2016_HSA_Yrbk_YUMPU_r2___
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
The GSN<br />
<strong>2016</strong> Digital Yearbook<br />
OF<br />
Homeland Security<br />
Awards
The GSN <strong>2016</strong> Homeland Security Awards
The GSN <strong>2016</strong> Homeland Security Awards<br />
Chuck Brooks, the Distinguished Judge of<br />
GSN’s <strong>2016</strong> Homeland Security Awards, agrees with<br />
the analysts now saying say that we are heading<br />
for a Fourth Industrial Revolution<br />
GSN: Chuck, thank you again for judging our<br />
most recent and very successful awards event.<br />
It was my real pleasure. Each year I am more<br />
and more impressed with the capabilities of the<br />
company submissions for best solutions. They<br />
are all top notch and at the innovative edge<br />
of security technologies. It also reassuring to<br />
review many of the new technologies being utilized<br />
across the physical and cyber spectrums<br />
for securing the homeland.<br />
GSN: Speaking of technologies, much is<br />
happening in the world emerging technologies.<br />
What are your quick thoughts as a subject<br />
matter expert on our new tech era?<br />
In my role of Chairman of CompTIA’s New and<br />
Emerging Technology Committee I get a window<br />
on what advancement is<br />
happening in both the public<br />
and private sectors. Many<br />
analysts are now saying we<br />
are entering a Fourth Industrial<br />
Revolution. I concur,<br />
these emerging technologies Chuck Brooks<br />
are already impacting how<br />
we live and work. With the advent of artificial<br />
intelligence, robotics, quantum computing, the<br />
Internet of Things, augmented reality, materials<br />
science, 3-D Printing, and data analytics the<br />
near future will be really exciting. We are living<br />
in an era where innovation, agility and imagination<br />
are all essential in order to keep pace<br />
with exponential technological transformation<br />
taking place. It is easy to imagine potential<br />
applications for new technologies. For example<br />
4
some of the applied verticals in homeland security<br />
where I see emerging technologies applied<br />
in the next few years include:<br />
• Enhanced Surveillance (chemical and bio<br />
sensors, cameras, drones)<br />
• Improved facial recognition and License<br />
plate readers<br />
• New Non-lethal technologies<br />
• Counter terrorism and law enforcement<br />
informatics via predictive analytics and<br />
artificial intelligence<br />
• Advanced Forensics via materials science<br />
and supercomputing<br />
• Interoperable communications,<br />
geo-fencing, and situational awareness<br />
• Biometrics: assured identity security<br />
screening by bio-signature: Every aspect<br />
of your physiology can be used as a<br />
bio-signature. Measure unique heart/pulse<br />
rates, electrocardiogram sensor, blood<br />
oximetry, skin temperature<br />
• Automated cybersecurity and information<br />
assurance<br />
• Robotic Policing<br />
That is my own future homeland security short<br />
list. However, even with new and exciting<br />
emerging technologies in the pipeline the new<br />
digital landscape of connectivity also brings<br />
a new and wide array of vulnerabilities and<br />
threats.<br />
GSN: What vulnerabilities and threats do you see<br />
associated with these new technologies and<br />
what will be government’s role in mitigating the<br />
threats?<br />
There is a security component to almost anything<br />
technology related. The connectivity of<br />
technologies, especially to the internet, makes<br />
everyone and everything a target of cyber intrusion.<br />
A good example is the Internet of Things<br />
(IoT). IOT refers to the emerging connectivity<br />
of embedded devices to the Internet. It is<br />
estimated that there will be as between 25 to<br />
65 billon connected Internet devices by 2020<br />
(depending on who you cite). The commercial<br />
and governmental IOT “landscape of sensors”<br />
is becoming more exponential and complex by<br />
the moment. Cybersecurity for the connected<br />
IP enabled smart devices, from phishing, malware,<br />
ransomware, and denial of service attacks<br />
Continued on next page<br />
5
The GSN <strong>2016</strong> Homeland Security Awards<br />
is becoming more of a priority with each passing<br />
day. The breaches are already happening in<br />
both the public and private sectors.<br />
GSN: What are your thoughts on the incoming<br />
Administration on homeland security issues?<br />
I think that the appointment of General John<br />
Kelly at DHS is an excellent one. He has the<br />
integrity, dedication, and amazing leadership<br />
skills need for the role of Secretary of Homeland<br />
Security. He has always been admire by<br />
those who serve under him and I know he<br />
will be well received by the law enforcement<br />
community. I like the fact that he has stressed<br />
cybersecurity and protecting the electric grid<br />
during his confirmation hearings. Also, the appointments<br />
of Tom Bossert as Homeland Security<br />
Advisor and former Mayor Rudy Giuliani<br />
to bring in expertise from the private sector on<br />
cyber tech and applications bodes well.<br />
In terms of across government mitigation efforts,<br />
cybersecurity continues to be a lead focus<br />
in the Department of Homeland Security’s<br />
(DHS) growing role as the leading civilian agency<br />
for protecting government agency networks<br />
and in coordinating and collaborating with the<br />
private sector. The Department of Homeland<br />
Security (DHS) is likely to continue to expand<br />
that role in the new Administration.<br />
Lt. Gen. H. R. McMaster, President Trump’s<br />
choice for national security adviser, is seasoned<br />
with a strong expertise on national security<br />
threats. On the Department of Defense (DOD)<br />
Community side, General James Mattis, who<br />
brings 41-years of Marine Corps experience,<br />
is another excellent appointment. He simply<br />
gets things done and he will provide exceptional<br />
leadership and resources, especially for<br />
the warfighter. I also like the appointments of<br />
Retired Senator Dan Coats of Indiana as Director<br />
of National Intelligence, and Congressman<br />
Mike Pompeo as Director of the CIA. Both are<br />
respected by their colleagues and have deep<br />
legislative oversight experience on national<br />
security issues. They bring the necessary leadership<br />
qualities to meet geopolitical challenges<br />
that require sharing of information, threat intelligence,<br />
technologies, and working with multiagency<br />
task forces.<br />
Although parameters and specifics of the mis-<br />
6
sions at DOD and in the Intelligence communities<br />
differ from DHS, there still needs to be a<br />
collaborative effort for protecting the homeland<br />
domestically and abroad, especially with<br />
cybersecurity. I think that the new Administration<br />
has assembled a very strong and capable<br />
security leadership team.<br />
GSN: Can you update us on your social media<br />
and thought leadership activities?<br />
Yes, last year I was selected by LinkedIn as<br />
“One of the Top 5 People to Follow On LinkedIn”<br />
by LinkedIn (I was named #2). I now<br />
have around 32,000 first degree followers on<br />
LinkedIn and manage or own 12 LI groups<br />
(mostly dealing with tech and security issues). I<br />
am also active on Twitter nearing 4,500 followers<br />
(please follow me @ChuckDBrooks) and<br />
on Facebook. As you all know, social media<br />
has become part of the digital fabric of how we<br />
communicate, operate, and conduct business<br />
in and out of government.<br />
In the recent months I have published over 100<br />
articles blogs. My topic areas have included<br />
homeland security, cyber security, defense,<br />
CBRNE, IT, R & D, science & technology,<br />
public/private partnerships, IoT, innovation.<br />
In addition to Government Security News, I<br />
have been published in FORBES, Huffington<br />
Post, InformationWeek, MIT Sloan Blog, Computerworld,<br />
Federal Times, NextGov, Cygnus<br />
Security Media, Homeland Security Today,<br />
The Hill, Biometric Update, CIO Water Cooler,<br />
Government Executive, Bizcatalyst360, Brink,<br />
IT Security Planet, Christian Science Monitor,<br />
and others.<br />
I have also been very active on the speaking<br />
circuit at a variety of conferences and events<br />
at Universities and forums over the past year.<br />
A couple of highlight; a few months back I<br />
presented at a workshop sponsored by The<br />
National Academies of Sciences, Engineering,<br />
and Medicine and the Federal Bureau of<br />
Investigation on Securing Life Sciences Data.<br />
I also spoke at George Washington University<br />
event about the Cyber Threat Spectrum along<br />
with co-panelists John Perren, former Assistant<br />
Director, FBI’s Weapons of Mass Destruction<br />
Directorate, and Lieutenant Colonel Scott<br />
Applegate, Strategic Planner, J5, Cyber Policy<br />
Continued on next page<br />
7
The GSN <strong>2016</strong> Homeland Security Awards<br />
Division, Joint Chiefs of Staff. I will be participating<br />
soon at USTRANSCOM Senior Leader<br />
Cyber Security Roundtable that will include<br />
Admiral Michael S. Rogers, who serves as the<br />
U.S. Cyber Commander, Director of the National<br />
Security Agency, and Chief of the Central<br />
Security Service.<br />
As always, thank you for speaking to me and<br />
letting me share my perspectives. GSN serves<br />
as an excellent media resource for all those<br />
active in the homeland security, cybersecurity,<br />
and national security fields. I strongly encourage<br />
others to become regular readers of your<br />
publication online and in print.<br />
About Chuck: Chuck Brooks is Vice President<br />
of Government Relations & Marketing for<br />
Sutherland Government Solutions. He has an<br />
extensive policy and technology background<br />
both in the public and private sectors. In government,<br />
Chuck has served at The Department<br />
of Homeland Security (DHS) in legislative<br />
leadership roles at The Science & Technology<br />
Directorate, the Domestic Nuclear Defense<br />
Organization, and FEMA (on detail during<br />
Hurricane Katrina). He served as a top Advisor<br />
to the late Senator Arlen Specter on Capitol<br />
Hill covering security and technology issues<br />
on Capitol Hill. He currently serves as subject<br />
Matter Expert to The Homeland Defense and<br />
Security Information Analysis Center (HDIAC),<br />
a Department of Defense (DOD) sponsored<br />
organization through the Defense Technical<br />
Information Center (DTIC). He also served in<br />
law enforcement as an Auxiliary Police Officer<br />
for Arlington, Virginia. In industry, Chuck was<br />
a Technology Partner Advisor to the Bill and<br />
Melinda Gates Foundation and he currently sits<br />
on the advisory boards of several corporations<br />
and organizations involved in cybersecurity and<br />
homeland security, including the Safe America<br />
8
Foundation. In academia, Chuck was an Adjunct<br />
Faculty Member at Johns Hopkins University<br />
where he taught a graduate course on<br />
homeland security for two years. He has an MA<br />
in International relations from the University of<br />
Chicago, a BA in Political Science from DePauw<br />
University, and a Certificate in International<br />
Law from The Hague Academy of International<br />
Law. Chuck is well recognized as a thought<br />
leader and subject matter expert on Cybersecurity,<br />
homeland security, and emerging technologies.<br />
In <strong>2016</strong>, he was named “Cybersecurity<br />
Marketer of the Year by the Cybersecurity<br />
Excellence Awards. LinkedIn named Chuck<br />
as one of “The Top 5 Tech People to Follow<br />
on LinkedIn” out of their 450 million members.<br />
Chuck has published dozens of articles<br />
in publications such as Forbes, Federal Times,<br />
Computer World, The Hill, Huffington Post,<br />
Government Technology, InformationWeek,<br />
and of course Government Security News on<br />
the technology and security topics. He is also<br />
a select “Passcode Influencer” for the Christian<br />
Science Monitor on information security issues.<br />
Chuck is a frequent speaker at conferences and<br />
events and his professional industry affiliations<br />
include being the Chairman of CompTIA’s New<br />
and Emerging Technology Committee, and as a<br />
member of The AFCEA Cybersecurity Committee.<br />
Chuck has also served as a judge for five<br />
Government Security News industry homeland<br />
security awards events.<br />
9
The GSN <strong>2016</strong> Homeland Security Awards<br />
Category #1: Vendors of IT and Cybersecurity Products and Solutions<br />
Judging in this category is based on a combination of:<br />
• Increase in client organization’s security<br />
• Technological innovation or improvement<br />
• Filling a recognized government IT security need<br />
• Flexibility of solution to meet current and future organizational needs<br />
Best User & Entity Behavior<br />
Analytics (UEBA) Solution<br />
Amplivox - Finalist<br />
Identive - Finalist<br />
Inmarsat - Winner<br />
FLIR - Finalist<br />
Rave Mobile Security – Finalist<br />
Gurucul - Winner<br />
Best Industrial<br />
Cybersecurity Solution<br />
Aperio - Winner<br />
Claroty - Finalist<br />
Darktrace - Winner<br />
Indegy - Winner<br />
Best Application Security Solution<br />
Waratec - Winner<br />
Best Multifactor Authentication Solution<br />
No entries<br />
10<br />
Best Anti-Malware Solution<br />
Blue Ridge - Winner<br />
Bromium - Winner<br />
Passages - Finalist<br />
Best Identity Management Platform<br />
Centrify - Winner<br />
Forum Systems - Finalist<br />
HID Global - Winner<br />
Best Enterprise File Solution<br />
No entries<br />
Best Compliance/Vulnerability<br />
Assessment Solution<br />
Netwrix Corporation - Finalist<br />
Risk Vision - Finalist<br />
Solar Winds - Winner<br />
Wombat - Finalist
Best Cyber Operational Risk Intelligence<br />
Red Seal - Winner<br />
Best Data Security/Loss Management Solution<br />
Spiron - Winner<br />
Best Email Security and Integrity Solution<br />
Wombat Security Technologies - Winner<br />
Best Endpoint Detection and Response Solution<br />
Bromium - Winner<br />
illusive networks - Winner<br />
Tychon - Finalist<br />
Best Forensic Software<br />
No Entries<br />
Best Big Data Analytics Solution<br />
Securiport - Winner<br />
Best Threat Intelligence Solution<br />
Securiport - Winner<br />
ViaSat - Finalist<br />
Best Network Security/Enterprise Firewall<br />
Forcepoint - Winner<br />
ViaSat – Finalist<br />
Best Physical Logical Privileged<br />
Access Management Solution<br />
Beyond Trust - Winner<br />
Centrify Corporation - Finalist<br />
EKUSA - Finalist<br />
Forum Systems - Finalist<br />
Identive - Winner<br />
Best Continuous Monitoring<br />
and Mitigation Solution<br />
Cyber Ark – Winner<br />
Darktrace - Winner<br />
Netwrix - Finalist<br />
Passages - Finalist<br />
Securiport - Finalist<br />
Solar Winds Worldwide - Finalist<br />
Best Security Incident & Event<br />
Management (SIEM) Solution<br />
Cyber Ark - Finalist<br />
Netwrix - Winner<br />
Solar Winds Worldwide - Winner<br />
Best Security Infrastructure Orchestration<br />
Phantom - Winner<br />
Best Server Security Solution<br />
BlueRidge - Winner<br />
11
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Indegy<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Industrial Cybersecurity Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Indegy has developed a cyber security platform that<br />
protects Industrial Control Systems (ICS)/ SCADA used<br />
in critical infrastructures (energy, water utilities, petrochemical<br />
plants, manufacturing facilities, etc.) by providing<br />
comprehensive visibility into the control-plane<br />
engineering activities of Operational Technology (OT)<br />
networks.<br />
By detecting unauthorized access and logic changes<br />
made to process controllers like PLCs, RTUs and DCS<br />
that are used to manage the lifecycle of industrial processes,<br />
Indegy identifies threats that place the safety,<br />
reliability and security of ICS systems at risk. Indegy provides<br />
advanced protection against cyber attacks, insider<br />
threats and human error.<br />
Contrary to popular belief, it is not difficult to attack<br />
ICS networks. Any second year engineering student with<br />
a basic understanding of industrial control systems has<br />
the requisite knowledge.<br />
However, while easy to attack, ICS networks are<br />
difficult to defend. First, ICS networks are inherently<br />
different than IT environments. They were designed<br />
and implemented decades ago, before the cyber threat<br />
existed, and therefore lack basic security mechanisms<br />
found in IT networks, such as authentication, encryption<br />
or logging capabilities. Many are poorly protected<br />
by “Air Gaps”, which are meaningless in today’s Internetconnected<br />
environments.<br />
Second, ICS devices and applications are rarely<br />
patched due to concerns over stability, disruptions and<br />
production downtime.<br />
Third, the communications in ICS networks are very<br />
different that those in IT networks. While application<br />
data and physical measurements are communicated<br />
over known and standardized industrial protocols like<br />
12
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.indegy.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
A short video depicting the technology:<br />
https://www.youtube.com/watch?v=xsK-1XnUVr4<br />
MODBUS, PROFINET, DNP3 and others, engineering<br />
activities used for programing PLCs, RTUs and DCSs are<br />
carried over proprietary, vendor-specific, and largely<br />
undocumented protocols. This includes all controller<br />
logic updates, configuration changes and firmware<br />
uploads/downloads, use vendor-specific protocols. If we<br />
would compare it to IT networks, these activities would<br />
be called privileged activities. Only that in ICS networks<br />
there are no controls to restrict these activities to privileged<br />
users or monitor them.<br />
Current IT cyber security solutions do not have the<br />
appropriate technology to monitor these proprietary<br />
vendor specific protocols and the engineering activities<br />
that can indicate cyber attacks, identify malicious insiders<br />
or detect human error.<br />
The Indegy Industrial Cyber Security Platform is natively<br />
designed for ICS networks and is the only cyber<br />
security platform capable of providing comprehensive<br />
visibility into the control-plane engineering activities of<br />
OT networks, covering both network activity and direct<br />
physical access to critical assets. As a result of extensive<br />
research by Indegy’s R&D labs, the depth of the<br />
platform’s deep packet inspection (DPI) engine and its<br />
ability to parse in real-time all engineering-level activi-<br />
Continued on next page<br />
“Attacks on industrial control and supervisory control and data<br />
acquisition (SCADA) systems is a continuing problem hanging<br />
over critical infrastructure like power grids and water supplies.<br />
Its appliances protect deployed SCADA devices that may be too<br />
numerous to replace with more secure ones. By monitoring to<br />
find alterations in the control planes of SCADA devices Indegy<br />
can discover potential changes to their programmable logic<br />
controllers that may indicate attacks. This can help discover<br />
threats before they are carried out to older systems lacking<br />
defenses.” – Tim Greene, Senior Editor, Network World<br />
http://www.networkworld.com/article/3080097/security/hot-security-startups-to-watch.html<br />
In Dark Reading, Indegy CEO Barak Perelman explains the<br />
threats to critical infrastructure, “And Now, A Cyber Arms Race<br />
Towards Critical Infrastructure Attacks”<br />
http://www.darkreading.com/attacks-breaches/andnow-a-cyber-arms-race-towards-critical-infrastructure-attacks/a/d-id/1323225?<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Marc Gendron, President<br />
Marc Gendron Public Relations<br />
office: 781-237-0341<br />
cell: 617-877-7480<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
marc@mgpr.net<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Marc Gendron Public Relations<br />
190 Lower County Road<br />
W. Harwich, MA 02671<br />
13
ties carried over proprietary control-plane protocols<br />
is unavailable from any other industrial cyber security<br />
solution on the market.<br />
Indegy monitors all ICS network activity with a<br />
unique focus on proprietary control-plane protocols,<br />
and provides critical real-time visibility into controller<br />
logic changes, configuration changes, firmware uploads<br />
and downloads and controller state. The Indegy platform<br />
enables ICS engineers and security staff to quickly<br />
pinpoint the source of problems with details about the<br />
who, what, when, where and how. It enable effective<br />
response to incidents before damage occurs and minimizes<br />
operational disruptions.<br />
Further, the Indegy platform’s ability to automatically<br />
detect assets in the ICS network and capture a full image<br />
of those devices enables it not only to monitor their<br />
integrity but also supports backup and recovery, allowing<br />
security staff to quickly restore problematic devices<br />
and shorten recovery time. The Indegy industrial cyber<br />
security platform is non-intrusive, agentless, and its DPI<br />
captures all proprietary, vendor specific control-plane<br />
activity, including access to controllers (PLCs, RTUS,<br />
DCSs) or changes in controller state, logic, configuration<br />
settings, firmware uploads/downloads, etc. To eliminate<br />
cyber security blind spots, Indegy detects all ICS<br />
changes, regardless of whether they are performed over<br />
the network or directly on the physical devices.<br />
The Indegy platform generates policy-based real-time<br />
security alerts that allow ICS engineers and security staff<br />
to quickly pinpoint the source of problems and effectively<br />
respond to prevent operational disruptions and<br />
physical damage that could occur from cyber attacks, insider<br />
threats and human error. Indegy includes built-in<br />
applications for automated asset management, configuration<br />
control, policy enforcement, risk analysis.<br />
For the first time in industrial networks, Indegy provides<br />
OT administrators with a long-desired, comprehensive<br />
audit trail. The platform automatically discovers<br />
all controllers and devices on ICS networks and<br />
routinely validates their integrity ensuring no logic,<br />
firmware version and configuration to identify any<br />
unauthorized or unintended changes take place. It is<br />
delivered as a turn-key network appliance, and supports<br />
seamless integration with third party software<br />
including SIEM, configuration management databases<br />
(CMDB) and other applications through an easy to use<br />
RESTFul API.<br />
Indegy combines a unique mix of cyber-security<br />
expertise with hands-on industrial control knowledge.<br />
The company’s leadership and R&D team consists of<br />
veterans from the Talpiot military academic program<br />
and the elite 8200 intelligence unit of the Israel Defence<br />
Forces. This background and expertise is the<br />
foundation on which Indegy delivers cutting edge<br />
technologies for securing ICS environments.<br />
Indegy announced the general availability of its<br />
industrial cyber security platform in February <strong>2016</strong>.<br />
It currently has customers in the US, Europe and<br />
Israel (where its R&D lab is based) and the product is<br />
deployed in live production environments. Indegy’s<br />
customers include a number of critical infrastructure<br />
utilities (power, gas, water), a global pharmaceutical<br />
firm, a petrochemical plant, a Fortune 50 technology<br />
manufacturer, and more.<br />
Indeg y has already received several awards:<br />
• Best Next Gen ICS/SCADA Security Solution<br />
from Cyber Defense Magazine<br />
• <strong>2016</strong> TiE50 Winner, one of the 10 Most<br />
Promising Cyber Security Startups by<br />
Forbes Israel<br />
• Network World Hot Security Startup to Watch<br />
14
15
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Beyond Trust<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Privileged Access Management Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Retina CS Enterprise Vulnerability Management<br />
With its actionable reporting capabilities, advanced<br />
threat analytics, centralized data warehouse, zero-gap<br />
coverage, and tight integrations with 3rd party solutions,<br />
Retina’s results-driven architecture works with<br />
government users to proactively discover what’s connected<br />
to their networks, put context around what<br />
systems and applications are most at risk, streamline<br />
remediation, track threats over time, and communicate<br />
progress to various stakeholders across their agencies.<br />
The following is just a sample of the key capabilities<br />
offered by Retina CS:<br />
Threat and Behavioral Analytics:<br />
• Correlates privilege, vulnerability and threat data<br />
from a variety of BeyondTrust and third-party<br />
solutions<br />
• Aggregate users and asset data to centrally base<br />
line and track behavior<br />
• Assign threat levels to events from various<br />
BeyondTrust and 3rd party data sources, based on<br />
scoring, malware, exploit research, exploit data<br />
bases, exploitability indices, CVSS, and more<br />
• Measure the velocity of asset changes to flag<br />
in-progress threats<br />
• Isolate users and assets exhibiting deviant<br />
behavior and report on outliers and risks<br />
Actionable Reporting:<br />
• Over 270 standard reports and pivot grid<br />
capabilities for custom reports<br />
• Maps vulnerabilities and misconfigurations to<br />
DISA Gold Disk, FDCC, NIST, USGCB, and many<br />
16
more regulatory frameworks<br />
• Risk Matrices and Heat Maps pinpoint vulnerabili<br />
ties with known exploits in the wild<br />
• Threat Analyzers measure remediation results<br />
before you do the work<br />
• Vulnerability and Compliance Scorecards and<br />
SLAs measure remediation and mitigation<br />
response times in the context of business risk<br />
BeyondInsight Risk Management Platform:<br />
• Reporting and analytics engine for Retina CS,<br />
provides a single, contextual lens through which<br />
to view user and asset risk<br />
• Group, assess, & report on assets by OS, domain,<br />
applications, function, vulnerabilities, and more<br />
• Built-in workflow, ticketing, and notification<br />
• Dozens of certified integrations with SIEM,<br />
GRC, NMS solutions, and more<br />
• Correlates McAfee, Qualys, Rapid7,<br />
Tenable, and Tripwire vulnerability<br />
scan data<br />
Vulnerability and Privilege Integration:<br />
• Control application access based on its<br />
known vulnerabilities, as well as their age,<br />
potential risk, and impact on regulatory<br />
compliance<br />
• Use application usage information to help<br />
prioritize which vulnerabilities to focus on<br />
Vulnerability Assessment:<br />
• Smart Credentials automatically scan targets using<br />
the highest level privilege credentials<br />
• Host-Based scanning closes security gaps<br />
created by cloud and virtual environments, and<br />
mobile devices<br />
• Cloud/Virtual scanning of Amazon, Azure,<br />
Hyper-V, VMware, and more.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.beyondtrust.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
ttps://www.beyondtrust.com/wp-content/uploads/<br />
ds-retina-cs.pdf?1453837501<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Mike Bradshaw, Partner<br />
Connect Marketing<br />
office: 801-373-7888<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Connect Marketing<br />
881 W. State Street<br />
Pleasant Grove, UT 84062<br />
BeyondTrust is proud of the fact that hundreds<br />
of U.S. Federal departments and agencies rely daily<br />
on Retina CS and are honored to have been selected by<br />
the Department of Homeland Security CDM program as<br />
its Vulnerability Management solution. BeyondTrust’s<br />
commitment to serving the U.S. government, and<br />
government-related organizations, starts with its compliance<br />
support for strategic cybersecurity mandates such<br />
as FISMA, CSIP, and the DoD Cybersecurity Culture and<br />
Compliance Initiative. This also includes the continuous<br />
monitoring and command and control capabilities made<br />
possible by Retina CS and its BeyondInsight platform,<br />
delivering unsurpassed analytics and intelligence to its<br />
end users.<br />
17
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Phantom<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Security Infrastructure Orchestration<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Recent research shows cyber teams struggle to identify<br />
and manage security alerts where remediation times<br />
may require hours of analysts’ time on teams already<br />
strapped for talent and resources.<br />
Organizations like the Department of Homeland Security<br />
and NSA talk of environments with security traffic<br />
exceeding 1 billion alerts per day - even after reducing<br />
the load to 1 million alerts per day with correlation and<br />
other tools, more than 20,000 human analysts would be<br />
needed to respond.<br />
Automation and orchestration solutions for incident<br />
response and threat defense operations are quickly<br />
emerging as “must have” technologies to increase<br />
response effectiveness, reduce costs, and ultimately<br />
achieve cyber resiliency.<br />
Phantom, the first company to provide an open, extensible,<br />
and community-powered security automation<br />
and orchestration platform, has extended its lead since<br />
entering the market and being named RSA Conference<br />
<strong>2016</strong>’s Most Innovative Startup earlier this year.<br />
The Phantom platform executes digital playbooks<br />
to automate and orchestrate the security technologies<br />
organizations already have in place. This layer of “connective<br />
tissue” allows users to achieve in seconds what<br />
would normally take hours to accomplish with the<br />
dozens of independent point products in their environment.<br />
As further validation of Phantom’s leadership, In-Q-<br />
Tel made a strategic investment earlier this year, and<br />
SINET tapped Phantom as one of the most innovative<br />
security technologies for <strong>2016</strong>.<br />
Phantom is actively involved in the Federal research<br />
community with projects like Integrated Adaptive Cyber<br />
Defense (IACD) along with the Department of Home-<br />
18
land Security (DHS), the National Security Agency’s Information<br />
Assurance Directorate (NSA/IAD), and Johns<br />
Hopkins University Applied Physics Lab (JHU/APL).<br />
IACD is a project intended to “radically shift the mentality<br />
and status quo in cyber defense to secure integration<br />
and automation to enable faster response times and<br />
increase community prevention.”<br />
Phantom also participates in the OpenC2 Forum<br />
chaired by the NSA, which is a group working to develop<br />
a reference architecture that addresses issues pertaining<br />
to security automation command and control.<br />
Booz Allen Hamilton and Phantom have formed a<br />
strategic alliance, fusing Booz Allen’s decades of mission<br />
intelligence and deep expertise architecting and implementing<br />
cyber solutions, with Phantom’s leading security<br />
automation and orchestration technology platform.<br />
Booz Allen delivers its significant cyber knowledge<br />
and proven security operations plans by crafting automation<br />
playbooks for use on Phantom’s platform, incorporating<br />
best practices in Cyber Threat Intelligence,<br />
Incident Response, and Security Operations. These playbooks,<br />
which codify security and business processes,<br />
help leaders break down common organizational siloes<br />
that inhibit collaboration and prevent rapid containment<br />
and resolution of cyber events. The playbooks are<br />
based on Booz Allen’s expertise and decades of defense<br />
and intelligence work with the federal government.<br />
In sum, Phantom is solving one of the biggest challenges<br />
facing the security community today and has<br />
been recognized for leadership and innovation in this<br />
emerging market on several occasions. Their commitment<br />
to federal cybersecurity community though<br />
projects like the IACD and OpenC2 Forum, plus their<br />
partnership with leading firms like Booz Allen Hamilton,<br />
make Phantom an ideal choice for GSN’s Annual Homeland<br />
Security Awards.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.phantom.us/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Booz Allen & Phantom Strategic Partnership Announcement:<br />
http://www.boozallen.com/media-center/pressreleases/<strong>2016</strong>/10/automation-enables-cyber-threatmitigationat-machine-speed--pro<br />
SINET Announces Phantom as One of Most Innovative Security<br />
Technologies in <strong>2016</strong>:<br />
http://www.businesswire.com/news/<br />
home/<strong>2016</strong>0919006353/en/SINET-Announces-16-Innovative-Cybersecurity-Technologies-<strong>2016</strong><br />
In-Q-Tel Announces Strategic Investment in Phantom:<br />
http://www.businesswire.com/news/<br />
home/<strong>2016</strong>0426005147/en<br />
Phantom Named “RSA® Conference <strong>2016</strong>’s Most Innovative<br />
Startup:<br />
http://www.businesswire.com/news/<br />
home/<strong>2016</strong>0301005926/en/Phantom-Named-<br />
%E2%80%9CRSA%C2%AEConference-<br />
<strong>2016</strong>%E2%80%99s-Innovative-Startup%E2%80%9D<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Manpreet Mattu, Director Strategic Ventures<br />
Booz Allen Hamilton<br />
office: 732-718-9812<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Booz Allen Hamilton<br />
8283 Greensboro Dr.<br />
McLean, VA 22102<br />
19
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Centrify Corporation<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Identity Management Platform<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The Centrify Identity Platform protects against the<br />
leading point of attack used in data breaches — compromised<br />
credentials — by securing an organization’s<br />
internal and external users as well as its privileged accounts.<br />
Centrify delivers stronger security, continuous<br />
compliance and enhanced user productivity through<br />
single sign-on, multi-factor authentication (MFA), mobile<br />
and Mac management, privileged access security and<br />
session monitoring.<br />
Centrify offers derived credential authentication<br />
support for secure mobile access to apps, websites and<br />
services that require smart card authentication, opening<br />
the door to full mobility for state and federal government.<br />
Derived credentials allow common access card<br />
(CAC) and personal identity verification (PIV) based<br />
authentication via mobile devices, without requiring<br />
cumbersome, dedicated smart card readers.<br />
Centrify also helps federal organizations comply with<br />
a myriad of regulations. Centrify provides demonstrable<br />
compliance to Federal Information Security Management<br />
Act (FISMA) and best-practice guidance from<br />
agencies such as the Office of Management and Budget<br />
(OMB) and the National Institute of Standards and Technology<br />
(NIST). Below is a list of the federal regulations<br />
Centrify helps government agencies to address:<br />
• FISMA<br />
• HSPD-12<br />
• NIST-800 Series<br />
• OMB<br />
• PCI-DSS<br />
• HIPAA<br />
• CDM<br />
20
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.centrify.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Centrify Identity Platform:<br />
https://www.centrify.com/why-centrify/centrify-identity-platform/<br />
Centrify Solutions for Federal Regulatory Compliance:<br />
https://www.centrify.com/solutions/federal-compliance/regulatory-compliance/<br />
Additionally, Centrify leverages existing infrastructure to<br />
centrally secure and audit heterogeneous systems and<br />
applications. With a single point of administration<br />
for accounts, access controls, privileges and policy for<br />
systems and<br />
workstations, IT managers can implement security<br />
levels appropriate to their individual organization’s<br />
needs and<br />
more easily accomplish the reporting and auditing<br />
tasks required for certification and accreditation of their<br />
processes.<br />
Below are some of the federal certifications and<br />
accreditations Centrify helps government agencies to<br />
address:<br />
• Common Criteria-EAL2+<br />
• SOC II<br />
• FedRAMP<br />
• FIPS-140-2<br />
• DITSCAP<br />
• NIACAP<br />
• FDCC<br />
• DIACAP<br />
This entry deserves to win because Centrify’s platform<br />
helps government organizations control, audit and<br />
Centrify Solutions for Federal Certification and Accreditation:<br />
https://www.centrify.com/solutions/federal-compliance/certifications/<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Jenny Overell, Account Supervisor<br />
Finn Partners<br />
office: 415-249-6778<br />
cell: 925-878-5655<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Finn Partners<br />
101 Montgomery Street #1500<br />
San Francisco, CA 94104<br />
report on access to sensitive data while reducing complexity,<br />
keeping users productive, and addressing the<br />
specific requirements of key federal regulations. Centrify<br />
has an extensive history of delivering data center, cloud<br />
and mobile solutions for the federal market. Centrify is<br />
trusted by over 100 top government agencies, including<br />
the FDA, Raytheon, U.S. Army and U.S. Air Force.<br />
21
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Centrify Corporation<br />
<strong>2016</strong> Finalist<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Privileged Access Management Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
With the constant forward progress of technology and<br />
the major shift to cloud-based systems, government<br />
agencies require a modern approach to managing and<br />
securing privileged accounts. Centrify Privilege Service<br />
(CPS) addresses increasingly hybrid IT environments<br />
of on-premises and cloud-based systems, and closes today’s<br />
growing gap in security, visibility and control over<br />
privileged accounts. CPS provides security for modern<br />
government agencies – where IT is increasingly outside<br />
the firewall – with a secure cloud-based service that is<br />
easy to implement and delivers quick ROI.<br />
CPS is delivered as a modern, multi-tenant cloud<br />
service, available in 15 languages from 10 data centers<br />
across the world and with rich support for mobile<br />
devices. CPS is built on the proven Centrify Identity<br />
Platform, which powers the Centrify Identity Service,<br />
the industry’s first entirely cloud-based solution for<br />
integrated identity, mobility and Mac management. CPS<br />
also complements and extends the broad set of capabili-<br />
ties for identity consolidation, privilege management<br />
and privileged session auditing found in the flagship<br />
Centrify Server Suite by providing shared account<br />
password management for servers, network devices and<br />
Infrastructure-as-a-Service (IaaS).<br />
With CPS, government agencies minimize risks associated<br />
with privileged accounts – that are increasingly<br />
the focus of hackers and malicious insiders – by enforcing<br />
centralized control over who can access shared<br />
credentials. And by leveraging privileged session monitoring<br />
and access reporting, government agencies make<br />
compliance efforts for privileged accounts efficient and<br />
effective. Additionally, government agencies achieve a<br />
future-proofed identity and access management strategy.<br />
CPS offers numerous security capabilities for stake-<br />
22
holders in the IT chain of command. Highlights include<br />
the power to:<br />
• Centrally manage emergency access to all servers<br />
and network devices in break-glass scenarios<br />
• Grant secure, cloud-based access for remote and<br />
outsourced IT staff to servers and network<br />
devices, without giving VPN access to the full<br />
data center<br />
• Secure access to on-premises servers, network<br />
devices and Infrastructure-as-a-Service via bestin-class<br />
resource management, shared password<br />
management and privileged session monitoring<br />
capabilities<br />
This entry deserves to win because CPS is the most<br />
comprehensive and tightly integrated privileged identity<br />
management solution available today. It increases<br />
security, simplifies compliance and spans both cloud<br />
and data center infrastructure. CPS has also been wellreceived<br />
and successfully deployed in numerous government<br />
IT infrastructures. By utilizing a pay-as-you-go<br />
cloud pricing model, CPS implementation<br />
has resulted in dramatically<br />
faster ROI than legacy<br />
systems.<br />
Centrify has an extensive history<br />
of delivering data center,<br />
cloud and mobile solutions for<br />
the federal market. Centrify is<br />
trusted by over 100 top government<br />
agencies, including the<br />
FDA, Raytheon, U.S. Army and<br />
U.S. Air Force.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.centrify.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Centrify Privilege Service product overview:<br />
https://www.centrify.com/products/privilege-service/<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Elise Vue, Senior Account Executive<br />
Finn Partners<br />
office: (415) 249 -6767<br />
cell: (415) 654-8753<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Finn Partners<br />
101 Montgomery Street #1500<br />
San Francisco, CA 94104<br />
23
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
illusive networks<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Endpoint Detection and Response Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
illusive networks’ premise is that “you cannot keep applying<br />
the same approach hoping for a different result”.<br />
It tackles cyber security from a different angle - the<br />
perspective of the attackers. Focusing on the actors of<br />
the attack, rather than just their instruments, it exploits<br />
their vulnerabilities, changing the asymmetry of cyber<br />
warfare.<br />
illusive networks pioneered a new type of defensedeception<br />
based cybersecurity. Its patent pending<br />
Deceptions Everywhere ® technology is a deception<br />
management system (DMS) that neutralizes targeted<br />
attacks and Advanced Persistent Threats (APT). It distributes,<br />
monitors and continuously manages deceptions by<br />
weaving a deceptive layer over the entire network. This<br />
means that every endpoint, server and network component<br />
is coated with deceptions. The moment an attacker<br />
penetrates the network, they are in an ‘illusive’ world<br />
where all the data is unreliable.<br />
Alternative ‘Solutions’<br />
Before Deceptions Everywhere, enterprises were<br />
relying on honeypot vendors. Honeypots have a low<br />
detection rate, high level of false positives, are easily<br />
traceable, hard to deploy and complicated to maintain.<br />
They look for malware, but build passive honeypots that<br />
the attackers may or may not stumble upon.<br />
Illusive’s deceptions change dynamically over time<br />
and best fit the environment. Highly dynamic, scalable<br />
and effective, illusive differs from its competitors:<br />
• identifies and visualizes attack risks before the<br />
attack takes place<br />
• visualizes where deceptions are deployed across<br />
the network<br />
• visualizes incident alert location on a map which<br />
24
draws an entire attack campaign,<br />
• DMS is self contained and does not rely on any<br />
external tools<br />
Deceptions Everywhere technolog y includes:<br />
Attacker View - IT security professionals view their<br />
network from an attacker’s perspective, visualizing<br />
attack paths. Unlike mapping software, it shows attack<br />
vectors found on each machine, and how attackers can<br />
navigate the network to reach critical assets, allowing<br />
security strategies to be adapted to mitigate against attacks.<br />
Advanced Ransomware Guard - Automatically blocks<br />
the ransomware operation at the source hosts, alerts the<br />
defenders and also diverts it to encrypt phony or false<br />
targets. Once ransomware attempts to access a network<br />
or move laterally towards strategic assets, it immediately<br />
detects the specific action, neutralizing the attack immediately<br />
and automatically.<br />
Wire Transfer Guard - The first cyber-deceptiondedicated<br />
solution built to protect financial networks.<br />
It effectively detects, reports on and mitigates targeted<br />
attacks that pose high risk of financial and strategic damage<br />
to financial institutions globally.<br />
Additional benefits:<br />
No more ‘false positive’ alerts - attackers act on false<br />
information, are instantly detected.<br />
Real-time forensics - Actionable breach report provides<br />
real-time forensic information needed to contain<br />
an attack “in its tracks”.<br />
Low total cost of ownership - Users are not aware of<br />
deceptions that are deployed and managed in an agentless,<br />
low-fingerprint manner.<br />
Conclusion<br />
Deceptions Everywhere has detected many advanced<br />
attackers as they tried to move laterally during an APT or<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.illusivenetworks.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
illusive networks recently released the first cyber deception<br />
technology to protect wire transfer networks in financial<br />
institutions. Wire Transfer Guard detects, reports and mitigates<br />
targeted attacks that pose high risk of financial and strategic<br />
damage to financial institutions worldwide.<br />
https://www.illusivenetworks.com/press-releases/<br />
illusive-networks-wire-transfer-guard-first-cyberdeception-technology-protecting-wire-transferbanking-networks-against-advanced-attacks-nowavailable<br />
More information on illusive networks:<br />
https://www.illusivenetworks.com/media-kit<br />
Description:<br />
http://www.<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Shlomo Touboul, CEO<br />
illusive networks<br />
office: Israel: + 972-54-4227780<br />
U.S. cell: 1-248-797-1414<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
illusive networks<br />
7 Tozeret Haaretz St., Tel Aviv, Israel 6789104<br />
and<br />
25 West 36th Street, 11th Floor, New York, NY 10018<br />
Ransomware attack, thereby saving the customers<br />
great losses. The attacker view also showed all the possible<br />
attack vectors - including numerous attack paths<br />
that were hidden to the client - allowing customers to<br />
mitigate immediate risks, demonstrating real return on<br />
investment.<br />
25
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Wombat Security Technologies<br />
<strong>2016</strong> Finalist<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Compliance/Vulnerability Assessment Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Solution: CyberStrength Assessment Tool<br />
Wombat is dedicated to creating the tools businesses<br />
need to educate their employees on best security<br />
practices. CyberStrength is one of these tools. It was<br />
launched in 2013 and has since revolutionized the<br />
concept of employee knowledge assessments, giving<br />
breadth and depth to all areas of a security training program.<br />
The scenario-based CyberStrength format offers a<br />
less invasive way to evaluate knowledge levels and use<br />
that information to plan a cybersecurity education plan<br />
that will be the most effective at managing end-user risk.<br />
CyberStrength is part of the Assess component of<br />
Wombat’s Continuous Training Methodology. Organizations<br />
that have used this cyclical, ongoing approach to<br />
security awareness and training have realized up to a<br />
90% reduction in successful external phishing attacks<br />
and malware infections. Moreover, CyberStrength offers<br />
a library of more than 150 questions in ten categories.<br />
International organizations are able to use translated<br />
content to evaluate employees in their native languages,<br />
and administrators can create custom questions to<br />
assess knowledge of company policies or compliancerelated<br />
issues. In addition, Wombat developed seven<br />
Predefined CyberStrength options to help administrators<br />
streamline the evaluation process. Additionally,<br />
security professionals can automatically assign follow-up<br />
training for end users whose assessment results show a<br />
gap in understanding that could equate to an increased<br />
risk to organizational security.<br />
26
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.wombatsecurity.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.wombatsecurity.com/security-education/security-awareness-knowledge-assessment<br />
YouTube video:<br />
https://www.youtube.com/watch?v=jBnzLGupBG8<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Dasha (Daria) Ivanova, Account Coordinator<br />
SHIFT Communications<br />
office: 512-792-2543<br />
cell: 713-705-0158<br />
CyberStrength is the first tool of its kind. It enables<br />
businesses to create, administer, and analyze the results<br />
of organization-wide cybersecurity knowledge evaluations.<br />
Furthermore, its ability to identify areas of susceptibility<br />
beyond phishing attacks supports Wombat’s<br />
vision of an end-to-end security solution.<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SHIFT Communications<br />
200 E 6th Street, #202<br />
Austin, TX 78701<br />
27
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Wombat Security Technologies<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Email Security and Integrity Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Solution: PhishAlarm Analyzer (software companion<br />
to PhishAlarm, an email analysis tool developed by<br />
Wombat Security Technologies)<br />
Launched in February <strong>2016</strong> and generally available<br />
since July, PhishAlarm Analyzer is a software-based<br />
phishing threat analysis tool that uses machine learning<br />
to identify and prioritize reported phishing emails for<br />
incident response teams. It is a companion to Wombat’s<br />
PhishAlarm email reporting button, which is a component<br />
of the company’s ThreatSim simulated phishing<br />
assessment tool.<br />
One of the main advantages of this tool is the ability<br />
to apply machine learning techniques to identify<br />
potential threats and prioritize reported messages<br />
accordingly. Its rapid identification and categorization<br />
of suspicious messages allows info security officers and<br />
security response teams to isolate and address phishing<br />
emails that have slipped past email filters, including<br />
zero-hour attacks. Another advantage of the tool is the<br />
ability to scan each reported email and establish risk levels<br />
based on data gathered from real-world phishing and<br />
spear phishing attacks. In contrast, competing solutions<br />
28
of this type only consider an end users’ ‘trustworthiness’<br />
and ‘accuracy’ in identifying threats, an approach<br />
that negatively impacts the reliability of results given it<br />
can take months or even years to precisely judge users’<br />
reporting abilities.<br />
PhishAlarm Analyzer helps businesses educate their<br />
employees on best security practices. Key benefits<br />
include rapid scanning, consolidation of email notifications,<br />
multiple implementation options, easy-to-use<br />
references, and targeted routing of reports. PhishAlarm<br />
Analyzer does more than just rank emails and alert response<br />
teams. It also provides an HTML research report<br />
with each categorized message, alerting designated staff<br />
to the sources of the IOCs that are present in the email.<br />
This saves considerable time and effort, and allows security<br />
teams to more effectively manage their resources<br />
and target the most credible and imminent threats<br />
within their email systems.<br />
PhishAlarm Analyzer is a prime example of the advantages<br />
of Wombat’s unique Continuous Training Methodology<br />
allowing infosec officers and security response<br />
teams to isolate and address phishing emails that have<br />
slipped past email filters or unaware end users, including<br />
zero-hour attacks.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.wombatsecurity.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Overview of the product (Blog Post):<br />
https://info.wombatsecurity.com/blog/phishalarmanalyzer-prioritizes-reported-emails-for-faster-remediation<br />
https://www.wombatsecurity.com/security-education/phishalarm-and-analyzer<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Dasha (Daria) Ivanova, Account Coordinator<br />
SHIFT Communications<br />
office: 512-792-2543<br />
cell: 713-705-0158<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SHIFT Communications<br />
200 E 6th Street, #202<br />
Austin, TX 78701<br />
29
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
HID Global<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Identity Management Platform<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
HID Global is the first to enable end-to-end identity access<br />
management solution across both physical and IT<br />
resources. The HID PIV (Personal Identity Verification)<br />
solutions span the full range of identity proofing and<br />
lifecycle management capabilities to establish, create,<br />
use, and manage a secure credential with a simplified<br />
path to compliance. HID PIV leverages the same government-strength<br />
security standards that have already been<br />
deployed to more than seven million people across<br />
the world. Organizations benefit from the ecosystem<br />
created by this large footprint, with many applications,<br />
operating systems, and devices natively supporting PIV<br />
credentials.<br />
This one of a kind solution provides governments<br />
and regulated industries an easy to deploy, multi-factor<br />
authentication solution. It secures access to networks,<br />
cloud applications and facilities to prevent breaches and<br />
achieve compliance with PIV, PIV-I, NIST Level of Assurance<br />
4 (LoA4) and equivalent mandates, policies and<br />
guidelines.<br />
Benefits:<br />
• Comprehensive Security and Trust – HID PIV<br />
leverages existing standards and extends it to<br />
facilities access, systems, networks, and<br />
applications resulting in a better security position.<br />
• Simplified User Experience – By incorporating<br />
more capabilities into a single smart card or USB,<br />
users have fewer credentials to remember in order<br />
to get access to what they need to do their jobs,<br />
and are less likely to circumvent your controls.<br />
• Easier Deployment and Management – The<br />
components of HID PIV are designed to work<br />
seamlessly together, so it is faster to get up and<br />
30
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.hidglobal.com<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Andrea Lloyd, Manager, Corporate Communications<br />
HID Global<br />
office: +1 512 776 9233<br />
cell: +1 512 965 2341<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
alloyd@hidglobal.com<br />
running, and easier to manage over time.<br />
• A Complete System – HID PIV delivers the<br />
entire PIV management process from establishing<br />
identity, to credential creation and issuance,<br />
synchronization of connected systems, and<br />
credential revocation.<br />
HID PIV is available in two options – Enterprise and<br />
Express, which includes the following:<br />
• Flexible identity proofing up to NIST Identity<br />
Assurance Level 3 requirements<br />
• ActivID ® Credential Management System (CMS)<br />
for secure management of credential deployment.<br />
• Smart cards and USB dongles supporting up to<br />
NIST Authenticator Level 3; proximity, iCLASS and<br />
Seos ® combo credential technologies; and ActivID<br />
CMS applets<br />
• Credentials support one time passwords (OTPs),<br />
biometrics data and HID’s IdenTrust digital<br />
certificates used by the US Federal Government<br />
HID PIV Enterprise also includes the company’s Quantum<br />
Secure SAFE platform, a Physical Identity and<br />
Access Management (PIAM) software solution that<br />
provides the bridge between physical and IT security<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
HID Global<br />
611 Center Ridge Drive<br />
Austin, TX 78753<br />
systems. The SAFE Platform augments HID PIV Enterprise<br />
with a variety of convenient, unified access control<br />
capabilities that deliver a more comprehensive view<br />
across otherwise disparate physical access control and<br />
visitor, tenant and contractor management systems,<br />
while also providing valuable reporting and predictive<br />
risk analytics capabilities.<br />
For maximum ease of procurement, deployment<br />
and maintenance, customers can take advantage of the<br />
full HID solution or leverage existing third party components<br />
to maximize existing investments. The HID<br />
PIV solution helps organizations improve their security<br />
posture, comply with mandates, improve the user experience<br />
and is easier to procure, deploy and maintain.<br />
31
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Identiv<br />
<strong>2016</strong> Finalist<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best User & Entity Behavior Analytics (UEBA) Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Federal agencies are feeling pressured to adopt government-wide<br />
Federal Identity, Credential, and Access<br />
Management (FICAM) compliant physical access control<br />
systems (PACS). Identiv’s Hirsch government FICAM<br />
solution offers a true end-to-end HSPD-12 solution that<br />
eliminates the need for expensive third-party credential<br />
management hardware. The net benefit is an overall solution<br />
that is more secure, faster, and less expensive to<br />
deploy and authorize access than first-generation FICAM<br />
solutions.<br />
Identiv’s Hirsch Velocity Certificate Service is compatible<br />
with existing Velocity systems running Velocity 3.6<br />
after application of a feature pack. All existing systems<br />
have the ability to be upgraded through software updates.<br />
Identiv’s Professional Services Group (PSG) can<br />
also provide transition planning support to upgrade<br />
existing systems. FISMA, COOP, and enterprise PACS<br />
solutions are also available.<br />
Identiv’s Secure Network Interface Board 3 (SNIB3)<br />
is an expansion component update for Hirsch Mx and<br />
DIGI*TRAC Controllers. It is a sophisticated, secure<br />
communication device that has dedicated processors to<br />
efficiently handle encryption and management operations.<br />
SNIB3 is used to manage PKI certificate data for<br />
door access as provisioned by Velocity. Using FIPS 140-2<br />
certified encryption technology, SNIB3 serves as the<br />
communication hub from controller to Velocity using a<br />
secure TCP/IP protocol.<br />
Identiv’s RS485 Reader Expansion Board (RREB)<br />
is a unique reader communication device that installs<br />
32
onto the expansion cable of Hirsch Mx and DIGI*TRAC<br />
Controllers and features eight RS-485 communication<br />
ports, capable of supporting 16 readers on eight doors.<br />
The RREB makes it possible to have extremely high data<br />
rates with up to 16 PIV smart card readers while using<br />
Open Supervised Device Protocol (OSDP).<br />
Identiv’s uTrust TS Government Readers are the industry’s<br />
most flexible and secure intelligent door reader<br />
endpoints, enabling agencies to deploy a highly secure<br />
U.S. government FICAM CAK at a fraction of the cost<br />
of competing solutions. ScramblePad and static keypad<br />
models are available. The readers have RS-485 and<br />
Wiegand connections, support PoE power, and can be<br />
configured to support thousands of different card technologies.<br />
Existing uTrust TS Government Readers are<br />
flash upgradeable to enable the FICAM solution without<br />
needing to replace current readers.<br />
In summary, Identiv’s FICAM solution is faster and<br />
less expensive. It provides customers a low-cost, simple<br />
to deploy, secure solution for FICAM compliance. The<br />
time required to upgrade existing Hirsch Velocity PACS<br />
is significantly less than competitor’s solutions, allowing<br />
federal agencies to meet rapidly approaching compliance<br />
deadlines. The time and cost to deploy new systems<br />
or transition from another system is offered at the<br />
same extreme value as other Hirsch solutions.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
identiv.com<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Identiv’s End-to-End Federal Identity, Credential, and Access<br />
Management (FICAM) Solution was developed to implement<br />
a simple, affordable FICAM-compliant solution simply with<br />
optimal performance:<br />
identiv.com/ficam<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Anja Pellegrino, Sr. Content Manager<br />
Identiv<br />
office: 213-910-0043<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
apellegrino@identiv.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Identiv Federal Headquarters<br />
2425 Wilson Blvd., Suite 325<br />
Arlington, VA 22201<br />
33
onto the expansion cable of Hirsch Mx and DIGI*TRAC<br />
Controllers and features eight RS-485 communication<br />
ports, capable of supporting 16 readers on eight doors.<br />
The RREB makes it possible to have extremely high data<br />
rates with up to 16 PIV smart card readers while using<br />
Open Supervised Device Protocol (OSDP).<br />
Identiv’s uTrust TS Government Readers are the industry’s<br />
most flexible and secure intelligent door reader<br />
endpoints, enabling agencies to deploy a highly secure<br />
U.S. government FICAM CAK at a fraction of the cost<br />
of competing solutions. ScramblePad and static keypad<br />
models are available. The readers have RS-485 and<br />
Wiegand connections, support PoE power, and can be<br />
configured to support thousands of different card technologies.<br />
Existing uTrust TS Government Readers are<br />
flash upgradeable to enable the FICAM solution without<br />
needing to replace current readers.<br />
In summary, Identiv’s FICAM solution is faster and<br />
less expensive. It provides customers a low-cost, simple<br />
to deploy, secure solution for FICAM compliance. The<br />
time required to upgrade existing Hirsch Velocity PACS<br />
is significantly less than competitor’s solutions, allowing<br />
federal agencies to meet rapidly approaching compliance<br />
deadlines. The time and cost to deploy new systems<br />
or transition from another system is offered at the<br />
same extreme value as other Hirsch solutions.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
identiv.com<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Identiv’s End-to-End Federal Identity, Credential, and Access<br />
Management (FICAM) Solution was developed to implement<br />
a simple, affordable FICAM-compliant solution simply with<br />
optimal performance:<br />
identiv.com/ficam<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Anja Pellegrino, Sr. Content Manager<br />
Identiv<br />
office: 213-910-0043<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
apellegrino@identiv.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Identiv Federal Headquarters<br />
2425 Wilson Blvd., Suite 325<br />
Arlington, VA 22201<br />
33
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Identiv<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Physical/Logical Privileged Access Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Federal agencies are feeling pressured to adopt government-wide<br />
Federal Identity, Credential, and Access<br />
Management (FICAM) compliant physical access control<br />
systems (PACS). Identiv’s Hirsch government FICAM<br />
solution offers a true end-to-end HSPD-12 solution that<br />
eliminates the need for expensive third-party credential<br />
management hardware. The net benefit is an overall solution<br />
that is more secure, faster, and less expensive to<br />
deploy and authorize access than first-generation FICAM<br />
solutions.<br />
Identiv’s Hirsch Velocity Certificate Service is compatible<br />
with existing Velocity systems running Velocity 3.6<br />
after application of a feature pack. All existing systems<br />
have the ability to be upgraded through software updates.<br />
Identiv’s Professional Services Group (PSG) can<br />
also provide transition planning support to upgrade<br />
existing systems. FISMA, COOP, and enterprise PACS<br />
solutions are also available.<br />
Identiv’s Secure Network Interface Board 3 (SNIB3)<br />
is an expansion component update for Hirsch Mx and<br />
DIGI*TRAC Controllers. It is a sophisticated, secure<br />
communication device that has dedicated processors to<br />
efficiently handle encryption and management operations.<br />
SNIB3 is used to manage PKI certificate data for<br />
door access as provisioned by Velocity. Using FIPS 140-2<br />
certified encryption technology, SNIB3 serves as the<br />
communication hub from controller to Velocity using a<br />
secure TCP/IP protocol.<br />
Identiv’s RS485 Reader Expansion Board (RREB)<br />
is a unique reader communication device that installs<br />
34
onto the expansion cable of Hirsch Mx and DIGI*TRAC<br />
Controllers and features eight RS-485 communication<br />
ports, capable of supporting 16 readers on eight doors.<br />
The RREB makes it possible to have extremely high data<br />
rates with up to 16 PIV smart card readers while using<br />
Open Supervised Device Protocol (OSDP).<br />
Identiv’s uTrust TS Government Readers are the industry’s<br />
most flexible and secure intelligent door reader<br />
endpoints, enabling agencies to deploy a highly secure<br />
U.S. government FICAM CAK at a fraction of the cost<br />
of competing solutions. ScramblePad and static keypad<br />
models are available. The readers have RS-485 and<br />
Wiegand connections, support PoE power, and can be<br />
configured to support thousands of different card technologies.<br />
Existing uTrust TS Government Readers are<br />
flash upgradeable to enable the FICAM solution without<br />
needing to replace current readers.<br />
In summary, Identiv’s FICAM solution is faster and<br />
less expensive. It provides customers a low-cost, simple<br />
to deploy, secure solution for FICAM compliance. The<br />
time required to upgrade existing Hirsch Velocity PACS<br />
is significantly less than competitor’s solutions, allowing<br />
federal agencies to meet rapidly approaching compliance<br />
deadlines. The time and cost to deploy new systems<br />
or transition from another system is offered at the<br />
same extreme value as other Hirsch solutions.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
identiv.com<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Identiv’s End-to-End Federal Identity, Credential, and Access<br />
Management (FICAM) Solution was developed to implement<br />
a simple, affordable FICAM-compliant solution simply with<br />
optimal performance:<br />
identiv.com/ficam<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Anja Pellegrino, Sr. Content Manager<br />
Identiv<br />
office: 213-910-0043<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
apellegrino@identiv.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Identiv Federal Headquarters<br />
2425 Wilson Blvd., Suite 325<br />
Arlington, VA 22201<br />
35
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Wombat Security Technologies<br />
<strong>2016</strong> Finalist<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Compliance/Vulnerability Assessment Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CyberStrength Assessment Tool<br />
Wombat is dedicated to creating the tools businesses<br />
need to educate their employees on best security<br />
practices. CyberStrength is one of these tools. It was<br />
launched in 2013 and has since revolutionized the<br />
concept of employee knowledge assessments, giving<br />
breadth and depth to all areas of a security training program.<br />
The scenario-based CyberStrength format offers a<br />
less invasive way to evaluate knowledge levels and use<br />
that information to plan a cybersecurity education plan<br />
that will be the most effective at managing end-user risk.<br />
CyberStrength is part of the Assess component of<br />
Wombat’s Continuous Training Methodology. Organizations<br />
that have used this cyclical, ongoing approach to<br />
security awareness and training have realized up to a<br />
90% reduction in successful external phishing attacks<br />
and malware infections. Moreover, CyberStrength offers<br />
36
a library of more than 150 questions in ten categories.<br />
International organizations are able to use translated<br />
content to evaluate employees in their native languages,<br />
and administrators can create custom questions to<br />
assess knowledge of company policies or compliancerelated<br />
issues. In addition, Wombat developed seven<br />
Predefined CyberStrength options to help administrators<br />
streamline the evaluation process. Additionally,<br />
security professionals can automatically assign follow-up<br />
training for end users whose assessment results show a<br />
gap in understanding that could equate to an increased<br />
risk to organizational security.<br />
CyberStrength is the first tool of its kind. It enables<br />
businesses to create, administer, and analyze the results<br />
of organization-wide cybersecurity knowledge evaluations.<br />
Furthermore, its ability to identify areas of susceptibility<br />
beyond phishing attacks supports Wombat’s<br />
vision of an end-to-end security solution.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.wombatsecurity.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.wombatsecurity.com/security-education/security-awareness-knowledge-assessment<br />
YouTube video:<br />
https://www.youtube.com/watch?v=jBnzLGupBG8<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Daria Ivanova, Account Coordinator<br />
SHIFT Communications<br />
office: 512-792-2543<br />
cell: 713-705-0158<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
divanova@shiftcomm.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SHIFT Communications<br />
200 E 6th Street, #202<br />
Austin, TX 78701<br />
37
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Forcepoint<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Network Security/Enterprise Firewall<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Forcepoint Stonesoft ® Next Generation Firewall<br />
Forcepoint’s network security solution Stonesoft® Next<br />
Generation Firewall (NGFW) connects and secures distributed<br />
government agency offices, branches and cloud<br />
systems with the industry’s greatest ease, efficiency, and<br />
reliability.<br />
Stonesoft is designed for government agencies from<br />
the ground up to enable interoperability between multiple<br />
organizations to securely connect people and data<br />
everywhere the mission takes them – from inside headquarters<br />
out to the field and up to the cloud.<br />
With Stonesoft, agencies centrally deploy, monitor<br />
and update thousands of firewalls and intrusion prevention<br />
systems to dramatically reduce administrative<br />
burdens and costs. Stonesoft’s unique high-availability<br />
architecture and Smart Policy system is scalable and<br />
resilient at all levels, practically eliminating downtime<br />
while boosting performance.<br />
Most of all, Forcepoint excels at both networking and<br />
security. As the industry’s pioneer in Advanced Evasion<br />
Technique (AET) defenses and proxy technologies for<br />
mission-critical applications, we’re relied upon to protect<br />
many of the most sensitive networks and data.<br />
Stonesoft delivers superior networking and security,<br />
so agencies can be more:<br />
• Effective – The Stonesoft Security Management<br />
Center (SMC) slashes the complexity and costs of<br />
creating and managing networks of thousands of<br />
NGFWs and IPSs – from central command centers<br />
out to remote locations and up into the cloud.<br />
• Efficient – Our high-availability architecture is<br />
unmatched, providing more scalability, longer<br />
lifetime, and lower OpEx while eliminating<br />
downtime.<br />
• Secure – We excel at both networking and security<br />
38
and our proxy technology protects the most sensitive<br />
networks in the world.<br />
In November of <strong>2016</strong>, NSS Labs gave Stonesoft their<br />
highest Next-Generation Firewall (NGFW) rating<br />
“Recommended” four years in a row and also a “Recommended”<br />
rating for Next-Generation Intrusion Prevention<br />
System (NGIPS) in <strong>2016</strong>, with a perfect record of<br />
blocking advanced evasions.<br />
Productivity in a government environment comes<br />
from visibility through correlation, extremely detailed<br />
overviews and reporting capabilities. Stonesoft not only<br />
manages and correlates engine traffic and feeds, it monitors<br />
third party devices, and integrates with endpoint<br />
client agents. This ensures a full picture of point-topoint<br />
analytics for an agency’s network security environment.<br />
Stonesoft’s mission critical features include:<br />
• Robust Security – Enable 16 node active-active<br />
firewall clustering to further increase uptime and<br />
speeds and feeds on daily traffic and VPNs, while<br />
ensuring smart validity checks to administrative<br />
changes.<br />
• Unique Proxy Functionality – Within the Stonesoft<br />
Management Console (SMS) leverage advanced<br />
levels of inspection control with attributes,<br />
connection parameters and commands for specific<br />
proxies.<br />
• Plug-and-Play Deployment – Deploy Stonesoft<br />
NGFW instantly at remote sites without sending a<br />
technician and without shutting down missioncritical<br />
networks affecting national security.<br />
• Simple, Precise Firewall Policies – Avoid errors and<br />
security holes with Smart Policies that are easy to<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.forcepoint.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Forcepoint Stonesoft ® NGFW: Optimize and scale network<br />
security:<br />
https://www.forcepoint.com/product/network-security/forcepoint-stonesoft-next-generation-firewall<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Jeff Hunter, Federal Product Marketing Manager<br />
Forcepoint<br />
office: 1-703-537-3969<br />
cell: 1-703-989-1686<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
jeff.hunter@forcepoint.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Forcepoint<br />
12950 Worldgate Dr., Ste. 600<br />
Herndon, VA 20170<br />
comprehend and more efficient to maintain.<br />
• Update Without Service Windows – Push new<br />
policies and updates without downtime for the most<br />
critical networks.<br />
• Unmatched Security – Stonesoft is the only security<br />
solution to protect against highly sophisticated and<br />
dynamic AETs for the most mission-critical<br />
applications.<br />
• Dynamic Agility – Use the same software for a<br />
variety of protection roles.<br />
39<br />
Stonesoft is the premier solution for government agencies<br />
looking for the highest level of network security in<br />
complex and mission-critical environments.
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Waratek<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Application Security Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The majority of government agencies still run customdeveloped,<br />
mission critical applications on out-of-date<br />
versions of Java. Most of these applications cannot be<br />
taken offline to install updates, and the quarterly frequency<br />
of critical patch updates overwhelms IT staff.<br />
Waratek has developed a disruptive new approach by<br />
virtualization-based to application security called Runtime<br />
Application Self Protection (RASP). This approach<br />
makes enterprise applications self-protecting by providing<br />
transparent, secure RASP containers for web applications<br />
deployed in on-premises datacenters and cloud<br />
environments, protecting new and legacy applications<br />
without the need to make any code changes or impacting<br />
application performance. Waratek delivers out of<br />
the box protection for enterprise applications and data<br />
from logic attacks like SQL Injection, network attacks,<br />
unpatched vulnerabilities at runtime, and unknown<br />
attacks.<br />
Waratek monitors, detects and blocks threats from<br />
within the Java Runtime Environment (i.e. JVM) in realtime,<br />
to enable applications to self-protect from the inside<br />
out. With Waratek, organizations gain visibility into<br />
malicious activity, enforce security policies and virtually<br />
patch vulnerabilities at runtime. The platform mitigates<br />
against vulnerabilities in legacy application platforms,<br />
third party and open source code, and effectively counters<br />
“zero day” malware. Waratek automatically modernizes<br />
any web application running on a legacy version of<br />
Java by updating it with all the security and performance<br />
improvements inherent to the Java 8 OS without changing<br />
even one line of code or performing a restart.<br />
Unlike other RASP solutions, Waratek uses a virtualization-based<br />
approach to create secure containers for<br />
protected applications. As a result, it does not require<br />
40
any code changes, or hardware and does not impact the<br />
performance of the application. With Waratek, all future<br />
routine and emergency security patches can be applied<br />
virtually without taking the application out of production.<br />
Waratek’s unique virtualization-based approach<br />
eliminates the need for enterprises to re-write or modify<br />
their applications, which significantly reduces the cost<br />
of ownership compared to traditional RASP products.<br />
Meanwhile, Waratek protects up to 98 percent of an<br />
application’s attack surface from known and unknown<br />
vulnerabilities without generating false positives by<br />
monitoring activity within the JVM in real-time. This<br />
eliminates the constant tuning and rule-writing associated<br />
with web application firewalls. In addition, Waratek<br />
can virtually patch applications that cannot be patched<br />
or taken out of production for patching, using its virtual<br />
patching capabilities. These combined capabilities<br />
significantly reduce total cost of ownership compared<br />
to other web application security products. Finally,<br />
since Waratek creates a secure container within the Java<br />
Runtime Environment, it can protect an infinite number<br />
of applications without introducing any scalability,<br />
performance degradation, management or configuration<br />
issues.<br />
According to Gartner Inc.’s Top 10 Security Predictions<br />
<strong>2016</strong>, by 2020, 40 percent of enterprises will<br />
secure developed applications by adopting application<br />
security self-testing, self-diagnosing and self-protection<br />
technologies.<br />
Gartner recommends companies adopt runtime application<br />
self protection (RASP).<br />
41<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.waratek.com<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
A short video depicting the technology:<br />
https://youtu.be/z8PRaAE4Y9E?rel=0<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Marc Gendron, President<br />
Marc Gendron Public Relations<br />
office: 781-237-0341<br />
cell: 617-877-7480<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
marc@mgpr.net<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Marc Gendron Public Relations<br />
190 Lower County Road<br />
West Harwich, MA 02671<br />
• Most Valuable Product in Computer Technology<br />
Review CTR MVP Awards 2015<br />
• SIIA NextGen winner 2015<br />
• SIIA CODiE finalist 2015<br />
• Cyber Defense Magazine Infosec Leader 2015<br />
• CRN Top 20 Coolest Cloud Security Vendors For<br />
<strong>2016</strong><br />
Customer case examples:<br />
The company has garnered recognition and awards, A Global Bank inventoried hundreds of internal applications,<br />
and found a multitude of Java versions for which<br />
including:<br />
• Innovation Sandbox winner of Most Innovative quarterly releases of security vulnerabilities is commonplace.<br />
A traditional upgrade or patching approach<br />
Company, RSA Conference 2015<br />
• CRN Top 20 Coolest Cloud Security Vendors For was unfeasible. Even if it were, it would have imposed<br />
<strong>2016</strong> Continued on next page
a huge cost and operational burden on the business,<br />
while impacting the bank’s agility and customer responsiveness.<br />
The Bank integrated Waratek’s security technology<br />
into their application hosting platform. This resolved<br />
the Java patching issue, as well as remediated other<br />
issues such as SQL Injection attacks, in a manner that<br />
is transparent to the applications. The net result was a<br />
dramatic reduction and avoidance of security patching<br />
costs, while improving security and preserving the agility<br />
of the organization.<br />
The centralized virtual patching capabilities provided<br />
by Waratek across hundreds of applications eliminated<br />
the need for the bank’s application development to<br />
upgrade to new versions of Java along with the associated<br />
testing and deployment activities. This saves time<br />
and money, and reduces business impact by minimising<br />
application downtime. It also enables the bank to<br />
focus on improving its applications and infrastructure to<br />
better serve customers and shareholders. With Waratek,<br />
the bank has a solution to a difficult security problem<br />
which significantly reduces its risk and exposure to data<br />
breaches.<br />
42
43
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Claroty<br />
<strong>2016</strong> Finalist<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Industrial Cybersecurity Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Claroty exited stealth mode at the right time, with the<br />
right team and the right technology to leverage the<br />
burgeoning, yet underserved market for Operational<br />
Technology (OT) security – a market Gartner predicts<br />
will double by 2020.<br />
Vendors have attempted to tackle industrial control<br />
system (ICS) cybersecurity challenges twice previously:<br />
first with legacy IT security products, and then with IT<br />
point solutions retrofitted for ICS environments. Neither<br />
approach addressed core ICS cybersecurity issues;<br />
did not work in the very different ICS environment; and<br />
did not foster the necessary dialogue between OT and<br />
IT teams that is essential for effective OT security. Everything<br />
about OT – from protocols to staff – is different<br />
and requires technology specifically designed for that<br />
environment. Claroty was founded not just to bridge the<br />
gap between OT and IT, but with a mission to secure<br />
and optimize the industrial control networks that run<br />
the world.<br />
Launching in September with $32 million in venture<br />
capital, Claroty is the most substantially funded<br />
ICS cybersecurity startup. The company boasts an elite<br />
management team with deep experience in both IT and<br />
OT disciplines. And the Claroty Platform – born from<br />
this combined IT and OT expertise – is supported by<br />
an unrivaled ICS security research organization that<br />
comprises the “top 1% of the 1%” from a special Israeli<br />
Defense Force cyberunit.<br />
Purpose-built for OT environments, the Claroty<br />
Platform is designed to safely monitor ICS, SCADA and<br />
other critical networks. It uncovers previously hidden<br />
issues and alerts cybersecurity teams and system operators<br />
to malicious attacks and process integrity issues<br />
that may impact industrial operations. Claroty gener-<br />
44
ates context-rich alerts, summarizing multiple associated<br />
events into a single robust notification for rapid<br />
investigation and response, and improved operational<br />
resilience. The Platform’s other differentiating features<br />
include: deeper visibility across all OT layers; broadest<br />
protocol coverage; superior anomaly and change detection;<br />
continuous, real-time monitoring; and safe, “passive”<br />
deep packet inspection.<br />
Notably, Claroty achieved several significant customer<br />
milestones well before its September launch. Securing<br />
multiple seven-figure deals, the Claroty Platform has<br />
been implemented in complex enterprise-class networks<br />
across dozens of industry verticals for more than a year.<br />
Underscoring this early customer success, a CISO from<br />
a global Fortune 100 organization explains his engagement<br />
with Claroty: “We are using Claroty to add security<br />
monitoring to our control systems around the world<br />
– an important part of our business where security was<br />
not previously thought of or architected in. We selected<br />
Claroty to give us greater visibility into the shop floor<br />
environment – both the assets that are there and the<br />
activities taking place. Equipped with this additional<br />
visibility we are able to increase productivity and make<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.claroty.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Claroty Solution Brief:<br />
https://s3.amazonaws.com/claroty-public/Claroty_<br />
Solution_Brief.pdf<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Carro Halpin, Account Executive<br />
CHEN PR<br />
office: 781-672-3132<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
chalpin@chenpr.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CHEN PR<br />
71 Summer Street, Penthouse<br />
Boston, MA 02110<br />
process improvements in addition to enhance security.”<br />
Additionally, market research analysts are lauding<br />
Claroty’s approach. In April, Gartner named Claroty<br />
a “Cool Vendor” in the publication “Cool Vendors<br />
in Smart City Application Solutions, <strong>2016</strong>.” The firm<br />
noted that what makes the company cool is the Claroty<br />
Platform, “which detects suspicious and/or anomalous<br />
system activity within industrial environments in realtime<br />
for rapid mitigation, a requirement for most eventdriven<br />
industrial systems.”<br />
45
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
CyberArk<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Continuous Monitoring and Mitigation Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Privileged account protection and threat detection are<br />
at the center of many federal requirements designed to<br />
secure agencies from both internal and external threats.<br />
Third-party contractors, like Harold Martin and Edward<br />
Snowden, add another significant layer of complexity.<br />
Contractors are typically not controlled by an organization’s<br />
internal policies, yet they often have the same – or<br />
greater – levels of privileged access to internal networks<br />
and information.<br />
The CyberArk Privileged Account Security Solution<br />
offers proactive protection of privileged credentials and<br />
threat detection of privileged account activities, while also<br />
enabling federal organizations to respond to advanced<br />
threats. Proactive protection includes the secure storage<br />
and management of privileged credentials, monitoring<br />
and isolation of privileged account sessions, and the<br />
enforcement of least privilege and application control at<br />
the endpoint. The CyberArk solution also features targeted<br />
analytics and the ability to analyze network traffic to better<br />
detect indications of an attack early in the lifecycle, includ-<br />
ing credential theft, lateral movement and privilege escalation.<br />
Incident response teams use CyberArk to quickly<br />
identify threats and shut down in-progress attacks.<br />
Specifically, with its privileged threat analytics capabilities,<br />
CyberArk enables government entities to dramatically<br />
shorten an attacker’s window of opportunity and reduce<br />
damage; rapidly detect attacks with analytics based on<br />
built-in and continuously-updated algorithms; prioritize<br />
incidents that require immediate attention by conducting<br />
event correlation and raising the risk score on critical incidents;<br />
adapt threat detection to a changing risk environment<br />
with machine learning algorithms that continuously<br />
adjust baseline behavior profiles as authorized behavior<br />
changes over time; and automatically respond to a suspected<br />
stolen privileged credential to stop an attacker’s<br />
movement and accelerate remediation.<br />
With its privileged session monitoring capabilities, Cy-<br />
46
erArk can isolate, monitor, record and control privileged<br />
sessions on critical systems including Unix and Windowsbased<br />
systems, databases and virtual machines to meet<br />
specific Federal guidelines around continuous monitoring.<br />
The solution acts as a jump server and single access<br />
control point, prevents malware from jumping to a target<br />
system, and records keystrokes and commands for continuous<br />
monitoring. The resulting detailed session recordings,<br />
DVR-like playback and audit logs are used to simplify<br />
compliance audits and accelerate forensics investigations.<br />
The CyberArk Privileged Account Security Solution was<br />
recently added to the U.S. Department of Defense (DoD)<br />
Unified Capabilities Approved Products List (UC APL). At<br />
the time of its inclusion, CyberArk was the only comprehensive<br />
privileged account security solution on the list.<br />
The solution also received the U.S. Army Certificate of<br />
Networthiness (Army CoN). These key government recognitions<br />
are added to CyberArk’s Common Criteria Evaluation<br />
Assurance Level EAL 2+ certification.<br />
CyberArk is trusted by more than 2,800 customers,<br />
including 45 percent of the Fortune 100 and more than 25<br />
percent of the Global 2000. As of Q3 <strong>2016</strong>, CyberArk has<br />
contracts in all three branches of the U.S. Federal government<br />
and across more than 15 distinct departments or<br />
agencies, among others. CyberArk can help meet security<br />
and compliance requirements in Federal organizations including<br />
FISMA/NIST SP 800-53; Department of Homeland<br />
Security CDM Program; NERC-CIP; and HSPD-12.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.cyberark.com<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CyberArk security and compliance for government organizations<br />
web page:<br />
www.cyberark.com/solutions/federal-government-solutions/<br />
CyberArk Privileged Account Security Solution web page:<br />
http://www.cyberark.com/products/privileged-accountsecurity-solution/<br />
CyberArk Privileged Session Manager web page:<br />
http://www.cyberark.com/products/privileged-accountsecuritysolution/privileged-session-manager/<br />
CyberArk Privileged Threat Analytics web page:<br />
http://www.cyberark.com/products/privileged-accountsecuritysolution/privileged-threat-analytics/<br />
NIST SP 800-53 Revision 4: Implementing Essential Security<br />
Controls with CyberArk® Solution - link to whitepaper:<br />
http://www.cyberark.com/resource/nist-sp-800-53-revision-4-implementing-essential-security-controls-cyberarksolutions/<br />
Addressing the NIST SP 800-171 CUI requirements with Cyber-<br />
Ark - link to white paper:<br />
http://www.cyberark.com/resource/addressing-nist-sp-<br />
800-171-cui-requirements-cyberark/<br />
CyberArk for NERC Secured Remote Access - link to white paper:<br />
http://www.cyberark.com/resource/cyberark-nerc-secured-remote-access/<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Liz Campbell, Sr. Manager, Corporate Communications<br />
CyberArk<br />
office: 617-558-2191<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
liz.campbell@cyberark.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
CyberArk<br />
60 Wells Avenue<br />
Newton, MA 02459<br />
47
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT and Cybersecurity Products and Solutions<br />
Gurucul<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best User & Entity Behavior Analytics (UEBA) Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Gurucul is changing the way government entities and<br />
enterprises protect themselves against insider threats,<br />
account compromise, targeted attacks, cyber fraud, data<br />
exfiltration and external intruders in the cloud, onpremise,<br />
and in hybrid environments. The company has<br />
pioneered a new cybersecurity category called user and<br />
entity behavior analytics (UEBA). Gurucul was the only<br />
vendor that analyst firm Gartner cited for meeting all<br />
five use cases outlined in their Market Guide for UEBA<br />
report: security management, insider threats, data exfiltration/DLP,<br />
identity access management, SaaS security,<br />
plus Gurucul met their extra qualifications for compliance<br />
and cyber fraud.<br />
Gurucul’s cyber security platform, Gurucul Risk<br />
Analytics (GRA), goes beyond traditional solutions that<br />
are based on rules, signatures and patterns. The U.S.<br />
Government has been affected by an increasing number<br />
of attacks, such as those targeting the IRS and the<br />
OPM, that exposed vast amounts of sensitive informa-<br />
tion. To detect threats early in the “kill chain,” Gurucul<br />
GRA ingests huge volumes of data generated by user<br />
access and activity across on-premise and cloud applications<br />
to identify anomalous behavior that spans time,<br />
place, access and actions. Gurucul GRA also includes<br />
identity analytics (IdA) to identify and eliminate excess<br />
access, access outliers, orphan and dormant accounts.<br />
Gurucul’s holistic approach of combined UEBA and IdA<br />
provides a 360-degree context for identity, accounts,<br />
access and activity, and is uniquely capable of detecting<br />
cyber threats that appear “normal” to traditional security<br />
products while identifying advanced security threats<br />
and low-and-slow attacks in their early stages, with an<br />
extremely low false positive rate.<br />
Traditional rules-based detection cannot keep pace<br />
48
with today’s sophisticated and targeted attacks. Rules,<br />
patterns and signatures are based on a historical understanding<br />
of attacks and a limited understanding of the<br />
data. They cannot predict future attack scenarios, and<br />
they generate excessive alerts. In contrast, Gurucul GRA<br />
monitors information on how identities are being used<br />
by both humans and machines, modeling hundreds of<br />
attributes and applying machine learning algorithms to<br />
create a rich source of “context”. Gurucul GRA derives<br />
and then leverages useful and predictive cues that are<br />
too noisy and highly dimensional for humans and traditional<br />
software to analyze within its machine learning<br />
models. Not only does this AI allow Gurucul GRA to<br />
identify security threats, even low-and-slow attacks, but<br />
also to predict a threat in its early stages, allowing for<br />
efficient remediation with an embedded case ticketing<br />
or integration with third party case management.<br />
Unlike machine learning solutions that rely on static<br />
peer groups, Gurucul GRA automatically builds baseline<br />
behavior around an identity, compares it against<br />
‘dynamic’ peer groups with similar behavior profiles<br />
and provides a real-time risk-ranked, 360 degree view<br />
of who is accessing what applications and data, on what<br />
devices, at what time, and in what locations. This greatly<br />
improves clustering and outlier analysis for more accurate<br />
behavior patterns resulting in lower false positives<br />
than using static peer groups.<br />
While most UEBA solutions are on-premises only,<br />
or require another partner solution for cloud visibility,<br />
Gurucul GRA provides a cloud API-based solution for<br />
visibility into SaaS, IaaS, PaaS and IDaaS solutions. Thus<br />
Gurucul GRA delivers a unique hybrid-UEBA approach<br />
that extends across both on-premises and cloud. UEBA<br />
as a feature within multiple solutions results in a divided<br />
and less contextually rich outcome for anomaly<br />
detection and risk scoring.<br />
An industry-first, Gurucul GRA features a self-audit<br />
Continued on next page<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://gurucul.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Link to Gurucul Risk Analytics (GRA):<br />
http://gurucul.com/gurucul-risk-analytics<br />
Gurucul STUDIO:<br />
http://gurucul.com/pressreleases/gurucul-studio-enables-it-security-teams-to-build-custommachine-learning-modelsthat-detect-user-entitybased-threats-and-risks<br />
Gurucul Self Audit:<br />
http://gurucul.com/solutions/self-audit<br />
SC Magazine product review:<br />
http://www.scmagazine.com/gurucul-risk-analytics/<br />
review/4399/<br />
Dark Reading article by Gurucul CEO Saryu Nayyar, explaining:<br />
The Blind Spot Between The Cloud & The Data<br />
Center:<br />
http://www.darkreading.com/vulnerabilities-<br />
--threats/the-blind-spot-between-the-cloud-and-thedata-center/a/d-id/1326063?<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Marc Gendron, President<br />
Marc Gendron Public Relations<br />
office: 781-237-0341<br />
cell: 617-877-7480<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
marc@mgpr.net<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Marc Gendron Public Relations<br />
190 Lower County Road<br />
West Harwich, MA 02671<br />
49
capability that empowers users to monitor their access<br />
for risk-ranked anomalous and suspicious activity,<br />
similar to the feedback loop that credit cards and credit<br />
monitoring agencies provide for their customers. The<br />
rich context that users provide goes beyond the knowledge<br />
of security analysts in security operation centers to<br />
identify and confirm anomalies. Self audits also provide<br />
security awareness and deterrence as key elements of an<br />
insider threat program.<br />
Gurucul GRA allows customers to implement data<br />
lakes of their choice with the ability to compute and<br />
store on big data for higher performance and increased<br />
data variety than legacy architectures. This provides<br />
efficiencies for machine learning models and significant<br />
savings by avoiding SIEM indexing fees, proprietary storage<br />
and data transfer fees.<br />
Gurucul’s newest release of GRA includes another<br />
innovation: Gurucul STUDIO. The intuitive step-by-step<br />
graphical interface does the heavy lifting to enable customers<br />
in highly regulated organizations, government<br />
agencies and the intelligence community to create their<br />
own custom machine learning models without the need<br />
for data science expertise or coding. Along with an open<br />
choice for big data, GRA also includes a flex data connector<br />
to ingest legacy (i.e. mainframe, building access<br />
systems) or new (i.e. SaaS apps, CASBs) data sources<br />
without coding or professional services. This enables<br />
customers to analyze any dataset with desired attributes<br />
through machine learning models with predictive risk<br />
scoring outcomes.<br />
Finally, Gurucul GRA is a proven big-data security<br />
analytics solution that is successfully deployed by government<br />
agencies and global Fortune 500 companies<br />
across the financial, healthcare, technology, retail and<br />
manufacturing sectors.<br />
Gurucul has been recognized in several high profile<br />
awards and reports, including:<br />
• <strong>2016</strong> SC Magazine US for Best Behavior Analytics/<br />
Enterprise Threat Detection platform<br />
• <strong>2016</strong> SC Magazine Europe for Best Behavior<br />
Analytics/Enterprise Threat Detection platform<br />
• 2015 and 2014 SINET Innovator awards<br />
• <strong>2016</strong> Cyber Defense Magazine winner in three<br />
categories:<br />
- Best of Breed User Behavior Analytics Solutions<br />
for <strong>2016</strong><br />
- Best Insider Threat Prevention Solution for <strong>2016</strong><br />
- Hot Company for Insider Threat Detection<br />
Solutions for <strong>2016</strong><br />
• 2014 Gartner Cool Vendor in Identity and Access<br />
Management<br />
Gurucul company and product updates: http://gurucul.<br />
com/press<br />
50
51
The GSN <strong>2016</strong> Homeland Security Awards<br />
Best Industrial Cybersecurity Solution<br />
Aperio Systems<br />
winner<br />
aperio-systems.com<br />
Best Compliance/Vulnerability<br />
Assessment Solution<br />
RiskVision<br />
finalist<br />
riskvisioninc.com<br />
Best Anti-Malware Solution<br />
Passages<br />
finalist<br />
getpassages.com<br />
Best Security Incident and<br />
Event Management (SIEM) Solution<br />
Solar Winds<br />
winner<br />
solarwinds.com
Category #1: Vendors of IT Security Products and Solutions<br />
Best Network Security/Enterprise Firewall<br />
ViaSat, Inc<br />
finalist<br />
viasat.com<br />
Best Endpoint Detection<br />
and Response Solution<br />
Tychon<br />
finalist<br />
tychon.io<br />
Best Continuous Monitoring &<br />
Mitigation Solution<br />
Netwrix Corporation<br />
finalist<br />
netwrix.com<br />
Best Big Data Analytics Solution<br />
Securiport<br />
winner<br />
securiport.com
The GSN <strong>2016</strong> Homeland Security Awards<br />
Best Data Security/Loss Management<br />
Solution<br />
Spirion<br />
winner<br />
spirion.com<br />
Best Identity Management Platform<br />
Forum Systems<br />
finalist<br />
forumsys.com<br />
Best Server Security Solution<br />
Blueridge<br />
winner<br />
blueridge.com
Category #1: Vendors of IT Security Products and Solutions<br />
Best Endpoint Detection and Response<br />
Solution<br />
Bromium<br />
winner<br />
bromium.com<br />
Best Big Data Analytics Solution<br />
Sqrrl<br />
winner<br />
sqrrl.com
The GSN <strong>2016</strong> Homeland Security Awards<br />
Category #2: Vendors of Physical Security Products and Solutions<br />
Judging in this category is based on a combination of:<br />
• Increase in client organization<br />
• Technological innovation or improvement<br />
• Filling a recognized government IT security need<br />
• Flexibility of solution to meet current and future organizational needs<br />
PHYSICAL SECURITY, ACCESS CONTROL,<br />
IDENTIFICATION, COMMUNICATIONS<br />
Best Biometric Identification System<br />
No Entry<br />
Best Access Control Hardware<br />
Identive - Winner<br />
Best Asset Tracking<br />
With Pairing Technology<br />
Offsite Vision Holdings - Winner<br />
Best Mass Notification System<br />
Amplifox Sound Systems - Winner<br />
LRAD 2 - Finalist<br />
Rave Mobile Security - Finalist<br />
Best Acoustic Hailing Service<br />
Amplivox Sound System - Finalist<br />
LRAD - Winner<br />
Best Lock-Down and 9-1-1 Notification<br />
in Active Shooter Situations<br />
Rave Mobile Safety - Winner<br />
Best Active Shooter<br />
Gunshot Detection Solution<br />
Shooter Detection System - Winner<br />
56
DETECTION PRODUCTS<br />
Best Chemical Detection Product or Solution<br />
FLIR - Winner<br />
Best Explosives Detection Product or Solution<br />
FLIR - Winner<br />
Best Nuclear/Radiation Detection Solution<br />
FLIR - Winner<br />
Best Automated License Plate<br />
Recognition (ALPAR)<br />
Perceptics LLC - Winner<br />
Best Spherical Situational<br />
Awareness Imaging Technology<br />
IC Realtime - Winner<br />
OTHER PRODUCTS<br />
Best Perimeter Protection,<br />
Intrusion Detection System<br />
Ross Technology Corporation - Winner<br />
Best Crash Barriers<br />
(Gates, Fences, Barriers, Bollards)<br />
Ross Technology Corporation - Winner<br />
Best Guard Booths<br />
B.I.G Enterprises – Winner<br />
SERVICES/EDUCATION<br />
Best Disaster Preparedness,<br />
Recovery, Clean-up<br />
High Rise Escape Systems Inc - Winner<br />
57
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of Physical Security Products and Solutions<br />
LRAD Corporation<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Acoustic Hailing Service<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Designed for integrated applications, the LRAD 950RXL<br />
can be controlled remotely across an IP network enabling<br />
system operators to create a fully functional,<br />
unmanned perimeter security solution and respond to<br />
potential threats from a safe location. The LRAD 950RXL<br />
achieves a maximum peak output of 156dB and broadcasts<br />
highly intelligible voice messages and warning<br />
tones from close range up to 3,000 meters. The LRAD<br />
950RXL’s ability to immediately interact with a potential<br />
threat remotely provides security personnel additional<br />
time and distance to accurately assess situations and<br />
scale their response appropriately. The LRAD 950RXL<br />
reduces manpower, false alarms and deadly incidents<br />
while providing a highly effective and cost efficient,<br />
remote response security solution.<br />
58
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
www.LRAD.com<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.lradx.com/lrad_products/lrad-rxl/<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Robert Putnam, Sr. Marketing Manager<br />
LRAD Corporation<br />
office: 858-676-0520<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
rputnam@lradx.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
LRAD Corporation<br />
16990 Goldentop Road, Ste. A<br />
San Diego, CA 92127<br />
59
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of Physical Security Products and Solutions<br />
Rave Mobile Safety<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Lock-Down and 9-1-1 Notification in Active<br />
Shooter Situations<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rave Panic Button is the industry leading one button<br />
panic mobile application. In seconds, Rave Panic Button<br />
clearly communicates an emergency to 9-1-1, on-site<br />
personnel, and first responders. As a result, response<br />
times are shortened and first responder safety is improved.<br />
According to the FBI, only 31% of active shooter<br />
incidents last longer than 5 minutes. With Rave Panic<br />
Button, staff, security, and on-site personnel will be immediately<br />
notified of an incident and can initiate emergency<br />
procedures before first responders arrive.<br />
In August 2015, the state of Arkansas deployed Rave<br />
Panic Button statewide to protect more than half million<br />
students, faculty, and staff. Since then they have<br />
seen countless examples of how Rave Panic Button has<br />
saved lives. In one instance, a student brought a gun on<br />
campus. Within 1 minute of pushing the panic button, a<br />
school resource officer was on the scene and lockdown<br />
procedures started. In two minutes, a second school<br />
resource officer arrived. In 8 minutes, first responders<br />
arrived on the scene, secured the gun, and prevented<br />
any injuries or deaths that day.<br />
When Rave Panic Button initiates the 9-1-1 call, a 9-1-<br />
1 call taker instantly sees where the call is coming from,<br />
who pushed the panic button, and what type of emergency<br />
has occurred. Additionally, the 9-11 call taker can<br />
see the building’s floor plans and other facility information.<br />
As the incident unfolds, the call taker can send text<br />
updates to teacher and staff to keep them informed and<br />
aware. With Rave Panic Button, 9-1-1 serves as incident<br />
command by continuously providing instructions to<br />
people on-site and relaying information to first responders.<br />
This better coordinated response saves time and<br />
60
saves lives.<br />
By immediately notifying 9-1-1 and on-site personal,<br />
Rave Panic Button initiates lockdown procedures and<br />
speeds up the process. A partner integration in Nassau<br />
County, NY highlights how Rave Panic Button’s is<br />
integral to lockdown procedures. In Nassau County, NY,<br />
Rave Panic Button was deployed to protect 350 schools<br />
and over 200,000 students. Since Nassau County has<br />
Rave Panic Button and IntraLogic Video Management<br />
Solutions, the Rave Panic Button triggers all doors<br />
to automatically lock. The 9-1-1 supervisor can also<br />
search live camera feeds and provide updates to first<br />
responders. As first responders arrive on the scene with<br />
improved situational awareness, they can use the Intra-<br />
Logic system to unlock doors.<br />
Institutions are replacing hard wired panic buttons<br />
for a fraction of the cost with the mobile technology that<br />
travels with you, calls 9-1-1, and alerts staff in 1.5 seconds.<br />
Rave Panic Button is trusted by schools, universities,<br />
hospitals, and corporations nationwide because<br />
when seconds count Rave Panic Button can be trusted<br />
to deliver a faster and more efficient response.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
ttps://www.ravemobilesafety.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rave Panic Button Video:<br />
https://www.youtube.com/watch?v=3wa9Fl0NsPY<br />
Rave Panic Button Alerts Teachers to Gun on Campus:<br />
https://www.youtube.com/watch?v=E5dMt_DRaA4<br />
Arkansas Deploys Rave Panic Button App to Better Protect K-12<br />
Students:<br />
https://www.youtube.com/watch?v=m8_L70rqVNk<br />
Limestone County Increases Safety with Rave Panic Button:<br />
https://www.youtube.com/watch?v=83N5gwBqqbA<br />
SNOPAC 9-1-1 Leverages Rave Panic Button to Locate Missing<br />
Children:<br />
https://www.ravemobilesafety.com/case-studysnopac-9-1-1rave-panic-button-technology-locatemissing-children/<br />
Rave Panic Button:<br />
https://www.ravemobilesafety.com/panic-button/<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Katharine Dahl, Director of Marketing<br />
Rave Mobile Safety<br />
office: 508-532-8933<br />
cell: 508-341-0545<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
kdahl@ravemobilesafety.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rave Mobile Safety<br />
50 Speen Street Suite 301<br />
Framingham, MA 01701<br />
61
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of Physical Security Products and Solutions<br />
Perceptics, LLC<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Automated License Plate Recognition (ALPAR)<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Perceptics is the sole LPR system provider for primary<br />
passenger vehicle inspection lanes at all land border<br />
ports of entry into the United States. Overall, Perceptics<br />
LPRs, driver and scene cameras are installed in over<br />
600 (inbound, outbound, and tactical) lanes for U.S.<br />
Customs and Border Protection. Perceptics recently<br />
installed LPRs at 42 U.S. Border Patrol check point lanes<br />
in Texas, New Mexico, Arizona, and California away from<br />
the border.<br />
Perceptics is the only company to successfully and consistently<br />
meet and exceed CBP’s stringent specifications,<br />
including CBP’s 95% LPR full plate read rate requirement<br />
for character and state/province identification, as<br />
well as delivery on performance, system availability, and<br />
equipment reliability targets.<br />
Perceptics has continually demonstrated its ability to engineer<br />
and develop the most accurate high performance<br />
imaging systems for national border security agencies in<br />
North America.<br />
62
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.perceptics.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Border Security Info:<br />
http://www.perceptics.com/markets/border-security/<br />
Checkpoint LPR:<br />
http://www.perceptics.com/products/license-platereaders/checkpoint-lpr/<br />
Freeflow LPR:<br />
http://www.perceptics.com/products/license-platereaders/freeflow-lpr/<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Casey Self, Marketing Manager<br />
Perceptics, LLC<br />
office: 865-671-9257<br />
cell: 865-210-3351<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
casey.self@perceptics.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Perceptics, LLC<br />
11130 Kingston Pike<br />
Suite 6<br />
Knoxville, TN 37934<br />
63
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of IT Security Products and Solutions<br />
Identiv<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Access Control Hardware<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Federal agencies are feeling pressured to adopt government-wide<br />
Federal Identity, Credential, and Access<br />
Management (FICAM) compliant physical access control<br />
systems (PACS). Identiv’s Hirsch government FICAM<br />
solution offers a true end-to-end HSPD-12 solution that<br />
eliminates the need for expensive third-party credential<br />
management hardware. The net benefit is an overall solution<br />
that is more secure, faster, and less expensive to<br />
deploy and authorize access than first-generation FICAM<br />
solutions.<br />
Identiv’s Hirsch Velocity Certificate Service is compatible<br />
with existing Velocity systems running Velocity 3.6<br />
after application of a feature pack. All existing systems<br />
have the ability to be upgraded through software updates.<br />
Identiv’s Professional Services Group (PSG) can<br />
also provide transition planning support to upgrade<br />
existing systems. FISMA, COOP, and enterprise PACS<br />
solutions are also available.<br />
Identiv’s Secure Network Interface Board 3 (SNIB3)<br />
is an expansion component update for Hirsch Mx and<br />
DIGI*TRAC Controllers. It is a sophisticated, secure<br />
communication device that has dedicated processors to<br />
efficiently handle encryption and management operations.<br />
SNIB3 is used to manage PKI certificate data for<br />
door access as provisioned by Velocity. Using FIPS 140-2<br />
certified encryption technology, SNIB3 serves as the<br />
communication hub from controller to Velocity using a<br />
secure TCP/IP protocol.<br />
Identiv’s RS485 Reader Expansion Board (RREB)<br />
is a unique reader communication device that installs<br />
64
onto the expansion cable of Hirsch Mx and DIGI*TRAC<br />
Controllers and features eight RS-485 communication<br />
ports, capable of supporting 16 readers on eight doors.<br />
The RREB makes it possible to have extremely high data<br />
rates with up to 16 PIV smart card readers while using<br />
Open Supervised Device Protocol (OSDP).<br />
Identiv’s uTrust TS Government Readers are the industry’s<br />
most flexible and secure intelligent door reader<br />
endpoints, enabling agencies to deploy a highly secure<br />
U.S. government FICAM CAK at a fraction of the cost<br />
of competing solutions. ScramblePad and static keypad<br />
models are available. The readers have RS-485 and<br />
Wiegand connections, support PoE power, and can be<br />
configured to support thousands of different card technologies.<br />
Existing uTrust TS Government Readers are<br />
flash upgradeable to enable the FICAM solution without<br />
needing to replace current readers.<br />
In summary, Identiv’s FICAM solution is faster and<br />
less expensive. It provides customers a low-cost, simple<br />
to deploy, secure solution for FICAM compliance. The<br />
time required to upgrade existing Hirsch Velocity PACS<br />
is significantly less than competitor’s solutions, allowing<br />
federal agencies to meet rapidly approaching compliance<br />
deadlines. The time and cost to deploy new systems<br />
or transition from another system is offered at the<br />
same extreme value as other Hirsch solutions.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
identiv.com<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Identiv’s End-to-End Federal Identity, Credential, and Access<br />
Management (FICAM) Solution was developed to implement<br />
a simple, affordable FICAM-compliant solution simply with<br />
optimal performance:<br />
identiv.com/ficam<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Anja Pellegrino, Sr. Content Manager<br />
Identiv<br />
office: 213-910-0043<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
apellegrino@identiv.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Identiv Federal Headquarters<br />
2425 Wilson Blvd., Suite 325<br />
Arlington, VA 22201<br />
65
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of Physical Security Products and Solutions<br />
Shooter Detection Systems LLC<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Active Shooter Gunshot Detection Solution<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The sound of a gunshot can easily be mistaken for<br />
construction noise or a car backfiring and this uncertainty<br />
can trigger unnecessary fear and panic or worse,<br />
inaction. Shooter Detection Systems’ Guardian Indoor<br />
Active Shooter Detection System listens and looks for<br />
gunfire and then reports that a shot has occurred within<br />
one second. The system has zero false alerts and<br />
displays the shooter’s location on an easy to read floor<br />
plan that shows security and key personnel where the<br />
gunshot occurred. This allows officials to immediately<br />
and appropriately respond to a life-threatening event<br />
and save lives with<br />
accurate, real-time<br />
information.<br />
As recent FBI<br />
reports have stated,<br />
Active Shooter<br />
incidents have<br />
been on the rise<br />
in the U. S. for the past several years. Effective response<br />
depends on the timely detection and reliable identification<br />
of an active shooter and the immediate communication<br />
of the incident details to at-risk personnel as well<br />
to emergency responders. A multi-mode (acoustic and<br />
IR based) gunshot detection sensor networked within<br />
a facility provides immediate and accurate detection of<br />
an Active Shooter within one second. The system also<br />
automates camera call up and initiates access control,<br />
therefore allowing security personnel to begin lockdown<br />
or evacuation procedures, and first responders to<br />
immediately address the threat.<br />
Shooter Detection Systems is comprised of a targeted<br />
team of business, tactical and multi-disciplinary systems<br />
engineering experts who collectively have over 40 years<br />
66
of experience with acoustic gunshot detection systems<br />
that were developed for military applications. While<br />
working at a major defense contractor, the SDS team<br />
was responsible for the successful production and delivery<br />
of over 10,000 gunshot detection systems to Iraq<br />
and Afghanistan. As a result of sniper attacks on the U.S.<br />
power grid, these same systems have been deployed to<br />
protect critical infrastructure and prevent the effects of a<br />
crippling power loss by sniper attack.<br />
Understanding the immediate need for technology<br />
to address the Active Shooter threat, the team began<br />
investigating how their experience designing acoustic<br />
detection technology could be applied indoors, offering<br />
a solution to this difficult and emerging problem. With<br />
a nation in fear of the Active Shooter, false alerts would<br />
not be tolerated. The difficulties in applying acoustic<br />
technology in an indoor environment were examined,<br />
thoroughly tested, and found to have an unacceptable<br />
false alert rate. Though even the vehicle gunshot detection<br />
version uses an acoustic modality to detect shooters,<br />
it was found that in an indoor environment, an<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.shooterdetectionsystems.com/<br />
Link to full award submission report:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.shooterdetectionsystems.<br />
com/?p=15028<br />
Nominating contact for this entry:<br />
–––––––––––––––––––––––––––––––––––<br />
Kendra Noonan, Director of Communications<br />
Shooter Detection Systems<br />
office: 1-844-SHOT911<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
knoonan@shooterdetectionsystems.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Shooter Detection Systems<br />
300 Newburyport Turnpike<br />
Rowley, MA 01969<br />
acoustics-only approach was insufficient. The result is the<br />
Guardian Indoor Active Shooter Detection System.<br />
The Guardian system is comprised of dual modality<br />
sensors strategically positioned within facilities that<br />
transmit gunshot alerts within one second. Guardian incorporates<br />
the world’s finest acoustic gunshot detection<br />
software and combines it with infrared sensor gunfire<br />
flash detection to produce the most accurate indoor<br />
gunshot detection system available. The sensor’s unique<br />
dual validation requirement provides the highest rate of<br />
detection while bringing the number of false alerts to<br />
zero.<br />
SDS is regularly chosen to participate in DHS Active<br />
Shooter and Terrorism scenario training drills involving<br />
multiple cooperating government agencies, a sampling<br />
Continued on next page<br />
67
The Evolution of Superior Gunshot Detection<br />
2011<br />
1990’s 2003 2005 2009 2010 2013 2014<br />
is below:<br />
In August 2014, SDS was selected to participate in<br />
a DHS sponsored School Safety Mock Active Shooter<br />
Drill at a large school in Wayne, New Jersey. Over 100<br />
role player participants were included in this exercise,<br />
including mock active shooters, shooting victims, and<br />
first responders. The active shooters in this scenario<br />
used high power rifles and handguns, and the Guardian<br />
sensors deployed throughout the facility provided 100%<br />
detection on all gunshots with zero false alerts. First<br />
responders were alerted via Situational Awareness Map<br />
and SMS messages, allowing immediate response and<br />
rapid takedown of the mock active shooter. In August<br />
2015, SDS was chosen to participate in a DHS sponsored<br />
Mock Active Shooter/Terrorist Drill at a multilevel<br />
synagogue in West Orange, New Jersey. The mock active<br />
shooter in this scenario used a high-power rifle and 20<br />
Guardian sensors deployed throughout the synagogue.<br />
The system provided 100% detection on all gunshots<br />
with zero false alerts.<br />
In November 2015, SDS was chosen by DHS to<br />
participate in an Active Shooter scenario in a New York<br />
City subway setting. Coincidentally, this event followed<br />
a series of coordinated terrorist attacks in Paris, drawing<br />
high level visitors to this subway event. DHS Secretary<br />
Jeh Johnson, New York City Mayor Bill de Blasio, NYPD<br />
Commissioner William Bratton, FDNY Commissioner<br />
Daniel Nigro, and NYPD Police Chief James Waters<br />
could witness firsthand how the Guardian sensors deployed<br />
along the subway platform and in the subway<br />
car alerted at 100% detection with zero false alerts.<br />
The Guardian System’s Situational Awareness Map was<br />
broadcast inside NYPD Mobile Command Center and<br />
shot information was repeated to first responders, allowing<br />
swift takedown of the active shooter.<br />
In June <strong>2016</strong>, SDS was chosen again by DHS to<br />
participate in an Active Shooter/Terrorist drill, this<br />
time in a professional sports stadium environment.<br />
The exercise took place at Fenway Park in Boston, MA,<br />
with over 500 role players participating in a simulated<br />
attack on a crowd at the entrance to the stadium.<br />
In cooperation with the Boston Police Department,<br />
SDS deployed sensors along the Gate D entrance and<br />
integrated with the building’s existing video surveillance<br />
system. In multiple scenarios, the Guardian<br />
system alerted on 100% of the shots fired along the<br />
concourse. The system sent alerts to participating First<br />
Responders, Fenway Security Personnel, and provided<br />
instant camera views to the active shooter to the Fenway<br />
Security Operations Office.<br />
As of December <strong>2016</strong>, SDS is installed nationwide<br />
with over 14 million hours of operation in real-world<br />
68
environments with zero false alerts. These installations<br />
include airports, Fortune 500 corporations, court<br />
systems, utilities, healthcare facilities and high-rise office<br />
buildings, with upcoming installations in many more<br />
government and private buildings. Active Shooter Protocols<br />
are now a standard practice among all these industries.<br />
The Guardian Indoor Active Shooter Detection<br />
System is the missing link to activate these protocols<br />
with confidence, decreasing response time and saving<br />
lives in the event of an active shooter.<br />
With the FBI recently reporting that 2014-2015<br />
showed the most active shooter incidents ever in a twoyear<br />
period, there is no better time or reason for SDS<br />
to win the GSN <strong>2016</strong> Homeland Security Award for Best<br />
Active Shooter Gunshot Detection System.<br />
For more information, please contact us at sales@<br />
shooterdetectionsystems.com or call 1-844-SHOT911.<br />
69
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of Physical Security Products and Solutions<br />
B.I.G. Enterprises, Inc.<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Guard Booths<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
B.I.G.’s award-winning Portable/Turnstile booth:<br />
B.I.G. helps facility owners put exceedingly tough access<br />
control wherever it is needed.<br />
Turnstiles are used at a wide variety of settings to allow<br />
only one person at a time to pass into an area. Now<br />
B.I.G. Enterprises has created a Portable Guard Booth<br />
w/Turnstile unit to provide secure access when and<br />
where needed.<br />
From a business/revenue standpoint, turnstiles give<br />
an accurate, verifiable count of attendance. From a<br />
security standpoint, they provide added access control<br />
limiting access to personnel with proper badges, and<br />
lead patrons to enter single-file, so security personnel<br />
have a clear view of each patron.<br />
From stadiums, amusement parks, mass transit stations,<br />
office lobbies, airports, ski resorts, and casinos to<br />
government buildings and critical facilities such as data<br />
centers, chemical or nuclear power plants, controlling<br />
the flow of foot-traffic—but at flexible places on a property<br />
can be exceedingly valuable.<br />
Recently, one of B.I.G.’s customers—a major North<br />
American construction company, needed to control<br />
construction workers as they arrived and departed each<br />
day from a highly sensitive power plant construction<br />
project. Nuclear power plants, Generation Stations and<br />
certain fuel fabrication facilities must show they can defend<br />
against a set of adversary characteristics called the<br />
Design Basis Threat (DBT). In general, the DBT outlines<br />
threats and adversary characteristics these facilities must<br />
demonstrate they can protect against. B.I.G.’s awardwinning<br />
Portable Guard Booth w/Turnstile unit helps<br />
such facilities show that they their access control can<br />
stand up to specific tactics used by terrorist groups and<br />
70
organizations.<br />
The prefabricated unit in this photo is designed with<br />
three Turnstiles, but B.I.G. could provide the same<br />
model with fewer or greater turnstiles. Portable, this<br />
unit can be used in various areas for secured access into<br />
a facility.<br />
The Portable Guard Booth WITH Turnstiles features<br />
full structural steel framing with insulated galvanized<br />
steel walls and roof, dual pane insulating glass, interior<br />
shelving, LED lighting, outlets and J-Boxes for data &<br />
communications, HVAC, floor and high solids polyurethane<br />
paint finish. The turnstile area is framed to accept<br />
the turnstiles and features galvanized flooring covered<br />
with polished aluminum diamond plate, recessed compact<br />
Fluorescent lights in the soffit above the turnstiles,<br />
and three factory-installed turnstiles.<br />
“Because we are experts at perimeter security and<br />
access control, we were pleased to work with this major<br />
utility company to assist in a critical time of their expansion<br />
process. Whatever the requirement you may face,<br />
B.I.G. Enterprises, Inc. has the solution.” – said Vice<br />
President David King.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.bigbooth.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.bigbooth.com/case-studies/april-<strong>2016</strong><br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Sharon Bailey, Managing Director<br />
Brand Orbit<br />
office: 626-791-7954<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
sharonb@brandorbit.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Brand Orbit<br />
1051 E. Altadena Drive<br />
Altadena, CA 91001<br />
About B.I.G. Enterprises:<br />
Since 1963, B.I.G. Enterprises, Inc. of California<br />
has engineered and manufactured a<br />
comprehensive line of high quality, highend,<br />
prefabricated security and revenue control<br />
booths. Their state-of-the-art selection of<br />
pre-assembled buildings include guardhouses,<br />
cashier booths, portable shelters, and<br />
a variety of custom-made kiosks. For more<br />
information, visit: www.bigbooth.com.<br />
71
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of Physical Security Products and Solutions<br />
Ross Technolog y<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Perimeter Protection<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Engineered to be extremely flexible and user friendly,<br />
the XT-4200 is the only electro-mechanical rising beam<br />
barrier that meets the ASTM F2656 M50-P1 crash test<br />
standard. Crash tested with a 24’ clear opening, this<br />
barrier is not only a cost effective solution for securing<br />
wide entrances, it’s also designed to reduce maintenance<br />
and operating costs.<br />
The all-electric system utilizes a continuous-duty<br />
rated motor and gearbox to provide long-term reliability<br />
and reduced downtime. And because the motor<br />
and drive system are located within the posts, they’re<br />
shielded from the elements to deter corrosion. This also<br />
makes it easy to access equipment for service. Finally,<br />
the crash beam is raised and lowered by a unique dual<br />
drive chain system to ensure consistently smooth and<br />
quiet operation.<br />
Like our Anti-Ram Fence, the XT-4200 post design<br />
features integral rebar rods (provided by Ross) to spare<br />
installers the time and expense of purchasing rebar and<br />
building cages. The post is also engineered to accept<br />
Ross XL-501 Anti-Ram Fence Beams for a complete,<br />
integrated perimeter security system.<br />
72
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.rosstechnology.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(XT-4200) M50 P1 Post & Beam Gate:<br />
http://www.rosstechnology.com/perimeter-security/<br />
gates-and-fencing-2/m50-p1-post-beam-gate/<br />
Beam style gates are ideal for guarding access control points<br />
with wide entrances, eliminating the need to install and<br />
maintain multiple wedge barriers or bollards. And because<br />
the vertical support posts and foundations are often installed<br />
beyond the roadway margins, these barriers can reduce the risk<br />
of interference with underground utilities. The XT-4200 Anti-<br />
Ram Gate features a unique rising beam actuated by a highly<br />
reliable, electromechanical drive system. It’s also engineered<br />
to integrate seamlessly into our XL-501 Post & Beam Fence to<br />
create a turnkey perimeter security solution.<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Steve Luscian,Vice President, Sales and Marketing<br />
Ross Technology<br />
office: 717-656-2200<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Sales@rosstechnology.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Ross Technology<br />
104 N. Maple Avenue<br />
P.O. Box 646<br />
Leola, PA 17540 USA<br />
73
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
Vendors of Physical Security Products and Solutions<br />
Ross Technolog y<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Best Crash Barriers (Gates, Fences, Barriers, Bollards)<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The XL-501 Post and Beam Anti-Ram Fence was engineered<br />
to be extremely simple and efficient in terms<br />
of the materials required to arrest vehicle impact and<br />
the effort required for construction. Constructed from<br />
heavy-duty structural steel, this unique system utilizes<br />
a single tubular beam with patented, energy-absorbing<br />
technology that enables the vertical posts to be set on<br />
30-foot centers. This design feature eliminates the need<br />
for multiple intermediate posts and cable runs used in<br />
traditional anti-ram fence products. Ross Post and Beam<br />
Anti-Ram Fence accommodates a wide range of inherent<br />
site considerations, including layout and terrain<br />
changes. The heavy-duty galvanizing and optional epoxy<br />
primer and polyurethane topcoat provide a high-quality,<br />
durable finish that withstands the elements. And the<br />
high-strength tubing does not require initial or ongoing<br />
tensioning.<br />
74
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.rosstechnology.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
(XL-501 / RSS-F501D) M50 P1 Post & Beam Fence:<br />
http://www.rosstechnology.com/perimeter-security/<br />
gates-and-fencing-2/anti-ram-m50-p1-post-beamfence/<br />
Anti-ram fencing safeguards high-risk facilities that require complete<br />
perimeter protection against vehicle-borne attacks. These<br />
anti-ram barrier systems provide maximum security for buildings,<br />
equipment and hazardous materials vulnerable to highspeed<br />
impacts or in close proximity to roadways. The XL-501<br />
Post and Beam Anti-Ram Fence is a proven high security vehicle<br />
barrier delivering vehicle-stopping strength with an innovative<br />
design that reduces overall costs, simplifies installation and<br />
improves visual appeal.<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Steve Luscian,Vice President, Sales and Marketing<br />
Ross Technology<br />
office: 717-656-2200<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Sales@rosstechnology.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Ross Technology<br />
104 N. Maple Avenue<br />
P.O. Box 646<br />
Leola, PA 17540 USA<br />
75
The GSN <strong>2016</strong> Homeland Security Awards<br />
Best Mass Notification System<br />
Rave Mobile Security<br />
finalist<br />
ravemobilesafety.com<br />
Best Asset Tracking with<br />
Pairing Technology<br />
Offsite Vision<br />
winner<br />
offsitevision.com<br />
Best Explosives Detection Product<br />
or Solution<br />
FLIR Systems<br />
winner<br />
flir.com/fidox2
Category #2: Vendors of Physical Security Products and Solutions<br />
Best Spherical Situational Awareness<br />
Imaging Technology<br />
IC Realtime<br />
winner<br />
icrealtime.com<br />
Best Disaster Preparedness, Recovery,<br />
Clean-up<br />
High Rise Escape Systems, Inc<br />
winner<br />
hres.com
The GSN <strong>2016</strong> Homeland Security Awards<br />
Category #3: GSN <strong>2016</strong> Government Excellence Award<br />
Judging in this category is based on one or more of the following criteria:<br />
• Development of successful strategy and increase in public safety<br />
• Providing a notable solution to a recognized problem<br />
• Reduction in cost and/or major increase in efficiency and effectiveness<br />
• Decisive, successful action to respond to threat or emergency<br />
Special note on this year’s Government Awards:<br />
Rather than relying on predetermined categories, the judges decided instead<br />
to select five entries that would best represented the term Government Excellence.<br />
<strong>2016</strong> Government Excellence Entry<br />
selected by judges:<br />
Agency: USDA Agricultural Research<br />
Service (USDA-ARS)<br />
Category: Most Notable Federal<br />
Government Program, Project or Initiative<br />
Product: BeyondTrust Powerbroker<br />
<strong>2016</strong> Government Excellence Entry<br />
selected by judges:<br />
Agency: Federal Emergency Management<br />
Agency (FEMA)<br />
Category: Most Notable Cybersecurity<br />
Program or Technology<br />
Product, Service or Program: Personal<br />
Identity Verification (PIV) and Single<br />
Sign On (SSO) enablement<br />
78
<strong>2016</strong> Government Excellence Entry<br />
selected by judges:<br />
Agency: Department of Homeland<br />
Security, Office of Cybersecurity and<br />
Communications<br />
Category: Most Notable Cybersecurity<br />
Program or Technology<br />
Product: National Cybersecurity<br />
Assessments and Technical Services<br />
(NCATS)<br />
<strong>2016</strong> Government Excellence Entry<br />
selected by judges:<br />
Agency: DOJ, OPM<br />
Category: Most Notable Government<br />
Security Program, Project of Initiative<br />
Product, Service or Program: Interagency<br />
Security Committee Risk Management<br />
Process (ISCRMP) Training Program<br />
<strong>2016</strong> Government Excellence Entry<br />
selected by judges:<br />
Agency: State of Montana<br />
Category: Most Notable State<br />
Government Program, Project or Initiative<br />
Program: State Information Technology<br />
Services Division (SITSD), State of<br />
Montana<br />
<strong>2016</strong> Government Excellence Entry<br />
selected by judges:<br />
Agency: Wombat Security Technologies<br />
Category: Most Notable Cybersecurity<br />
Program or Technology<br />
Product, Service or Program: Wombat<br />
Security Education Platform<br />
79
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
GSN <strong>2016</strong> Government Excellence Award<br />
USDA Agricultural Research Service (USDA-ARS)<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Federal Government Security Program,<br />
Project or Initiative<br />
Name of Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
BeyondTrust Powerbroker<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In June of 2015, the Office of Management and Budget<br />
(OMB) launched a 30-day Cybersecurity Sprint to assess<br />
and improve the health of all Federal assets and networks.<br />
Agencies were directed to protect Federal information<br />
systems, and improve the resilience of networks<br />
in both civilian and military organizations, then report<br />
on their successes and challenges. Organizations were<br />
instructed to immediately patch critical vulnerabilities<br />
and strictly limit the number of privileged users with access<br />
to authorized systems, while significantly accelerating<br />
the use of strong authentication for privileged users.<br />
The US Department of Agriculture, Agricultural Research<br />
Service (USDA-ARS), took the call to action seriously<br />
and set out to rapidly secure 11,000 privileged users in<br />
their windows environment. Deploying BeyondTrust<br />
Powerbroker for Windows in half the time expected<br />
for a deployment of this size, the USDA-ARS was able<br />
to secure and manage their privileged accounts quickly<br />
and efficiently. In many cases, achieving this well ahead<br />
of peer agencies.<br />
Legacy Software: Upgrades and Vulnerabilities<br />
The USDA-ARS began to see immediate benefits. “As<br />
we brought ARS sites from around the country into<br />
Enterprise Active Directory, under the agency domain,<br />
we found thousands of machines had older versions of<br />
software, such as Internet Explorer, Adobe, Java, etc.<br />
Many of these older versions of software were found to<br />
contain vulnerabilities and a mandate was generated to<br />
upgrade to the latest versions. With PBW, I was able to<br />
80
quickly and easily create rules that provided users the<br />
administrative privilege to uninstall old software and<br />
install new software without the need for administrative<br />
credentials,” said the project lead at the agency. In<br />
addition, this project allowed the agency to create a very<br />
large set of “canned” rules to allow background update<br />
services to install updates and patches. “We immediately<br />
began to see a drop in the number of vulnerabilities<br />
reported in these applications.”<br />
Elevating Specific Applications<br />
Like many of our government agencies, the US<br />
Department of Agriculture ARS has cases where one<br />
user, or several users, need to launch an application<br />
with administrator privileges on a specific machine or<br />
group of machines. However, they don’t need full-time<br />
administrator privileges or access to the username and<br />
password of a local administrator account as part of<br />
their day-to-day duties. This implementation allowed the<br />
agency to elevate the specific application to launch with<br />
administrative privileges without the user ever obtaining<br />
the username and password for a local administrator<br />
account. “Thus, the user is not able to login to the computer<br />
with an administrator account, thereby gaining<br />
administrator-level access to everything on the machine,<br />
nor do they have the ability to launch/install other<br />
applications using the built-in ‘Run-As’ function,” said<br />
the agency project lead. The USDA-ARS is making the security<br />
of their information systems a priority, achieving<br />
least privilege quickly and effectively. Congratulations to<br />
the agency teams and leadership for a job well done.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.beyondtrust.com/<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Mike Bradshaw, Partner<br />
Connect Marketing<br />
office: 801-373-7888<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
mikeb@connectmarketing.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Connect Marketing<br />
881 W. State Street<br />
Pleasant Grove, UT 84062<br />
81
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
GSN <strong>2016</strong> Government Excellence Award<br />
Federal Emergency Management Agency (FEMA)<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Cybersecurity Program or Technology<br />
Name of Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Personal Identity Verification (PIV)<br />
and Single Sign On (SSO) Enablement<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In June of 2015, the Office of Personnel Management<br />
suffered a high-profile data breach which spurred action<br />
on cyber security across numerous agencies. Adrian<br />
Gardner, the Chief Information Officer (CIO) of the<br />
Federal Emergency Management Agency (FEMA), was<br />
determined to safeguard his agency’s information. He<br />
sought a comprehensive, rigorous solution rather than a<br />
“Band-Aid” approach, and had a very aggressive schedule<br />
to implement the solution in six months. Mr. Gardner<br />
requested that 76 high priority systems be Personal<br />
Identity Verification (PIV) Card and Single Sign On<br />
(SSO) enabled to ensure that industry leading security<br />
standards, aligning with FEMA’s Target Actionable Architecture,<br />
would be applied to systems containing user<br />
information.<br />
The FEMA PIV SSO project was kicked off on October<br />
1, 2015, consisting of a joint FEMA-IBM initiative that incorporated<br />
efforts led by the Office of the Chief Information<br />
Officer (OCIO) and supported by various mission<br />
critical FEMA program areas. The scope of the effort<br />
included the implementation of an enterprise security<br />
infrastructure based on the IBM Security Access Manager<br />
(ISAM) Webseal, Federated Identity Manager (FIM)<br />
and Integrated Windows Authentication (IWA) technologies.<br />
FEMA’s systems leverage a wide variety of technologies,<br />
including Java, C++, .NET, PowerBuilder,<br />
and Mainframe. The PIV/SSO implementation approach<br />
varied depending upon the technology and existing<br />
authentication mechanism of the specific application.<br />
FEMA understood that no single solution would be<br />
82
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.fema.gov/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Given the nature of this project, there is limited publicly<br />
available information. What information can be found on the<br />
internet has been included here.<br />
able to address the authentication needs for all applications<br />
within an organization as large and complex as<br />
FEMA. Accordingly, the team created a standardized<br />
approach which took into consideration the systems’<br />
technical platforms (Powerbuilder, Java, .NET, Custom-<br />
Off-The-Shelf ) and other mitigating factors such as<br />
end user population types, need for mobility support,<br />
the production environment and other critical factors.<br />
Moreover, the integrated team took into consideration<br />
a user population that does not currently use PIV cards<br />
for access: namely state, local, tribal, and territorial<br />
(SLTT) users. The solution allowed them continued<br />
access to the systems through user name and password<br />
authentication as a temporary workaround until PIV-I<br />
would be rolled out.<br />
The system deployments were planned to minimize<br />
the impact to the mission of the organization. Application<br />
releases were grouped based on technology,<br />
authentication method and application dependency.<br />
The first group deployment, in mid-February <strong>2016</strong>,<br />
included applications dependent on the mission-critical<br />
National Emergency Management Information System<br />
(NEMIS) system. The second group of applications,<br />
mostly relying on the FEMA Integrated Security and<br />
Access Controls – FEMA Access Management System<br />
(ISAAC - FAMS) landing page, were deployed at the end<br />
of February. The last group of systems, primarily includ-<br />
Continued on next page<br />
This quick reference guide helps to demonstrate the proper<br />
use of the system. It helps to explain how the user interface<br />
changed to increase security without impacting current work<br />
products:<br />
http://floodmaps.fema.gov/tutorials/piv/MIP_PIV_<br />
Quick_Reference_Guide.pdf<br />
Note from FEMA Chief Information Security Officer (CISO),<br />
Donna Bennett to employees describing the implementation of<br />
the single sign on system:<br />
https://www.fema.gov/media-library-<br />
data/1458661814326-bf98611bc38ad-<br />
8ba63241578a3e2c145/PIVRollout.txt<br />
Helps to describe the innovative nature of FEMA’s authentication<br />
program and its impact:<br />
https://gcn.com/articles/<strong>2016</strong>/10/06/dig-it-fema-authentication.aspx<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Thomas Coleman, Partner<br />
IBM Global Business Services<br />
office: 301-803-6689<br />
cell: 202-320-3280<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
thomas.coleman@us.ibm.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
IBM Corporation<br />
600 14th St, NW, Floor 2<br />
Washington, DC 20005-2012, US<br />
83
ing Cloud based systems and systems outside of the<br />
FEMA Enterprise Network, were deployed at the end of<br />
March, meeting the initial six-month deadline through<br />
tight collaboration across all stakeholders.<br />
The completion of PIV/SSO enablement is a significant<br />
step in furthering FEMA’s cyber defenses and<br />
controls to better protect FEMA data, including information<br />
from disaster survivors and FEMA partners. The<br />
PIV/SSO effort not only introduced a scalable enterprise<br />
security platform but it also integrated all FEMA’s critical<br />
systems within the infrastructure to ensure the security<br />
of the organization’s applications and the data which<br />
it maintains. This was accomplished with minimal user<br />
interruption as the integrated FEMA-IBM team carefully<br />
planned the deployment of the systems taking into consideration<br />
FEMA restrictions of system changes during<br />
active disaster declarations.<br />
This project PIV enabled FEMA systems at the application<br />
level, allowing FEMA to attain the Level of<br />
Assurance 4, in accordance with the NIST SP 800-63<br />
requirements, for their high value systems. With this<br />
capability, the agency has transformed the way all users<br />
access their applications, simplifying and streaming<br />
their access to the applications while improving system<br />
security and reducing FEMA operational overhead of<br />
manually updating employee records. By creating a<br />
standardized solution approach across disparate identity<br />
architectures throughout different FEMA IT Systems,<br />
this project also reduces the effort for any new system to<br />
be integrated within FEMA’s enterprise security infrastructure<br />
in the future. The FEMA PIV/SSO effort applied<br />
industry-leading security standards and created a robust<br />
security layer, which enhances FEMA’s ability to both<br />
secure and control access to sensitive information. This<br />
implementation not only leveraged an architecture that<br />
conforms to various FICAM model objectives, but also<br />
helped FEMA reach its objective of meeting OMB and<br />
DHS mandates.<br />
Summary highlights of how the PIV/SSO initiative transformed<br />
FEMA’s security posture include:<br />
• Implementation of an architecture that conforms<br />
to goals for Federal Identity, Credential, and Access<br />
Management (FICAM) model.<br />
• FEMA attainment of Level of Assurance 4, in<br />
accordance with the NIST SP 800-63 requirements,<br />
for their high value systems.<br />
• Implementation of appropriate policy controls<br />
such as User Based Enforcement (UBE).<br />
• Reduced PII Exposure and improved audit<br />
reporting.<br />
• A standardized solution across disparate<br />
identity architecture throughout different<br />
FEMA IT Systems.<br />
• Reduced FEMA operational overhead of manually<br />
updating employee records.<br />
84
85
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
GSN <strong>2016</strong> Government Excellence Award<br />
Department of Homeland Security,<br />
Office of Cybersecurity and Communications<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Cybersecurity Program or Technology<br />
Name of Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
National Cybersecurity Assessments and Technical<br />
Services (NCATS)<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
In May 2015, the Department of Homeland Security<br />
(DHS) issued a first-of-its-kind binding operational<br />
directive (BOD) requiring all federal agencies to patch<br />
critical network vulnerabilities within 30 days. The National<br />
Cybersecurity Assessments and Technical Services<br />
(NCATS) Cyber Hygiene program was responsible for<br />
identifying critical vulnerabilities in agency systems.<br />
They helped create the BOD Scorecard, BOD vulnerability<br />
tracker, real-time dashboard with graphs for real-time<br />
situational awareness, and programmed a hierarchical<br />
data structure to enhance the categorization of each<br />
stakeholder’s internet protocol (IP) space. These products<br />
have improved DHS’s ability to determine a federal<br />
department or agency’s network security status in realtime.<br />
The National Cybersecurity Assessments and Technical<br />
Services (NCATS) program is located within the<br />
DHS’s Office of Cybersecurity and Communication’s<br />
86
National Cybersecurity and Communications Integration<br />
Center (NCCIC). The NCATS team focuses on proactively<br />
engaging with its federal, state, local, tribal, territorial<br />
and critical infrastructure partners to improve their<br />
cybersecurity posture, limit their exposure to risks and<br />
threats, and reduce rates of exploitation. The NCATS<br />
team offers cybersecurity services such as red teaming,<br />
penetration testing, and vulnerability scanning at no<br />
cost.<br />
To date, the NCATS program has worked with over<br />
386 organizations, delivered over 19,000 reports and<br />
helped resolve over 326,000 vulnerabilities. DHS’s<br />
Office of Cybersecurity and Communications Assistant<br />
Secretary Dr. Andy Ozment states, “NCATS is a lifeline to<br />
funding-constrained public and private sector partners,<br />
particularly among the critical infrastructure sectors.<br />
Their cybersecurity expertise in current and emerging<br />
threats provides an objective third-party perspective to<br />
help improve an organization’s cybersecurity posture.”<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
http://www.DHS.gov/cyber<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.us-cert.gov/ccubedvp/federal<br />
https://krebsonsecurity.com/2015/12/dhs-givingfirms-free-penetration-tests/<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Rob Karas, Director of National Cybersecurity<br />
Assessment & Technical Services (NCATS)<br />
Department of Homeland Security,<br />
Office of Cybersecurity and Communications<br />
Contact Bob Hopkins on his behalf: 703-235-5788<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Robert.Hopkins@hq.dhs.gov<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Department of Homeland Security,<br />
Office of Cybersecurity and Communications<br />
245 Murray Lane, SW<br />
Building 410, MS 645<br />
Washington, DC 20528<br />
Organizations participating in DHS’s “Cyber Hygiene” vulnerability<br />
scans. Source: DHS<br />
87
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
GSN <strong>2016</strong> Government Excellence Award<br />
Wombat Security Technologies<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Cybersecurity Program or Technology<br />
Name of Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Wombat Security Education Platform<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The Wombat Security Education Platform helps IT security<br />
professionals maximize learning and lengthen retention<br />
through the implementation of a continuous cycle of assessment,<br />
education, reinforcement, and measurement all<br />
in one integrated platform. Wombat’s methodology sits in<br />
strong contrast to a “one and done” approach, providing<br />
an innovative and appealing way to teach the end-user,<br />
which sharpens their security skills and gives IT security<br />
professionals and enterprises the opportunity to mitigate<br />
risk through constant security awareness. Wombat’s success<br />
in driving awareness and creating lasting behavior<br />
change for end users is demonstrated across a variety of<br />
industries. After pairing mock phishing attacks and interactive<br />
training modules, a large public college in the<br />
Northeastern U.S. saw a significant reduction in malware<br />
and viruses, a 90% reduction in successful phishing attacks<br />
from the wild, significantly fewer support requests, an<br />
increase in the number of users reporting incidents and<br />
attacks, and a greater awareness of issues.<br />
Wombat’s training program differentiates itself from<br />
other offerings by focusing on the following:<br />
• Learning Science Principles: Wombat applies traditional<br />
proven training methods to a modern education<br />
problem with an innovative software-based solution. All<br />
of Wombat’s training solutions utilize multiple learning<br />
science principles to engage the learner, lengthen retention<br />
and change behavior. Wombat’s training software<br />
asks learners to practice as they learn, provides immediate<br />
feedback for right and wrong answers, and provides<br />
teachable moments to show a learner what they don’t<br />
know.<br />
• Automating Attacks and Training: Wombat’s simulated<br />
88
attacks and knowledge assessments are integrated with<br />
cloud-based training modules so everyone who falls for<br />
an attack, or scores below an assessment threshold, can<br />
automatically be assigned training they can complete at<br />
a later time. This enables the organization to understand<br />
and address the riskiest users in their organization.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://www.wombatsecurity.com/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Testimonials page:<br />
https://www.wombatsecurity.com/about/testimonials<br />
Platform page:<br />
https://www.wombatsecurity.com/security-education<br />
Educate page:<br />
https://www.wombatsecurity.com/security-education/educate<br />
Independent media coverage:<br />
http://www.eweek.com/small-business/wombatreleases-security-education-platform.html<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Dasha (Daria) Ivanova, Account Coordinator<br />
SHIFT Communications<br />
office: 512-792-2543<br />
cell: 713-705-0158<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
divanova@shiftcomm.com<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SHIFT Communications<br />
200 E 6th Street, #202<br />
Austin, TX 78701<br />
Wombat’s Security Education Platform contains Security<br />
Assessment Tools that give customers important insights<br />
into susceptibility and allows them to narrow in on key<br />
areas of susceptibility. Clients can pair the company’s<br />
CyberStrength® knowledge assessments with Wombat’s<br />
ThreatSim®, SmishGuru®, and USBGuru® simulated<br />
attack programs for a comprehensive view of an organization’s<br />
potential vulnerabilities. Security officers also have<br />
the ability to customize training programs for the entire<br />
organization or to focus on a group of employees. Wombat’s<br />
mobile-responsive modules provide users increased<br />
flexibility and accessibility. Meeting U.S. 508 & WCAG<br />
compliance standards and offering more than 25 languages<br />
provides a diverse cross-section of users the opportunity<br />
to complete training requirements regardless of their<br />
native language or individual abilities. The newly released<br />
Dynamic Reporting capabilities within the Security Education<br />
Platform allow IT security professionals to seamlessly<br />
monitor user performance and deploy gamification of<br />
security education programs to further motivate employee<br />
engagement in training initiatives.<br />
Wombat Security Technologies is the first and only<br />
company to offer a complete suite of anti-phishing and<br />
security awareness assessment and training products that<br />
leverage progressive training techniques to effectively improve<br />
human response against cyber threats – up to a 90%<br />
reduction in malware infections and phishing attacks. The<br />
platform provides the ability to assess, educate, reinforce,<br />
and measure. This gives IT security professionals a solid<br />
foundation to implement an effective security awareness<br />
program, where each and every employee becomes a “security<br />
guard” of the company no matter what kind of cyber<br />
attack the company faces. Wombat’s Education Security<br />
platform is built on scientific research, which distinguishes<br />
Wombat from any other education platform across the<br />
security industry.<br />
89
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
GSN <strong>2016</strong> Government Excellence Award<br />
State of Montana<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable State Government Security Program,<br />
Project or Initiative<br />
Name of Nominated Product, Service,<br />
or Program:<br />
–––––––––––––––––––––––––––––––––––––––<br />
State Information Technology Services Division<br />
(SITSD), State of Montana<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
SITSD has been working to increase visibility in agencies<br />
across the state of Montana including Health & Human<br />
Services, the Department of Revenue, the Department<br />
of Administration and the Judicial Department, through<br />
the use of Splunk Enterprise and Splunk Enterprise<br />
Security. SITSD utilizes this platform to improve the<br />
security posture of the state, and is doing so through<br />
troubleshooting and other crucial capabilities. The<br />
SITSD team is also now able to monitor multiple security<br />
categories – including information across the network,<br />
directories, web filtering, DNS and virtual servers<br />
– as well as the security bandwidth of various agencies<br />
across the state.<br />
Within SITSD, security teams now have the ability to<br />
build and use threat intelligence dashboards, providing<br />
visibility into all threat intelligence activity across the<br />
network. Using these dashboards, the team automatically<br />
accesses datafrom agencies across the state within<br />
minutes to assess and mitigate potential threats. Prior to<br />
implementing the security platform, the team manually<br />
retrieved this information, which was very time consuming.<br />
Security personnel can now pull data from multiple<br />
sources into one pool for unified search discovery and<br />
troubleshooting. Examples are Firewall, Websense Filtering,<br />
Netscaler, Active Directory Auditing, DNS, and VM<br />
machine access.<br />
In addition to these new capabilities, teams within<br />
SITSD have begun to function in a proactive manner<br />
90
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://sitsd.mt.gov/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The State Informational Technology Services Division is part of<br />
the Montana Department of Administration. The mission of the<br />
State Information Technology Services Division is to provide<br />
shared IT services to support the needs of the state and citizens<br />
of Montana:<br />
http://sitsd.mt.gov/Services-Support/Enterprise-<br />
Architecture<br />
rather than in the reactive way they functioned prior to<br />
deploying the platform. They can now fully understand<br />
their threat environment and monitor all types of data,<br />
which has led to a major increase in efficiency and information<br />
sharing across Montana. The state no longer has<br />
to assess threats on a case-by-case basis, and can more<br />
efficiently and effectively protect the data of the state,<br />
and therefore its citizens.<br />
This program has become a critical tool for Montana’s<br />
network. “Any time we have network or content<br />
filtering issues, our go-to is Splunk. Previously, troubleshooting<br />
issues could take hours, and multiple people<br />
across different bureaus working together as the logs<br />
were from several sources,” said Randy Haefka, Enterprise<br />
Support Services Section Supervisor, Enterprise<br />
Technology Services Bureau, SITSD/Montana Department<br />
of Administration. The team now has all of its<br />
tools and information centralized on one platform,<br />
which further enables it to be proactive and maintain<br />
the integrity of the state’s network.<br />
Independent media coverage:<br />
http://sitsd.mt.gov/News-Events/PID/22417/evl/0/<br />
CategoryID/125/CategoryName/Current-SITSD-<br />
News<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Ron Baldwin, Chief Information Officer<br />
State of Montana<br />
office: 406-444-2777<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
RBaldwin@mt.gov<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
State of Montana<br />
Department of Administration<br />
125 N. Roberts<br />
Helena, MT 59620<br />
91
GSN <strong>2016</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />
<strong>2016</strong><br />
GSN <strong>2016</strong> Government Excellence Award<br />
DOJ, OPM<br />
<strong>2016</strong> Winner<br />
Awards Category:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Most Notable Federal Government Security Program,<br />
Project of Initiative<br />
Name of Nominated Product, Service,<br />
or Program:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Interagency Security Committee Risk Management<br />
Process (ISC RMP) Training Program<br />
Reason this entry deserves to win:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Approximately 350,000 Federal facilities across the country<br />
require a comprehensive risk assessment methodology<br />
that addresses threat, consequence, and vulnerability of<br />
the 33 undesirable events identified in the Department of<br />
Homeland Security (DHS), Interagency Security Committee<br />
(ISC) Standard Report. Often facility security practitioners<br />
do not always consider all the undesirable events<br />
when conducting risk assessments due to lack of expertise<br />
or available resources, leaving facilities vulnerable to risk,<br />
exposed to unnecessary expense, and non-compliant with<br />
the ISC standards.<br />
The ISC RMP Training Program was first established as<br />
a pilot course in May 2011 by the DOJ. After some refinement,<br />
the course documentation was submitted to the<br />
ISC and approved in December 2011 as the first official<br />
risk management process training program. At the end of<br />
2012, DOJ reached out to OPM to establish a partnership<br />
to have the highly regarded program managed by OPM/<br />
EMDC, based on their 50 year history in delivering stellar<br />
leadership and management development programs.<br />
The DOJ/OPM partnership officially kicked off with the<br />
first open enrollment course delivered in Washington, DC<br />
in January 2014. The feedback from the participants in this<br />
first course reflected an overall success score of 4.93 out a<br />
possible 5.0.<br />
The ISC RMP Training Program continues to reach new<br />
heights and achieve success. Most recently, the program<br />
recognized and celebrated the graduation of the 500th<br />
participant. The program has been successfully delivered<br />
92
to over 540 graduates from 57 different agencies, with<br />
participants ranging from GS-6 to SES. The number of<br />
participants continues to grow substantially, with increasing<br />
numbers coming from the Department of Defense.<br />
The program has been delivered more than 29 times to<br />
date, with additional single agency requested or ad hoc<br />
sessions being added to the training schedule each year.<br />
The program also continues to receive higher than industry<br />
average course evaluation scores.<br />
The success of the program is demonstrated in the<br />
significant increase in the number of security practitioners<br />
who effectively establish risk assessment methodologies<br />
for their facilities that comply with the ISC RMP standards.<br />
Participants who are responsible for securing their agencies<br />
facilities and practitioners who participate in the<br />
development of security countermeasures receive access<br />
to the first ISC certified and approved Risk Management<br />
Process Tool, designed to automate the process of calculating<br />
facility security levels and identifying the relevant<br />
countermeasures associated with various types of threats,<br />
consequences, and vulnerabilities of the 33 undesirable<br />
events.<br />
Graduates of the ISC RMP Training Program are able to:<br />
• Provide guidance to Facility Security Committees<br />
(FSCs)<br />
• Perform ISC-Compliant Risk Assessments<br />
• Determine Facility Security Levels (FSL)<br />
• Identify Necessary Levels of Protection (LOP)<br />
Establishing and executing a comprehensive risk assessment<br />
methodology is a challenge for many Federal facility<br />
security professionals across the country. The ISC RMP<br />
Training Program should be recognized by the Government<br />
Security News <strong>2016</strong> Homeland Security Awards Program<br />
for providing a blended learning solution for Federal<br />
agencies to address risk assessment challenges, reduce<br />
cost and inefficiencies of their security resources, and mitigate<br />
the impact of undesirable events at their facilities.<br />
Link to Web Page of Nominated Organization:<br />
––––––––––––––––––––––––––––––––––––––––<br />
https://cldcentral.usalearning.net/<br />
Link to additional information:<br />
––––––––––––––––––––––––––––––––––––––––<br />
The Department of Justice and Office of Personnel Management partnered<br />
to offer the ISC Risk Management Process Training Program. This course is<br />
designed to provide opportunities for individuals to become experienced<br />
with the ISC Risk Management Process. Participants learn how to accurately<br />
summarize the main features of the ISC Risk Management Process, identify<br />
how its implementation benefit their organization; and given the risk assessment,<br />
make informed, risk-based decisions. The training program consists<br />
of collaborative exercises, hands-on interactive training, and instruction<br />
from accomplished risk management professionals. This is the first and only<br />
ISC certified and approved training course offered to Federal audiences:<br />
https://leadership.opm.gov/programs.aspx?c=180<br />
The current lead RMP instructor, E. Reid Hilliard, also won the GSN’s 2010<br />
federal trophy for his team leadership in documenting the Physical Security<br />
Criteria for Federal Facilities. Note: This nomination is for the training that’s<br />
been implemented based on the 2010 work products:<br />
http://gsnmagazine.com/article/21986/everett_reid_hilliard_doj_and_interagency_security<br />
Nominating contact for this entry:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Reid Hilliard, Assistant Director<br />
Justice Protective Services, DOJ<br />
office: 202-598-1441 cell: 202-514-1441<br />
Janet White, Education Program Director<br />
Eastern Management Development Center,<br />
Center for Leadership Development, OPM<br />
office: 202-606-6531 cell: 202-731-8631<br />
Kevin McCombs<br />
Director Security Services Facilities, Security, and Emergency Management,<br />
OPM<br />
office: 202-418-0201 cell: 202-345-0025<br />
Nominating contact email address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
Everett.R.Hilliard@usdoj.gov<br />
Nominating organization address:<br />
––––––––––––––––––––––––––––––––––––––––<br />
U.S. Department of Justice<br />
Office of Personnel Management<br />
950 Pennsylvania Avenue, NW<br />
1900 E Street, NW<br />
Washington, DC 20530-0001<br />
Washington, DC 20415<br />
93
The News Leader in Physical, IT and Homeland Security<br />
CEO/Editorial Director<br />
Adrian Courtenay<br />
917-696-5782<br />
acourtenay@gsnmagazine.com<br />
Editor<br />
Steve Bittenbender<br />
502-552-1450<br />
sbittenbender@gsnmagazine.com<br />
Senior Writer<br />
Karen Ferrick-Roman<br />
412-671-1456<br />
karenferrickroman@gmail.com<br />
Columnist<br />
Shawn Campbell<br />
Campbell on Crypto<br />
shawn.campbell@safenetat.com<br />
Columnist<br />
George Lane<br />
Hazmat Science & Public Policy<br />
georgelane@hotmail.com<br />
Contributing Author<br />
Lloyd McCoy Jr<br />
Immix Group<br />
Contributing Author<br />
Walter Ewing<br />
Contributing Author<br />
Wendy Feliz<br />
Contributing Author<br />
Joshua Breisblatt<br />
Contributing Author<br />
J. Michael Barrett<br />
Contributing Author<br />
Christopher Millar<br />
Gatekeeper Security<br />
Art Director<br />
Gerry O’Hara, OHDesign3<br />
gerry@ohd3.com<br />
203-249-0626<br />
Production Manager<br />
Brenden Hitt<br />
Brenden.hitt@gsnmagazine.com<br />
Direct: 203-216-7798<br />
FREE<br />
SUBSCRIPTION<br />
SIGN-UP<br />
Monthly Digital Edition<br />
Airport/Seaport Newsletter<br />
Daily Insider Newsletter<br />
Cybersecurity Newsletter<br />
CLICK HERE<br />
94