICD-<br />
705 for SCIF security, or the NERC standards for energy<br />
generation facilities. Honeywell’s Vindicator Keypad<br />
Solution (VKS) meets these regulations in a cost effective,<br />
extremely efficient manner. In addition, the VKS<br />
is the first map-based system that provides assessment<br />
at a glance. Its s<strong>of</strong>tware charts the location <strong>of</strong> sensors<br />
and alarms, resulting in a perimeter map <strong>of</strong> the building<br />
or partition (a previously designated area or grouping).<br />
Operators can see the location <strong>of</strong> each sensor as<br />
it relates to the overall structure <strong>of</strong> the protected area,<br />
and can also see whether the sensor is armed based<br />
upon the color shown on the display – a huge operational<br />
efficiency compared to text-based systems. For<br />
example, a standard text-based system could inform the<br />
user that Zone 10 is compromised. However the user<br />
must be very familiar with the physical site and be able<br />
to remember where Zone 10 is and what the implications<br />
<strong>of</strong> a security event in that area means, in order to<br />
adequately respond. Further, during high-stress events,<br />
a user might confuse zone areas, resulting in a delayed<br />
or inappropriate response to security events. <strong>The</strong> VKS’s<br />
map-based system, on the other hand, shows the user<br />
exactly which sensors have been activated on the map <strong>of</strong><br />
the building, giving a clear, easy-to-understand picture<br />
<strong>of</strong> the events that are occurring.<br />
56
<strong>The</strong> VKS brings many unique attributes to facilities,<br />
including:<br />
1. ASSESSMENT AT A GLANCE: <strong>The</strong> VKS is the only<br />
keypad solution with a map-based interface for immediate<br />
situational assessment. <strong>The</strong> intuitive, graphic display<br />
gives operators visual confirmation <strong>of</strong> alarm locations<br />
and states, instead <strong>of</strong> text-only communication, making<br />
local arm/disarm and alarm response easier, faster and<br />
safer.<br />
2. SPEED & RELIABILIT Y: <strong>The</strong> solution’s controller<br />
panel with embedded firmware is not dependent on an<br />
outside server or PC, eliminating common issues such<br />
as hard-drive crashes and time-consuming Windows<br />
upgrades. Its embedded processing provides instantaneous<br />
notification <strong>of</strong> alarm events. <strong>The</strong> controller can<br />
withstand extreme environmental conditions – from<br />
extreme cold and high winds to high heat and corrosive<br />
environments – ensuring reliability in even the most<br />
rugged situations.<br />
3. COST-EFFECTIVE: <strong>The</strong> VKS cost is comparable to<br />
traditional text-based LCD keypads and meets ICD 705<br />
regulations for SCIFs without the need for third-party<br />
converters or devices. IP-communication reduces time<br />
needed for installation, keeping deployment costs low.<br />
4. SECURIT Y: <strong>The</strong> VKS controller panel, the Vindicator<br />
Premise Controller (VPC), processes logic through its<br />
proprietary operating system. Its firmware is embedded<br />
within the physical controller, marking it stronger<br />
against hacking, viruses and worms, and meets AES encryption<br />
standards. <strong>The</strong> system polls for events every 8<br />
milliseconds, can annunciate five simultaneous events in<br />
two seconds and can manage up to 10,000 alarm points<br />
without latency in reporting alarm events.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.honeywellsecurity.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.honeywellvindicator.com/..<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Solveig Hommema, Assistant Account Executive<br />
Weber Shandwick<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: 952-346-6050<br />
cell: 612-501-0949<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
shommema@webershandwick.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
8000 Norman Center Drive, Suite 400<br />
Bloomington, MN 55437<br />
57
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />
Best Integrated Security Programs<br />
Emergency Response Technology, LLC<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Integrated Harbor Security Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Integrated Harbor Security Program for the Port <strong>of</strong><br />
Greater Baton Rouge<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
According to the American Association <strong>of</strong> Port Authorities,<br />
the Lower Mississippi River (LMR), where the Port<br />
<strong>of</strong> Greater Baton Rouge operates, provides transportation<br />
for over 45% <strong>of</strong> all energy resources and more than<br />
60% <strong>of</strong> all U.S. commerce, making it the most critical<br />
and at the same time vulnerable critical infrastructure<br />
in the U.S. Each day that the transportation <strong>of</strong> maritime<br />
commerce on the LMR is interrupted costs the U.S.<br />
economy over $275 million per day, and international<br />
commerce over $500 million per day. A tanker cut a<br />
barge into 2 pieces in 2008, releasing 419,000 gallons<br />
<strong>of</strong> diesel and shutting down the LMR for 11 days. This<br />
interruption <strong>of</strong> transportation <strong>of</strong> maritime commerce<br />
on the LMR created a loss <strong>of</strong> over $3 billion to the U.S.<br />
economy and $6 billion to international commerce<br />
(www.cnn.com/2008/US/07/25/mississippi.spill/). But<br />
without an emergency response capability for secondary<br />
emergencies, the collision could have been much<br />
worse. <strong>The</strong> tanker had just uploaded approximately 3<br />
million gallons <strong>of</strong> Styrene monomer, a compound that<br />
reacts with itself in “autopolymerization”. If this had<br />
happened, the tanker would have exploded with the<br />
force <strong>of</strong> from 3 to 5 times that <strong>of</strong> the truck bomb used<br />
in Oklahoma City in 1995, causing extensive collateral<br />
damage and closing the river much longer. <strong>The</strong> Emergency<br />
Response Technology (ERT) IHSP is designed<br />
to autonomously detect and report multiple threats<br />
simultaneously using both active and passive advanced<br />
sensors using surveillance s<strong>of</strong>tware. Chemical releases<br />
from either accidents or intentional acts <strong>of</strong> terrorism at<br />
58
or near the Port <strong>of</strong> Greater Baton will affect local public<br />
health and interrupt the transportation <strong>of</strong> maritime<br />
commerce, not only on the LMR, but also at the Port<br />
Allen lock <strong>of</strong> the strategic Gulf Intracoastal Waterway<br />
(GIWW) located at the port, as well as overseas transportation<br />
<strong>of</strong> maritime commerce. <strong>The</strong> IHSP will provide<br />
CONOPS, situational awareness, and enhance chemical<br />
security and response for the Port <strong>of</strong> Greater Baton using<br />
integrated orthogonal chemical sensors. “Orthogonal”<br />
means that multiple sensor methodologies will be<br />
deployed to reduce false/positive detection. ERT CEO<br />
George Lane also teaches Homeland Security program<br />
at Tulane University. For portable chemical monitoring<br />
at the port, the IHSP will deploy Differential Mobility<br />
Spectrometry (DMS) sensors in JUNO ® , developed by<br />
Chemring Sensors & Electronic Systems for JCAD-2. As<br />
a tunable ion sensor DMS separates, detects, and measures<br />
individual chemicals in complex mixtures. Portable<br />
chemical detectors will also be deployed in maritime<br />
emergency response vessels operating on the LMR. For<br />
fixed chemical monitoring and scanning <strong>of</strong> chemical<br />
releases at a distance <strong>of</strong> up to 5 km, the IHSP will utilize<br />
the RAPID (Remote Air Pollution Infrared Detector)<br />
chemical detector, developed by Bruker Detection for<br />
deployment on the military’s Stryker reconnaissance<br />
vehicle. RAPID uses a Fourier Transform infrared (FTIR)<br />
sensor which identifies the characteristic “fingerprint”<br />
signatures <strong>of</strong> chemicals. Sophisticated s<strong>of</strong>tware discriminates<br />
against interferences, avoids false alarms, and can<br />
determine the origin <strong>of</strong> the release. When deployed, the<br />
ERT IHSP will protect both public health and critical infrastructure<br />
around the port, and mitigate the interruption<br />
<strong>of</strong> domestic maritime commerce on the LMR and<br />
GIWW, and international maritime commerce overseas.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Fixed sensor in IHSP:<br />
www.bruker-industrial.com/RAPID.html<br />
Portable sensor in IHSP:<br />
www.chemringds.com/products/chemical-detection/juno.aspx<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
George Lane; CEO<br />
Emergency Response Technology<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
cell: 225-281-3141<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
georgelane@hotmail.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Emergency Response Technology<br />
999 9th Street Suite 206<br />
Baton Rouge, LA 70802<br />
59
<strong>The</strong> <strong>GSN</strong> <strong>2015</strong><br />
Homeland Security<br />
<strong>Awards</strong>
Winners in the <strong>2015</strong><br />
Homeland Security <strong>Awards</strong> Program<br />
VENDORS OF IT SECURITY<br />
PRODUCTS AND SOLUTIONS<br />
Best Anti-Malware Solution<br />
Blue Ridge Networks – Winner<br />
Best Identity Management<br />
Platform<br />
Gemalto – Winner<br />
Best Compliance/Vulnerability<br />
Solution<br />
Agiliance Inc. – Winner<br />
Best Endpoint Detection and<br />
Response Solution<br />
RSA, <strong>The</strong> Security Division <strong>of</strong> EMC – Winner<br />
Best Big Data Analytics Solution<br />
RSA, <strong>The</strong> Security Division <strong>of</strong> EMC – Winner<br />
Best Privileged Access<br />
Management Solution<br />
BeyondTrust – Winner<br />
CyberArk – Winner<br />
Best Continuous Monitoring and<br />
Mitigation Solution<br />
CyberArk – Winner<br />
SolarWinds – Winner<br />
Best Security Incident and<br />
Event Management (SIEM) Solution<br />
SolarWinds – Winner<br />
VENDORS OF PHYSICAL SECURITY<br />
PRODUCTS AND SOLUTIONS<br />
Best Biometric Identification<br />
Solution<br />
Securiport, LLC – Winner<br />
Best Integrated System for<br />
HSP D-12/FIPS 201 Compliance<br />
Viscount Systems – Winner<br />
Best Mass Notification Systems<br />
Acoustic Technology, Inc. – Winner<br />
Best Chemical Detection<br />
Product or Solution<br />
908 Devices – Winner<br />
Best Explosive Detection<br />
Product or Solution<br />
Implant Sciences – Winner<br />
Best Intelligent Video<br />
Surveillance Solution<br />
Qognify – Winner<br />
Best Crash Barrier (Gates,<br />
Fences, Bollards, Guard Booths)<br />
B.I.G. Enterprises, Inc. – Winner<br />
CINCH systems, Inc. – Winner<br />
Best Physical Security Information<br />
Management (PSIM) Solution<br />
Qognify – Winner<br />
Best Facility Security/Force<br />
Protection Service<br />
AlliedBarton Security Services – Winner<br />
MOST NOTABLE GOVERNMENT<br />
SECURITY PROGRAMS, PROJECTS,<br />
INITIATIVES<br />
Most Notable Federal Government<br />
Security Program/Project<br />
or Initiative<br />
TSA - TSA Airport and Aviation security – Winner<br />
U.S. Department <strong>of</strong> State – Winner<br />
Most Notable State Government<br />
Security Program/Project<br />
or Initiative<br />
New York State Division Of Homeland Security<br />
and Emergency Services (DHSES) – Winner<br />
California Department <strong>of</strong> Motor Vehicles,<br />
Investigations Division – Winner<br />
Most Notable Cybersecurity<br />
Program, Project or Initiative<br />
City <strong>of</strong> Los Angeles - Centralization <strong>of</strong><br />
Cybersecurity Incident Data Analysis – Winner<br />
Most Notable County/Municipal<br />
Program/Project or Initiative<br />
Nanded India, Safe City - Qognify – Winner<br />
SAMMC (San Antonio Military Medical Center)<br />
Advanced Security Program, Suspect Search -<br />
Qognify – Winner<br />
Most Notable Law Enforcement<br />
Interdiction, Arrest, Counter<br />
Terrorism or Crime Prevention<br />
Program – Federal/State or Local<br />
Memphis Police Department – Winner<br />
61
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Blue Ridge Networks<br />
<strong>2015</strong> Winner<br />
IT Security Products and Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Anti-Malware Platform<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
AppGuard<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Introduction<br />
Blue Ridge Networks’ AppGuard is a unique Anti-<br />
Malware solution that stops malware breaches at the<br />
earliest stages <strong>of</strong> attack without requiring detection,<br />
scanning, or updates. Recognized by leading industry<br />
analysts as effective, next generation endpoint protection,<br />
AppGuard delivers a multi-layered defense that<br />
prevents breaches from emerging undetectable threats<br />
and generates earlier Indicators <strong>of</strong> Attack (IOA) without<br />
a compromise occurring. AppGuard is compatible with<br />
all current Windows versions, is easy to deploy with<br />
scale, is non-disruptive to users and productivity, and<br />
works “on” and “<strong>of</strong>f ” enterprise without on-going management<br />
dependencies.<br />
Technological Innovation<br />
Other endpoint protection products allow malware to<br />
“detonate”, relying on detecting and responding to a<br />
compromise in time to limit breach effects. Without<br />
a known signature or IOC (Indicator <strong>of</strong> Compromise),<br />
breaches can go undetected by breach<br />
detection, whitelisting, blacklisting (antivirus),<br />
sandboxing or other conventional<br />
techniques for weeks or months,<br />
placing an enterprise at risk.<br />
AppGuard <strong>of</strong>fers an effective<br />
defense against these emerging<br />
undetectable threats that cannot<br />
be addressed by conventional<br />
62
means. Without relying on detection, identification,<br />
signatures, or scanning, AppGuard disrupts breach attempts<br />
before a compromise can occur from zero-day<br />
malware, polymorphic malware, phishing, “malvertising”,<br />
watering-holes, weaponized documents, drive-bydownloads,<br />
ransomware and other forms <strong>of</strong> undetectable<br />
malware attacks. AppGuard’s patented technology<br />
establishes trust zones protecting applications, operating<br />
system resources, firmware, memory, and other<br />
core processes. Protection policies are automatically<br />
dynamically extended to descendant “child” processes<br />
eliminating the need for complex rules specific to each<br />
application and ensuring effective protection without<br />
management overhead or impact to<br />
user productivity.<br />
When AppGuard stops a malware<br />
attack, it collects Indicators <strong>of</strong> Attack<br />
(IoA) that can be analyzed and used to<br />
identify new malware before any IOC is<br />
known. This provides valuable earlywarning<br />
data for enhanced Threat Intelligence without<br />
the exposure <strong>of</strong> a compromise.<br />
Reliable, Versatile, Usable, Scalable, Affordable<br />
AppGuard has demonstrated with Enterprise, Business<br />
63<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.blueridge.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.appguardit.com<br />
www.appguardbusiness.com<br />
www.appguardenterprise.com<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Nancy Canty, VP <strong>of</strong> Product Management<br />
Blue Ridge Networks<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (703) 633-7331<br />
cell: (571) 232-9149<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
nancy@blueridge.com<br />
(SME), and Personal use customers and in continuous<br />
extensive penetration testing, the ability to stop breaches<br />
other approaches cannot stop. It is compatible with<br />
all current Windows versions (Win XP, Vista, 7, 8, 8.1,<br />
Continued on next page
and 10 including DeviceGuard and Virtual Secure Mode)<br />
on desktops, laptops, tablets, servers, and embedded<br />
appliances (ATMs, Point-<strong>of</strong>-Sale appliances, Healthcare<br />
devices, etc.). “Out-<strong>of</strong>-the-box”, it protects a wide range<br />
<strong>of</strong> popular applications (Office, Office365, IE, Adobe,<br />
etc.) and can be configured to protect custom applications,<br />
VDIs, VPNs, VDIs, etc. <strong>The</strong> Enterprise version<br />
places AppGuard endpoint s<strong>of</strong>tware agents under the<br />
administration and control <strong>of</strong> the enterprise to deploy<br />
and manage customized enterprise policies with a<br />
separate management plane to ensure protection and<br />
situational awareness “on” on “<strong>of</strong>f ” the enterprise. AppGuard’s<br />
underlying technologies are also extensible to<br />
Internet-<strong>of</strong>-Things applications.<br />
Other References<br />
AppGuard has been recommended by respected security<br />
authorities, including Bob Bigman, former CISO, CIA:<br />
http://www.activecyber.net/interview-with-bob-bigmanformer-ciso-<strong>of</strong>-cia/<br />
Gartner and other leading industry analysts have regularly<br />
cited AppGuard in numerous reports as an emerging<br />
next-generation endpoint protection.<br />
64
65
Gemalto<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Identity Management Platform<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Coesys Document Verification<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Identity theft pr<strong>of</strong>oundly affects the public and private<br />
sectors worldwide. In 2013, according to Javelin Strategy<br />
and Research, one incident <strong>of</strong> identity fraud occurs<br />
every 3 seconds in the United States. Clearly, there is<br />
a growing need for reliable identity document verification.<br />
However, verifying identity documents is becoming<br />
increasingly more complex. Public and private administrations<br />
face the challenge <strong>of</strong> detecting suspected fraud<br />
on various types and versions <strong>of</strong> documents (passports,<br />
identity cards, driver’s licenses, etc.) from an array <strong>of</strong> issuing<br />
countries. <strong>The</strong> California Department <strong>of</strong> Motor Vehicles<br />
made it a priority to address this issue head-on by<br />
implementing an advanced solution through Gemalto,<br />
the world leader in digital security. In July <strong>2015</strong>, the California<br />
DMV selected Gemalto as the choice provider <strong>of</strong><br />
identify document verification s<strong>of</strong>tware to its nearly 200<br />
field and investigative <strong>of</strong>fices. <strong>The</strong> California DMV issues<br />
thousands <strong>of</strong> ID documents every day and places a high<br />
premium on securing the integrity <strong>of</strong> an identity. Reliable<br />
verification is vital for the DMV in order to combat<br />
identity fraud and related criminal activities. Gemalto’s<br />
Coesys Document Verification s<strong>of</strong>tware solution successfully<br />
allows DMV <strong>of</strong>ficials to verify the authenticity <strong>of</strong><br />
documents such as passports, identity cards and driver<br />
licenses by simply checking the graphical data and security<br />
features against reference templates from an array <strong>of</strong><br />
issuing countries. <strong>The</strong>se reference templates are stored<br />
in a database, administrated centrally and automatically<br />
synchronized into all local repositories. With Coesys<br />
Document Verification, each document type and version<br />
66
is recognized. Gemalto’s solution provides unmatched<br />
results identifying counterfeit documents and accepting<br />
genuine ones. Using Gemalto’s sophisticated technology,<br />
the California DMV is able to streamline its review<br />
process, overcome the challenge <strong>of</strong> authenticating foreign<br />
documents and identify any document abnormalities<br />
or defects. Gemalto’s solution is designed to make<br />
it easy to quickly confirm on-the-spot the authenticity <strong>of</strong><br />
documents and the identity <strong>of</strong> an applicant. Importantly,<br />
Coesys Document Verification enables DMV <strong>of</strong>ficials<br />
to verify identity documents with peace <strong>of</strong> mind. Gemalto<br />
was selected because <strong>of</strong> the company’s ability to meet<br />
the California DMV’s specific requirements and in the<br />
specified timeframe. Gemalto’s experts understood the<br />
California DMV’s specific business practices and were<br />
able to provide a consistent solution to all <strong>of</strong> the DMV’s<br />
nearly 200 <strong>of</strong>fices. For DMV representatives, Gemalto’s<br />
Coesys Document Verification is simple to use and<br />
provides instantaneous results identifying counterfeit<br />
documents and accepting genuine ones. Gemalto also<br />
worked with the California DMV to bring an automated<br />
synchronization solution connected to a central document<br />
repository, which reduces the burden <strong>of</strong> manual<br />
updates on each authentication workstation located<br />
within the DMV field <strong>of</strong>fices. More than just s<strong>of</strong>tware,<br />
Coesys Document Verification is a fully-customizable<br />
editing platform that enables customers like the California<br />
DMV to pilot each and every verification action<br />
on any identity document. Coesys Document Verification<br />
is part <strong>of</strong> Gemalto’s Border and Visa Management<br />
suite. Its flexible architecture enables customization to<br />
suit any customer deployment configuration. Gemalto’s<br />
objectives for its Coesys Document Verification s<strong>of</strong>tware<br />
solution are to: mitigate risk <strong>of</strong> identity fraud; provide a<br />
solution flexible enough to keep up with the demands<br />
<strong>of</strong> changing infrastructures, technologies, document<br />
standards and attempts to perpetrate fraud; and provide<br />
its customers with ease <strong>of</strong> use and peace <strong>of</strong> mind.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.gemalto.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.gemalto.com/press/Pages/California-selects-Gemalto-for-automated-identitydocument-verification.aspx<br />
http://www.gemalto.com/govt/coesys/doc-verification<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Michelle Leech<br />
Gemalto<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (512) 605-2110<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
ellenmichelle.leech@gemalto.com<br />
67
Agiliance Inc.<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Compliance/Vulnerability Assessment Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RiskVision 7.5<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> biggest inhibitor <strong>of</strong> effective security and vulnerability<br />
management lies in the fact that the number <strong>of</strong><br />
threats to organizations has grown exponentially over<br />
the past few years. This is largely due to the increasing<br />
number <strong>of</strong> IT assets under management, which are<br />
creating a big data challenge. To ensure proper coverage,<br />
government organizations in many cases are relying<br />
on multiple tools to produce the necessary vulnerability<br />
assessment data. This only adds to the volume, velocity,<br />
and complexity <strong>of</strong> data feeds that must be analyzed,<br />
normalized, and prioritized. Relying on human labor<br />
to comb through mountains <strong>of</strong> data logs is one <strong>of</strong> the<br />
main reasons that critical vulnerabilities are not being<br />
addressed in a timely fashion. According to the Verizon<br />
Data Breach Investigations Report, 92% <strong>of</strong> breaches<br />
were discovered by a third party and not through internal<br />
resources. As a result, government organizations are<br />
seeking technical solutions to automate data aggregation,<br />
normalization, and business impact correlation.<br />
<strong>The</strong> ultimate objective is to shorten the window attackers<br />
have to exploit a s<strong>of</strong>tware flaw, thereby reducing the<br />
overall risk <strong>of</strong> cyber-attacks and insider threats. Agiliance<br />
is assisting civilian, defense, and intelligence agencies in<br />
achieving continuous monitoring and enabling them to<br />
report on their organizations risk and security posture<br />
in near real time. <strong>The</strong> company’s RiskVision s<strong>of</strong>tware<br />
gathers data feeds from otherwise silo-based security<br />
and IT tools such as SIEMs, configuration management<br />
databases, vulnerability scanners, threat data feeds and<br />
advisory services, database security management, etc.<br />
68
and then aggregates, normalizes, and correlates this<br />
information based on business criticality. This enables<br />
a near real time snap shot <strong>of</strong> an organization’s security<br />
posture. In addition, RiskVision automates an organization’s<br />
governance processes, providing insight into the<br />
agency’s compliance posture. <strong>The</strong> final result is a riskbased<br />
assessment <strong>of</strong> the organization’s infrastructure<br />
which prioritizes remediation actions based on business<br />
criticality. If needed, RiskVision can also assist with automatic<br />
ticket creation. By using the Agiliance ticketing<br />
system or integrating with leading ticketing and patch<br />
management systems, an organization’s security operations<br />
team can shadow the progress the IT team makes<br />
in mitigating the vulnerabilities. This eliminates the<br />
traditional approach best described as throwing something<br />
over the fence and praying for the best outcome.<br />
For one major government agency, using RiskVision<br />
resulted in a dramatic increase in operational efficiency.<br />
Prior to using Agiliance, it took 60 full-time employees<br />
working 24 x 7 for a month to manually create 180,000<br />
remediation tickets. With RiskVision, the agency was<br />
able to reduce the headcount required to oversee ticket<br />
creation by more than 80% and shrink the processing<br />
time from one month to a couple <strong>of</strong> days. RiskVision<br />
is considered by many to be the best compliance and<br />
vulnerability management solution on the market for<br />
its ability to combine risk intelligence, using big data<br />
gathered and correlated from security operations tools,<br />
with automated remediation that establishes bi-directional<br />
workflows with IT operations. <strong>The</strong> end result is<br />
improved operational efficiency through automated<br />
continuous monitoring and ticketing to remediate only<br />
business critical risks.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.agiliance.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RiskVision Named Best New Risk Management S<strong>of</strong>tware<br />
in <strong>2015</strong> Security Products Magazine <strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>0923_<br />
SecurityProduct_<strong>Awards</strong>.html<br />
Agiliance Dominates at American Business <strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>0915_<br />
American_business_award.html<br />
RiskVision Helps Retailers Minimize Cyber Risk Exposure:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>0910_<br />
Cyber_Risk_Exposure.html<br />
Agiliance Scores Big at International Stevie <strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>0814_<br />
Stevie_<strong>Awards</strong>.html<br />
Agiliance Named to Cybersecurity 500:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>0907_<br />
Cybersecurity_500.html<br />
RiskVision Earns Two IT World <strong>Awards</strong> from Network<br />
Products Guide:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>0807_<br />
Nation_Product_Guide_Winner.html<br />
RiskVision Scores Twice at Info Security Products<br />
Guides <strong>2015</strong> Global Excellence <strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>2104_<br />
Info_Security_Products_Guides.html<br />
Cyber Defense Magazine Names RiskVision Most<br />
Innovative Risk Management Solution for Second-<br />
Consecutive Year:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>2004_<br />
Most_Innovative_Solution.html<br />
69
RiskVision Named Best Monitoring Solution in Govies<br />
<strong>2015</strong> <strong>Awards</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>1704_<br />
Best_Monitoring_Solution.html<br />
Agiliance to Showcase Essential Building Blocks for<br />
Cyber Security at RSA Conference <strong>2015</strong>:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>1404_<br />
Essential_Building_Blocks_for_CyberSecurity.<br />
html<br />
RiskVision 7.5 Enables Good Cyber Hygiene to<br />
Achieve Immediate and Effective Defenses Against<br />
Cyber-Attacks:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>0704_<br />
RiskVision_75.html<br />
Agiliance Becomes a Board and Business Standard for<br />
Managing Cyber Security Operational Risks in 2014:<br />
http://www.agiliance.com/news/pr_<strong>2015</strong>1601_<br />
Agiliance_Cyber_Security_Operational_Risk.<br />
html<br />
Agiliance / ESG White Paper: Beyond GRC: SRM and<br />
the Move to Integrated Risk Management:<br />
http://www.agiliance.com/forms/WhitePaper-<br />
Reg.html?doc=Beyond_GRC<br />
Agiliance White Paper: How to Achieve a Continuous<br />
Monitoring Framework:<br />
http://www.agiliance.com/infocenter/whitepaper.html<br />
Agiliance Data Sheets:<br />
http://www.agiliance.com/infocenter/<br />
Agiliance Case Studies:<br />
http://www.agiliance.com/infocenter/casestudy.<br />
html<br />
Agiliance Recorded Webcasts:<br />
http://www.agiliance.com/news/webcasts.html<br />
Agiliance Product Tours:<br />
http://www.agiliance.com/infocenter/tour.html<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Torsten George, Vice President <strong>of</strong><br />
Worldwide Marketing and Products<br />
Agiliance, Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (408) 200-0461<br />
cell: (408) 431-3250<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
tgeorge@agiliance.com<br />
70
71
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
RSA, <strong>The</strong> Security Division <strong>of</strong> EMC<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Endpoint Detection and Response Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA ECAT<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA President Amit Yoran said “IT Security has Failed.”<br />
Organizations across a wide range <strong>of</strong> industries are<br />
breached, new malware, zero-day vulnerabilities are<br />
everywhere. Money, intellectual-property, hacktivism<br />
are only a few <strong>of</strong> the reasons. <strong>The</strong>y are bombarded with<br />
crimeware, adware, targeted campaigns, and nationstate<br />
attacks. Attackers today can easily bypass traditional<br />
signature-based defenses, create persistency, move<br />
laterally, exfiltrate data while leaving organizations blind<br />
from those types <strong>of</strong> threats that will put their name on<br />
the first page <strong>of</strong> today’s news. RSA does not believe in<br />
this status quo! How is RSA ECAT doing things differently?<br />
ECAT is an endpoint threat detection and response<br />
solution focused on malware and other threats’ behavioral<br />
detection, able to provide visibility to how wide-<br />
spread an attack is and instantly determine the scope<br />
and mitigate in real-time. Analysts trust ECAT to identify<br />
both the known and unknown zero-day malware based<br />
on its behavioral-based detection capabilities.<br />
RSA ECAT’s approach provides:<br />
• Behavioral modeling via ECAT’s Instant Indicator <strong>of</strong><br />
Compromise (IIOC). ECAT provides an out-<strong>of</strong>-the-box<br />
list (~300) <strong>of</strong> IIOCs for both Windows and Mac operating<br />
systems, being able to identify the exact attack<br />
vector used by threats and generic behavior indicative<br />
<strong>of</strong> malware. Based on IIOCs triggered, a machine and<br />
module risk score are generated enabling analysts for<br />
better detection and prioritization capabilities. ECAT’s<br />
IIOCs expose the attack characteristics by pointing the<br />
72
analysts automatically at the suspicious modules and<br />
attack vectors identified such as: floating code, hidden/<br />
temp/program data folder write to executable, scripts<br />
run (PSexec, whoami, etc.) which equips the analyst<br />
with tools and techniques used to not only identify the<br />
how but the who as well. All IIOCs are executed serverside<br />
as data is processed, reducing no overhead on the<br />
agent and client performance.<br />
• Detection and Visibility through Layered Approach.<br />
While ECAT performs live memory analysis and in-depth<br />
inspection <strong>of</strong> host behavior, it is also leveraging other<br />
ways <strong>of</strong> enriching data for analysis by using OPSWAT,<br />
Yara, module reputation models, and multiple threat<br />
intelligence data feeds including RSA Research and<br />
community-based intel via STIX, enabling analysts to<br />
quickly come to a resolution and take response action.<br />
• Detect, Investigate and Response. While threats will<br />
find their way into the organization, being able to trigger<br />
a response action to shorten dwell time is a key.<br />
ECAT is able to block and quarantine suspicious modules<br />
for endpoints within a corporate network as well as<br />
endpoints <strong>of</strong>f network connected to the Internet.<br />
• Machine Learning Risk Score system. <strong>The</strong> Risk Score<br />
system collects and analyzes vast amounts <strong>of</strong> data on<br />
the endpoint and network data transferred in/out and<br />
compiles a module and machine risk score based on a<br />
statistical machine-learning, adaptive model. ECAT’s analysts<br />
leverage the risk score as the basis for prioritized<br />
investigation, working on the most risky endpoints such<br />
as: module behavior, machine status, threat intelligence,<br />
business context, etc. Significant contributors to ECATs<br />
Risk Scoring system are RSA’s data-science team and Incident<br />
Responders providing contact feedback and new<br />
findings identified.<br />
• Enterprise Scalability. ECAT protects 50,000 agents<br />
with a single ECAT server.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.emc.com/domains/rsa/index.htm<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA ECAT Home Page:<br />
https://www.emc.com/security/rsa-ecat.htm<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Bryan Grillo, Vice President<br />
CHEN PR<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (781) 466-8282<br />
cell: (617) 947-0547<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
bgrillo@chenpr.com<br />
73
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
RSA, <strong>The</strong> Security Division <strong>of</strong> EMC<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Big Data Analytics Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA Security Analytics<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> application <strong>of</strong> Big Data Analytics/Data Science<br />
techniques to the challenge <strong>of</strong> IT security is in its early<br />
stages, but what is clear given the seemingly unending<br />
stream <strong>of</strong> major breaches, is that what the security<br />
industry is doing today isn’t working. A new approach<br />
to IT security is needed. A key challenge is that the<br />
detection <strong>of</strong> what can be very subtle and targeted attacks<br />
is nearly impossible with the signature, perimeter,<br />
and log/SIEM dependent security systems that are most<br />
prevalent today. <strong>The</strong> attraction <strong>of</strong> Big Data Analytics<br />
and its associated Data Science techniques are that they<br />
provide capabilities that are most in need to address<br />
today’s security challenges, namely the ability to ingest<br />
and manipulate a very large and diverse set <strong>of</strong> data<br />
from across an enterprise, over a long time horizon,<br />
and apply analytic techniques to it which are tuned to<br />
finding subtle signals <strong>of</strong> an attack amongst the everyday<br />
normal activity <strong>of</strong> the organization. Attackers have<br />
learned to hide in plain sight and move low-and-slow to<br />
remain undetected. By using Data Science models with<br />
the right data, one can shine a light on this activity. RSA<br />
Security Analytics deserves to win this award because<br />
it uniquely combines the ability to collect, ingest and<br />
make sense out <strong>of</strong> large amounts <strong>of</strong> internal telemetry<br />
– logs, events, full network traffic, netflow, endpoint<br />
activity, IT asset, identity, and other business context<br />
and combine it with external threat intelligence to<br />
massively increase the security visibility <strong>of</strong> the organization.<br />
To this data RSA Security Analytics applies multiple<br />
detective analytic techniques, including those based<br />
74
on Big Data Analytics/Data Science, to surface security<br />
anomalies that are highly suggestive <strong>of</strong> advanced or<br />
targeted attacks. Our Data Science models use hundreds<br />
<strong>of</strong> indicators to identify activities such as beaconing and<br />
suspicious domain activity. No other security product<br />
on the market combines the capabilities <strong>of</strong> broad and<br />
deep, enterprise-wide, data collection, data enrichment,<br />
with the delivery <strong>of</strong> tested detective oriented, Data Science<br />
based algorithms which can be applied to a given<br />
organization with only modest customization. Some<br />
competitive products natively collect some <strong>of</strong> this data,<br />
but usually not the most important (network packets<br />
& endpoint activity data) sets, while other products<br />
collect no data at all and only provide an analytic platform,<br />
leaving the data collection as an exercise for the<br />
customer. Other products provide general purpose Big<br />
Data Analytics capabilities, but leave it to the organization<br />
and their own data scientists (which most security<br />
organization don’t have) to apply these general purpose<br />
tools to the security domain. RSA Security Analytics is<br />
a detective and investigative platform that was specifically<br />
designed for the security domain, provides its own<br />
native data collection and management capabilities for<br />
the data most likely to have the subtle signals <strong>of</strong> an attack,<br />
and marries this with analytic algorithms that were<br />
specifically designed by RSA’s security researchers and<br />
data scientists to aide in the detection <strong>of</strong> today’s most<br />
advanced and targeted attackers.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.emc.com/domains/rsa/index.htm<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RSA Security Analytics Home Page:<br />
http://www.emc.com/security/security-analytics/security-analytics.htm<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Chris Conway, Associate Account Executive<br />
CHEN PR, Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (781) 672-3113<br />
cell: (508) 212-4226<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
cconway@chenpr.com<br />
75
BeyondTrust<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Privileged Access Management Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
PowerBroker for Unix & Linux<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Whether the goal for attackers is to compromise sensitive<br />
government data, steal personally identifiable information<br />
(PII) or disrupt normal operations, the increasing<br />
sophistication <strong>of</strong> attacks is making it more difficult<br />
to safeguard the federal government’s cyber critical<br />
infrastructure. Adding to the complexity <strong>of</strong> cybersecurity<br />
is the compliance landscape for government agencies<br />
that changes with almost every administration. <strong>The</strong>re<br />
are always new requirements – and penalties – that<br />
agencies must anticipate, implement, and report on.<br />
Large-scale information breaches, like the recent Office<br />
<strong>of</strong> Personnel Management attack, <strong>of</strong>ten begin with an attacker<br />
exploiting a single external vulnerability on a lowlevel<br />
system or through contractor credentials, and then<br />
capitalizing on privileges to gain access to critical sys-<br />
tems and data. It is also very possible for a government<br />
employee to abuse access privileges from the inside to<br />
steal sensitive information. One has to look no farther<br />
than Edward Snowden as a pro<strong>of</strong> point. BeyondTrust’s<br />
PowerBroker for Unix & Linux for least privilege helps<br />
balance the privilege requirements <strong>of</strong> users, with those<br />
<strong>of</strong> security and compliance teams, for routers/switches,<br />
and mainframes in Unix and Linux environments. <strong>The</strong><br />
solution enables IT Security teams to confidently deploy<br />
secure and compliant network gear, servers and<br />
desktops, while giving employees the correct amount <strong>of</strong><br />
privileged access to applications without affecting a user’s<br />
ability to remain productive. <strong>The</strong> result is improved<br />
security, through reduced risk and attack surface, along<br />
with improved system uptime and availability. Sudo<br />
76
presents unique challenge faced by government departments<br />
and agencies using Unix or Linux – specifically<br />
the time and effort it takes for their organization to migrate<br />
to a commercially supported solution and whether<br />
or not their existing data and policies can be integrated.<br />
With PowerBroker for Unix & Linux, organizations do<br />
not have to sacrifice existing sudoer files for the sake<br />
<strong>of</strong> centralization. Instead, organizations can store and<br />
centralize multiple sudoer files in PowerBroker, adding<br />
enhanced policy groupings to more easily define user<br />
roles across the enterprise. <strong>The</strong> result is a simplified migration<br />
path from sudo. Auditing and controlling activity<br />
inside scripts and third-party applications within Unix<br />
and Linux systems have also been difficult for many<br />
organizations to achieve, especially when it is easy to<br />
“cheat” the system by pointing shortcuts to unapproved<br />
applications. PowerBroker for Unix & Linux overcomes<br />
these challenges by providing enhanced system level<br />
control and audit capabilities over any application – regardless<br />
<strong>of</strong> how the application is initiated. When users<br />
click on an icon, all activity (including keystroke information)<br />
is recorded. This helps organizations control<br />
actual commands and actions at the system level. <strong>The</strong>se<br />
and other capabilities enable PowerBroker customers to<br />
meet the privileged access control requirements <strong>of</strong> government<br />
and industry mandates including SOX, HIPAA,<br />
PCI DSS, GLBA, PCI, FDCC, FISMA and more. With more<br />
than 200 U.S. Federal departments and agencies as customers,<br />
BeyondTrust delivers powerful privileged access<br />
management solutions that have been proven in a wide<br />
range <strong>of</strong> large and complex IT environments.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.beyondtrust.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.beyondtrust.com/Products/Power-<br />
BrokerUnixLinux/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Douglas De Orchis, Client Executive<br />
Voce Communications<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (617) 897-8259<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
ddeorchis@vocecomm.com<br />
77
CyberArk<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Privileged Access Management Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CyberArk Privileged Account Security Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> CyberArk Privileged Account Security Solution<br />
focuses on eliminating the most advanced cyber threats<br />
– those that exploit privileged credentials to attack the<br />
heart <strong>of</strong> the enterprise. <strong>The</strong> CyberArk solution helps<br />
identify existing privileged credentials across networks,<br />
makes sure those credentials are locked down and secure,<br />
and leverages continuous monitoring <strong>of</strong> privileged<br />
account credentials to detect anomalous behavior and<br />
stop an attack early in the cycle to reduce damage. In<br />
July <strong>2015</strong>, CyberArk achieved Common Criteria Certification<br />
for the CyberArk Privileged Account Security<br />
Solution. This designation is an important independent<br />
evaluation <strong>of</strong> the security capabilities <strong>of</strong> IT products<br />
and a key differentiator when working with the federal<br />
government. CyberArk is also the first vendor in the<br />
industry to achieve the certification for a comprehensive<br />
privileged account security solution. CyberArk has been<br />
working with government agencies to use its solution<br />
to address privileged user security priorities set forth in<br />
the federal government’s 30-day Cybersecurity Sprint.<br />
CyberArk designed the Privileged Account Security Solution<br />
for low total cost <strong>of</strong> ownership, with ease <strong>of</strong> management<br />
and access to ongoing training. <strong>The</strong> CyberArk<br />
Privileged Account Security Solution is built on a shared<br />
technology platform, is designed to integrate into any IT<br />
environment, and delivers enterprise-class security, scalability<br />
and high availability on a single integrated solution.<br />
With the modular Privileged Account Security Solution,<br />
organizations can better protect their networks by:<br />
securely storing, rotating and controlling access to SSH<br />
78
keys; isolating, monitoring, recording and controlling<br />
privileged sessions on critical systems; and providing<br />
targeted, immediately-actionable threat alerts through<br />
patent-pending analytic technology. <strong>The</strong> CyberArk<br />
solution is further differentiated by its patented <strong>Digital</strong><br />
Vault technology and Master Policy engine. Launched in<br />
the past year, the CyberArk SSH Key Manager enables<br />
customers to secure and manage SSH keys, just like any<br />
other privileged credential. Also available as part <strong>of</strong> the<br />
solution is CyberArk Privileged Threat Analytics, which<br />
detects, alerts and responds to cyber attacks by collecting,<br />
monitoring and analyzing privileged account data,<br />
including activity from the CyberArk Vault, and data<br />
feeds from security information and event management<br />
(SIEM) systems to identify and lessen the most serious<br />
<strong>of</strong> risks. An independent study from Nucleus Research<br />
on customer ROI found that the CyberArk Privileged<br />
Account Security Solution reduced customers’ cyber security<br />
risk pr<strong>of</strong>ile, as well as delivered complete payback<br />
within six months, providing greater ROI as the Cyber-<br />
Ark platform is used over time. CyberArk was named a<br />
leader in the IDC MarketScape: Worldwide Privileged<br />
Access Management 2014 Vendor Assessment, calling<br />
CyberArk the “privileged access management pure-play<br />
‘big gorilla’ with the most revenue and largest customer<br />
base.” Today, CyberArk has a customer base <strong>of</strong> more<br />
than 1,900, including 40 percent <strong>of</strong> the Fortune 100, 19<br />
percent <strong>of</strong> the Global 2000 and 17 <strong>of</strong> the world’s top 20<br />
banks, and includes leading enterprises in a diverse set<br />
<strong>of</strong> industries, such as energy and utilities, financial services,<br />
healthcare, manufacturing, retail, technology and<br />
telecommunications, as well as government agencies.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.cyberark.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Background on the CyberArk Privileged Account Security<br />
Solution:<br />
http://www.cyberark.com/products/privilegedaccount-security-solution/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Liz Campbell, Sr. Manager,<br />
Corporate Communications<br />
CyberArk<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (617) 558-2191<br />
cell: (781) 820-9840<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
liz.campbell@cyberark.com<br />
79
CyberArk<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Continuous Monitoring and Mitigation Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CyberArk Privileged Threat Analytics<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> devastating cyberattacks on Sony Pictures, Anthem<br />
and U.S. Office <strong>of</strong> Personnel Management (OPM) demonstrate<br />
that today’s cyber security battle has shifted<br />
from the perimeter to inside the IT network. Once<br />
inside a targeted network, attackers immediately seek<br />
to steal and exploit privileged accounts – the gateway<br />
to sensitive and valuable information. Attackers exploit<br />
these accounts to navigate the system, conduct reconnaissance<br />
and escalate privileges – all while impersonating<br />
authorized users. In fact, industry research indicates<br />
that privileged credential exploitation is a signature in<br />
almost every advanced attack. That’s why organizations<br />
need to be proactively monitoring and recording all<br />
privileged activity to ensure attackers – whether they’re<br />
outside hackers or malicious insiders – are not able to<br />
gain access to critical networks, move laterally across<br />
the network to the target goal, or exfiltrate data without<br />
detection. CyberArk Privileged Threat Analytics detects,<br />
alerts and responds to cyber attacks by collecting, monitoring<br />
and analyzing privileged account data, including<br />
activity from the CyberArk Vault, and data feeds from<br />
security information and event management (SIEM)<br />
systems to identify and lessen the most serious <strong>of</strong> risks.<br />
This solution enables incident response teams to identify<br />
an attack in real time, take the necessary steps to<br />
mitigate the attack and reduce damage. Through industry-leading<br />
analytics, including self-learning, behaviorbased<br />
algorithms, CyberArk enables customers to detect<br />
attacks faster by pinpointing malicious privileged account<br />
activity previously hidden in the sheer volume <strong>of</strong><br />
80
information collected by big data analytics solutions.<br />
With proactive controls and threat detection, CyberArk<br />
Privileged Threat Analytics is the only analytic solution<br />
able to detect malicious activity and actively respond by<br />
invalidating account access. This enables incident response<br />
teams to quickly contain threats by invalidating<br />
stolen credentials to stop an attacker from continuing<br />
their attack. By reducing an attacker’s window <strong>of</strong> opportunity<br />
and residual damage through real-time alerts on<br />
in-progress attacks, CyberArk Privileged Threat Analytics<br />
improves organizations’ effectiveness by enabling response<br />
teams to identify anomalous privileged activities<br />
and prioritize only the most critical security incidents.<br />
Privileged Threat Analytics is part <strong>of</strong> the CyberArk Privileged<br />
Account Security Solution. CyberArk delivers regular<br />
updates to ensure customers can proactively take<br />
advantage <strong>of</strong> new features including new algorithms that<br />
are added to the analytic engine. <strong>The</strong> R&D and Cyber-<br />
Ark Lab teams are constantly researching attacks in the<br />
wild and building new detection capabilities and algorithms<br />
to detect the latest attacks. Today, CyberArk has a<br />
customer base <strong>of</strong> more than 1,900, including 40 percent<br />
<strong>of</strong> the Fortune 100, 19 percent <strong>of</strong> the Global 2000 and<br />
17 <strong>of</strong> the world’s top 20 banks, and includes leading<br />
enterprises in a diverse set <strong>of</strong> industries, such as energy<br />
and utilities, financial services, healthcare, manufacturing,<br />
retail, technology and telecommunications, as well<br />
as government agencies. CyberArk serves customers in<br />
more than 65 countries and has more than 200 global<br />
partners.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.cyberark.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Main page for Privileged Threat Analytics information,<br />
including data sheets:<br />
http://www.cyberark.com/products/privilegedaccount-security-solution/privileged-threatanalytics/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Liz Campbell, Sr. Manager,<br />
Corporate Communications<br />
CyberArk<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (617) 558-2191<br />
cell: (781) 820-9840<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
liz.campbell@cyberark.com<br />
81
SolarWinds<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Continuous Monitoring and Mitigation Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SolarWinds User Device Tracker<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SolarWinds User Device Tracker (UDT) delivers automated<br />
user and device tracking with powerful switch<br />
port management capabilities empowering federal IT<br />
Pros with strong continuous monitoring capabilities and<br />
visibility into who or what is connected to their network.<br />
Highlights include:<br />
• Automatically discovers, maps and monitors switches,<br />
ports and network devices<br />
• Quickly finds devices and retrieves user name, port<br />
details, connection history and more<br />
• Enables searching on IP address, user name, hostname<br />
or MAC address to track endpoints<br />
• Allows whitelisting and watch lists with automatic<br />
alerts and click-<strong>of</strong>-a-button port shutdown<br />
• Provides detailed switch port usage data, capacity<br />
analysis and built-in reporting<br />
With the ever-increasing use <strong>of</strong> personal devices and<br />
applications, SolarWinds UDT provides federal IT Pros<br />
with peace <strong>of</strong> mind about the security <strong>of</strong> their network<br />
and the devices on it by continuously monitoring who<br />
and what connects to their network. Additionally, Solar-<br />
Winds UDT can track down lost or rogue devices with a<br />
simple search <strong>of</strong> a user name, IP address, hostname or<br />
MAC address, ensuring that all devices that can connect<br />
to federal networks stay in the right hands. SolarWinds<br />
UDT also features alerting that signifies unauthorized<br />
network access and provides the ability to quickly shut<br />
82
down switch ports to secure access to sensitive information.<br />
Updates to SolarWinds UDT coincide with the<br />
latest issues being tackled by IT Pros such as BYOD. In<br />
the latest update to scalability and additional support<br />
and optimization for varying devices and vendors was a<br />
priority. And, by working closely with and listening to<br />
its user community, SolarWinds is able to gain real-time<br />
and candid feedback from IT practitioners, so its products<br />
can address the problems and challenges prevalent<br />
in IT security today. SolarWinds UDT provides three<br />
critical capabilities for network and systems managers.<br />
First, it makes it possible to physically locate an enduser<br />
device or user on the network extremely quickly.<br />
Second, it allows for rapid quarantine <strong>of</strong> users or systems<br />
by remotely shutting down a switch port. Finally,<br />
it supports watch-lists and can alert when certain types<br />
<strong>of</strong> devices or specific users connect to the network and<br />
even take pre-defined actions to help protect information<br />
and other assets. SolarWinds s<strong>of</strong>tware is built to<br />
scale and can support an IT environment <strong>of</strong> any size<br />
and is used by nearly every U.S. federal civilian agency,<br />
DoD branch and intelligence agency. SolarWinds UDT<br />
complements other products, such as SolarWinds Network<br />
Configuration Monitor, SolarWinds Log & Event<br />
Manager, and SolarWinds Server & Application Monitor,<br />
to name a few, providing additional breadth and depth<br />
for continuous monitoring. SolarWinds s<strong>of</strong>tware can<br />
“collect once and report to many,” which gives IT, information<br />
assurance, and security departments the unique<br />
functionality they each need from a single, cost-effective<br />
set <strong>of</strong> tools. SolarWinds UDT licensing is based on the<br />
number <strong>of</strong> switch ports to being monitored. <strong>The</strong> licensing<br />
model features large jumps in switch port count<br />
allowing for rapid growth <strong>of</strong> an organization before an<br />
additional licensing level is reached and can scale to an<br />
unlimited number <strong>of</strong> switch ports.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.solarwinds.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Web page:<br />
http://www.solarwinds.com/user-device-tracker.aspx<br />
Additional information:<br />
https://www.youtube.com/watch?v=s4G_<br />
yPZq7Jc<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rebecca Orr, Corporate Communication<br />
Solarwinds<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (512) 498-6372<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
rebecca.orr@solarwinds.com<br />
83
SolarWinds<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
IT Security Products and Solutions<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Security Incident & Event Management (SIEM)<br />
Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SolarWinds Log & Event Manager<br />
Reason this entry deserves to win:<br />
–––––––––––––––––––––––––––––––––––––––– • Threat intelligence feed to help identify malicious<br />
SolarWinds Log & Event Manager (LEM) is a comprehensive<br />
security information and event management • File Integrity Monitoring delivers broader compliance<br />
activity<br />
(SIEM) solution that delivers powerful real-time event support and deeper security intelligence<br />
correlation and analysis for immediate, actionable threat • Fast and powerful forensics via cutting-edge search<br />
intelligence to thwart attacks, contain breaches, and and visual data exploration<br />
maintain continuous compliance in an ever-evolving • Out-<strong>of</strong>-the-box compliance reporting with predefined,<br />
threat landscape.<br />
customizable templates<br />
SolarWinds LEM Highlights:<br />
• Immediate threat detection via true real-time, inmemory<br />
event correlation<br />
• Proactive defense against cyber-attacks and insider<br />
abuse<br />
• Hands-free threat remediation through built-in, automated<br />
responses<br />
With SolarWinds LEM, organizations get what they need<br />
to stay ahead <strong>of</strong> security threats, compliance violations,<br />
and operational issues – all in one package. It<br />
gives users the ability to capture and analyze log data in<br />
real-time from multiple sources around specific incidents,<br />
which is instrumental in quickly identifying and<br />
responding to threats, uncovering policy violations, and<br />
84
esolving vital network issues. SolarWinds LEM surpasses<br />
other solutions by providing built-in Active Responses,<br />
event normalization, and a drag-and-drop UI to create<br />
custom dashboards easily. Active Responses enable<br />
users to take automatic actions for hands-free threat<br />
mitigation, including shutting down breached systems,<br />
blocking IP addresses, killing unexpected processes,<br />
and disabling user accounts. Event normalization makes<br />
reporting and identifying security incidents across different<br />
types <strong>of</strong> log sources simple. Additionally, Solar-<br />
Winds LEM provides advanced search functionality and<br />
easy-to-use data visualization tools to quickly explore<br />
log data, perform event forensics, and identify the rootcause<br />
<strong>of</strong> a security incident or network problem – fast.<br />
SolarWinds LEM goes well beyond traditional SIEM<br />
solutions with key innovations like in-memory correlation,<br />
automated Active Responses, USB Defender technology,<br />
and a groundbreaking approach to IT search.<br />
SolarWinds LEM’s latest release in September <strong>2015</strong><br />
added threat intelligence feed integration to its already<br />
strong feature set, helping the system stay up-to-date on<br />
known threats. Most importantly, SolarWinds listens to<br />
the IT security community to continually improve and<br />
update solutions based on user feedback and real-world<br />
needs. SolarWinds’ user community, thwack, features<br />
a forum in which IT pros can request and vote on new<br />
features and thus directly influence product updates.<br />
Check out the SolarWinds LEM feature request forum<br />
to see this process in action. SolarWinds LEM alleviates<br />
the complexity associated with compliance reporting<br />
by providing over hundreds <strong>of</strong> built-in, “audit-proven”<br />
report templates to address both internal policies and<br />
regulatory requirements, including NIST FISMA, DISA<br />
STIG, PCI-DSS, HIPAA, SOX, and more. Additionally, SolarWinds<br />
LEM is an integral part <strong>of</strong> a continuous monitoring<br />
strategy to maintain security and compliance.<br />
SolarWinds LEM is available on the U.S. General Services<br />
Administration (GSA) Schedule, Department <strong>of</strong> Defense<br />
ESI, and other contract vehicles. SolarWinds s<strong>of</strong>tware is<br />
built to scale and can support an IT environment <strong>of</strong> any<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.solarwinds.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Web page:<br />
http://www.solarwinds.com/siem-security-information-event-management-s<strong>of</strong>tware.aspx<br />
Compliance Video:<br />
https://thwack.solarwinds.com/docs/DOC-<br />
186983<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rebecca Orr, Corporate Communication<br />
Solarwinds<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (512) 498-6372<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
rebecca.orr@solarwinds.com<br />
size, small business IT shops and large enterprises alike,<br />
and is used by nearly every U.S. federal civilian agency,<br />
DoD branch and intelligence agency. SolarWinds LEM<br />
employs a node-based license model vs. volume-based,<br />
allowing users to stay within a planned budget as they<br />
deploy and expand their IT infrastructures across multiple<br />
datacenters and geographies. Further, a Workstation<br />
Edition license makes monitoring logs from Windows ®<br />
workstations very cost effective.<br />
85
Securiport, LLC<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
ACCESS CONTROL AND IDENTIFICATION<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Biometric Identification Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Securiport, LLC<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Improving Civil Aviation Security with Securiport’s<br />
Civil Aviation & Immigration Security Services for<br />
Homeland Security & Allies <strong>of</strong> United States <strong>of</strong> America<br />
In today’s interconnected world, Civil Aviation plays<br />
a powerful and impactful role in fueling the global<br />
economy. It has the power to bridge cultural gaps and<br />
bring people together from all over the world. But with<br />
great power, also comes great responsibility. It is up<br />
to governments and their countries to take proactive<br />
steps towards strengthening their Civil Aviation Security<br />
capabilities. With the growing popularity and freedom<br />
to travel basically anywhere in the world with Civil Aviation,<br />
many individuals and criminal organizations are<br />
taking advantage <strong>of</strong> systems in place to conduct illegal<br />
activity such as smuggling narcotics, weapons, and even<br />
humans. In addition, Civil Aviation has increasingly<br />
become the focus <strong>of</strong> the operational activity <strong>of</strong> various<br />
terrorist organizations as a subject, rather than an<br />
implement, <strong>of</strong> their actions [2] . Due to these increased<br />
security risks, it is paramount that airports and security<br />
checkpoints are equipped with the necessary technology,<br />
resources, processes, systems, and training needed<br />
to effectively identify potential security risks and criminal<br />
activity. Securiport’s Integrated Immigration Control<br />
System (IICS) can help countries, such as Honduras,<br />
strengthen their airport security capabilities. By implementing<br />
an intelligent solution that utilizes the most<br />
advanced technologies (such as biometric identification<br />
systems), and is connected with international traveler<br />
databases, security <strong>of</strong>ficials are provided a comprehensive<br />
set <strong>of</strong> traveler data and information that can be used<br />
to confirm a passenger’s identity and uncover certain<br />
security risks. By leveraging these systems, government<br />
86
<strong>of</strong>ficials and immigration <strong>of</strong>ficers will be able to equip<br />
themselves with the actionable data and necessary<br />
information needed to keep all ports <strong>of</strong> entry secure,<br />
ultimately creating safer and more secure nations. This<br />
creates a complete Civil Aviation Security solution, one<br />
that elicits safer travels, more secure nations and is<br />
tailored to provide benefits to both travelers and governments.<br />
<strong>The</strong> Civil Aviation industry has been around<br />
for over 100 years, since Tony Jannus piloted a plane<br />
across Tampa Bay, Florida on January 1st, 1914. Today,<br />
more than 3.3 billion people utilize aviation and take to<br />
the air each year [1] . Whether it’s for business or visiting<br />
family, the Civil Aviation industry has revolutionized<br />
the way people connect, interact and conduct business.<br />
This ability to bring people together from different parts<br />
<strong>of</strong> the globe, known as aviation connectivity, has been<br />
the catalyst for economic growth, connecting individuals<br />
from all over the globe ultimately fueling the global<br />
economy. IATA’s Director General and CEO, Tony Tyler,<br />
spoke about aviation’s role in the global economy and<br />
stated “aviation is helping fuel the growth <strong>of</strong> the global<br />
economy. It brings people together – families, friends<br />
and business colleagues. It helps minds to meet and<br />
exchange ideas in forums. It gives people the freedom<br />
to be almost anywhere in just 24 hours. And it has<br />
turned our wonderfully big planet into a wonderfully<br />
small world <strong>of</strong> enormous and wonderful opportunities.”<br />
<strong>The</strong> aviation industry is truly the lifeblood <strong>of</strong> the<br />
global economy; it supports over 58 million jobs and<br />
$2.4 trillion in annual economic activity [1] . It stimulates<br />
tourism, supports and creates jobs for farmers who<br />
sell fresh produce and flowers in world markets, and<br />
facilitates global supply chains to support collaboration<br />
among workers in different countries to build cars,<br />
airplanes and computers. Aviation helps deliver many <strong>of</strong><br />
the real world goods that are traded in global markets<br />
and has been the catalyst for global economic and social<br />
development. With the increase in popularity and usage<br />
<strong>of</strong> aviation, there has been a “transportation revolution”<br />
around the world, which has paved the way for rapid<br />
and free movement <strong>of</strong> people, commodities and ser-<br />
87<br />
vices on a global scale [2] . This is known as globalization<br />
and provides many positives for our world, but regretfully<br />
has a negative side as well. Beyond any doubt, the<br />
emergence <strong>of</strong> terrorism as a global threat is the biggest<br />
challenge facing the Civil Aviation and security industries.<br />
Terrorism has evolved into a major geopolitical<br />
factor, capable <strong>of</strong> causing systematic crises at a global<br />
scale. And by virtue <strong>of</strong> its functional significance and<br />
vulnerability, Civil Aviation is increasingly becoming<br />
the focus <strong>of</strong> the operational activity <strong>of</strong> different terrorist<br />
groups [2] . High taxes and a lack <strong>of</strong> resources and a<br />
proper infrastructure can hinder the performance and<br />
efficiency <strong>of</strong> Civil Aviation Security from identifying<br />
potential suspects and uncovering criminal activity. In<br />
addition to the threat <strong>of</strong> terrorism, aviation has been<br />
used as a hotbed for a plethora <strong>of</strong> other criminal activity,<br />
such as drug smuggling and passengers traveling<br />
under false names and documents. This makes it critical<br />
to take practical and necessary steps toward improving<br />
the security capabilities at international points <strong>of</strong> entry<br />
such as airports.<br />
Solution: Securiport’s Civil Aviation and Immigration<br />
Security Services (CAISS)<br />
With the increase in globalization and aviation connectivity,<br />
criminal activity and the threat <strong>of</strong> attacks on<br />
aircrafts by terrorists remain persistent and growing<br />
concerns for our world. Countries around the globe<br />
have a number <strong>of</strong> safeguards in place to prevent attacks<br />
against commercial aircrafts such as security checkpoints<br />
at airports where passengers and their carry-on items<br />
are screened for dangerous objects, such as weapons<br />
and explosives. Historically, however, screeners who<br />
operate checkpoints in the U.S. have had difficulty in<br />
detecting potentially dangerous situations, missing as<br />
many as 20% during tests [3] . With the large number<br />
<strong>of</strong> passengers traveling through airports every day, it<br />
is critical that immigration and security checkpoints are<br />
equipped with the proper resources and infrastructure<br />
needed to identify potential security risks and criminal ac-<br />
Continued on next page
tivity. Countries should look to implement intelligent Civil<br />
Aviation solutions that utilize the latest technology, such<br />
as Securiport’s Civil Aviation and Immigration Security<br />
Services (CAISS). Securiport, a global leader in the design<br />
and implementation <strong>of</strong> passenger biometric recognition,<br />
immigration control systems, and intelligent information<br />
management and reporting s<strong>of</strong>tware systems, is committed<br />
to the Science <strong>of</strong> Safer Nations by empowering governments<br />
to enhance their Civil Aviation Security and combat<br />
criminal activity. Securiport’s Integrated Immigration<br />
Control System (IICS) is a comprehensive security solution<br />
that empowers border management and immigration<br />
<strong>of</strong>ficials. <strong>The</strong> IICS utilizes advanced biometric identification<br />
systems and provides proprietary intelligent information<br />
used to identify potential security risks and criminal<br />
activity, further strengthening the effectiveness <strong>of</strong> their<br />
security capabilities. When coupled with Securiport’s Intelligent<br />
Information Management System, a methodology<br />
for cross-referencing passenger information across international<br />
traveler databases, such as INTERPOL’s I-24/7, the<br />
CAISS provides governments, airport security, and immigration<br />
<strong>of</strong>ficials with a comprehensive set <strong>of</strong> traveler data<br />
and information that can be used to confirm a passenger’s<br />
identity and uncover certain security risks. <strong>The</strong> CAISS also<br />
includes Watch-list Management, which crosschecks passenger<br />
information against multiple government databases<br />
and performs real-time identification checks. Implementing<br />
a solution such a Securiport’s CAISS, governments<br />
and airport security <strong>of</strong>ficials can drastically improve the<br />
performance and effectiveness <strong>of</strong> airport security checkpoints<br />
and better prevent terrorists and criminals from illegally<br />
entering or leaving their country’s borders. Beyond<br />
increasing the performance and effectiveness <strong>of</strong> airport<br />
security checkpoints, countries and airliners can work<br />
together to strengthen Civil Aviation Security by improving<br />
the passenger experience. Earlier this year, Securiport was<br />
named a Strategic Partner to the International Air Transport<br />
Association (IATA) and has been involved in discussions<br />
within program areas <strong>of</strong> expertise such as Security<br />
and Passenger Experience. As a contributing member <strong>of</strong><br />
the Passenger Experience area <strong>of</strong> expertise, Securiport has<br />
focused on improving the passenger experience across 14<br />
steps, including security and immigration processes. Many<br />
key stakeholders within the Civil Aviation industry are very<br />
optimistic about mobile technology helping the industry<br />
to meet passengers’ expectations and to provide a more<br />
seamless experience going through security and immigration<br />
checkpoints. Having a better-defined process in place<br />
that incorporates modern technology and intelligent systems<br />
creates a more streamlined airport experience, and<br />
therefore will improve the capabilities and effectiveness <strong>of</strong><br />
airport security checkpoints.<br />
Benefits to Governments<br />
Through implementing Securiport’s Civil Aviation and Immigration<br />
Security Services and other various security solutions,<br />
countries such as Honduras could benefit greatly.<br />
In recent months, the Government <strong>of</strong> the Republic <strong>of</strong><br />
Honduras has been working to prevent and reduce human<br />
and narcotic traffickers as well as other criminals from<br />
illegally crossing its borders. Honduras and the U.S. held a<br />
High Level Security Dialogue to discuss ways the U.S. and<br />
Honduras can continue to work together to strengthen<br />
both countries’ borders. Honduras highlighted its notable<br />
successes over the past year, including the extradition <strong>of</strong><br />
major drug traffickers to the United States and an impressive<br />
drop in the homicide rate. Honduras also outlined its<br />
strategy for countering threats like transnational organized<br />
crime and trafficking in persons and drugs [4] . By strengthening<br />
airport security capabilities and improving traveler<br />
safety, governments such as the Honduran government,<br />
can substantially decrease the amount <strong>of</strong> resources needed<br />
to monitor and deter criminals from illegally entering<br />
or leaving the country. To help accomplish this, Securiport<br />
provides a substantial investment in the technology, training,<br />
and processes for countries in regards to immigration<br />
and security. This ensures the security <strong>of</strong>ficials are<br />
equipped with the necessary knowledge and resources<br />
to improve their security capabilities with little to no<br />
investment from the country itself. With the assistance <strong>of</strong><br />
88
Securiport, implementing advanced solutions such as the<br />
Integrated Immigration Control System and Intelligent<br />
Information Management and Pr<strong>of</strong>iling, Honduras can<br />
substantially improve their border security and dismantle<br />
human smuggling networks and other criminal activity.<br />
Just last year, Securiport’s Intelligent Information Management<br />
Data Analytics enabled international authorities to<br />
interdict a Senegal-based human trafficking ring, resulting<br />
in numerous criminal arrests. In addition, Securiport’s<br />
IICS assisted in the identification and arrest <strong>of</strong> an individual<br />
traveling with a stolen passport, who belonged to a vast<br />
network <strong>of</strong> counterfeiters. By leveraging these systems,<br />
countries such as Honduras will be able to equip themselves<br />
with the actionable data and necessary information<br />
needed to keep all <strong>of</strong> ports <strong>of</strong> entry secure. This creates<br />
safer and more secure nations.<br />
Business Outcomes:<br />
1) http://www.securiport.com/securiports-intelligent-information-management-data-analytics-enable-internationalauthorities-interdict-senegal-based-human-trafficking-ringresulting-numerous-criminal-arrests-preservati/<br />
2) http://www.securiport.com/securiports-integratedimmigration-control-system-assist-in-the-identification-andarrest-<strong>of</strong>-a-passenger-traveling-to-senegal-with-a-stolenpassport/<br />
3) http://www.securiport.com/solutions/intelligent-information-management-and-pr<strong>of</strong>iling/<br />
4) http://www.securiport.com/technology/biometric-identification-systems/<br />
References:<br />
http://www.iata.org/pressroom/speeches/Pages/2014-10-14-01.aspx<br />
http://www.comw.org/tct/fulltext/0503arasly.pdf<br />
http://www.gao.gov/assets/160/156968.pdf<br />
http://www.state.gov/r/pa/prs/ps/<strong>2015</strong>/01/235867.htm<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.securiport.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
1) http://www.securiport.com/securiport-and-inmarsat-partner-to-deliver-new-border-securityservice/<br />
2) http://www.securiport.com/securiports-intelligent-information-management-data-analyticsenable-international-authorities-interdict-senegal-based-human-trafficking-ring-resultingnumerous-criminal-arrests-preservati/<br />
3) http://www.securiport.com/securiports-integrated-immigration-control-system-assist-inthe-identification-and-arrest-<strong>of</strong>-a-passengertraveling-to-senegal-with-a-stolen-passport/<br />
4) http://www.securiport.com/solutions/intelligent-information-management-and-pr<strong>of</strong>iling/<br />
5) http://www.securiport.com/technology/biometric-identification-systems/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Borenstein Group<br />
Nominating contact’s <strong>of</strong>fice telephone and<br />
email:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Gal Borenstein, (PR Point <strong>of</strong> Contact)<br />
(703) 385-8178 x28 gal@borensteingroup.com<br />
Megan Gallagher, Client Director <strong>of</strong> Comm.<br />
(202) 339-6288 mgallagher@securiport.com<br />
89
Viscount Systems<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
ACCESS CONTROL AND IDENTIFICATION<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Integrated System for HSP D-12/FIPS 201<br />
Compliance<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Freedom Access Control<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Freedom is an IT-centric access control system that<br />
eliminates the need for traditional access control panels.<br />
Fully compliant with FIPS-201 and HSPD-12, Freedom<br />
leverages the power <strong>of</strong> the IT infrastructure to control<br />
access points through encryption bridges that transform<br />
card readers into IP addressable devices. Data<br />
is encrypted to eliminate the opportunity for cyber<br />
threats, ensuring a high level <strong>of</strong> security is maintained.<br />
Network complexity and upfront costs are immediately<br />
reduced due to a reduction in hardware and infrastructure<br />
investments, allowing users to meet strict budget<br />
requirements, and experience immediate and long-term<br />
return-on-investment. Freedom’s unique architecture<br />
leverages existing IT infrastructure to meet the FICAM<br />
(Federal Identity Credential and Access Management)<br />
requirements by integrating the PIV and PIV-I (personal<br />
identity verification - interoperability) credential<br />
certificate validation and authentication functionality<br />
directly into the access control s<strong>of</strong>tware. Physical access<br />
points are controlled using IP encryption bridges to<br />
connect door hardware and transform card readers into<br />
IP addressable devices. Credentials are presented at the<br />
reader and cryptographically challenged by the Freedom<br />
PACS Validation s<strong>of</strong>tware. <strong>The</strong>se credentials are then authenticated<br />
and validated before an authorization check<br />
is performed to grant or deny access to the cardholder.<br />
Freedom Access Control allows companies to build integrated<br />
access control and video management systems<br />
under one centrally managed or distributed network.<br />
Freedom expands as the security needs and physical<br />
90
footprint <strong>of</strong> the organization change, enabling it to build<br />
large physical security networks without requiring any<br />
additional investment in communication infrastructure.<br />
Organizations <strong>of</strong> any size can integrate physical security<br />
devices such as card readers, ID management, visitor<br />
entry, alarm points, and video applications. Video management<br />
systems can be easily added to Freedom for a<br />
single, unified system. Another unique advantage inherent<br />
on the Freedom s<strong>of</strong>tware platform is an open API<br />
for third-party technology partners or the enterprise’s<br />
IT department for specialized or custom integrations.<br />
Viscount Systems has been awarded contracts to provide<br />
access control for government agencies such as USCIS<br />
because <strong>of</strong> the unique technical capabilities <strong>of</strong> its Freedom<br />
access control solution as well as its compliance<br />
with FIPS-201 and HSPD-12. As part <strong>of</strong> the FICAM testing<br />
process, Freedom underwent a series <strong>of</strong> stringent<br />
compliance tests to ensure the system is not prone to<br />
any type <strong>of</strong> unauthorized network access. <strong>The</strong> result is<br />
a lower cost per door with overall lower annual maintenance<br />
costs than the traditional panel alternatives.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.viscount.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Freedom unifies physical and logical access control initiatives<br />
across enterprises:<br />
http://www.viscount.com/access-control/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CompassPR<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
delphine@compasspulicrelations.com<br />
91
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
COMMUNICATION PRODUCTS<br />
Acoustic Technology, Inc.<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Mass Notification Systems<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
MassAlert ®<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Acoustic Technology, Inc. (ATI Systems) has successfully<br />
developed, designed, manufactured and installed<br />
highly integrated and advanced mass notification systems<br />
for the campus, community, industrial and military<br />
markets since 1981. With a staff well experienced in<br />
acoustic modeling and GIS, ATI is the worldwide leader<br />
in providing Mass Notification Systems that deliver<br />
superior sound coverage and intelligibility for outdoor<br />
and indoor areas, ensuring the safety <strong>of</strong> the populace.<br />
ATI provides complete end-to-end solutions that include<br />
hardware and s<strong>of</strong>tware for audible and visual warning<br />
via multiple layers. <strong>The</strong> solutions consist <strong>of</strong> a simplecompact<br />
design, flexible user-friendly s<strong>of</strong>tware, and<br />
communication methods including RF, P25, IP, Fiber,<br />
DSL, Cellular, or Satellite. MassAlert ® is ATI’s easy-to-use<br />
and configurable GUI s<strong>of</strong>tware. <strong>The</strong> s<strong>of</strong>tware controls<br />
and monitors the system from either an on-site control<br />
station or from a remote locations. MassAlert can<br />
trigger any type <strong>of</strong> alert to an outdoor and/or indoor<br />
coverage area, and to computers or handheld devices<br />
via SMS, email, telephone, or computer popups. This<br />
multi-layered warning system provides a redundant<br />
means <strong>of</strong> notification to ensure that as many people as<br />
possible are being warned <strong>of</strong> the threat/danger. ATI has<br />
installed Mass Notification Systems at thousands <strong>of</strong> DoD<br />
installations worldwide, providing the ability to rapidly<br />
communicate both outside and inside <strong>of</strong> buildings on a<br />
base or facility. ATI’s systems are designed to meet the<br />
Unified Facilities Criteria (UFC) 4-021-01 for the Design,<br />
Operation and Maintenance <strong>of</strong> Mass Notification<br />
92
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.atisystem.com/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.atisystem.com/products/mas.htm<br />
http://www.atisystem.com/products/wp.htm<br />
http://www.atisystem.com/markets/militarymass-notification-systems.htm<br />
http://www.atisystem.com/markets/communitywarning-systems.htm<br />
Systems. ATI’s products are designed with the ability<br />
to easily integrate with other systems or equipment via<br />
Common Alerting Protocol (CAP), IPAWS, dry contact,<br />
RS232, or analog. ATI products can also interface with<br />
any type <strong>of</strong> digital or analog radio, modem, or media<br />
converter. With decades <strong>of</strong> experience in system consulting,<br />
acoustic design, manufacturing and integration,<br />
ATI is the leader in providing reliable mass notification<br />
solutions that utilizes every channel <strong>of</strong> communication<br />
available to ensure that end users receive critical lifesaving<br />
information and direction.<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Tarek Bassiouni<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (617) 567-4969<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
tarek@atisystem.com<br />
93
908 Devices<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
DETECTION PRODUCTS<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Chemical Detection Product or Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
M908<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Today’s First Responders require many different tools to<br />
get answers. With more than six billion chemicals in the<br />
world, First Responders are encountering and uncovering<br />
more unknowns than ever before. As a result,<br />
First Responders require an expansion <strong>of</strong> the tools and<br />
capabilities used directly in the hotzone. 908 Devices<br />
has expanded First Responder capabilities with their<br />
flagship product, M908TM – the first and only handheld<br />
mass spectrometer for downrange threat detection and<br />
identification. M908 utilizes high-pressure mass spectrometry<br />
(HPMS) to provide first responders, CST<br />
teams and the military with the capabilities to detect<br />
and identify a wide range <strong>of</strong> priority threats at the point<br />
<strong>of</strong> need. HPMS enables M908 to operate in the field with<br />
unprecedented levels <strong>of</strong> selectivity and sensitivity. As a<br />
result, the device alerts the user in seconds to the presence<br />
<strong>of</strong> priority chemical warfare agents, toxic industry<br />
chemicals, and precursor materials with incredibly low<br />
false alarm rates even when interferents are present.<br />
Weighing in at 4.4lbs, M908 is battery powered for continuous<br />
operation in the field and has been ruggedized<br />
to MIL-SPEC standards. In addition, unlike conventional<br />
mass spectrometry devices, the device requires little to<br />
no training to operate effectively. Regardless <strong>of</strong> their<br />
level <strong>of</strong> experience, first responders across multiple disciplines<br />
can operate the device with confidence. M908<br />
was specifically purpose-built to fill technology gaps<br />
and meet the evolving needs <strong>of</strong> today’s response mission.<br />
When used in conjunction with presently fielded<br />
Raman, FTIR and IMS devices, M908 adds the “gold<br />
94
standard” <strong>of</strong> mass spectrometry to the survey mission.<br />
M908 can be used as an emergency alert and initial survey<br />
tool for priority threat detection in vapor, solid and<br />
liquid form, from trace to bulk quantities, and render<br />
the scene safe from priority threats. This allows users<br />
more time when using Raman/FTIR tools (bulk solid<br />
and liquid detectors) to further interrogate samples for<br />
identification. Global departments <strong>of</strong> defense, civilian<br />
and military organizations, along with state, local,<br />
federal and foreign government agencies are currently<br />
using M908. To date, M908 has supported missions from<br />
drug interdiction to explosive threat detection within<br />
the past year. 908 Devices’ M908 and HPMS technology<br />
has been proven a success in the field by the Massachusetts<br />
State Hazmat Response Division, who purchased<br />
eight devices this year. <strong>The</strong> company has also been<br />
awarded contracts with the U.S. Army’s Next Generation<br />
Chemical Detector (NGCD) and Defense Threat Reduction<br />
Agency (DTRA) programs to create custom successors<br />
to M908 utilizing HPMS technology. In September<br />
2014, the team was awarded $2.6M in funding from the<br />
U.S government’s Technical Support Working Group<br />
(TSWG) to achieve even higher levels <strong>of</strong> selectivity and<br />
sensitivity with HPMS for field identification and detection<br />
<strong>of</strong> trace explosives.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.908devices.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
More about M908:<br />
http://908devices.com/products/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rebecca Gatesman, Account Executive<br />
PAN Communications<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (617) 502-4365<br />
cell: (716) 218-8531<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
rgatesman@pancomm.com<br />
95
Implant Sciences<br />
<strong>2015</strong> Winner<br />
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
DETECTION PRODUCTS<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Explosive Detection Product or Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
QS-B220<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Explosives Detection Solution: Implant Sciences<br />
QS-B220 Explosives Trace Detector One way to judge<br />
a product is to observe who steps up to buy it. At the<br />
completion <strong>of</strong> a series <strong>of</strong> rigorous and highly competitive<br />
tests, the Department <strong>of</strong> Homeland Security’s Transportation<br />
Security Administration (TSA) and ten European<br />
nations have committed tens <strong>of</strong> millions <strong>of</strong> dollars to<br />
one particular explosive trace detection (ETD) product,<br />
Implant Sciences’ QS-B220. <strong>The</strong> TSA, considered the<br />
leading ETD evaluation agency in the world, qualified<br />
the QS-B220 for passenger and baggage screening in August<br />
<strong>of</strong> 2014, calling it “the new gold standard in trace<br />
detection.” In October, 2014, the QS-B220 became the<br />
first system to pass the European Union’s stringent laboratory<br />
testing protocol. <strong>The</strong>se certifications, based on<br />
the unique capabilities <strong>of</strong> the Implant Sciences technology<br />
platform, quickly led to a number <strong>of</strong> large contracts.<br />
<strong>The</strong> TSA issued an exclusive ID/IQ (basically an open<br />
purchase order) to Implant Sciences for $162 million,<br />
followed by an initial order for 1170 units. <strong>The</strong>se units<br />
are being deployed at airports throughout the U. S. <strong>The</strong><br />
Netherlands, France, Germany, Belgium, Norway, Austria,<br />
the Czech Republic, Romania, Cyprus and Poland<br />
are ECAC countries that have selected the QS-B220 to<br />
date. Nations across the globe have become particularly<br />
concerned about ISIS and other radical groups, who kill<br />
and maim indiscriminately. One <strong>of</strong> their favorite techniques<br />
is to find holes in a country’s aviation systems,<br />
and exploit them. <strong>The</strong> downing <strong>of</strong> a Russian airline<br />
with 224 passengers aboard is the most recent example,<br />
96
though not the only one. <strong>The</strong> hundreds <strong>of</strong> thousands <strong>of</strong><br />
refugees from Syria and Iraq pose another threat – most<br />
refugees want a better life; some are allied with ISIS<br />
and Al Qaeda. No one at this point can tell the difference.<br />
Yet another threat is “homegrown” terrorists,<br />
individuals raised in the West but loyal to radical groups.<br />
Militants have carried out many attacks, including the<br />
marathon bombing in Boston. Some 3700 soldiers<br />
from Western countries, including at least 180 from the<br />
U.S., have served in Iraq and Syria, and the threat is,<br />
they will bring their ideology and terror tactics back to<br />
their home countries. <strong>The</strong> TSA and EU selected Implant<br />
Sciences’ technology to help counter the threats. <strong>The</strong><br />
QS-B220 provides fast, accurate real-time detection <strong>of</strong><br />
trace amounts <strong>of</strong> a wide variety <strong>of</strong> military, commercial<br />
and homemade explosives, as well as drugs, featuring<br />
lower total cost <strong>of</strong> operation. <strong>The</strong> system is easy to use,<br />
with intuitive controls that eliminate or reduce training<br />
requirements. A patented automatic internal calibration<br />
system eliminates the need for manual calibration<br />
using costly disposable materials, and its small footprint<br />
is well suited to crowded security checkpoints. Unlike<br />
some competing systems, its low false alarm rate keeps<br />
airport operations on track. Implant Sciences’ QS-B220<br />
has won Government Security News’ Homeland Security<br />
Award for “Best Explosives Detection Solution” in 2013<br />
and 2014, a judgment clearly confirmed by the TSA and<br />
European authorities who have selected the company’s<br />
system as the best way to protect people and property<br />
from the threat <strong>of</strong> terrorism.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.implantsciences.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Implant Sciences’ QS-B220 has won Government Security<br />
News’ Homeland Security Award for “Best Explosives Detection<br />
Solution” in 2013 and 2014, a judgment clearly confirmed by<br />
the TSA and European authorities who have selected the company’s<br />
system as the best way to protect people and property<br />
from the threat <strong>of</strong> terrorism. Additional relevant information is<br />
available at:<br />
http://www.implantsciences.com/technology/<br />
overview<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Bob Liscouski, Presdident<br />
Implant Sciences Corporation<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (978) 752-1700<br />
cell: (703) 407-9437<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
rliscouski@implantsciences.com<br />
http://www.implantsciences.com/technology/overview/<br />
http://www.implantsciences.com/products/desktopexplosives-drugs-trace-detector/<br />
http://www.implantsciences.com/technology/patents/<br />
97
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
VIDEO SURVEILLANCE/CCTV<br />
Qognify (Formerly NICE Security)<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Intelligent Video Surveillance Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Object Origin by Qognify<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In mere seconds, Object Origin can analyze hours <strong>of</strong><br />
surveillance video in order to detect the first time an object<br />
appears within a recorded scene. A patented video<br />
analytics solution, this unique capability is critical for<br />
high-traffic environments where unattended bags, suspicious<br />
objects, or unauthorized vehicles can cause costly<br />
disruptions or worse. And when combined with Suspect<br />
Search, a video analytics solution that can identifsy and<br />
tracks an individual’s movement in recorded video, law<br />
enforcement and security personnel are able to respond<br />
much faster, potentially criminal and dangerous situations<br />
by finding the object owner’s current location<br />
within seconds.<br />
Why it’s the best Intelligent Video Surveillance solution<br />
When it comes to safety and security, the sooner good<br />
decisions can be made, the more likely risk and damage<br />
can be mitigated. When a suspicious object is involved,<br />
there’s no time to manually scan hours <strong>of</strong> video, and no<br />
room for second-guessing. Object Origin saves precious<br />
time by quickly providing insight into how a suspicious<br />
object got there. With just one click on the object <strong>of</strong><br />
interest, Object Origin starts searching to reveal when,<br />
how, and who placed the object at the scene. This allows<br />
security personnel and law enforcement to make<br />
informed decisions that can save time, resources, cost,<br />
and in some instances lives. While Object Origin can<br />
be used on its own, when it’s part <strong>of</strong> a comprehensive<br />
security solution in conjunction with NICE Suspect<br />
Search, the individual who left the object can also be<br />
quickly located. <strong>The</strong> operator simply uses uploads the<br />
video image <strong>of</strong> the object’s owner the target suspect and<br />
98
Suspect Search goes to work right away to display the<br />
suspect’s path and last known location on premise.<br />
A Range <strong>of</strong> Applications and Attributes<br />
Object Origin mitigates risk and prevents criminal activity<br />
by determining if a suspicious object was intentionally<br />
placed or simply forgotten. Moreover, it is a valuable<br />
forensics tool allowing investigators to quickly find the<br />
origin <strong>of</strong> an object (a piece <strong>of</strong> luggage or a . parked car<br />
for example). And when combined with Suspect Search,<br />
it accelerates suspect apprehension.<br />
Incredible Time Saver<br />
On average, Object Origin can review one hour <strong>of</strong> video<br />
in less than 10 seconds. In a critical situation this is invaluable.<br />
As a business benefit, it can save organizations<br />
substantial costs, such as the case with airports, where<br />
every minute <strong>of</strong> delay or terminal closure can be tens<br />
<strong>of</strong> thousands <strong>of</strong> dollars. It is very efficient during, also<br />
in the case <strong>of</strong> post event investigations, saving hours<br />
<strong>of</strong> manpower otherwise needed to manually reviewing<br />
video footage.<br />
Fast, Accurate and Versatile<br />
Object Origin can be used in a real-time mode as an<br />
incident is unfolding as well as after-the-fact for forensic<br />
investigations. It can provide accurate results for almost<br />
any-sized object, from small purse to car, truck or cargo<br />
container and even if the object is partially occluded. It<br />
can be put into use for searching the origin <strong>of</strong> a variety<br />
<strong>of</strong> objects, from small as a purse or bag up to a car,<br />
truck or container.<br />
Extremely intuitive and Easy-to-use<br />
Simply open the search window on any video channel,<br />
select the object by placing a rectangle around it, and<br />
click search. Results are returned in seconds, showing<br />
the relevant video footage from the movement <strong>of</strong> first<br />
appearance in the scene.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.qognify.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.qognify.com/video-analytics/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Hagar Lev, Marketing Director<br />
Qognify<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: +49 (0) 69 97 17 738<br />
cell: +49 (0) 171 1637-667<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
hagar.lev@qognify.com<br />
Part <strong>of</strong> a Comprehensive Security Solution<br />
Once Object Origin has found the initial appearance<br />
<strong>of</strong> the object and who placed it there, the video image<br />
can be input into Suspect Search to locate the person<br />
<strong>of</strong> interest and reveal that person’s last known location<br />
or current whereabouts. Response personnel can be immediately<br />
dispatched.<br />
99
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
OTHER PRODUCTS<br />
B.I.G. Enterprises, Inc.<br />
<strong>2015</strong> Winner – Guard Booths<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Crash Barrier (Gates, Fences, Bollards, Guard<br />
Booths)<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Xtreme Facility Protector (guard booth)<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
At 120 square feet, <strong>The</strong> Xtreme Facility Protector is<br />
built to MIL-A-12560H, UFC 3-340-01, and UFC 3-340-<br />
02 specifications. This buard booth is the top defender<br />
made today. <strong>The</strong> booth delivers the highest level <strong>of</strong><br />
ballistic and blast-resistance available in the industry,<br />
allowing security personnel to remain effective in the<br />
midst <strong>of</strong> the most extreme emergency situation. In addition,<br />
when properly installed, the unit is capable <strong>of</strong><br />
withstanding a direct hit from an F5 tornado. While this<br />
level <strong>of</strong> protection may seem extreme for some applications,<br />
it serves as an example <strong>of</strong> B.I.G.’s commitment<br />
to building guard booths that can meet any challenge.<br />
Sensitive installations <strong>of</strong> all descriptions, including data<br />
storage centers, nuclear installations, and military complexes<br />
can benefit from <strong>The</strong> Xtreme Facility Protector’s<br />
defensive capabilities.<br />
100
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.bigbooth.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.bigbooth.com/case-studies/october-<strong>2015</strong><br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Sharon Bailey Beckett, President<br />
Brand Orbit<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (626) 791-7954<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
sharonb@brandorbit.com<br />
101
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
OTHER PRODUCTS<br />
CINCH systems, Inc.<br />
<strong>2015</strong> Winner – Crash Barriers/Gates/Fences<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Crash Barrier (Gates, Fences, Bollards, Guard<br />
Booths)<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rampart Vehicle Barrier System Control<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Shortly after the attacks on 9/11/2001, the world <strong>of</strong> security<br />
changed and expanded like never before. One <strong>of</strong> the<br />
new frontiers <strong>of</strong> security involved the ability to control<br />
and/or prevent vehicle access to high pr<strong>of</strong>ile buildings,<br />
parking areas and even roads surrounding the building<br />
during a threat. Retractable bollards and wedge barriers<br />
were installed at countless government and military<br />
facilities world-wide to control and prevent entry <strong>of</strong><br />
vehicles used for forced access and possible destruction.<br />
Fifteen years have gone by since retractable bollards and<br />
wedge barriers were installed during the early 2000’s.<br />
It has become common that many <strong>of</strong> the barriers systems<br />
installed during this time had become inoperable<br />
and remained in a normally “open” or down position.<br />
Without the ability to have the barriers function when<br />
needed, the facilities were now exposed to a possible<br />
breach. This problem affected a wide-range <strong>of</strong> facilities<br />
that included several important buildings in the Washington<br />
DC area and even a pr<strong>of</strong>essional baseball park in<br />
the Midwest. In each <strong>of</strong> these cases, after inspection it<br />
was found that the bollards and barriers were in working<br />
condition but the controls that sends the proper<br />
signals for up or down, were not working properly.<br />
Enter the Solution <strong>The</strong> Rampart Vehicle Barrier System<br />
(VBS) Control from CINCH systems has proven to be an<br />
ideal solution to get a VBS System back in action, doing<br />
the job it was designed to do—control vehicle access or<br />
seal-<strong>of</strong>f an area. <strong>The</strong> Rampart is the industry’s first AES<br />
Encrypted End-To-End, VBS processor based control<br />
system. <strong>The</strong> Rampart provides encrypted communi-<br />
102
cation between all devices connected to the system,<br />
engineered specifically for high security and vehicle<br />
barrier applications. <strong>The</strong> system is capable <strong>of</strong> controlling<br />
operation <strong>of</strong> one barrier, a sally port or multiple sally<br />
ports or up to 20 barriers for immediate vehicle lockdown.<br />
Rampart’s on-board 233 million event history<br />
provides quick detailed information on the operation<br />
<strong>of</strong> the system and critical ‘black box’ information in the<br />
event <strong>of</strong> an incident at any barrier or gate.<br />
<strong>The</strong> Rampart system is capable <strong>of</strong> controlling and<br />
monitoring:<br />
• Up to 20 VBS controls for bollards, wedge barriers<br />
gate arms, traffic lights and rolling gates.<br />
• 252 definable user access codes.<br />
• On-board storage for up to 233 million events for<br />
archival documentation using a removable SD memory<br />
card.<br />
• Connections through, Copper, Fiber Optics or TCP/IP.<br />
• Field upgradeable s<strong>of</strong>tware, via USB CINCH stick.<br />
• Modular and expandable.<br />
As a testament to the Rampart VBS Control System —<br />
the following is a comment received from a military<br />
facility that was testing installation, operation and reliability<br />
<strong>of</strong> the Rampart system:<br />
“After the installation was complete, my crew<br />
mentioned this was the first time ANY barrier installation<br />
they have done or know <strong>of</strong>, that passed<br />
certification on the first attempt.”<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.cinchsystems.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.cinchsystems.com/products/index.<br />
html<br />
https://www.youtube.com/<br />
watch?v=lMMmgVxM6Po<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Steve Craig<br />
CINCH systems, Inc.<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (763) 497-1059<br />
cell: (651)207-2407<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
steve.craig@cinchsystems.com<br />
103
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
OTHER PRODUCTS<br />
Qognify (Formerly NICE Security)<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Physical Security Information Management<br />
(PSIM) Solution<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Situator by Qognify<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Qognify (formerly NICE Security) continues to innovate<br />
the way PSIM technology is being utilized and increasing<br />
the impact it brings organizations. With Situator being<br />
used by some <strong>of</strong> the world’s largest, most high pr<strong>of</strong>ile<br />
and security-conscious organizations, Qognify has<br />
gained the insight to extract value far beyond the initial<br />
promise PSIM <strong>of</strong>fered. Situator is helping organizations’<br />
save time, cost, resources, reputation, and in some<br />
cases lives. Why it’s the best PSIM solution Measurable<br />
Value According to one <strong>of</strong> the world’s largest oil and gas<br />
companies, using Situator and NiceVision, saved them<br />
$1.2 million in 2014 and expect even greater savings in<br />
<strong>2015</strong>. <strong>The</strong> company, which spent $8 million annually<br />
in guard costs prior to implementing these solutions,<br />
now uses Situator to remotely monitor sites. By selec-<br />
tively moving work that was previously conducted by<br />
on-site security guards to the Global Security Operations<br />
Center (GSOC), the company has been able to cut costs<br />
by 15 percent. Situator’s ability to effectively manage<br />
major incidents was demonstrated at LAX when a recent<br />
SkyWest flight made an emergency landing without its<br />
left landing gear. Situator and GIS were used to successfully<br />
manage the incident from start to finish, including<br />
guiding all first responders – police, fire, operations,<br />
and maintenance – and coordinating the smooth transfer<br />
<strong>of</strong> passengers from plane to safety. <strong>The</strong> Netherland’s<br />
national rail infrastructure operator, ProRail has been<br />
able reduce incident response time by over 60 percent<br />
with Situator, cutting the average intake time down from<br />
fourteen minutes to four. This is a real game changer for<br />
104
the national train system, impacting passenger satisfaction<br />
and its’ bottom line. Operators not only reach<br />
better decisions faster, incidents are managed more<br />
consistently, and ProRail now has full audit capabilities<br />
to prove it is complying with rail regulations. Successful<br />
Global Deployments and Expansions in a Range<br />
<strong>of</strong> Sectors An excellent indicator <strong>of</strong> the value Situator<br />
delivers is the rate at which organizations expand the<br />
solution. One the world’s largest mass transit organizations<br />
initially deployed Situator in several test locations.<br />
In a relatively short period <strong>of</strong> time, they’ve now decided<br />
to expand coverage to their entire environment, helping<br />
protect the over 11 million passengers that travel<br />
with them every day. <strong>The</strong> U.S. government is also using<br />
Situator to help secure one <strong>of</strong> the world’s largest datacenters,<br />
as is the Department <strong>of</strong> Transportation for one<br />
<strong>of</strong> the nation’s largest cities. Market Leadership Industry<br />
Recognition IHS has ranked Situator the global leader<br />
in PSIM solutions (Situator) and named the company<br />
the leading PSIM vendor worldwide. In addition, Frost<br />
& Sullivan has defined Situator as one <strong>of</strong> the few Tier<br />
1 PSIM solutions available. New, extended capabilities<br />
Suspect Search, the award-winning video analytics<br />
technology that reduces search time for individuals in<br />
recorded video from hours or days to minutes, can now<br />
be seamlessly integrated with Situator. Whether it’s an<br />
active shooter situation or when searching for a missing<br />
child, every second counts. <strong>The</strong> integration <strong>of</strong> Situator<br />
and Suspect Search makes them both even more powerful.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.qognify.com<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.qognify.com/situation-management-psim/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Hagar Lev, Marketing Director<br />
Qognify<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: +49 (0) 69 97 17 738<br />
cell: +49 (0) 171 1637-667<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
hagar.lev@qognify.com<br />
105
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Physical Security Products and Solutions<br />
SERVICES<br />
AlliedBarton Security Services<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Facility Security/Force Protection Service<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
AlliedBarton RTD-Denver Security Bike Patrol<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
With more than 150 bus routes, six light rail lines,<br />
and many specialty services, Regional Transportation<br />
District-Denver is a primary form <strong>of</strong> transportation for<br />
many. In February 2013, AlliedBarton Security Services,<br />
the industry’s premier provider <strong>of</strong> highly trained security<br />
personnel, transitioned the account, taking on more<br />
than 3800 weekly hours <strong>of</strong> security services, including<br />
armed security <strong>of</strong>ficers, fare verification, special event<br />
support, exterior patrols, rider assistance and more.<br />
AlliedBarton security <strong>of</strong>ficers are posted throughout the<br />
system’s various locations in Denver and the surrounding<br />
counties, 24 hours a day, 365 days a year. Keeping<br />
passengers and employees safe, securing critical<br />
infrastructure and providing customer service is <strong>of</strong> the<br />
utmost importance to transit agencies like RTD. Because<br />
they serve large numbers <strong>of</strong> people in publicly accessible<br />
facilities, public transit agencies have unique security<br />
challenges. In addition, security has become a viable<br />
solution to a traditional transit facility challenge: graffiti.<br />
When RTD was faced with the problem <strong>of</strong> graffiti along<br />
parts <strong>of</strong> the system, AlliedBarton’s local management<br />
suggested developing a bike patrol program to deter<br />
this crime. RTD Transit Police Chief Tarbert agreed to<br />
pilot the program, and within the month, AlliedBarton<br />
worked with Denver Transit to purchase bikes and train<br />
security <strong>of</strong>ficers on the specifics <strong>of</strong> bike patrol through<br />
their partnership with the local police department. <strong>The</strong><br />
first few weeks <strong>of</strong> the pilot proved to be a success, as<br />
graffiti crimes dropped 30%, saving the transit system<br />
thousands <strong>of</strong> dollars on graffiti removal. <strong>The</strong> value <strong>of</strong><br />
106
the program was quickly seen by RTD, transit riders and<br />
the general public. In addition to addressing the graffiti<br />
issue, the bike patrol creates a larger security presence<br />
overall. In August 2014, bike <strong>of</strong>ficers heard a cry for<br />
help along the rail line. <strong>The</strong>y responded to a woman in<br />
distress who had slid down an embankment. <strong>The</strong>y were<br />
able to provide first aid and call for EMS. Had the bike<br />
patrol not been in place, she likely she would not have<br />
been heard or found. With the reopening <strong>of</strong> the Denver<br />
Union Station in the summer <strong>of</strong> 2014, AlliedBarton’s<br />
bike patrol services needed to expand. This highlytravelled<br />
area is the main hub for entertainment venues,<br />
pr<strong>of</strong>essional sports events and many other tourist destinations<br />
and activities. <strong>The</strong> highly-visible bike patrols<br />
are a constant security presence, effective crowd control<br />
and pedestrian traffic management resource, and a fast<br />
response when foot or vehicle patrols cannot respond.<br />
<strong>The</strong> addition <strong>of</strong> AlliedBarton’s bike patrol security <strong>of</strong>ficers<br />
are an effective brand enhancement for RTD and<br />
have become a staple in the downtown Denver area<br />
and along the transit system. Now at over 4787 hours <strong>of</strong><br />
security services a week, bike patrols <strong>of</strong>fer RTD a rapid<br />
deployment force, able to move quickly and respond to<br />
emergencies. <strong>The</strong> visible presence <strong>of</strong> well-trained, uniformed<br />
AlliedBarton security <strong>of</strong>ficers provides a sense <strong>of</strong><br />
security and safety to transit passengers and employees<br />
alike at RTD. <strong>The</strong> collaborative partnership between<br />
AlliedBarton and RTD has created a proactive culture<br />
where security services evolve to meet changing needs.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.alliedbarton.com/Industries-Served/<br />
Transportation<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.alliedbarton.com/Industries-Served/<br />
Transportation<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Charles Bohnenberger, VP Government Services<br />
AlliedBarton Security Services<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (484) 351-1340<br />
cell: (484) 213-6420<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Charles.bohnenberger@alliedbarton.com<br />
katie.killmeyer@alliedbarton.com<br />
107
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Most Notable Federal Government Security Program/Project or Initiative<br />
TSA - TSA Airport and Aviation security<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Airport/Aviation Security Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
TSA Airport and Aviation security<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
TSA ETD Fulfillment Program Nations across the globe<br />
have become particularly concerned about “homegrown”<br />
terrorists, individuals raised in the West but<br />
loyal to ISIS, Al Qaida and other radical groups. Some<br />
3700 soldiers from Western countries, including at least<br />
180 from the U.S., have served in Iraq and Syria, and<br />
the threat is, they will bring their ideology and terrorist<br />
tactics back to their home countries. A country’s aviation<br />
system is a particularly inviting target, as bringing<br />
down an airliner or bombing an airport can inflict mass<br />
casualties, sow wide spread fear and gain broad publicity.<br />
<strong>The</strong> agency charged with ensuring that the U. S.<br />
aviation system is safe from extremists is the Transportation<br />
Security Administration (TSA), a unit <strong>of</strong> the federal<br />
Department <strong>of</strong> Homeland Security. <strong>The</strong> TSA is <strong>of</strong>ten<br />
maligned, but the agency has a reputation as a global<br />
leader in evaluating and implementing aviation security<br />
technology. So just as terror groups are awake to opportunity,<br />
the TSA remains vigilant, constantly improving<br />
its systems, including systems used to screen for explosives.<br />
<strong>The</strong> TSA determined that existing explosive trace<br />
detection (ETD) systems were approaching the end <strong>of</strong><br />
their useful life, and two years ago began planning to<br />
replace them with more modern and efficient detectors.<br />
<strong>The</strong> agency’s world-renowned TSA Lab took the<br />
lead in helping identify the best ETD solution. <strong>The</strong> Lab,<br />
located on a 12acre campus at Atlantic City International<br />
Airport, and its staff <strong>of</strong> leading physicists, chemists and<br />
engineers perform research and evaluate a variety <strong>of</strong><br />
technologies on an ongoing basis, including validating<br />
108
solutions to detect and mitigate the threat <strong>of</strong> improvised<br />
explosive devices. <strong>The</strong> testing process is objective and<br />
rigorous. Primary factors considered by the TSA Lab<br />
when evaluating explosive trace detection systems were<br />
the ability to quickly and accurately detect a wide variety<br />
<strong>of</strong> chemicals; a low incidence <strong>of</strong> false alarms, which play<br />
havoc with airport operations; and ease <strong>of</strong> use. A new<br />
but critical factor also in the mix was a product’s high<br />
threshold <strong>of</strong> networking security effectiveness, a recent<br />
requirement for all DHS systems. <strong>The</strong> TSA Lab sent its<br />
report to TSA management, which considered other<br />
important factors, including training requirements and<br />
total cost <strong>of</strong> ownership. Three companies were qualified<br />
by the agency and asked to bid on the ETD replacement<br />
program. <strong>The</strong> process – thorough and impartial – led<br />
to the selection <strong>of</strong> Implant Sciences Corporation’s QS-<br />
B220 explosives detection product. <strong>The</strong> agency awarded<br />
Implant Systems, headquartered in Wilmington, Massachusetts,<br />
an ID/IQ (basically an open purchase order)<br />
amounting to $162 million, and followed up with an initial<br />
order for 1170 systems. Installation <strong>of</strong> the new systems<br />
is scheduled to begin before year end. <strong>The</strong> TSA is<br />
dedicated to keeping the flying public safe. Its ability to<br />
measure risks and identify deterrents is a point <strong>of</strong> pride<br />
to the agency, which is perceived by security agencies in<br />
Europe and around the globe as the leader in assessing<br />
technologies that keep people and property safe from<br />
those who would do harm. As organizations emerge that<br />
use terror to murder and intimidate, as terrorists leave<br />
the battlefield and return home, the Transportation<br />
Security Administration remains a critical, vigilant line<br />
<strong>of</strong> defense for America’s airports and the millions who<br />
fly. <strong>The</strong> agency’s ETD program involving the planning,<br />
evaluation and deployment <strong>of</strong> hundreds <strong>of</strong> advanced<br />
explosive trace detectors at airports throughout the<br />
country is a testament to the agency’s foresight and effectiveness,<br />
and the reason it deserves the <strong>GSN</strong> Government<br />
Excellence award.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.tsa.gov<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Scott Arnold<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (207) 651-4949<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
scttrnld26@gmail.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
160 Brackett Hill Rd<br />
Alfred, ME 04002<br />
109
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Most Notable Federal Government Security Program/Project or Initiative<br />
U.S. Department <strong>of</strong> State<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Continuous Clearance Evaluation Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Continuous Clearance Evaluation Program<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> U.S. government currently has about five million<br />
people holding security clearances – confidential, secret<br />
or top secret – all providing consent to certain ongoing<br />
checks in order to maintain that status. Under the<br />
current system, clearances at the confidential, secret<br />
and top secret level are reviewed at 15, 10 and five years<br />
respectively. However, major life changes may occur<br />
within the span <strong>of</strong> five to 15 years, ranging from common<br />
occurrences like financial or marriage changes<br />
to more severe transgressions, such as arrests, drug<br />
or criminal activity. Any <strong>of</strong> these factors could affect a<br />
clearance holder’s personal stability and would merit<br />
a review <strong>of</strong> the access privileges granted to that user.<br />
However, the only check currently in place relies on the<br />
individual self-reporting changes against the 13 Federal<br />
Adjudicative Standards, such as personal conduct, foreign<br />
influence, criminal conduct, drug involvement, etc.<br />
This is an unreliable safeguard, as it places the reporting<br />
requirement on the individual who has a vested interest<br />
in maintaining clearance status. In fact, only a minority<br />
<strong>of</strong> clearance holders actually self-report, and in some<br />
cases, criminal activity went unreported. As the government<br />
continues its efforts to mitigate insider threats,<br />
agencies have been moving to establish more effective<br />
controls. To this effect, agencies have primarily focused<br />
on their physical and network security environment, but<br />
these measures are unable to account for a full picture<br />
<strong>of</strong> risk informed by life events. In a pioneering effort to<br />
change that, the State Department has implemented a<br />
comprehensive risk-based oversight system that utilizes<br />
110
advanced analytics in conjunction with vast amounts <strong>of</strong><br />
available public records and data. By applying information<br />
from sources such as public records, to the 13 Federal<br />
Adjudicative Standards, the State Department can<br />
more effectively identify if an individual has a propensity<br />
to “do bad” (or better yet, identify an individual who<br />
does NOT have such a propensity). This process – similar<br />
to what is successfully used by the insurance industry<br />
to determine if individuals qualify for insurance and at<br />
what rate – enables the Department to make better decisions<br />
on who they might want to engage more closely.<br />
<strong>The</strong> State Department’s structured, phased approach<br />
includes continuous evaluation and re-investigation. By<br />
using public records and data analytics to establish if a<br />
clearance holder has violated the rights provided under<br />
that clearance, the State Department can consistently<br />
evaluate and assess that individual using constantly<br />
updated data stores and establishing re-evaluations for<br />
deeper examination when necessary. <strong>The</strong> implementation<br />
<strong>of</strong> an analytics-fueled continuous evaluation approach<br />
has provided the Department with a complete<br />
picture <strong>of</strong> employees with security clearances: their situation<br />
today; their recent and past history; their potential<br />
susceptibility to outside influence; and their propensity<br />
to commit fraud, as well as deviant or other unsuitable<br />
behavior. It is a breakthrough solution to a governmentwide<br />
issue that can be easily replicated by other agencies.<br />
<strong>The</strong> State Department’s innovation and initiative<br />
deserves to be recognized.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.state.gov<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://lexisnexisspecialservices.com/what-wedo/continuous-evaluation/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Steve Nguyen, Vice President<br />
Federal Programs and LexisNexis Special Services Inc.<br />
(LNSSI)<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
cell: (571) 277-8770<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Steve.Nguyen@Lnssi.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
1150 18th Street, N.W., Suite 250<br />
Washington, DC 20036<br />
111
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Most Notable State Government Program, Project or Initiative<br />
New York State Division Of Homeland Security<br />
and Emergency Services (DHSES)<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable State Government Security Program/<br />
Project or Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
County Emergency Preparedness Assessment (CEPA)<br />
Initiative<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>The</strong> County Emergency Preparedness Assessment<br />
(CEPA) is a statewide initiative to better understand how<br />
the State and local governments are prepared to deal<br />
with various threats and hazards facing New York. As<br />
the number one target <strong>of</strong> terrorism in the Country, and<br />
a State with numerous natural disasters (4th most in<br />
the nation), CEPA is a critical component <strong>of</strong> our overall<br />
homeland security strategy. <strong>The</strong> CEPA process was<br />
developed in collaboration with State and local subject<br />
matter experts and involves facilitated workshops with<br />
each <strong>of</strong> New York’s 58 counties (including NYC) to capture<br />
risk, capability and resource information using an<br />
intuitive, standardized and repeatable process. Through<br />
the CEPA process, DHSES is able to better understand<br />
local capabilities and resource gaps across the entire<br />
homeland security spectrum (e.g., counter-terrorism,<br />
critical infrastructure, communications, cyber-security,<br />
emergency management, public health, etc.), and CEPA<br />
has identified a series <strong>of</strong> common gaps and trends than<br />
can now be better addressed. This information from<br />
CEPA is helping both the State and our local partners<br />
make more informed resource decisions and increasing<br />
our efficiency and effectiveness by focusing our<br />
collective efforts to where they are most needed. CEPA<br />
has also helped us identify and promote best practices<br />
across the State, and the highly collaborative nature<br />
<strong>of</strong> the process has served to strengthen relationships<br />
with our partners. To date, more than 1,300 public<br />
112
and private sector stakeholders have participated in<br />
the CEPA process, and New York’s innovative approach<br />
to the CEPA initiative recently led to a Public Service<br />
Excellence Award from the State Academy for Public<br />
Administration. <strong>The</strong> CEPA process has helped New York<br />
address the longstanding problem <strong>of</strong> how measure and<br />
quantify preparedness. We now have a baseline preparedness<br />
assessment and the ability to monitor and<br />
track our progress over time. <strong>The</strong> federal government,<br />
academics, think-tank and others have long struggled<br />
with how to assess preparedness, but rather than wait<br />
for someone else to develop a solution to this challenge,<br />
New York took decisive action and created a solution<br />
that could serve as national model, and we are actively<br />
sharing information about CEPA with others so that they<br />
may learn from our experiences. <strong>The</strong> growing threat<br />
<strong>of</strong> extreme weather coupled with the complex terrorism<br />
threat environment warrants new and innovative<br />
approaches to increase preparedness, and the CEPA<br />
initiative is an embodiment <strong>of</strong> that ideology. As such,<br />
we would greatly appreciate consideration for the <strong>2015</strong><br />
<strong>GSN</strong> Homeland Security Award.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.dhses.ny.gov/<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CEPA Overview from DHSES website:<br />
http://www.dhses.ny.gov/planning/<br />
Article about CEPA:<br />
https://www.chds.us/c/item/2543<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Terry Hastings, DHSES Senior Policy Advisor<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (518) 242-5163<br />
cell: (518) 764-0009<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
terry.hastings@dhses.ny.gov<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
NYS DHSES 1220 Washington Ave, Building 7a (7th fl)<br />
Albany, NY 12242<br />
113
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Most Notable State Government Program, Project or Initiative<br />
California Department <strong>of</strong> Motor Vehicles,<br />
Investigations Division<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable State Government Security Program/<br />
Project or Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
California DMV Identity Management Program<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In late 2013, the California state legislature passed a law<br />
that went into effect on January 1st <strong>of</strong> this year. <strong>The</strong> law<br />
allows applicants who are unable to provide satisfactory<br />
pro<strong>of</strong> that their presence in the U.S. is authorized under<br />
federal law to receive an original driver’s license without<br />
the fear <strong>of</strong> criminal repercussion. As a result <strong>of</strong> this legislation,<br />
the number <strong>of</strong> Californians who have applied<br />
for a driver’s license has exploded, with half a million<br />
applications filed by April <strong>of</strong> <strong>2015</strong>, double the number<br />
<strong>of</strong> applications that the Department <strong>of</strong> Motor Vehicles<br />
(DMV) originally anticipated. A great majority, 91% <strong>of</strong><br />
these applicants, are still providing the necessary identity<br />
and residency documents, and 203,000 immigrants<br />
had received their licenses by April <strong>2015</strong>. While this<br />
indicates substantial progress towards achieving Califor-<br />
nia’s goal <strong>of</strong> accurately accounting for all residents with<br />
driver’s licenses, it also can result in individuals trying<br />
to beat the system by committing fraud or other crimes<br />
to obtain driver’s licenses. In order to help crack down<br />
on any undocumented immigrants who may wish to<br />
remain undocumented for the furthering <strong>of</strong> criminal activities,<br />
the California DMV’s Investigations Division has<br />
implemented identity pro<strong>of</strong>ing solutions designed to<br />
assist in verifying an individual’s identity. Identity pro<strong>of</strong>ing<br />
integrates data and analytics for identity verification,<br />
knowledge-based authentication and investigative information<br />
into a sophisticated algorithm that generates a<br />
true identity picture. Identity pro<strong>of</strong>ing makes intelligent<br />
information connections beyond the obvious and draws<br />
insights from public records data, while taking steps to<br />
114
observe the highest levels <strong>of</strong> privacy and compliance.<br />
<strong>The</strong> first step in the process is identity discovery as<br />
presented by the applicant. <strong>The</strong> second step is identity<br />
verification. <strong>The</strong> process is accomplished by running it<br />
through a series <strong>of</strong> algorithms to determine if the information<br />
in-hand belongs to an actual person. <strong>The</strong> information<br />
is checked against vast amounts <strong>of</strong> open source<br />
data sets and confirmed by thousands <strong>of</strong> public records.<br />
<strong>The</strong> final step is to authenticate that the applicant is in<br />
fact the owner <strong>of</strong> the identity. This is done through a<br />
quiz engine that tailors questions to the verified individual’s<br />
public records and area demographics based<br />
upon a multitude <strong>of</strong> data domains that are selected by<br />
the agency. This process <strong>of</strong>fers identity authentication<br />
input options beyond just name, address and Social<br />
Security Number, all <strong>of</strong> which can be easily falsified.<br />
<strong>The</strong> ability to properly identify individuals applying for<br />
driver’s licenses has a major impact on homeland security<br />
and public safety. By resolving identities in advance<br />
<strong>of</strong> issuing licenses, the California DMV Investigations<br />
Division is helping to prevent criminal activities before<br />
they occur.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.dmv.ca.gov/portal/dmv/dmv/<strong>of</strong>fices/investigations<strong>of</strong>fice<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.lexisnexis.com/risk/government/<br />
gov-identity-management.aspx<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Dale Ferranto, Law Enforcement Liaison<br />
Western USA, LexisNexis Risk Solutions<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (949) 276-6601<br />
cell: (949) 542-0442<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
dale.ferranto@lexisnexis.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
1000 Alderman Dr.<br />
Alpharetta, GA 30005<br />
115
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Most Notable Cybersecurity Program, Project or Initiative<br />
City <strong>of</strong> Los Angeles - Centralization <strong>of</strong> Cybersecurity<br />
Incident Data Analysis<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Cybersecurity Program, Project or<br />
Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
City <strong>of</strong> Los Angeles Centralizes Cybersecurity Incident<br />
Data Analysis with Customized Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
With more than 4 million residents, the City <strong>of</strong> Los Angeles<br />
is the second largest city in the Unites States. <strong>The</strong><br />
City <strong>of</strong> LA’s Information Technology Agency (ITA) manages<br />
the IT systems and network traffic for more than<br />
37 departments, including those that support the city’s<br />
financials, taxes and public internet for citizens. ITA is<br />
dedicated to using the most secure, cost effective, highly<br />
efficient and interoperable enterprise-wide technology<br />
to serve the City <strong>of</strong> LA. In recent years, the cybersecurity<br />
threat landscape has dramatically evolved, with an everincreasing<br />
number <strong>of</strong> advanced persistent threats and<br />
targeted breaches. State and city governments today are<br />
tasked with safeguarding citizen data and confidential<br />
information, making them a target for malicious threat<br />
actors. Until recently, if an inconsistency or potential security<br />
breach was found, the protocol in place required<br />
pulling security logs from each individual department,<br />
reviewing and analyzing the disparate reports and then<br />
correlating the data manually with multiple security<br />
tools. This was a time consuming process that not only<br />
left room for error, but did not allow ITA to proactively<br />
tackle enough <strong>of</strong> the cyber threats attempting to infiltrate<br />
the city’s networks. Led by Timothy Lee, the city’s<br />
chief information security <strong>of</strong>ficer (CISO), ITA sought<br />
to implement an advanced security information and<br />
event management (SIEM) solution, to help consolidate,<br />
maintain and analyze security data across the city’s multiple<br />
departments. Given the limited resources Lee and<br />
116
his team faced—from staffing to budget—ITA deployed a<br />
unique, cloud-based SIEM solution to enhance cybersecurity<br />
capabilities. In addition, Lee led the city’s Cyber<br />
Intrusion Command Center (CICC), a city-wide cybersecurity<br />
working group that leads cybersecurity preparation<br />
and response to security incidents, implemented<br />
the city’s first Integrated Security Operations Center<br />
(ISOC). This ISOC collects and correlates log data and<br />
security events from different security appliances across<br />
the city’s departments into a single database and a useable<br />
dashboard and actionable threat intelligence to<br />
enable a high-level security posture city-wide. Instead <strong>of</strong><br />
going to each <strong>of</strong> the 40 plus departments, Lee and his<br />
team can now monitor everything from clickstreams and<br />
transactions, to security events and network activity, and<br />
analyze all the correlated data from a centralized, customized<br />
dashboard, 24x7 anytime, anywhere; turning<br />
machine-generated data into valuable intelligence that,<br />
in turn, drives good decisions. <strong>The</strong> SIEM solution takes<br />
the City <strong>of</strong> LA to another level <strong>of</strong> cybersecurity intelligence.<br />
With the data in one place, the City <strong>of</strong> LA and its<br />
FBI counterpart, FBI Cyberhood Watch, can quickly and<br />
efficiently gather information about threats, and identify<br />
strategies to prevent future intrusions. <strong>The</strong> solution<br />
has undoubtedly enhanced the city’s ability to manage<br />
and protect the city’s critical infrastructure and digital<br />
assets serving Angelenos. Lee states, “I can confidently<br />
say we have avoided a number <strong>of</strong> security breach situations<br />
because we implemented these proactive tools.<br />
We have blocked intrusion attempts, have been able to<br />
swiftly correlate data and share threat information to the<br />
stakeholders, and have been able to expedite the time it<br />
takes to close these security incident tickets.”<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://ita.lacity.org/index.htm<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Caralyn Duke, Account Executive<br />
Qorvis MSLGROUP<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: (202) 683-3203<br />
cell: (202) 658-9201<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
caralyn.duke@mslgroup.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
1201 Connecticut Ave, NW Suite 500<br />
Washington, DC 20036<br />
117
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Most Notable County/Municipal Program, Project or Initiative<br />
Nanded India, Safe City -<br />
Qognify (Formerly NICE Security)<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable County/Municipal Program, Project or<br />
Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Nanded India, Safe City<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Nanded is the second largest city in the Marathwada<br />
District <strong>of</strong> Maharashtra, India with over half a million<br />
citizens. <strong>The</strong> city holds historical and religious significance,<br />
making it a destination city. Several times a year,<br />
religious tourism spikes, bringing an influx <strong>of</strong> tens <strong>of</strong><br />
thousands <strong>of</strong> visitors and the risk associated with a<br />
swelling population. Maintaining safety and security<br />
is a priority for the municipality, not just during peak<br />
visitation, but every day. Serving as a model for future<br />
deployments around the Maharashtra state and India in<br />
general, the Safe City project was named C-Cube after<br />
the command, control and communication center that<br />
monitors the entire city, 24/7. <strong>The</strong> Safe City solution is<br />
comprised <strong>of</strong> several different integrated components<br />
that work together to provide law enforcement with<br />
situational awareness and management. NICE Situa-<br />
tor Express is the PSIM backbone <strong>of</strong> the solution, with<br />
NiceVision video surveillance including NVRs, decoders<br />
and Crowd Monitoring video analytics supporting it. In<br />
addition, Panic Buttons have been deployed throughout<br />
the city and pre-configured advanced Standard Operating<br />
Procedures (SOP) in the local language, Marathi,<br />
have been developed and implemented to address<br />
the various security and disaster situations that could<br />
potentially occur. Nanded <strong>of</strong>ficials outlined very specific<br />
challenges that they wanted to address effectively, yet<br />
affordably, with the Safe City solution.<br />
<strong>The</strong>y include:<br />
NICE Crowd Monitoring analytics or Panic Button<br />
activation alert C-Cube <strong>of</strong> crowd formations – This<br />
allows operators at C-Cube to control the situation with<br />
118
the help <strong>of</strong> Situator with embedded pre-defined SOPs in<br />
the local language.<br />
Citywide Public Address (PA)System — Nanded is<br />
using NiceVision as their PA system in the event <strong>of</strong> an<br />
emergency – eliminating their need for additional<br />
equipment. Using Nice Vision’s audio out capability, an<br />
operator can simply click on any camera and the camera’s<br />
loudspeaker makes the announcement.<br />
Affordable State-<strong>of</strong>-the-Art Control Room — with a<br />
4x2 LCD video wall and powered by a NICE decoder<br />
and Video Matrix license, providing a true video wall<br />
feel to C-Cube.<br />
Procession and VIP Route Monitoring — NICE Situator<br />
with predefine SOPS help law enforcement monitor<br />
and manage routine operations. For example, during<br />
VIP Route Monitoring the SOP dictates that the corresponding<br />
cameras along the route are displayed on the<br />
video wall enabling real-time monitoring.<br />
Disaster Management — with predefined, escalating<br />
SOPs, operators have the ability effectively and consistently<br />
manage emergency situations including structure<br />
collapses, flooding, railway accidents, earthquakes and<br />
others.<br />
“Nanded’s historical and religious significance made<br />
safety and security a high priority. <strong>The</strong> C-Cube was designed<br />
to facilitate better communications between law<br />
enforcement <strong>of</strong>ficials and the public, and to centralize<br />
safety and security management. With NICE’s support,<br />
we were able to bring our vision to fruition and even<br />
create a public address system that allows us to communicate<br />
quickly with our citizens. We’re experiencing<br />
improvement in security, operations, and communications,<br />
and in the way incidents are handled,” attested,<br />
Mr. Sushil Khodwekar, Municipal Commissioner <strong>of</strong><br />
Nanded City.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
nwcmc.gov.in<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.qognify.com/situation-management-psim/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Hagar Lev, Marketing Director<br />
Qognify<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: +49 (0) 69 97 17 738<br />
cell: +49 (0) 171 1637-667<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
hagar.lev@qognify.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
461 From Rd<br />
Paramus, NJ 07652<br />
United States<br />
(C/O Steve Maron, @ NICE Systems Inc.)<br />
119
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Most Notable County/Municipal Program, Project or Initiative<br />
SAMMC (San Antonio Military Medical Center)<br />
Advanced Security Program, Suspect Search –<br />
Qognify (Formerly NICE Security) <strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable County/Municipal Program, Project or<br />
Initiative<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SAMMC (San Antonio Military Medical Center) Advanced<br />
Security Program, Suspect Search<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In the early morning hours, a “code pink” alarm has<br />
been triggered. A newborn baby was moved from its<br />
bed. <strong>The</strong> RFID bracelet on her wrist triggered an alarm<br />
once she was past a predefined security access point.<br />
Automatically, video from relevant nearby cameras is<br />
streamed to the control room, revealing a fast walking<br />
figure, dressed in street clothing. <strong>The</strong> person is clearly<br />
visible when seen on the video camera closest to where<br />
the infant’s RFID bracelet triggered the alarm. That image<br />
is imported into the system, and within seconds, an<br />
album <strong>of</strong> pre-indexed persons appeared on the screen.<br />
From here, visual verification <strong>of</strong> the suspected person<br />
is swift, and his trail across the cameras is shown on the<br />
screen. <strong>The</strong> abductor was clever, selecting a course that<br />
would not be easily traceable otherwise. He knows the<br />
hospital well. But the system is smarter, and security<br />
personnel are dispatched. <strong>The</strong>y track him down to the<br />
parking lot, before leaving hospital grounds. <strong>The</strong> infant<br />
is safe again. <strong>The</strong> above is not a true story, but based<br />
on many incidents that have occurred, nationwide, with<br />
hospital related crime on the rise*. But what if the right<br />
system is deployed – one that enables the happy ending<br />
described above? That potential happy ending is why<br />
this entry deserves to win. <strong>The</strong> San Antonio Military<br />
Medical Center (SAMMC), is the largest U.S. Department<br />
<strong>of</strong> Defense Military Medical facility and Level I Trauma<br />
and Burn Research Center. It is an expansive medical<br />
center; with over 2.1 million square feet. Its ER process-<br />
120
es more than 5,700 emergency room visits a month and<br />
serves hundreds <strong>of</strong> thousands <strong>of</strong> U.S. service members<br />
and their families. SAMMC’s was an early adopter <strong>of</strong><br />
Suspect Search video analytics solution, enabling personnel<br />
to track and locate missing patients or suspicious<br />
persons during time-critical scenarios. Qognify Suspect<br />
Search provides real-time forensics <strong>of</strong> surveillance video<br />
to locate a person <strong>of</strong> interest in situations when time is<br />
<strong>of</strong> the essence. Using a video image, uploaded photo, or<br />
user-generated composite (an “avatar”, based on verbal<br />
description <strong>of</strong> suspect, its clothing, etc)- Suspect Search<br />
can scan hours <strong>of</strong> video in minutes and automatically<br />
filter out 95 percent <strong>of</strong> irrelevant images. Its mapping<br />
capabilities provide geo-spatial awareness by retracing<br />
a suspect’s movements across cameras and pinpointing<br />
his current or last known locations on your premises.<br />
All images, related video, and locations associated with<br />
the search are digitally stamped and can be saved or<br />
shared among law enforcement agencies for use in<br />
investigations and prosecution. <strong>The</strong> adoption <strong>of</strong> Suspect<br />
Search builds on and integrates with SAMMC’s existing<br />
NiceVision video surveillance solution, which has been<br />
used to investigate incidents related to patient safety<br />
and well-being. Now, the combined solution helps<br />
SAMMC teams locate and track persons <strong>of</strong> interest in<br />
a matter <strong>of</strong> seconds and amidst hours <strong>of</strong> footage. <strong>The</strong><br />
combined security program enables SAMMC benefits<br />
such as accelerated response times; contained impact<br />
<strong>of</strong> potential criminal or harmful activity; reduction in<br />
shutdown times and the associated negative impact on<br />
patient care.<br />
* Violent crimes at hospitals on the rise: Over 200 infant<br />
abductions documented from hospitals and other locations<br />
When Hospital Safeguards Against Drug <strong>The</strong>ft Aren’t Enough<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.bamc.amedd.army.mil/sammc.asp<br />
Link to additional information on product,<br />
service or program, with brief description:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.qognify.com/suspect-search-next-generation-video-analytics/<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Hagar Lev, Marketing Director<br />
Qognify<br />
Nominating contact’s <strong>of</strong>fice telephone and cell<br />
phone:<br />
––––––––––––––––––––––––––––––––––––––––<br />
<strong>of</strong>fice: +49 (0) 69 97 17 738<br />
cell: +49 (0) 171 1637-667<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
hagar.lev@qognify.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
461 From Rd<br />
Paramus, NJ 07652<br />
United States<br />
(C/O Steve Maron, @ NICE Systems Inc.)<br />
121
<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
Most Notable Law Enforcement Interdiction, Arrest, Counter Terrorism<br />
or Crime Prevention Program – Federal/State or Local<br />
Memphis Police Department<br />
<strong>2015</strong> Winner<br />
<strong>Awards</strong> Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Law Enforcement Interdiction, Arrest,<br />
Counter Terrorism or Crime Prevention Program<br />
Name <strong>of</strong> Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Memphis Police Department<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Memphis, a city with a rich history <strong>of</strong> creative and trailblazing<br />
American icons, has captured the city’s creative<br />
spirit in crime prevention as well. <strong>The</strong> Memphis Police<br />
Department is using a combination <strong>of</strong> traditional and<br />
unconventional video surveillance to protect the city’s<br />
citizens and critical infrastructure. MPD has established<br />
a network <strong>of</strong> about 600 surveillance cameras throughout<br />
the city. Many <strong>of</strong> these cameras have smart features<br />
such as line crossing and intrusion detection to make<br />
surveillance more effective. <strong>The</strong>se features can send<br />
alerts to the police when someone enters or leaves a<br />
designated area. Live footage flows back to the MPD<br />
Real Time Crime Center (RTCC). <strong>The</strong> RTCC is a sophisticated<br />
way for the city to fight crime. It features a large<br />
video wall that can pull up live streams from surveil-<br />
lance cameras throughout the city, as well as unique<br />
s<strong>of</strong>tware that provides instant information on recent<br />
criminal activity in a radius around a crime, existing<br />
crime patterns in the surrounding area, and a history<br />
<strong>of</strong> people with arrest records who may frequent the<br />
neighborhood. MPD has also invested in mobile trailers<br />
that are each equipped with two cameras. <strong>The</strong>se trailers,<br />
powered by generators or solar energy, monitor parking<br />
lots, malls, and special events. Officers in the RTCC<br />
can monitor events live and respond as needed. Another<br />
fascinating element <strong>of</strong> this crime prevention program<br />
is a gunshot detection feature that works in tandem<br />
with the PTZ (pan, tilt, zoom) cameras. A circuit board<br />
is programmed to listen for gunshots and essentially<br />
filters out all other noise. Microphones atop the enclo-<br />
122
sure pick up any possible gunshot sounds, and if those<br />
sounds are heard, the detector triangulates the location<br />
<strong>of</strong> the shot. It then guides the camera to pan, tilt, and<br />
zoom in the direction <strong>of</strong> the gunshot within seconds.<br />
Many cameras are placed on utility poles in unique, patented<br />
enclosures that house the cameras and all <strong>of</strong> their<br />
related equipment: a DVR or NVR, an encoder, a power<br />
supply, and a router. A flashing blue light — a nod to<br />
a police car’s light bar on the ro<strong>of</strong> — is placed on the<br />
enclosure as a finishing touch. <strong>The</strong>se units are peppered<br />
throughout the city, from Beale Street to the ports and<br />
many areas in between. To further protect police force<br />
and sensitive operations, a local wifi system is employed<br />
that enables <strong>of</strong>ficers to pull up to an enclosure, connect<br />
to the network, and discreetly pull data without even<br />
exiting the car. Not only is the department receiving a<br />
lot <strong>of</strong> positive feedback on its crime prevention efforts,<br />
but the cameras have become an instrumental tool in<br />
catching criminals — MPD has several cases prosecuted<br />
each week thanks to incidents being captured on video.<br />
Plus, the police are able to dispatch calls from the RTCC<br />
and view live video before the <strong>of</strong>ficer even arrives on the<br />
scene. From gunshot detection to the video evidence<br />
used in prosecutions, it’s clear that MPD’s crime prevention<br />
program has made a measurable impact on public<br />
safety.<br />
Link to Web Page <strong>of</strong> Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.memphispolice.org<br />
Name and organization <strong>of</strong> nominating<br />
contact for this entry, including name, title,<br />
organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Anna Boudinot, Content Manager<br />
Hikvision USA<br />
Nominating contact’s email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
anna.boudinot@hikvision.com<br />
Address <strong>of</strong> nominating contact’s organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
908 Canada Court<br />
City <strong>of</strong> Industry, CA 91748<br />
123
<strong>The</strong> News Leader in Physical, IT and Homeland Security<br />
CEO/Editorial Director:<br />
Adrian Courtenay<br />
(O) 212-344-0759, X3<br />
(C) 917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Publisher:<br />
Michael Madsen<br />
(O) 212-344-0759, X1<br />
(C) 732-233-8119<br />
mmadsen@gsnmagazine.com<br />
Senior Writer:<br />
Steve Bittenbender<br />
(C) 502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Senior Writer:<br />
Karen Ferrick-Roman<br />
(C) 412-671-1456<br />
karenferrickroman@gmail.com<br />
Columnist:<br />
John Convy<br />
Convy on Netcentric Security<br />
john@convyassociates.com<br />
Columnist:<br />
Shawn Campbell<br />
shawncampbell@safenetat.com<br />
Guest Expert Contributor:<br />
Denise Rucker Krepp<br />
(C) 202-546-2533<br />
kdrkrepp@hotmail.com<br />
Art Director:<br />
Gerry O’Hara<br />
OHDesign3<br />
(C) 203-249-0626<br />
gerry@ohd3.com<br />
Production Director:<br />
Tammy Waitt<br />
(O) 732-233-0245<br />
twaitt@gsnmagazine.com<br />
Mailing Address:<br />
Government Security News<br />
P.O. Box 7608<br />
Greenwich, CT 06836<br />
Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />
six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />
Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing <strong>of</strong>fices. POSTMASTER: Send address<br />
changes to <strong>GSN</strong>: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />
decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />
<strong>GSN</strong>: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />
foreign subscribers are charged $140 International Airmail. Copyright 2016 by <strong>GSN</strong>: Government Security News. All rights reserved.<br />
Printed in the U.S.A. <strong>GSN</strong>: Government Security News assumes responsibility for validity <strong>of</strong> claims in items reported.<br />
126