19.02.2015 Views

2014 Digital Yearbook of Homeland Security Awards

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The GSN <strong>2014</strong><br />

<strong>Digital</strong><br />

<strong>Yearbook</strong><br />

<strong>of</strong><br />

<strong>Homeland</strong><br />

<strong>Security</strong><br />

<strong>Awards</strong>


Thanks to our<br />

generous sponsors<br />

for making this<br />

important program<br />

possible.<br />

Thanks to our<br />

generous sponsors<br />

for making this<br />

yearbook possible<br />

About the GSN <strong>Homeland</strong><br />

<strong>Security</strong> <strong>Awards</strong> Program<br />

The Government <strong>Security</strong> News <strong>Awards</strong> Program was<br />

organized in 2009 to honor the distinguished vendors <strong>of</strong><br />

IT and Physical <strong>Security</strong> products and solutions, and the<br />

dedicated <strong>of</strong>ficials in federal, state, county and municipal<br />

government, whose combined efforts keep our nation<br />

safe and secure 24/7.<br />

We are also pleased to honor the vendors and government<br />

<strong>of</strong>ficials <strong>of</strong> other nations that have chosen to participate in<br />

this year’s program with their prize-winning entries.<br />

<strong>Homeland</strong> <strong>Security</strong> in many nations benefits from remarkable<br />

technology breakthroughs and ever-more sophisticated<br />

programs from government agencies, <strong>of</strong>ten produced in<br />

productive collaboration with private industry.<br />

We hope you find our awards program’s findings regarding<br />

the great achievements <strong>of</strong> the past year in the field <strong>of</strong><br />

<strong>Homeland</strong> <strong>Security</strong> to be interesting and informative.<br />

Adrian Courtenay, CEO<br />

Government <strong>Security</strong> News<br />

2


TABLE OF CONTENTS<br />

4<br />

6<br />

8<br />

10<br />

12<br />

16-37<br />

39<br />

42<br />

46-67<br />

68<br />

70<br />

74-99<br />

100<br />

Meet the Sponsors: Tenable<br />

Meet the Sponsors: HID Global<br />

Meet the Sponsors: Agiliance<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Solutions<br />

GSN Interview – Chuck Brooks,<br />

Distinguished Judge<br />

Winners in IT <strong>Security</strong> Categories<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Solutions<br />

GSN Interview – Scott Greiper,<br />

Distinguished Judge<br />

Winners in Physical <strong>Security</strong> Solutions<br />

Government Agency <strong>Awards</strong><br />

GSN Interview – K. Denise Krepp,<br />

Distinguished Judge<br />

Winners <strong>of</strong> Government Agency <strong>Awards</strong><br />

Government <strong>Security</strong> News<br />

About the Statute:<br />

The Statue <strong>of</strong> Liberty, a symbol<br />

<strong>of</strong> freedom and the United<br />

States, was designed by the<br />

French sculptor Frederic<br />

Auguste Bartholdi, given to the<br />

United States by the people<br />

<strong>of</strong> France and dedicated on<br />

October 28, 1886. The robed<br />

female figure representing the<br />

Roman goddess Libertas bears<br />

a torch and a tablet evoking<br />

the law, on which is inscribed<br />

the date <strong>of</strong> the American<br />

Declaration <strong>of</strong> Independence,<br />

July 4, 1776. The statue is an<br />

icon <strong>of</strong> freedom and a welcoming<br />

signal to immigrations<br />

arriving from abroad.<br />

3


MEET THE SPONSORS<br />

Continuous Network Monitoring for<br />

Government Agencies<br />

by Jennifer Collis, Government Solutions Marketing<br />

Manager, Tenable Network <strong>Security</strong><br />

When Tenable Network <strong>Security</strong> ® was founded in 2002, its<br />

founders knew that there were no quick and easy solutions<br />

for solving complex security problems. Tenable’s first<br />

product, Nessus ® , went on to become the most widely deployed<br />

vulnerability scanner in the world and is acknowledged<br />

as the global standard in detecting and assessing<br />

network data.<br />

4<br />

But a lot has changed since 2002. The modern IT landscape<br />

has expanded to include laptops, mobile devices,<br />

virtual systems, and cloud-based applications. In a BYOD<br />

(“bring your own device”) environment, employees use<br />

their own personal devices for work, introducing a significant<br />

risk into the traditional IT infrastructure. While these<br />

devices increase the agility <strong>of</strong> an organization, they also<br />

introduce visibility and security gaps, leaving the organization<br />

open to vulnerabilities and breaches. Periodic scanning<br />

helps, but it can miss devices that are not connected<br />

to the network 100% <strong>of</strong> the time. And if those devices have<br />

been surfing the Internet or shopping online, they may be<br />

completely unprotected from exploits and attacks.<br />

Another significant risk on the modern IT network is the<br />

prevalence <strong>of</strong> cloudbased<br />

applications<br />

and virtual systems.<br />

IT security managers<br />

may not be aware <strong>of</strong><br />

all virtual machines,<br />

many <strong>of</strong> which might<br />

be created and used<br />

for transient purposes.<br />

And the security<br />

team may also be unaware <strong>of</strong> the many cloud-based<br />

hosted services used by various departments.<br />

This is why Tenable has been pioneering continuous<br />

network monitoring since 2004: to ensure that your entire<br />

security program is aligned and working 24/7 to assess<br />

and protect today’s hybrid network systems. Continuous,


automated testing <strong>of</strong> a network’s defenses against a security<br />

policy is the best method to monitor the health and<br />

assurance <strong>of</strong> your network.<br />

NIST defines continuous network monitoring as “maintaining<br />

ongoing awareness <strong>of</strong> information security, vulnerabilities,<br />

and threats to support organizational risk management<br />

decisions.”<br />

Continuous network monitoring is one <strong>of</strong> the most<br />

promising developments in Next Generation Vulnerability<br />

Management (NGVM). Instead <strong>of</strong> scanning periodically,<br />

agencies can now implement real-time scanning to<br />

eliminate blind spots. A well-run network should include<br />

solutions that accurately measure security risks in real<br />

time and bring together the processes <strong>of</strong> asset discovery,<br />

vulnerability detection and configuration auditing.<br />

Tenable’s <strong>Security</strong>Center Continuous View (<strong>Security</strong>-<br />

Center CV) includes innovative continuous network<br />

monitoring tools, such<br />

as passive vulnerability<br />

scanning on devices<br />

that are not always<br />

connected to the<br />

network, log correlation<br />

and analysis, tight<br />

integrations with the<br />

security ecosystem, and<br />

advanced threat detection<br />

technologies. <strong>Security</strong>Center CV’s centralized console<br />

manages distributed Nessus vulnerability scanners for<br />

agency-wide security and compliance visibility. Sensors<br />

automatically discover and assess traditional IT systems,<br />

mobile users, virtual networks, and cloud-based applications.<br />

Advanced analytics, including extensive dashboards<br />

and customizable reports, aggregate scan data to help<br />

5<br />

you identify and remediate security and compliance<br />

issues.<br />

In today’s IT environment, an unknown risk can compromise<br />

your agency and put your executive management<br />

at the center <strong>of</strong> media attention. Continuous<br />

network monitoring provides peace <strong>of</strong> mind by reporting<br />

against any number <strong>of</strong> compliance standards and<br />

your own security policy. Only a well-run, carefully managed<br />

network can achieve security that is “obtainable<br />

and defendable,” which is the very meaning <strong>of</strong> the word<br />

tenable.<br />

About Tenable Network <strong>Security</strong><br />

Tenable Network <strong>Security</strong> provides continuous network<br />

monitoring to identify vulnerabilities, reduce risk and<br />

ensure compliance. Our family <strong>of</strong> products includes<br />

<strong>Security</strong>Center Continuous View, which provides the<br />

most comprehensive and integrated view <strong>of</strong> network<br />

health, and Nessus ® , the global standard in detecting<br />

and assessing network data. Tenable is relied upon by<br />

many <strong>of</strong> the world’s largest corporations, not-for-pr<strong>of</strong>it<br />

organizations and public sector agencies, including the<br />

entire U.S. Department <strong>of</strong> Defense. For more information,<br />

please visit tenable.com.


MEET THE SPONSORS<br />

HID Global completes consolidation<br />

at its Austin, TX, world headquarters<br />

and North American operations center<br />

Austin, TX-based HID Global, a worldwide provider <strong>of</strong><br />

secure identity solutions, has announced it has completed<br />

the consolidation <strong>of</strong> its world headquarters and North<br />

American Operations Center. The company has also<br />

achieved recognition by three organizations for successfully<br />

implementing some <strong>of</strong> the industry’s most stringent<br />

sustainability guidelines in the design, construction and<br />

operation <strong>of</strong> its 250,000 square feet <strong>of</strong> manufacturing, <strong>of</strong>fice<br />

and warehouse space.<br />

“We are very proud <strong>of</strong> our accomplishments, and grateful<br />

for the tremendous support we’ve received from the<br />

Austin community during this process,” said Jason Bohrer,<br />

vice president and general manager for HID Global’s<br />

North American Operations Center. “This facility has<br />

become our focal point for worldwide manufacturing<br />

excellence and a showcase for operational quality and<br />

sustainability that will enable us to strengthen and expand<br />

6<br />

our leadership <strong>of</strong>fering <strong>of</strong> world-class secure identity solutions.”<br />

Since opening its Austin facility in January <strong>2014</strong>, HID<br />

Global has successfully achieved the following:<br />

• Hired 310 employees.<br />

• Completed consolidation <strong>of</strong> all North American manufacturing<br />

operations, with 45 percent <strong>of</strong> all global<br />

revenue now being generated out <strong>of</strong> the new facility.<br />

The facility is also expected to become the cornerstone<br />

for manufacturing government ID credentials that will<br />

be shipped around the globe. HID Global will be pursuing<br />

a number <strong>of</strong> additional security certifications for its<br />

operation in the coming 12 to 18 months.<br />

• Earned recognition as the only industrial manufacturing<br />

facility in the state <strong>of</strong> Texas to achieve the highest, platinum-level<br />

distinction in the U.S. Green Building Council<br />

(USGBC) LEED rating program.<br />

• Received a four- out <strong>of</strong> five-star rating from Austin Energy<br />

Green Building (AEGB), which focuses on the city’s<br />

more stringent energy, water and indoor environmental<br />

quality requirements.


• Was named one <strong>of</strong> the city’s best new buildings in<br />

Austin Business Journal’s 15th annual Commercial Real<br />

Estate <strong>Awards</strong> competition.<br />

HID Global is a trusted source for innovative products,<br />

services, solutions, and know-how related to the creation,<br />

management, and use <strong>of</strong> secure identities for millions <strong>of</strong><br />

customers around the world. The company’s served markets<br />

include physical and logical access control, including<br />

strong authentication and credential management; card<br />

printing and personalization; visitor management systems;<br />

highly secure government and citizen ID; and identification<br />

RFID technologies used in animal ID and industry<br />

and logistics applications. The company’s primary brands<br />

include ActivID, EasyLobby, FARGO, IdenTrust, LaserCard,<br />

Lumidigm, and HID. HID Global has over 2,200 employees<br />

worldwide and operates international <strong>of</strong>fices that<br />

support more than 100 countries. HID Global is an ASSA<br />

ABLOY Group brand. For more information, visit http://<br />

www.hidglobal.com.<br />

7


MEET THE SPONSORS<br />

GSN INTERVIEW<br />

Joe Fantuzzi, President and CEO, Agiliance, Inc.<br />

– <strong>2014</strong> Winner, Best Compliance / Vulnerability Assessment Solution<br />

– <strong>2014</strong> Finalist, Best Big Data Analytics Solution<br />

– <strong>2014</strong> Finalist, Best Continuous Monitoring Solution<br />

Joe Fantuzzi has been president and CEO <strong>of</strong> Agiliance since January 2010. He drives the company’s business direction,<br />

strategy, and execution. His team successfully pioneered and delivered the first massively scaled, real-time Cyber <strong>Security</strong><br />

Operational Risk solution in the market. Bringing 25 years <strong>of</strong> s<strong>of</strong>tware experience to Agiliance, Joe is an expert in<br />

creating high-growth, venture-backed businesses in emerging technology markets, and has helped building over<br />

$3 billion in market valuation as an executive for industry leading companies throughout his career.<br />

GSN: Tell us a little bit more about Agiliance.<br />

JF: Agiliance is known as the Big Data Risk Management<br />

Company. We deliver integrated Cyber <strong>Security</strong> and Operational<br />

Risk Intelligence via cloud-managed services and<br />

s<strong>of</strong>tware. Agiliance solutions automate how Global 2000<br />

companies and government agencies achieve continuous<br />

monitoring <strong>of</strong> big data across financial, operations, and IT<br />

domains to orchestrate incident, threat, and vulnerability<br />

actions. RiskVision customers demonstrate automation use<br />

cases within 30 days on-demand, and within 60 days onpremise,<br />

made possible by a configurable, purpose-built<br />

platform and applications, leveraging over 70 data integrations<br />

to <strong>of</strong>f-the-shelf s<strong>of</strong>tware, and mapping content from<br />

over 300 domains and regulations. RiskVision scales with<br />

organizations, effectively managing assets, data, people,<br />

and processes to achieve 100 percent risk and compliance<br />

coverage. Its real-time risk analysis leads executives<br />

8<br />

to optimized business performance and better investment<br />

decisions.<br />

What key issues does RiskVision resolve<br />

for organizations?<br />

JF: RiskVision delivers real-time ‘data-to-command’ risk<br />

intelligence. Customer use cases are Incident Risk Response<br />

(IRR), Threat and Vulnerability Mitigation (TVM),<br />

Third-Party Risk (TPR), and Operational Risk Management<br />

(ORM). Previous approaches cost $10s <strong>of</strong> millions to piece<br />

together data from the mission, security, and IT operations,<br />

only to learn the data was obsolete once presented,<br />

and cyber-attackers had been inside the infrastructure for<br />

months. RiskVision’s integrated data model and massively<br />

scalable architecture change the game on cyber-attackers<br />

by speeding up the process to make cyber risks visible,<br />

measureable, and actionable. Inaccuracies are reduced


and legacy systems are retired, saving both time and money.<br />

Some production clients manage over 1 million assets<br />

and have over 10,000 daily users. Benefits are incident<br />

reduction, 5 – 10x faster time-to-remediation, less audit<br />

failures, and 2 – 3x operational efficiency gains.<br />

Please describe a major federal agency<br />

using the Agiliance RiskVision approach.<br />

JF: The U.S. Department <strong>of</strong> Veterans Affairs (VA) is one<br />

such example. They were experiencing major operational<br />

efficiency issues stemming from their Assessment and<br />

Authorization (A&A) procedures. Per FISMA law, every<br />

online system must maintain an Authority to Operate<br />

(ATO) certification, and FISMA subjects must renew their<br />

ATOs for every major<br />

system change. For the<br />

agency, this meant manual<br />

gathering and assessing<br />

millions <strong>of</strong> check results<br />

generated by third-party<br />

security monitoring tools.<br />

The problem with this approach<br />

was the vast amounts <strong>of</strong> data it produced and great<br />

difficulty understanding the real meaning <strong>of</strong> the collected<br />

data and correlating it to the agency’s compliance posture.<br />

And by time the data was processed and analyzed, it<br />

was no longer actionable. All the time and money spent<br />

collecting it, was wasted. As a result, completing each<br />

ATO was a labor- and time-intense process, inhibiting the<br />

agency’s ability to meet their audit deadlines.<br />

The agency implemented RiskVision to collect data<br />

from their IT and security tools and perform real-time<br />

diagnostics and mitigation using NIST SP 800-137 and the<br />

NIST IR 7756 (CEASARS) risk frameworks. The VA project<br />

is the largest cyber security risk project in the world, conducting<br />

daily control checks for 1+ million systems for<br />

more than 130 technical controls at the VA centers in DC<br />

and Austin, Texas; providing access to 4,000 workflow and<br />

reporting users, as well as 400,000 policy attestation users.<br />

9<br />

Now the VA can cross-verify controls between federal regulatory<br />

risk management frameworks such as FISMA, NIST<br />

SP 800-53, and CyberScope. After deploying RiskVision, the<br />

agency achieved significant cost and time saving. Rather<br />

than collecting each bit <strong>of</strong> data generated by more than 1<br />

million data collection points, the IT personnel now gathers<br />

and stores highly relevant information and attends to<br />

high-risk issues in a timely manner.<br />

How does Agiliance see the future <strong>of</strong> Cyber<br />

<strong>Security</strong> Operational Risk?<br />

JF: Notwithstanding better analytics and decision-making<br />

from use <strong>of</strong> big data technologies, cloud-managed services<br />

is the new way to informed risk management. In<br />

<strong>2014</strong> alone, our clouddelivered<br />

clients grew<br />

over 600 percent versus<br />

2013, led by customers in<br />

the Financial Services and<br />

Healthcare industries.<br />

One <strong>of</strong> our Financial Services<br />

customers is already<br />

managing 200,000 critical assets with an end-to-end threat,<br />

vulnerability, and ticketing solution delivered on the<br />

RiskVision platform and several connected technologies,<br />

all in the cloud. We’ve developed RiskVision’s managed<br />

services to be cloud security hardened and ready for cloud<br />

risk programs that are deploying in the DoD, IC, and civilian<br />

agencies. With pioneering efforts <strong>of</strong> CSA, FedRAMP,<br />

NIST, and others on cloud security, and the need to stand<br />

up solutions with operational efficiency, over 70% <strong>of</strong> cyber<br />

security operation risk management will be centered in<br />

the cloud by 2018.<br />

I can be reached by Twitter: @joe_fantuzzi and<br />

by email: jfantuzzi@agiliance.com<br />

On behalf <strong>of</strong> Agiliance and our customers, thank<br />

you for an opportunity to share our perspectives with<br />

your readers.


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

VENDORS OF IT SECURITY SOLUTIONS<br />

11<br />

12<br />

Roster <strong>of</strong> <strong>2014</strong> Winners<br />

GSN Interview with Distinguished Judge <strong>of</strong> <strong>2014</strong> <strong>Awards</strong>,<br />

Chuck Brooks<br />

16<br />

18<br />

22<br />

24<br />

26<br />

28<br />

30<br />

32<br />

34<br />

36<br />

38<br />

Winning entries reproduced with permission <strong>of</strong>:<br />

Blue Ridge Networks<br />

Agiliance<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC<br />

Encryptics<br />

NICE Systems<br />

Solar Wind<br />

Tenable Network <strong>Security</strong><br />

Event Tracker<br />

Applied Visions, Inc. / Secure Decisions Division<br />

10


Winners in the <strong>2014</strong><br />

<strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

VENDORS OF IT SECURITY SOLUTIONS<br />

Best Anti-Malware Solution<br />

Blue-Ridge Networks – Winner<br />

Palo Alto Networks – Finalist<br />

Cyphort Inc – Finalist<br />

Best Identity Management Platform<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />

NetIQ – Winner<br />

Real Time Technology Network – Finalist<br />

Best Compliance/Vulnerability Solutions<br />

Agiliance Inc – Winner<br />

Solar Winds – Finalist<br />

Pro<strong>of</strong>point, Inc – Finalist<br />

Applied Visions, Inc <strong>Security</strong> Division – Finalist<br />

RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Finalist<br />

TSA Advantage – Finalist<br />

Best Data <strong>Security</strong>/Loss<br />

Management Solution<br />

Imperva – Winner<br />

RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />

Waratec – Finalist<br />

Power Amin LLC – Finalist<br />

Watchful S<strong>of</strong>tware – Finalist<br />

Best Email <strong>Security</strong> &<br />

Integration Solution<br />

Encryptics – Winner<br />

Good Technology – Finalist<br />

Pro<strong>of</strong>point, Inc – Finalist<br />

Best Endpoint Securty Systems<br />

Bromium – Winner<br />

RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Finalist<br />

11<br />

Best Forensic S<strong>of</strong>tware<br />

NICE Systems – Winner<br />

RSA, Division <strong>of</strong> EMC – Finalist<br />

Big Data Analytics Solution<br />

Splunk – Winner<br />

RSA Division <strong>of</strong> EMC – Finalist<br />

Agiliance – Finalist<br />

Best Intrusion Detection/Prevention Solution<br />

Venyu Solutions – Winner<br />

Best Network <strong>Security</strong>/Enterprise Firewall<br />

Palo Alto Networks – Winner<br />

Black Lotus Communications – Finalist<br />

Firemon – Finalist<br />

Forescout – Winner – Finalist<br />

Best Privileged Access<br />

Management Solution<br />

RSA <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />

Beyond Trust – Winner<br />

Best Continuous Monitoring Solution<br />

Solarwinds – Winner<br />

Tenable Network <strong>Security</strong> – Winner<br />

Agiliance – Finalist<br />

Firemon –<br />

Lancope – Finalist<br />

Power Admin – Finalist<br />

Best <strong>Security</strong> Incident &<br />

Event Management Solution (SIEM)<br />

Event Tracker – Winner<br />

RSA, <strong>Security</strong> Division <strong>of</strong> EMC – Winner<br />

NetIQ – Finalist<br />

LogRhythm, Inc – Finalist<br />

Solarwinds – Finalist


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

Chuck Brooks, Distinguished Judge,<br />

GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

Charles (Chuck) Brooks serves as Vice President/Client Executive for DHS at Xerox. Chuck<br />

served as the first Director <strong>of</strong> Legislative Affairs for the Science & Technology Directorate within<br />

the Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>. He was an Adjunct Faculty Member at Johns Hopkins<br />

University, where he taught a graduate course on “Congress and <strong>Homeland</strong> <strong>Security</strong>.” He also<br />

spent 6 years on Capitol Hill as a Senior Advisor on national security issues to the late Senator<br />

Arlen Specter. Chuck has an MA in International Relations from the University <strong>of</strong> Chicago and<br />

a BA in Political Science from DePauw University. He has served in several senior executive<br />

corporate roles and is widely published as a thought leader on subjects relating to homeland security, technology,<br />

innovation, CBRNE, and cybersecurity. He also operates two <strong>of</strong> the largest homeland security groups on LinkedIn<br />

and is a featured speaker at government and industry conferences. Chuck has also served as a judge for three recent<br />

Government <strong>Security</strong> News industry homeland security awards events.<br />

GSN: What is the threat landscape for the<br />

Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> as it<br />

enters its second decade <strong>of</strong> operations?<br />

CB: DHS has made great progress over the last decade<br />

but the current threat level is now heightened for DHS,<br />

the intelligence community, and law enforcement as a<br />

result <strong>of</strong> evolving threats. The most immediate threat is<br />

posed by ISIS and affiliated Islamic extremists who have<br />

gained combat experience in Iraq and Syria and have access<br />

to Western passports. Rep. Michael McCaul (R-Texas),<br />

chairman <strong>of</strong> the House <strong>Homeland</strong> <strong>Security</strong> Committee,<br />

said these terrorists “present the greatest threat we’ve<br />

seen since 9/11.” Also, a decade ago terrorists’ ability to<br />

12<br />

organize and mobilize was more limited because <strong>of</strong> communication<br />

capabilities. The exponential growth in smart<br />

phones (there are now 14B smartphones worldwide) and<br />

the terrorists’ use <strong>of</strong> social media has made surveillance<br />

and monitoring <strong>of</strong> those who might threaten the homeland<br />

a bigger challenge.<br />

The defense against CBRNE (chemical, biological,<br />

radiological, nuclear, and explosive) threats will continue<br />

to be priorities <strong>of</strong> DHS because <strong>of</strong> the asymmetrical terror<br />

consequences they present. The recent Ebola outbreak<br />

illustrates our vulnerability to pandemics and infectious<br />

disease outbreaks. The potential for bio-terrorism directed<br />

by non-state actors is a frightening but real scenario. Right-


fully so, countering biological threats remains a high priority<br />

at DHS. As our experiences in Afghanistan and Iraq<br />

have shown, man portable improvised explosive devices<br />

(IEDS) and vehicle-borne IEDS are still a major concern,<br />

especially against s<strong>of</strong>t targets.<br />

Other threats such as chemical and radiological<br />

substance releases, and natural disasters from floods, hurricanes<br />

and earthquakes all still pose plausible and dire<br />

threats to the homeland. Unfortunately, it is likely that the<br />

nation’s preparedness will be tested again in the coming<br />

decade.<br />

One area where DHS has taken on an increasingly<br />

larger role is in cybersecurity. Presidential Directives have<br />

mandated DHS to play the primary role in the civilian side<br />

<strong>of</strong> government for cybersecurity. A major reason for the<br />

new focus on cybersecurity has been the rapid changes<br />

in the information technology landscape. Since 2003, the<br />

capabilities and connectivity <strong>of</strong> cyber devices and communications<br />

has grown exponentially. Concurrently, so<br />

have the cyber intrusions and threats from malware and<br />

hackers. This has required restructuring <strong>of</strong> priorities and<br />

the cybersecurity missions at DHS. The cyber threat to the<br />

homeland reaches far beyond terrorists and includes various<br />

criminal enterprises and adversarial nation states.<br />

What do government and industry perceive<br />

to be the main cybersecurity threats and<br />

required responses?<br />

CB: Both government and industry have prioritized<br />

critical infrastructure as a focus <strong>of</strong> threat and hardened<br />

response. There is a growing understanding <strong>of</strong> the seriousness<br />

and sophistication <strong>of</strong> the cyber threats, especially<br />

denial <strong>of</strong> service. In terms <strong>of</strong> preparation, the financial and<br />

13<br />

retail communities have been at the forefront <strong>of</strong> addressing<br />

these threats with significant investment in technologies<br />

and in training. However, 43% <strong>of</strong> companies had<br />

breaches last year (including companies such as Home<br />

Depot, JPMorgan, and Target) and the intrusion threats<br />

are not diminishing.<br />

According to the think tank Center For Strategic<br />

and International Studies (CSIS), cyber related crime now<br />

costs the global economy about $445-billion every year.<br />

These breaches demonstrate that there is a continued<br />

need for protocols and enhanced collaboration between<br />

government and industry.<br />

Last year, The Council on Cyber<strong>Security</strong>, an influential<br />

not-for–pr<strong>of</strong>it organization, formed a “20 Critical <strong>Security</strong><br />

Controls list” with collaboration between the public<br />

and private sectors. The list provides an emerging working<br />

framework for protecting the critical infrastructure and<br />

provides a recommended set <strong>of</strong> actions for cyber defense<br />

that includes specific and actionable ways to stop today’s<br />

most pervasive attacks. I was honored to participate in<br />

that working group.<br />

Indeed, cyber security controls are very important.<br />

In the U.S., most (approximately 85%) <strong>of</strong> the cybersecurity<br />

critical infrastructure including defense, oil and gas,<br />

electric power grids, healthcare, utilities, communications,<br />

transportation, banking, and finance is owned by the<br />

private sector and regulated by the public sector. DHS has<br />

recognized the importance for private sector input into<br />

cybersecurity requirements across these verticals and has<br />

played a major part in bringing government and industry<br />

together to develop a strategy to protect critical infrastructure.


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

Chuck Brooks, Distinguished Judge,GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

There will always be a need for better encryption,<br />

biometrics, analytics, and automated network security to<br />

protect critical infrastructure in all categories. Also, cyber<br />

resilience is an area that must be further developed both<br />

in processes and technologies. In the future, cybersecurity<br />

for the “Internet <strong>of</strong> Things,” consisting <strong>of</strong> hundreds <strong>of</strong> millions<br />

connected IP enabled smart devices, will certainly be<br />

a main priority<br />

What would be on your own master list<br />

<strong>of</strong> cybersecurity priorities and emerging<br />

trends?<br />

Emerging Technology Areas:<br />

• Internet <strong>of</strong> Things (society on new verge <strong>of</strong><br />

exponential interconnectivity)<br />

• Wearables<br />

• Drones and Robots<br />

• Artificial intelligence<br />

• Smart Cities<br />

• Connected transportation<br />

Priorities:<br />

• Protecting critical infrastructure through technologies<br />

and Public/Private cooperation<br />

• Better encryption and biometrics (quantum encryp<br />

tion, keyless authentication)<br />

• Automated network-security correcting systems (selfencrypting<br />

drives)<br />

14<br />

• Technologies for “real time” horizon scanning and<br />

monitoring <strong>of</strong> networks<br />

• Diagnostics and forensics (network traffic analysis,<br />

payload analysis, and endpoint behavior analysis)<br />

• Advanced defense for framework layers (network,<br />

payload, endpoint, firewalls, and anti-virus)<br />

• Mobility and BYOD security<br />

• Big data<br />

• Predictive analytics<br />

• Interoperability<br />

Trends:<br />

• Informed risk management<br />

• Emergence <strong>of</strong> Public/Private sector partnerships<br />

• More information sharing and collaboration<br />

between the public and private sectors<br />

• Shared R & D spending<br />

• Increased spending for cloud computing<br />

• Consolidation <strong>of</strong> data centers<br />

• Expansion <strong>of</strong> hiring and training <strong>of</strong> cybersecurity<br />

workforce<br />

• Tech foraging<br />

What is Xerox’s focus in the homeland security<br />

space?<br />

CB: Xerox has a great tradition <strong>of</strong> innovation and has<br />

become a world leader in digitization, contact centers,<br />

document management, IT, and data analytics. Xerox is


a recognized leader in “digitization” <strong>of</strong> documents in the<br />

Federal government. The company has been providing<br />

mailroom, scanning, imaging, indexing, and data capture<br />

for nearly three decades, including with DHS. Xerox uses<br />

innovative technologies, including Optical Character<br />

Recognition (OCR). OCR automatically extracts data from<br />

scanned images and makes those data available for electronic<br />

processing for millions <strong>of</strong> images each day. Having<br />

electronic access to data and files provides for more<br />

efficient planning and operations in the security environment.<br />

Xerox is also known for its contact center expertise.<br />

The company uses multi-channel contact technology<br />

tools via phone, email, web, and mobility to optimize,<br />

automate, and help scale customer service agent response.<br />

Contact center management solutions are designed to<br />

minimize impact, assure end-user incidents are addressed<br />

quickly, and prevent reoccurrence that is important for a<br />

public safety mission.<br />

Xerox has also developed and deployed a disease<br />

surveillance and outbreak management s<strong>of</strong>tware called<br />

Maven that is <strong>of</strong> interest to homeland security and public<br />

health agencies. It is configured to provide “contact<br />

tracing” for Ebola and other communicable diseases. The<br />

s<strong>of</strong>tware manages the identification and diagnosis <strong>of</strong> those<br />

who may have come in contact with an infected person.<br />

Federal government employees who regularly use LinkedIn,<br />

including over 65,000 from DHS. Social media has become<br />

part <strong>of</strong> the fabric <strong>of</strong> how we communicate, operate,<br />

and conduct business. The two homeland security groups<br />

I run on LinkedIn –“U.S. Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>”<br />

and “<strong>Homeland</strong> <strong>Security</strong>”– have grown to over 50,000<br />

members. (Please look them up and join and post!) I have<br />

become active now on Twitter too. Please follow me:<br />

@ChuckDBrooks<br />

I have also been active on the speaking circuit at<br />

conferences, including recent presentations at the National<br />

Press Club, <strong>Homeland</strong> <strong>Security</strong> Week, Secure Cities,<br />

George Washington University, Bowie State University,<br />

and CyberMaryland. Please check out my recent article<br />

in The Hill newspaper called “Navigating the Four Pillars<br />

<strong>of</strong> Washington, DC” that explores the interplay between<br />

government, industry, media, and policy organizations in<br />

the nation’s capitol.<br />

Thank you for speaking to me and letting me<br />

share my perspectives. GSN serves as an excellent media<br />

resource for all those active in the homeland security and<br />

national security fields. I strongly encourage others to<br />

become regular readers <strong>of</strong> your publication online and in<br />

print.<br />

Can you update us on your social media<br />

and thought leadership activities?<br />

CB: Many senior level executives in the Federal government<br />

are on social sites such as LinkedIn, GovLoop,<br />

Facebook, and Twitter. There are an estimated 1.4 million 15


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Blue Ridge Net works –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Anti-Malware Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

AppGuard<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

It is evident with all the reported breaches in government,<br />

retail, banking, and consumers that there is a<br />

need for an innovative security solution that will protect<br />

computers. AppGuard is a patented solution that<br />

would have absolutely blocked all the reported breaches<br />

including Target, JP Morgan, community health systems,<br />

and all the cyber espionage that is happening at all<br />

levels <strong>of</strong> government. AppGuard’s unique approach is<br />

simple, cost effective, and stops the advanced threats<br />

that no other security capability has been able to defeat.<br />

AppGuard is proven technology, deployed in over 100<br />

countries, and is the best line <strong>of</strong> defense when malware<br />

strikes. It protects the endpoint from malvertising, mal-<br />

John Higginbotham<br />

Chairman and CEO<br />

Mike Fumai<br />

COO and Director<br />

warized documents, drive by downloads, watering hole<br />

attacks, phishing attacks, ransomware, advanced volatile<br />

threats, and others. It provides in-depth host-based<br />

threat intelligence complementing network based threat<br />

intelligence. All <strong>of</strong> this is accomplished with an easy to<br />

use, easy to deploy client with out-<strong>of</strong>-the box settings.<br />

16


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.appguardus.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.blueridge.com/index.php/products/<br />

appguard/enterprise<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Maureen Gray, VP <strong>of</strong> Operations<br />

Blue Ridge Networks<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (703) 631-9713<br />

cell: (571) 259-8428<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

maureen@blueridge.com<br />

17


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Agiliance –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Compliance/Vulnerability Assessment Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RiskVision 7<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The biggest inhibitor <strong>of</strong> effective security and vulnerability<br />

management lies in the fact that the number <strong>of</strong><br />

threats to organizations has grown exponentially over nal resources. As a result, government organizations are<br />

the past few years. This is largely due to the increasing<br />

number <strong>of</strong> IT assets under management, which are tion, normalization, and business impact correlation.<br />

seeking technical solutions to automate data aggrega-<br />

creating a big data challenge. To ensure proper coverage,<br />

government organizations in many cases are relying ers have to exploit a s<strong>of</strong>tware flaw, thereby reducing the<br />

The ultimate objective is to shorten the window attack-<br />

on multiple tools to produce the necessary vulnerability overall risk <strong>of</strong> cyber-attacks and insider threats. Agiliance<br />

assessment data. This only adds to the volume, velocity,<br />

and complexity <strong>of</strong> data feeds that must be analyzed, achieving continuous monitoring and enabling them to<br />

is assisting civilian, defense, and intelligence agencies in<br />

normalized, and prioritized. Relying on human labor report on their organizations risk and security posture<br />

to comb through mountains <strong>of</strong> data logs is one <strong>of</strong> the in near real time. The company’s RiskVision s<strong>of</strong>tware<br />

main reasons that critical vulnerabilities are not being gathers data feeds from otherwise silo-based security<br />

addressed in a timely fashion. According to the Verizon and IT tools such as SIEMs, configuration management<br />

Data Breach Investigations Report, 92% <strong>of</strong> breaches databases, vulnerability scanners, threat data feeds and<br />

were discovered by a third party and not through inter- advisory services, database security management, etc.<br />

18


and then aggregates, normalizes, and correlates this<br />

information based on business criticality. This enables<br />

a near real time snap shot <strong>of</strong> an organization’s security<br />

posture. In addition, RiskVision automates an organization’s<br />

governance processes, providing insight into the<br />

agency’s compliance posture. The final result is a riskbased<br />

assessment <strong>of</strong> the organization’s infrastructure<br />

which prioritizes remediation actions based on business<br />

criticality. If needed, RiskVision can also assist with automatic<br />

ticket creation. By using the Agiliance ticketing<br />

system or integrating with leading ticketing and patch<br />

management systems, an organization’s security operations<br />

team can shadow the progress the IT team makes<br />

in mitigating the vulnerabilities. This eliminates the<br />

traditional approach best described as throwing something<br />

over the fence and praying for the best outcome.<br />

For one major government agency, using RiskVision<br />

resulted in a dramatic increase in operational efficiency.<br />

Prior to using Agiliance, it took 60 full-time employees<br />

working 24 x 7 for a month to manually create 180,000<br />

remediation tickets. With RiskVision, the agency was<br />

able to reduce the headcount required to oversee ticket<br />

creation by more than 80% and shrink the processing<br />

time from one month to a couple <strong>of</strong> days. RiskVision<br />

is considered by many to be the best compliance and<br />

vulnerability management solution on the market for<br />

its ability to combine risk intelligence, using big data<br />

gathered and correlated from security operations tools,<br />

with automated remediation that establishes bi-directional<br />

workflows with IT operations. The end result is<br />

improved operational efficiency through automated<br />

continuous monitoring and ticketing to remediate only<br />

business critical risks.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.agiliance.com<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Torsten George, Vice President <strong>of</strong> Worldwide<br />

Marketing and Products<br />

Agiliance, Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (408) 200-0461<br />

cell: (408) 431-3250<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

tgeorge@agiliance.com<br />

Links to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Agiliance Named Most Innovative Tech Company for <strong>2014</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0916_American_<br />

Business_<strong>Awards</strong>_Stevie_Competition.html<br />

Agiliance Wins Three <strong>2014</strong> Golden Bridge <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0911_Agiliance_<br />

Wins_3_Golden_Bridge_<strong>Awards</strong>.html<br />

RiskVision Shortlisted for CIR Risk Management Award<br />

<strong>2014</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0904_CIR_Risk_<br />

Management_Award_<strong>2014</strong>.html<br />

Agiliance Named Finalist for Two <strong>2014</strong> Computing <strong>Security</strong><br />

<strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0821_<strong>2014</strong>_Computing_<strong>Security</strong>_<strong>Awards</strong>.html<br />

Agiliance Receives International Recognition from Stevie<br />

<strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0815_Stevie_<br />

<strong>Awards</strong>_Winner_<strong>2014</strong>.html<br />

19<br />

Links continued on next page


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Agiliance – <strong>2014</strong> Winner<br />

Best Compliance/Vulnerability Assessment Solution<br />

Links to additional information, continued:<br />

Agiliance Expands Threat-Based, Real-Time Risk Remediation<br />

with CrowdStrike Falcon Intelligence:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0624_Crowd-<br />

Strike_Falcon_Intelligence.html<br />

RiskVision Earns Gold in the <strong>2014</strong> Network Products<br />

Guide <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0624_<strong>2014</strong>_Networks_Products_Guide.html<br />

Agiliance Introduces First NIST Cybersecurity Framework<br />

<strong>Security</strong> Checklist Content Pack:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0623_NIST_Cybersecurity_Framework.html<br />

RiskVision is Platinum Winner in the <strong>2014</strong> Govies Government<br />

<strong>Security</strong> <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0514_RV_Platinum_Winner_<strong>2014</strong>_Govies_<strong>Awards</strong>.html<br />

RiskVision Architecture and Cloud Services Set New Standard:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0505_RV_Architecture_Cloud_Services.html<br />

Agiliance Issues Updated ISO Information <strong>Security</strong> Management<br />

Process Controls Content:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0304_ISO_Content_Packs.html<br />

RiskVision Scores Big at Info <strong>Security</strong> Product Guide’s<br />

<strong>2014</strong> <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0225_Info_<strong>Security</strong>_Products_Guide_<strong>2014</strong>.html<br />

RiskVision 7 Ushers New Era <strong>of</strong> Big Data Risk Management:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0224_RV7_Ushers_New_Era.html<br />

20


Cyber Defense Magazine Names RiskVision Most Innovative<br />

Risk Management Product:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0224_Cyber_Defense_Magazine.html<br />

RiskVision Helps Retailers to Strengthen their Cyber Defenses:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0131_Retailers_<br />

Strengthen_Cyber_Defenses.html<br />

Agiliance to Showcase Continuous Diagnostics and Mitigation<br />

Capabilities:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0124_Cybersecruity_Innovation_Forum.html<br />

RiskVision Assists Financial Services Organizations Raise<br />

Quality <strong>of</strong> Third-Party Risk Management:<br />

http://www.agiliance.com/news/pr_<strong>2014</strong>0123_Financial_<br />

Services_Organization.html<br />

Agiliance / ESG White Paper: Beyond GRC: SRM and the<br />

Move to Integrated Risk Management:<br />

http://www.agiliance.com/forms/WhitePaperReg.<br />

html?doc=Beyond_GRC<br />

Agiliance White Paper: How to Achieve a Continuous<br />

Monitoring Framework:<br />

http://www.agiliance.com/infocenter/whitepaper.html<br />

Agiliance Data Sheets:<br />

http://www.agiliance.com/infocenter/ Agiliance<br />

Case Studies:<br />

http://www.agiliance.com/infocenter/casestudy.html<br />

Agiliance Recorded Webcasts:<br />

http://www.agiliance.com/news/webcasts.html<br />

Agiliance Product Tours:<br />

http://www.agiliance.com/infocenter/tour.html<br />

21


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

RSA Securit y Division <strong>of</strong> EMC –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Identity Management Platform<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA SecurID<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA SecurID has a long and successful history in protecting<br />

sensitive information <strong>of</strong> the government. Go-<br />

changes every 60 seconds. By requiring users to provide<br />

rithms available) to generate a one-time password that<br />

ing back to before the Internet and continuing with a combination <strong>of</strong> something they know (their password)<br />

innovations that strengthen passwords in new and and something they have (the RSA SecurID one-time<br />

emerging infrastructures including cloud and mobility, password), RSA SecurID allows users gain secure access<br />

RSA SecurID is the industry’s most trusted two-factor to VPNs, wireless access points, cloud applications, web<br />

authentication solution. With government being an early applications, mobile applications and network operating<br />

innovator in interconnected networking (i.e. DARPA and systems – ensuring that private information is protected<br />

ARPANET) RSA SecurID was the first solution there to and the the identities <strong>of</strong> people, devices and applications<br />

exchanging that information are legitimate. Build-<br />

protect sensitive government information and applications.<br />

Used by more than 40 million users within 30,000 ing on its market-leading capabilities, RSA introduced<br />

organizations worldwide, RSA SecurID is the standard the industry’s first authentication platform that combines<br />

strong two-factor authentication with intelligence-<br />

for two-factor authentication solutions, reliably assuring<br />

the identities <strong>of</strong> users, devices and applications by driven, risk-based authentication. RSA Authentication<br />

using a proven algorithm (AES-128 which is recognized Manager (the brains behind RSA SecurID) uses Big Data<br />

by NIST as one <strong>of</strong> the strongest symmetric key algo- analytics to increase identity assurance by transparently<br />

22


uilding rich user pr<strong>of</strong>iles based on device and behavioral<br />

characteristics. Leveraging dozens <strong>of</strong> risk factors<br />

in near infinite combinations, it detects and permits<br />

normal behavior, and challenges or blocks anomalous<br />

activity to provide secure access control that exceeds<br />

stand-alone multifactor authentication methods. User<br />

login processes are fast, familiar and simple and yet<br />

still provides secure access control that goes well beyond<br />

stand-alone two- and multi-factor authentication<br />

methods giving organizations a higher level <strong>of</strong> identity<br />

assurance without compromising user convenience or<br />

productivity. What’s more the risk-based authentication<br />

is tokenless and invisible, greatly aiding in the protection<br />

<strong>of</strong> government portals and online benefits and<br />

health information and enables tens <strong>of</strong> thousands <strong>of</strong><br />

organizations to maintain various regulations and compliance<br />

needs including HIPPA, FACTA, FISMA, FFIEC,<br />

HSPD-12, CJIS, PCI-DSS and more. RSA SecurID includes<br />

management and administration tools that lower<br />

an organization’s overall TCO and make the solution<br />

easy to manage. Complementing RSA SecurID’s intuitive<br />

browser-based management console, RSA Authentication<br />

Manager’s single-pane view dashboard enables Help<br />

Desk administrators to quickly address common user<br />

inquiries. Also, a customizable Self-Service Console empowers<br />

users to manage their authentication needs and<br />

methods, and various aspects <strong>of</strong> their token lifecycles,<br />

enabling IT teams to apply time and resources – typically<br />

dedicated to managing a traditional authentication<br />

deployment – to other critical tasks. And, available as a<br />

VMware Virtual Appliance, RSA Authentication Manager<br />

enables customers to leverage existing virtual infrastructures<br />

and accelerate time to value.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA SecurID Homepage:<br />

www.emc.com/security/rsa-securid.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Shannon Todesca, Account Executive<br />

CHEN PR, Inc. (for RSA)<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (781) 672-3147<br />

cell: (508) 494-4607<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

stodesca@chenpr.com<br />

23


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

RSA Securit y Division <strong>of</strong> EMC –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Data <strong>Security</strong>/Loss Management Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Data Loss Prevention (DLP)<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In this era <strong>of</strong> knowledge economy, the most valuable<br />

asset for organizations, after people, is information. We<br />

are seeing, nearly every day, headlines focused on data<br />

breaches and loss <strong>of</strong> sensitive information. Organizations<br />

need to adequately protect this information – not<br />

only for the well being <strong>of</strong> the business and brand, but<br />

also that <strong>of</strong> their customers and partners. RSA DLP is<br />

used by over 3,500 organizations to gain visibility into<br />

risk and prevent the loss <strong>of</strong> sensitive data from accidents,<br />

malicious insiders and external attackers. RSA<br />

DLP discovers and monitors the location and flow <strong>of</strong><br />

sensitive data, including regulated data or corporate IP,<br />

across the infrastructure including cloud, virtual and<br />

mobile devices. Through real-time alerts and enforcement<br />

controls including encryption, quarantine, block<br />

and notify, RSA DLP prevents the loss <strong>of</strong> sensitive data<br />

24<br />

via email, web, mobile devices, etc. The web-based<br />

management console allows organizations to set up a<br />

single DLP policy to protect sensitive data across the<br />

network, endpoints (connected or disconnected including<br />

mobile) and datacenter, with centralized incident<br />

management for complete visibility into risk. What sets<br />

RSA DLP apart is that it is protocol-and port-agnostic<br />

and can analyze traffic from all network layers and is the<br />

only DLP <strong>of</strong>fering that has exceptionally customizable<br />

workflows for incident management and investigations.<br />

RSA DLP can also be extended into GRC use cases for<br />

managing risk and audits, features native encryption<br />

functionality and open APIs for partners, and provides<br />

a single pane <strong>of</strong> glass view with native integrations with<br />

Big Data analytical tools.


Offering the lowest TCO on the market, RSA DLP provides:<br />

• The lowest number <strong>of</strong> false positives, significantly<br />

reducing the number <strong>of</strong> FTEs required and<br />

operational costs.<br />

• 170+ out-<strong>of</strong>-the-box policies based on industry/<br />

regional regulations, dramatically reducing set-up<br />

and tuning time.<br />

• A distributed architecture that easily scales to the<br />

largest environments, with the ability to run on<br />

virtual machines to reduce implementation costs.<br />

• The most extensive ecosystem <strong>of</strong> partners, enabling<br />

customers to leverage their existing infrastructure<br />

and built-in infrastructure integrations to further<br />

reduce deployment costs.<br />

By centralizing incident management, integrating with<br />

existing infrastructure, automating the enforcement<br />

<strong>of</strong> controls to protect data and establishing repeatable<br />

incident workflows, RSA DLP improves cost effectiveness<br />

for customers’ ongoing operations. In addition, with the<br />

RSA DLP Risk Remediation Manager module, customers<br />

can remediate tens <strong>of</strong> thousands <strong>of</strong> sensitive files in a<br />

matter <strong>of</strong> weeks – a manual process that previously took<br />

more than nine months to complete, with resources<br />

being pulled from other projects or hired as contractors.<br />

RSA DLP has also helped prevent loss <strong>of</strong> tens <strong>of</strong> thousands<br />

<strong>of</strong> customer records which would have resulted<br />

in millions <strong>of</strong> dollars in losses. In one example, RSA DLP<br />

prevented two contracted employees attempting to steal<br />

trade secrets and alerted the appropriate security teams<br />

to prevent damage, saving millions <strong>of</strong> dollars. RSA DLP<br />

also helps organizations prevent fines and pass audits<br />

more efficiently. Customers have reported audit savings<br />

<strong>of</strong> more than 25% thanks to the ability <strong>of</strong> RSA DLP to<br />

scan the infrastructure and auto-remediate violations.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA DLP Homepage:<br />

www.emc.com/security/rsa-data-loss-prevention.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Shannon Todesca, Account Executive<br />

CHEN PR, Inc. (for RSA)<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (781) 672-3147<br />

cell: (508) 494-4607<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

stodesca@chenpr.com<br />

25


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

RSA Securit y Division <strong>of</strong> EMC –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Privileged Access Management Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Identity Management and Governance<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In the era <strong>of</strong> big data, mobile, cloud, and social media,<br />

identity and access management (IAM) has become a<br />

significant challenge for many organizations. Add on<br />

heightened threats, strict regulatory requirements, and<br />

a growing and demanding population <strong>of</strong> business users,<br />

securing access and enabling trusted interactions between<br />

users and resources can feel like a never ending<br />

game <strong>of</strong> whack-a-mole. The RSA Identity Management<br />

and Governance (IMG) solution helps organizations<br />

transform IAM into an enabler for a faster and more<br />

secure network by taking aim at three key ways in which<br />

organizations can deliver a strong Identity Management<br />

program:<br />

1. Identity Lifecycle Management — Streamlined selfservice<br />

user registration allows users to create accounts<br />

and choose access rights for themselves, new employees<br />

and contractors. The UI automatically enforces policies<br />

while suggesting entitlements based on similar users.<br />

Automated approval workflows and provisioning<br />

ensures that user access is delivered rapidly, while maintaining<br />

compliance with process and policy requirements.<br />

2. Data Access Governance. – With an increase in both<br />

data breaches and compliance requirements, it is critical<br />

to extend access governance to data as well as applications.<br />

RSA IMG is designed to provide ubiquitous support<br />

across all major file systems, providing one place to<br />

centrally manage and govern the access to all data. RSA<br />

IMG leverages identity context and data attributes (such<br />

as user access frequency) to establish a line-<strong>of</strong>-business<br />

owner for data resources.<br />

26


3. Provisioning 2.0 – RSA IMG is engineered to take a<br />

governance-driven approach, dramatically simplifying<br />

application onboarding, and enabling organizations to<br />

automate many more applications. For example, one<br />

customer in the transportation industry reduced<br />

application onboarding time by approximately 75%. The<br />

RSA IMG platform enables organizations to meet their<br />

security, regulatory and business access needs through<br />

a collaborative set <strong>of</strong> business processes. By automating<br />

manual tasks, providing evidence <strong>of</strong> compliance, reducing<br />

access-related business risk, and efficiently delivering<br />

business access, enterprises can confidently manage,<br />

control and enforce access to applications and data<br />

across the enterprise and the cloud. Beyond the immediate<br />

benefits seen after implementation, RSA IMG aids<br />

organizations by improving security, visibility, and compliance.<br />

By deploying the RSA IMG platform organizations<br />

experience significant reduction in effort for access<br />

reviews and audits, faster time to value with reduced<br />

deployment times from installation to production and<br />

orphaned accounts become a thing <strong>of</strong> the past. Without<br />

an automated approach to IAM, organizations are more<br />

susceptible to regulatory compliance violations and data<br />

breaches, some <strong>of</strong> which can cost millions <strong>of</strong> dollars<br />

in lost revenue and fines as well as significant brand<br />

damage. RSA IMG establishes increased security over<br />

sensitive information, visibility into the complete user<br />

access lifecycle, and ensured compliance to increasingly<br />

stringent regulations, potentially saving millions and<br />

protecting long-term vitality.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Identity Management and Governance Homepage:<br />

http://www.emc.com/security/rsa-identity-management-and-governance.htm#<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Shannon Todesca, Account Executive<br />

CHEN PR, Inc. (for RSA)<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (781) 672-3147<br />

cell: (508) 494-4607<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

stodesca@chenpr.com<br />

27


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Encryptics –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Email <strong>Security</strong> and Integrity Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Encryptics for Email<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Encryptics’ flagship product, Encryptics for Email,<br />

showcases this data protection company’s commitment<br />

to true end-to-end data protection. This product<br />

utilizes a hybrid security model unlike any other on the<br />

market today. By eliminating the flaws inherent in existing<br />

models, Encryptics <strong>of</strong>fers the most innovative and<br />

effective solution for the email security space. Most data<br />

protection solutions utilize one <strong>of</strong> two standard security<br />

models: trusted server or peer-to-peer. In a trusted<br />

server model, encryption and authentication take place<br />

at a centralized location (a server, gateway, or router).<br />

This model makes it easy to manage authentication<br />

and control who has access to data once it’s encrypted.<br />

Unfortunately, data is not encrypted until it leaves the<br />

device it was created on and travels to an external appliance<br />

where the encryption will occur. Furthermore,<br />

if the encrypted data and the keys to unlock that data<br />

are stored in the same location, this single point within<br />

the transmission constitutes a serious security risk. The<br />

peer-to-peer model attempts to counter these drawbacks<br />

by decentralizing the process. Because encryption<br />

occurs at the user device level, this model addresses the<br />

security gap between the user’s device and an external<br />

appliance. However, in this model, authentication and<br />

key exchange are also handled at the user device level<br />

and are difficult to manage. Unfortunately, this model<br />

does not eliminate the potential for a single point <strong>of</strong><br />

failure: if the encryption keys travel alongside the encrypted<br />

data at any time, there is always risk <strong>of</strong> interception<br />

and exposure. Rather than choosing between these<br />

existing security models, Encryptics resolved to blend<br />

the best <strong>of</strong> both models in a patented, Trusted Peer-to-<br />

28


Peer platform. This innovative approach resulted in<br />

a superior solution designed to protect data over the<br />

course <strong>of</strong> its entire lifecycle, leaving no security gaps<br />

and no single points at risk <strong>of</strong> failure to secure the data.<br />

Taking it even further, Encryptics devised Data Rights<br />

Management (DRM) tools to empower data owners and<br />

preserve document integrity. With DRM, data owners<br />

can manage and maintain control <strong>of</strong> their data in real<br />

time, even when it resides on remote email servers<br />

and recipient devices. As its email product is gaining<br />

momentum, Encryptics hopes not only to shed light<br />

on the significance <strong>of</strong><br />

data security and Policy-<br />

Based Protection (PBP),<br />

an add-on that works<br />

with Encryptics for Email<br />

to prevent data loss, but<br />

also to revolutionize the<br />

way in which we protect<br />

important information in<br />

an increasingly unsecure<br />

technological landscape.<br />

With an easy-to-use product that brings convenience<br />

to our busy lives, Encryptics ensures that we can share<br />

and store almost any data without ever having to worry<br />

about leaks, hacks, or theft.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.encryptics.com/default.aspx<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Texas Department <strong>of</strong> Information Resources Case Study: Overview<br />

<strong>of</strong> how Encryptics empowered the first ever email security<br />

plan for Texas Department <strong>of</strong> Information Resources, home to<br />

the state’s technology solutions for government and education.<br />

https://www.encryptics.com/case_studies/DIR-EncrypticsCaseStudy.pdf<br />

Law Enforcement Association Case Study: Summary<br />

<strong>of</strong> a successful 30-day trial, resulting in a prominent state law<br />

enforcement association adopting Encryptics for Email to protect<br />

the personal identifiable information (PII) <strong>of</strong> its members.<br />

https://www.encryptics.com/case_studies/<br />

Law_Enforcement_Association.pdf<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Erika Swanner, Vice President <strong>of</strong> Marketing<br />

Encryptics<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (512) 657-2685<br />

cell: (214) 864-7486<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

eswanner@encryptics.com<br />

29


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

NICE Systems –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Forensic S<strong>of</strong>tware<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NICE Suspect Search<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

An active shooter is on the loose. An airport checkpoint<br />

has just been breached. Police are frantically searching<br />

for a lost child amid a crowded location. A suspicious<br />

bag is left behind in a busy transit station. In each <strong>of</strong><br />

these situations, time is <strong>of</strong> the essence. Surveillance<br />

video can provide clues to finding a suspect, but will<br />

you be able to pinpoint the exact video you need in<br />

time? Here’s where NICE Suspect Search can help.<br />

Suspect Search is a patent-pending video analytics<br />

technology that helps you quickly locate and retrace<br />

the movements <strong>of</strong> a person <strong>of</strong> interest within a video<br />

surveillance network. It can scan an hour <strong>of</strong> video in<br />

less than a minute, automatically filtering out 95 percent<br />

<strong>of</strong> irrelevant images. Suspect searches can be initiated<br />

using a recorded image, an uploaded full body photo,<br />

or a suspect composite. As the search reveals snapshots<br />

<strong>of</strong> the suspect over time across different cameras, it<br />

evolves into a history <strong>of</strong> their movements before and potentially<br />

after the incident. Timely situational awareness<br />

is critical so snapshots are presented on an actual map.<br />

This answers questions like how did the suspect get<br />

here? Where did he go? Did he meet up with anyone or<br />

was he alone? And is he<br />

still on premise? Suspect<br />

Search revolutionizes<br />

video forensics, both<br />

for real-time use and for<br />

after-the-fact investigations.<br />

<strong>Digital</strong>ly stamped<br />

images, video, and location<br />

information associated<br />

with each search<br />

can easily be shared with<br />

police departments and<br />

district attorneys for<br />

forensic investigations.<br />

WHAT SETS SUSPECT SEARCH APART<br />

There are technologies on the market that can search<br />

for a specific color, but until now, none <strong>of</strong> them could<br />

search for a specific person, especially not in real-time.<br />

30


Suspect Search takes into account three parameters -- a<br />

full body image, the unique human signature <strong>of</strong> a person<br />

(e.g. size and the way they walk), and the textures<br />

and colors associated with that person like their clothes,<br />

accessories, hair, or skin. The Suspect Search algorithm<br />

analyzes, tags, sorts, and stores images in a database according<br />

to these parameters, increasing search accuracy.<br />

Furthermore, calculations are done in real-time. Video is<br />

analyzed as it is captured, so searches can begin immediately<br />

and results are available within seconds. Another<br />

differentiator is Suspect Search’s ability to simultaneously<br />

search across multiple camera feeds. Once the<br />

target has been located, Suspect Search’s geo-spacial<br />

capabilities allow operators to trace and retrace the suspect’s<br />

route to predict patterns <strong>of</strong> movement for quick<br />

apprehension.<br />

SUSPECT SEARCH BENEFITS<br />

By providing near real-time, actionable information<br />

about the whereabouts<br />

and movements <strong>of</strong><br />

persons <strong>of</strong> interest,<br />

Suspect Search can<br />

accelerate response<br />

times and effect positive<br />

outcomes, whether<br />

that means finding<br />

a lost child faster,<br />

apprehending suspects<br />

quicker, or avoiding<br />

costly shutdowns.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.nice.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/nice-suspect-search<br />

https://www.youtube.com/watch?v=PD-hSXOt5<br />

FA&index=54&list=PLC3F1BBC80EE0AA53<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

31


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Solar Winds –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds User Device Tracker<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds User Device Tracker (UDT) delivers automated<br />

user and device tracking with powerful switch<br />

port management capabilities empowering federal IT<br />

Pros with strong continuous monitoring capabilities and<br />

visibility into who or what is connected to their network.<br />

Highlights include:<br />

• Automatically discovers, maps and monitors switches,<br />

ports and network devices<br />

• Quickly finds devices and retrievers user name, port<br />

details, connection history and more<br />

• Enables searching on IP address, user name, hostname<br />

or MAC address to track endpoints<br />

• Allows whitelisting and watch lists with automatic<br />

alerts and click-<strong>of</strong>-a-button port shutdown<br />

• Provides detailed switch port usage data, capacity<br />

analysis and built-in reporting<br />

With the ever-increasing use <strong>of</strong> personal devices and<br />

applications, SolarWinds UDT provides federal IT Pros<br />

with peace <strong>of</strong> mind about the security <strong>of</strong> their network<br />

and the devices on it by continuously monitoring who<br />

and what connects to their network. Additionally,<br />

SolarWinds UDT can track down lost or rogue devices<br />

with a simple search <strong>of</strong> a user name, IP address, hostname<br />

or MAC address ensuring that all devices that can<br />

connect to federal networks stay in the right hands.<br />

SolarWinds UDT also features alerting that signifies<br />

unauthorized network access<br />

and provides the ability to<br />

quickly shut down switch<br />

ports to secure access to sensitive<br />

information. Updates<br />

to SolarWinds UDT coincide<br />

with the latest issues being<br />

tackled by IT Pros such as<br />

BYOD. In the latest update<br />

to scalability and additional<br />

support and optimization for<br />

varying devices and vendors<br />

was a priority. And, by work-<br />

32


ing closely with and listening to its user community,<br />

SolarWinds is able to gain real-time and candid feedback<br />

from IT practitioners, so its products can address the<br />

problems and challenges prevalent in IT security today.<br />

SolarWinds UDT provides three critical capabilities for<br />

network and systems managers. First, it makes it possible<br />

to physically locate an end-user device or user on<br />

the network extremely quickly. Second, it allows for<br />

rapid quarantine <strong>of</strong> users or systems by remotely shutting<br />

down a switch port. Finally, it supports watch-lists<br />

and can alert when certain types <strong>of</strong> devices or specific<br />

users connect to the network and even take pre-defined<br />

actions to help protect information and other assets. SolarWinds<br />

s<strong>of</strong>tware is built to scale and can support an IT<br />

environment <strong>of</strong> any size and is used by nearly every U.S.<br />

federal civilian agency, DoD branch and intelligence<br />

agency. SolarWinds UDT complements other products,<br />

such as SolarWinds Network Configuration Monitor,<br />

SolarWinds Log & Event Manager, SolarWinds Firewall<br />

<strong>Security</strong> Manager and SolarWinds Server & Application<br />

Monitor, to name a few, providing additional breadth<br />

and depth for continuous monitoring. SolarWinds s<strong>of</strong>tware<br />

can “collect once and report to many,” which gives<br />

IT, information assurance, and security departments<br />

the unique functionality they each need from a single,<br />

cost-effective set <strong>of</strong> tools.<br />

SolarWinds UDT licensing<br />

is based on the number <strong>of</strong><br />

switch ports to being monitored.<br />

The licensing model<br />

features large jumps in<br />

switch port count allowing<br />

for rapid growth <strong>of</strong> an organization<br />

before an additional<br />

licensing level is reached and<br />

can scale to an unlimited<br />

number <strong>of</strong> switch ports.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.solarwinds.com/user-device-tracker.aspx<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.youtube.com/watch?v=s4G_<br />

yPZq7Jc<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rebecca Orr, Corporate Communications Associate<br />

SolarWinds<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(512) 498-6372<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rebecca.orr@solarwinds.com<br />

33


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Tenable Net work Securit y –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>Security</strong>Center<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Founded in 2002, Tenable Network <strong>Security</strong> provides<br />

continuous network monitoring to identify vulnerabilities,<br />

reduce risk and ensure compliance. Relied<br />

upon by more than 20,000 organizations around the<br />

world, Tenable’s key clients include Fortune Global 500<br />

companies across industries as well as the entire U.S.<br />

Department <strong>of</strong> Defense (DoD) and many <strong>of</strong> the world’s<br />

leading governments. With the largest install base and<br />

best expertise in the industry, Tenable gives customers<br />

the ability to identify their biggest threats and respond<br />

quickly. Through its work with the DoD, Tenable’s<br />

technology is meeting the vulnerability, compliance and<br />

real-time risk management requirements <strong>of</strong> one <strong>of</strong> the<br />

largest, most demanding government organizations in<br />

the world. The Defense Information System Agency was<br />

confronted with a limited capability to quickly and accu-<br />

rately assess the network security <strong>of</strong> Department <strong>of</strong> Defense<br />

(DoD) enterprise networks. To address this, DISA<br />

established Tenable Network <strong>Security</strong> as the foundation<br />

<strong>of</strong> its Assured Compliance Assessment Solution (ACAS)<br />

which replaced the Secure Configuration Compliance<br />

Validation Initiative (SCCVI) suite <strong>of</strong> s<strong>of</strong>tware previously<br />

acquired by the DoD.<br />

ACAS was created to fulfill a combination <strong>of</strong> operational<br />

and strategic objectives, including:<br />

• Provide an innovative technical solution with a flexible<br />

cost structure.<br />

• Employ a commercial solution that could be easily<br />

ordered and quickly deployed across the DoD infrastructure.<br />

• Support enterprise-wide deployment across the<br />

34


Department <strong>of</strong> Defense, with the ability to tier system<br />

evaluation and management throughout the<br />

organization.<br />

Ultimately, DISA wanted fast and accurate enterprisewide<br />

network security assessment that could satisfy the<br />

goal <strong>of</strong> increasing the accuracy <strong>of</strong> risk assessment and<br />

standards compliance verification. They wanted realtime<br />

risk assessment across DoD networks to provide essential<br />

situational awareness and enable true, risk-based<br />

management decisions consistent with existing and<br />

emerging federal guidelines for continuous monitoring.<br />

DISA’s selection <strong>of</strong> Tenable<br />

followed an extensive evaluation<br />

process culminating with<br />

a 6-month, multi-site implementation.<br />

As part <strong>of</strong> Tenable’s<br />

solution, DISA implemented<br />

Tenable <strong>Security</strong>Center, which<br />

provided continuous assetbased<br />

security and compliance<br />

monitoring, bringing together<br />

the processes <strong>of</strong> asset discovery, vulnerability detection<br />

and configuration auditing. The <strong>Security</strong>Center console<br />

works with Tenable’s Nessus vulnerability scanners, the<br />

global standard in detecting and assessing network data,<br />

to look for policy changes every time a scan is requested.<br />

This provides the ability to assess an organization’s<br />

vulnerability and compliance posture, as well as deliver<br />

analysis and workflow tools that allow the user to easily<br />

perform reporting, auditing and remediation tasks. Tenable<br />

<strong>Security</strong>Center streamlines vulnerability scanning,<br />

administration and reporting. For organizations with<br />

large and complex networks, <strong>Security</strong>Center provides a<br />

comprehensive view <strong>of</strong> enterprise security, compliance<br />

and risk, combining the power <strong>of</strong> Nessus scanning with<br />

an enterprise-class vulnerability and threat management<br />

platform. <strong>Security</strong>Center simplifies administration<br />

35<br />

using a single console that manages distributed Nessus<br />

scanners for enterprise-wide security and compliance<br />

visibility. It also accelerates scans with a distributed and<br />

load balanced scanning, and delivers advanced analytics<br />

including extensive dashboard and built-in and customizable<br />

reports that aggregate scan data to help you<br />

identify and respond to security and compliance issues.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.tenable.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Continuous Monitoring:<br />

http://www.tenable.com/solutions/continuousmonitoring<br />

Whitepaper:<br />

http://www.tenable.com/whitepapers/continuous-monitoring-for-the-new-it-landscape<br />

Blog:<br />

http://www.tenable.com/blog<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Chris Petty, Communications Coordinator<br />

Tenable Network <strong>Security</strong><br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(410) 872-0555 ext. 522<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cpetty@tenable.com


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

EventTracker –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best <strong>Security</strong> Incident & Event Management (SIEM)<br />

Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

EventTracker Enterprise<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

EventTracker <strong>of</strong>fers a suite <strong>of</strong> award-winning products<br />

for <strong>Security</strong> Information and Event Management (SIEM)<br />

and event log management including EventTracker<br />

Enterprise. EventTracker Enterprise enables organizations<br />

to be constantly aware <strong>of</strong> potential security risks<br />

and internal or external threats can be identified and<br />

eliminated before they are exploited. Increasingly, Department<br />

<strong>of</strong> Defense, state and local government departments<br />

are deploying EventTracker’s (SIEM) solutions<br />

to meet their cyber security needs and to comply with<br />

FISMA and SCAP/FDCC initiatives by supporting NIST<br />

800-X and other regulatory guidelines.<br />

ments, including:<br />

• Real time collection and secure storage <strong>of</strong> all network<br />

system and device logs for as long as you require<br />

• Reporting & analytics<br />

• Powerful FISMA compliance reporting<br />

• Correlation and alerting on all event log sources<br />

• Behavior analysis and anomaly detection<br />

• FIPS 140-2 compliant transmission <strong>of</strong> event data<br />

Going beyond simple SIEM, EventTracker’s continuous<br />

monitoring solutions provide unequalled network visibility<br />

with integrated:<br />

• Registry and file integrity monitoring<br />

• User activity monitoring<br />

• Advanced USB monitoring<br />

• SCAP certified Configuration Assessment<br />

EventTracker <strong>of</strong>fers a unique, flexible and cost effective<br />

automated continuous monitoring solution that meets<br />

government information and network security require-<br />

These combined features enable security personnel<br />

to continuously monitor your environment in either<br />

real time, for a preventative approach, or in a forensic<br />

36


capacity to analyze what activity has occurred. The end<br />

result is a robust, customizable monitoring solution that<br />

utilizes best practices for determining risk and preventing<br />

incidents to give you the confidence that your<br />

organization is secure, all while helping demonstrate<br />

compliance.<br />

Other Benefits to government agencies and contractors<br />

include:<br />

• Simple Straight-forward Licensing<br />

• S<strong>of</strong>tware Only Solution – fully virtual ready<br />

• Flexible, Component-based Architecture<br />

• All Compliance Packs Included SIEM Simplified,<br />

EventTracker’s award winning services <strong>of</strong>fering, augments<br />

IT security teams and provides additional resources<br />

to effectively extract actionable information<br />

about the IT infrastructure. As an option, our experienced<br />

staff assumes responsibility for all SIEM related<br />

tasks including daily incident reviews, daily/weekly log<br />

reviews, configuration assessments, incident investigation<br />

support and audit support. EventTracker Enterprise<br />

empowers organizations to maintain regulatory compliance<br />

and simplifies the audit process, reducing audit<br />

times by up to 90%. Detailed reporting minimizes the<br />

time and effort to determine potential gaps in compliance<br />

requirements, and address them efficiently. Event-<br />

Tracker Enterprise processes hundreds <strong>of</strong> millions <strong>of</strong><br />

discrete log messages to distill critical information to the<br />

organization and provides a 360o view <strong>of</strong> the entire IT<br />

infrastructure, <strong>of</strong>fering real-time alerting and reporting.<br />

EventTracker Enterprise allows organizations to maintain<br />

continuous compliance.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.eventtracker.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.eventtracker.com/eventtracker/enterprise/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dina Petrosky<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (860) 495-5566<br />

cell: (860) 912-3201<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

dina@smartconnectionspr.com<br />

37


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> IT <strong>Security</strong> Products and Solutions<br />

Applied Visions, Inc. / Secure Decisions<br />

Division – <strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Compliance/Vulnerability Assessment Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Code Dx ®<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Corporate and government enterprises are all potential<br />

victims <strong>of</strong> cyber-attacks that can adversely impact a<br />

company’s bottom line, damage public reputation,<br />

compromise sensitive government data, and diminish<br />

the public trust. Industry experts and the Department<br />

<strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> (DHS) have traced most compromises<br />

to poorly written s<strong>of</strong>tware. 70-80% <strong>of</strong> security<br />

breaches occur because <strong>of</strong> poorly written code containing<br />

numerous security vulnerabilities. Consequently,<br />

s<strong>of</strong>tware development and acquisition organizations<br />

are under increased pressure to find and fix s<strong>of</strong>tware<br />

vulnerabilities before they are deployed. DHS, NASA,<br />

DoD and commercial businesses have begun to use<br />

static application security testing (SAST) tools to find<br />

s<strong>of</strong>tware vulnerabilities during the development cycle<br />

and as part <strong>of</strong> the acquisition process. One problem,<br />

however, is that no single source code analysis tool finds<br />

most <strong>of</strong> the vulnerabilities in an application. Different<br />

tools identify different vulnerabilities. Benchmark tests<br />

by NIST and NSA reveal that, on average, a single static<br />

analysis tool will detect only 14% <strong>of</strong> all <strong>of</strong> the s<strong>of</strong>tware<br />

weaknesses in code. Consequently, one needs to use<br />

multiple source code analysis tools to find a majority <strong>of</strong><br />

the vulnerabilities. A second problem is that each tool<br />

outputs its results in a different format with different<br />

severity scales, making it difficult to combine the results<br />

and present them in a unified report. A third problem<br />

is related to expense: each commercial tool added to<br />

the vulnerability analysis adds significant cost; and each<br />

open-source SAST tool requires additional resources to<br />

find and configure them. Code Dx ® finds, prioritizes,<br />

and visualizes s<strong>of</strong>tware vulnerabilities – fast and afford-<br />

38


ably. Code Dx ® makes it easy for s<strong>of</strong>tware developers<br />

and security analysts to start checking their s<strong>of</strong>tware for<br />

vulnerabilities without a significant investment <strong>of</strong> time<br />

or money. It embeds, automatically selects, and runs the<br />

appropriate open-source static application security testing<br />

(SAST) tools for each language in a s<strong>of</strong>tware code<br />

base. It also adds in results from commercial analysis<br />

tools and manual code analyses, combines these with<br />

the results <strong>of</strong> the open-source tools, and unifies the<br />

results into a common severity scale and display. Its<br />

visual analytics help to triage and prioritize s<strong>of</strong>tware<br />

vulnerabilities so that the most important vulnerabilities<br />

are fixed first, and false positives are removed from<br />

future vulnerability scans. Code Dx provides advanced<br />

collaboration and reporting tools to ensure expeditious<br />

communication <strong>of</strong> findings and remediation recommendations.<br />

Compliance reports can be customized to<br />

show which vulnerabilities are potential violations <strong>of</strong><br />

regulations such as PCI or HIPAA. Code Dx removes the<br />

most prominent barriers to finding and fixing s<strong>of</strong>tware<br />

vulnerabilities: time to get started, complexity, and expense.<br />

Its entry point <strong>of</strong> $2,500 for an annual subscription<br />

makes it affordable even for small businesses.<br />

39<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.codedx.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Code Dx finds, prioritizes, and visualizes s<strong>of</strong>tware<br />

vulnerabilities fast and affordably: http://securedecisions.com/products/codedx/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dr. Anita D’Amico / Director Secure Decisions<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Applied Visions, Inc. Secure Decisions Division<br />

<strong>of</strong>fice: (631) 759-3909<br />

cell: (516) 702-7706<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Anita.Damico@SecureDecisions.com


GSN Announces the 2015<br />

Airport/Seaport/Boarder <strong>Security</strong> <strong>Awards</strong> Program<br />

GSN’s second annual awards program recognizing excellence in Airport/Aviation <strong>Security</strong>,<br />

Maritime/Port <strong>Security</strong> and Border <strong>Security</strong> will open for entries on Monday, March 2, 2015.<br />

The updated 2015 edition <strong>of</strong> this exciting program will once again cover basic technology<br />

groups, including Access Control/Identification, Detection Solutions, Air/Land and Sea<br />

Communications and Surveillance, Integrated <strong>Security</strong> Programs and Aviation/Maritime<br />

and Border <strong>Security</strong> Human Resource Development.<br />

In addition to the staples <strong>of</strong> Cargo Screening, Thermal Nightvision, Integrated Harbor<br />

<strong>Security</strong> and Perimeter Protection, you can expect many new categories in Satellite<br />

Communications, Aviation and Military Beacons and Air Traffic Control – plus new categories<br />

recommended by knowledgable vendors or outstanding operators or security teams.<br />

The last group <strong>of</strong> entries will once again be dedicated to the following three categories:<br />

* Most Notable Airport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />

* Most Notable Seaport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Upgrade<br />

* Most Notable Border <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />

AIRPORT | SEAPORT | BORDER<br />

SECURITY<br />

AWARDS PROGRAM<br />

43 38


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products & Solutions<br />

40<br />

42<br />

Roster <strong>of</strong> <strong>2014</strong> Winners<br />

GSN Interview with Distinguished Judge <strong>of</strong> <strong>2014</strong> <strong>Awards</strong>,<br />

Scott Greiper<br />

46<br />

48<br />

50<br />

52<br />

54<br />

56<br />

58<br />

60<br />

62<br />

64<br />

66<br />

Winning entries reproduced with permission <strong>of</strong>:<br />

IRIS ID<br />

EID Passport<br />

Alert Enterprise<br />

Desktop Alert<br />

Desktop Alert<br />

NICE Systems<br />

Automative Systems<br />

SecureUSA<br />

NICE Systems<br />

HIKVISION<br />

HID Global<br />

39


Winners in the <strong>2014</strong><br />

<strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products & Solutions<br />

PHYSICAL ACCESS CONTROL<br />

AND IDENTIFICATION<br />

Best Biometric Identification Solution<br />

IRIS ID – Winner<br />

Best Intergrated System<br />

for HSPF-12/FIPS 201 Compliance<br />

Eid Passport – Winner<br />

Best Smart Card Solution<br />

WAVE Systems – Winner<br />

Best Platform for Physical/Logical Access<br />

Viscount Systems – Winner<br />

Alert Enterprise – Finalist<br />

HID – Finalist<br />

Honeywell – Finalist<br />

COMMUNICATION PRODUCTS<br />

Best Interoperable First Responder<br />

Communications<br />

Desktop Alert –Winner<br />

AtHoc – Finalist<br />

Best Mass Notification Systems<br />

Desktop Alert – Winner<br />

AtHoc – Finalist<br />

Best Regional or National Public Safety<br />

Communications Deployment<br />

AtHoc – Winner<br />

Alastar S<strong>of</strong>tware – Finalist<br />

DETECTION PRODUCTS<br />

Best Explosive Detection Product or Solution<br />

Implant Sciences – Winner<br />

American Science and Engineering (AS&E) – Finalist<br />

Best Long Range Detection Product,<br />

Service or System<br />

Rapiscan – Winner<br />

Pure Tech Systems – Finalist<br />

VIDEO SURVEILLANCE PRODUCTS<br />

Best Intelligent Video Surveillance Solution<br />

NICE Systems – Winner<br />

AXIS Communications – Finalist<br />

Panasonic – Finalist<br />

Puretech Systems – Finalist<br />

Best Network IP Cameras<br />

AXIS Communications – Winner<br />

Bosch – Finalist<br />

Hikvision – Finalist<br />

40


OTHER PRODUCTS<br />

Best Perimeter Protection System<br />

Automatic Systems – Winner<br />

Best Crash Barriers<br />

(Gates, Fences, Bollards, Guard Booths)<br />

Secure USA – Winner<br />

Best Physical <strong>Security</strong><br />

Information Management Solution (PSIM)<br />

NICE Systems – Winner<br />

Best Crash Barriers<br />

(Gates, Fences, Bollards, Guard Booths)<br />

Secure USA -- #609 – Winner<br />

SERVICES<br />

Best Disaster Preparedness and/or<br />

Disaster Recovery and Clean-up Services<br />

High Rise Esacape – [win status?]<br />

Best <strong>Homeland</strong> <strong>Security</strong> Training,<br />

Higher Education Program<br />

Bellevue University – Winner<br />

41


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

Scott Greiper, Distinguished Judge,<br />

GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

Mr. Greiper is the President and Founding Partner <strong>of</strong> Secure Strategy Group (SSG), a boutique<br />

advisory and investment banking platform in the physical and cyber security sectors. He has<br />

had a distinguished 15-year career in the security and technology sectors as both a research<br />

analyst and investment banker, and is known as a thought leader in the industry. Before<br />

forming Secure Strategy Group, he was a Managing Director at Legend Merchant Group and<br />

Head <strong>of</strong> the firm’s Convergent <strong>Security</strong> Group, which provided capital, strategic advisory and<br />

M&A services to growth companies in the security and defense technology markets. Previously,<br />

Mr. Greiper was a Principal and Senior Analyst at C. E. Unterberg, Towbin, where he covered public companies in the<br />

Global <strong>Security</strong> industry and was consistently ranked as one <strong>of</strong> the top analysts in the sector. He has worked with a<br />

range <strong>of</strong> industry leaders and is a frequent guest speaker and moderator at conferences and seminars across the country.<br />

Mr. Greiper attended the Executive MBA program at Columbia University and holds a B. A. in Economics from The<br />

University <strong>of</strong> Chicago. He is a member <strong>of</strong> the FBI InfraGard program, BENS (Business Executives for National <strong>Security</strong>),<br />

ASIS (American Society for Industrial <strong>Security</strong>) and NYSSA (New York Society for <strong>Security</strong> Analysts).<br />

GSN: What is the key trend you’re seeing in<br />

the security industry as we enter 2015?<br />

SG: The massive global security industry is being transformed<br />

from “guns, guards and gates” into highly integrated<br />

technology solutions that must protect against both<br />

physical and cyber threats while at the same time demonstrating<br />

ROI. The distinction between cyber and physical<br />

security is blurring and the requirement for unified<br />

management <strong>of</strong> threats in different domains growing. This<br />

“unification” is in my mind the most important transformation<br />

impacting the security industry.<br />

42<br />

What is “Unified <strong>Security</strong>”? It is the growing integration<br />

<strong>of</strong> security and resilience solutions – themselves<br />

increasingly digital – across the full spectrum <strong>of</strong> requirements<br />

and threats, from cyber to physical. It is the integration<br />

<strong>of</strong> physical security solutions – surveillance, access<br />

control, fire alarms – onto the same common operating<br />

platform <strong>of</strong> cyber security solutions – anti-virus, intrusion<br />

detection. This in an effort to create full situational awareness<br />

<strong>of</strong> an organizations security systems and sensors, and<br />

to more readily coordinate response.<br />

More and more building automation systems,


such as HVAC, access control, utilities, and communications,<br />

and being monitored and driven by an enterprise’s<br />

network. As such, these systems provide an easier route<br />

to hack into the network, because they <strong>of</strong>ten sit in front<br />

<strong>of</strong> the firewall and don’t contain the same level <strong>of</strong> security<br />

as network systems do. The theft <strong>of</strong> over one hundred<br />

million customer accounts during the Target Stores breach<br />

was enabled by the theft <strong>of</strong> a password from an HVAC<br />

technician that was subsequently used to breach the Target<br />

network.<br />

What are the drivers <strong>of</strong> demand for Unified <strong>Security</strong><br />

Solutions?<br />

Improved Technology & ROI:<br />

• Technology and ROI: analog to digital video surveil<br />

lance; new capabilities in simulation, ROIP, etc –<br />

better security and ROI?<br />

• New capabilities to combine physical and digital<br />

access control and identity management<br />

• “S<strong>of</strong>tware trumps hardware”<br />

• Requirements for security technology to keep up with<br />

“smart buildings”<br />

• M2M/Internet <strong>of</strong> Things/smart sensors<br />

• Securing the “last mile”<br />

• <strong>Security</strong> integration with external partners (from<br />

warning to video sharing, a la Boston)<br />

• Critical Infrastructure Regulations like FERC, PPD-21<br />

• Federal specific regs (eg, FIPS 201-2) and new security<br />

requirements for products sold to the U.S. Government<br />

How does the investment community perceive<br />

the opportunities in the security market?<br />

SG: Investment returns in the security sector were strong<br />

in <strong>2014</strong>, mirroring the healthy growth in the industry. Secure<br />

Strategy Group publishes the SSG Small Cap <strong>Homeland</strong><br />

<strong>Security</strong> Report and Index, which tracks the top small<br />

and mid-sized public companies in the security industry,<br />

categorized across 11 different technology sectors.<br />

As you can see in the table below, our SSG Small<br />

Cap <strong>Security</strong> Industry Index returned 22.5% for <strong>2014</strong>,<br />

handily beating the Dow Jones Industrial Average (up<br />

10.0%), the S&P 500 (up 13.7%), the Nasdaq Composite<br />

(up 14.7%) and the Russell 2000 (up 4.9%). Moreover, 7 <strong>of</strong><br />

our 11 sectors showed positive returns.<br />

Regulations:<br />

• SEC cyber reporting guidance; Sarbanes Oxley<br />

requirements<br />

• Federal regulations such as FICAM and HSPD-12 that<br />

mandate improved security for federal buildings by<br />

implementing “cyber pro<strong>of</strong> ” access control systems<br />

43


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

Scott Greiper, Distinguished Judge,GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

You act as both advisor and banker to your<br />

client companies. What are the key variables<br />

you look for before taking on a new<br />

client?<br />

SG: There are three key variables we measure when<br />

evaluating a new potential client assignment. We don’t<br />

assign a specific ranking to each, but at the end <strong>of</strong> the day<br />

the quality, integrity and experience <strong>of</strong> the management<br />

team is the tipping point between success and failure.<br />

Since we act in a capital raising capacity for our clients, we<br />

always position ourselves in the mind <strong>of</strong> an investor as we<br />

do our due diligence.<br />

Technology:<br />

• Does the technology fill a market gap and have real<br />

functional differentiation vs. the competition?<br />

• Does the technology <strong>of</strong>fer an ROI to the end user,<br />

either in terms <strong>of</strong> upfront acquisition cost or the total<br />

life cycle cost <strong>of</strong> ownership?<br />

• Does the technology <strong>of</strong>fer flexibility in terms <strong>of</strong> size,<br />

portability, weight, and mobility?<br />

• Can the technology be easily and cost-effectively up<br />

graded over time?<br />

• Can the technology maintain its functional and/or cost<br />

advantages over time?<br />

Management:<br />

• What is management’s background and experience in<br />

the specific technology sector?<br />

• Has management previously taken a company from<br />

early-stage, to growth stage to a successful exit in the<br />

past?<br />

• Is there a strong Board <strong>of</strong> Directors that brings exper<br />

tise in governance, operations and management?<br />

• Is there a strong ethical culture in the organization<br />

that starts “at the top”?<br />

• Has there been continuity in the core management<br />

team over time?<br />

Business Model:<br />

• Is there sustainability in the Company’s pricing model?<br />

• Can gross and operating margins be sustained or<br />

increased over time?<br />

• Is there both a direct and channel sales model in<br />

order to cost-effectively access end-user opportunities?<br />

• Is there a component <strong>of</strong> a recurring revenue or SaaS<br />

revenue model?<br />

• Are there customer concentration issues/is the sales<br />

cycle elongated?<br />

44


Tell us about some <strong>of</strong> the recent additions<br />

to your team.<br />

SG: We made a number <strong>of</strong> important additions to our<br />

team and our advisory board in <strong>2014</strong> to prepare us for<br />

growth in 2015.<br />

We added Mark Sauter as our Head <strong>of</strong> M&A. Mark<br />

was a co-founder <strong>of</strong> America’s first business accelerator for<br />

national security technology and manager <strong>of</strong> its contract<br />

with the NSA. Just prior to joining SSG, Mark was a principal<br />

in the Spectrum Group, one <strong>of</strong> the country’s leading<br />

M&A due diligence firms. He served as an Army <strong>of</strong>fice<br />

in Special Forces and infantry units and is a graduate <strong>of</strong><br />

Harvard University and the Columbia University Graduate<br />

School <strong>of</strong> Journalism. He is also co-author <strong>of</strong> McGraw<br />

Hill’s leading university textbook, “<strong>Homeland</strong> <strong>Security</strong>: A<br />

Complete Guide.”<br />

We added Tom DiNanno as our Head <strong>of</strong> Government<br />

Affairs. Tom served as Deputy Assistant Secretary for<br />

Critical Infrastructure Protection at the U.S. Department <strong>of</strong><br />

<strong>Homeland</strong> <strong>Security</strong>, served as Special Assistant to the Chief<br />

<strong>of</strong> Staff in the Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>, and in<br />

the White House Office <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> as Director<br />

<strong>of</strong> Corporate Relations. He received his MS in Business<br />

and Urban Planning from MIT, and an MA in Government<br />

Administration from the University <strong>of</strong> Pennsylvania.<br />

We added Brian Tuskan to our advisory board late<br />

last year. Brian serves as Senior Director <strong>of</strong> Micros<strong>of</strong>t Global<br />

<strong>Security</strong>, where he oversees global strategic development,<br />

integration and growth for Technology, Showcase,<br />

Investigations, and Communications for the Micros<strong>of</strong>t<br />

Global <strong>Security</strong> team. He joined Micros<strong>of</strong>t in 2000, after<br />

serving more than 12 years in law enforcement with the<br />

City <strong>of</strong> Redmond Police (Washington) and the Honolulu<br />

Police Department. During his distinguished law enforcement<br />

career he served as a metropolitan police <strong>of</strong>ficer,<br />

patrol, SWAT tactical team member, undercover narcotics<br />

detective, major crimes detective, and <strong>of</strong>ficer-in-charge.<br />

45


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

IRIS ID –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Biometric Identification Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

IrisAccess - Iris Recognition Systems<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Iris ID ® (formerly LG Iris) has been active in the development<br />

and deployment <strong>of</strong> iris recognition technology<br />

since 1997. The IrisAccess ® platform has been widely<br />

deployed around the world. Iris ID’s first generation<br />

product was the IrisAccess ® 2200 iris recognition system<br />

released in 1999, which paved the way for the first successful<br />

commercialization <strong>of</strong> iris<br />

recognition. This generation was<br />

subsequently followed by the releases<br />

<strong>of</strong> the IrisAccess 3000, iCAM<br />

4000, iCAM 7000 series, iCAM<br />

TD100, iCAM D1000, iCAM T10,<br />

iData ® EAC s<strong>of</strong>tware, IrisAccelerator<br />

® and iData ® S<strong>of</strong>tware Development<br />

tools. Twentieth-century security<br />

infrastructures are straining<br />

against the demand <strong>of</strong> twenty-first<br />

46<br />

century security implementation. The crushing pressure<br />

<strong>of</strong> an unpredictable global threats, stringent regulatory<br />

constrains increasing exceptions and escalating security<br />

threats are stressing facilities, and IT systems to the<br />

breaking point. In this volatile business environment,<br />

the world over are confronting extraordinary challenges<br />

including the inherent contradiction between improving<br />

operational efficiency, customer service, and the overall<br />

“experience” while anticipating and combating a broad<br />

range <strong>of</strong> security threats. This dual high service/high security<br />

challenge has created significant operational gaps<br />

in the homeland environment that require innovative<br />

process reengineering and comprehensive operational<br />

improvements. IrisAccess iris-based access control is one<br />

<strong>of</strong> an array <strong>of</strong> new and innovate<br />

business processes and automated<br />

technology solutions homeland<br />

security agencies are adopting to<br />

close these gaps, remain vegilant,<br />

and breakthrough to the customer<br />

experience. Secure access control<br />

is critical to addressing existing<br />

airport security/service operational<br />

gaps. This is particularly<br />

true for managing staff and third


party vendor access to restricted zones within a facility.<br />

IrisAccess ® solutions most effectively and reliably balance<br />

a number <strong>of</strong> seemingly irreconcilable constraints,<br />

including:<br />

• Regulatory Compliance<br />

• Cost minimization and reduction<br />

• Leveraging security infrastructure and investments<br />

• Comprehensive, multi-layered security<br />

• Balancing security with speed <strong>of</strong> access<br />

• Uniform access to multiple locations and facilities<br />

• Flexible solutions that evolve with planning process<br />

• User friendly, easily adopted, and accepted solutions<br />

• Integrating access control with existing and planned<br />

airport ID systems<br />

• Unique facility/location issues – environmental, local<br />

rules/regulation, end-user concerns<br />

IrisAccess highly reliable identification process can be a<br />

key component <strong>of</strong> any homeland security access control<br />

solution that successfully balancing these requirements.<br />

Iris ID IrisAccess solution is uniquely suited to quickly<br />

and accurately establish and verify identity enabling<br />

secure and reliable access control in the highly sensitive<br />

places. Iris ID IrisAccess systems provide high integrity<br />

mass enrolment applications, physical access security<br />

for airports, national ID programs, secure border crossings,<br />

data centers, biotech labs and HAZMAT environments,<br />

as well as other critical infrastructures. The only<br />

biometric technology designed for operation in oneto-many<br />

search mode, the technology also integrates<br />

with traditional system architectures which may include<br />

smart-cards as well as other tokens or PINs. Readily<br />

accommodating expansion and scalability in terms <strong>of</strong><br />

system and database size requirements, Iris ID continues<br />

to advance the “doorway to desktop” and global<br />

security solution that enterprise and governments seek<br />

today, as well as <strong>of</strong>fering the robust authentication<br />

47<br />

that will be required in an increasingly wireless world.<br />

IrisAccelerator and associated development tools have<br />

been proven to provide highly accurate and fast identification<br />

<strong>of</strong> individuals. Iris ID has been providing iris<br />

technology solutions for <strong>Homeland</strong> <strong>Security</strong> for past<br />

14 years. Iris ID products and solutions are currently<br />

used in more than 50 airports, high value assets such as<br />

nuclear power plants, critical infrastructure government<br />

or commercial security around the world for employee<br />

access control and homeland security. Recently Iris ID<br />

was awarded the honor <strong>of</strong> providing a border security<br />

solution for Canada Border <strong>Security</strong> Agency (CBSA) and<br />

Hammad International Airport, Doha Qatar.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.irisid.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Mohammed Murad<br />

Vice President, Iris ID Systems Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(609) 819-4747<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

murad@irisid.com


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Eid Passport –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Integrated System for HSP D-12/FIPS 201<br />

Compliance<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The RAPIDGate Program<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The RAPIDGate ® Program, from Eid Passport, Inc., is<br />

an end-to-end high assurance identity management<br />

and installation access control solution for vendors,<br />

contractors, and service providers. This field-proven,<br />

accredited, and widely-accepted credentialing and<br />

vetting program has been deployed at more than 450<br />

federal facility access control points across the United<br />

States and its territories, helping the U.S. military guard<br />

against such threats as unauthorized access, identity<br />

theft, fraud and cyber-crime. These threats put the safety<br />

<strong>of</strong> military personnel, critical infrastructure, and other<br />

valuable assets at risk every day. This DIACAP ATOcertified<br />

program was specifically designed to enhance<br />

installation safety and security and improve operational<br />

efficiency and effectiveness in aligning with HSPD-12/<br />

FIPS 201 requirements by utilizing our proprietary,<br />

48<br />

self-contained physical access control system for card<br />

validation, authentication, and registration. Since 2004,<br />

the RAPIDGate Program has identity-pro<strong>of</strong>ed, performed<br />

suitability risk analysis and credentialed more<br />

than 790,000 vendor/contractor employees representing<br />

approximately 59,000 companies doing business<br />

with the U.S. Navy, Army, Marine Corps, and Coast<br />

Guard. Over 130,000,000 authentication events have<br />

been recorded, the majority <strong>of</strong> which are vendors and<br />

contractors requiring identity verification and access to<br />

military and government bases/buildings. As a result,<br />

Eid Passport is the leading commercial provider <strong>of</strong> U.S<br />

Department <strong>of</strong> Defense recognized vendor credentials.<br />

The time required to screen and verify vendors and<br />

contractors for base access cuts deeply into productivity,<br />

particularly for smaller companies who can least


afford to wait in line. This results in higher vendor costs,<br />

which ends up increasing military costs. To significantly<br />

reduce the time it takes for thousands <strong>of</strong> personnel to<br />

gain needed access to military facilities, the RAPID-RCx ®<br />

Program was developed. It seamlessly integrates access<br />

control point systems and biometric identity verification<br />

into a single, RAPIDGate credential. Additionally,<br />

Eid Passport is currently implementing its RAPIDGate<br />

Premier credentialing program for the U.S. Navy.<br />

This advanced program adds Personal Identity Verification<br />

Interoperable (PIV-I) credentials to the RAPIDGate<br />

Program. These enhanced, tamper-resistant credentials<br />

meets PIV-I credentialing standards and are in accordance<br />

with HSPD-12 and FIPS 201. RAPIDGate Premier<br />

PIV-I credentials contain: a unique ID code; a color<br />

photograph; the credential holder’s full name; organizational<br />

affiliation/company name; issued and expiration<br />

dates; and program seal <strong>of</strong> authenticity. Furthermore,<br />

the RAPIDGate Premier Program credentials are the<br />

only PIV-I credentials with integrated background vetting.<br />

Incorporating this enhanced credential with PIV-I<br />

compliant PACS systems provides participants with a<br />

single, interoperable credential granting them access to<br />

controlled areas such as flight lines, secure buildings,<br />

spaces, vaults, and other areas where authorized access<br />

is required. Once RAPIDGate has been deployed,<br />

security personnel can verify that anyone arriving with<br />

a RAPIDGate badge has been Registered And Previously<br />

ID’d. That means they’ve passed a thorough background<br />

screen, been photographed, fingerprinted and badged.<br />

Vendors like RAPIDGate because it saves them hours<br />

<strong>of</strong> time and improves worker productivity by providing<br />

rapid base access. Force Protection likes RAPIDGate<br />

because it allows security personnel to spend less time<br />

and resources screening “Registered And Previously<br />

ID’d” visitors who have already been vetted and allows<br />

them to meet security policy requirements.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

High-assurance identity management for vendors, contractors,<br />

suppliers, & service providers<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Eid Passport, Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

John Nee : (503) 924-5293<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

jnee@eidpassport.com<br />

49


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Alert Enterprise –<br />

<strong>2014</strong> Finalist<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Platform for Physical and Logical Access<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Enterprise Guardian<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Companies are faced with the daunting task <strong>of</strong> reconciling<br />

employee, contractor and visitor lists against HR that are working fine. AlertEnterprise has developed a<br />

resorting to cost prohibitive replacement <strong>of</strong> systems<br />

Management Systems, Manual Contractor acquisition solution to bridge the security gaps across these silos <strong>of</strong><br />

processes and the list <strong>of</strong> electronic access cards that are Physical and Logical systems with a Converged Identity<br />

actually active. Add to that the complexity <strong>of</strong> monitoring Governance and Management solution that extends<br />

the system access that they have in enterprise and legacy beyond IT and enables you to manage and control user<br />

applications. Organizations are living with the risk that access risks across the entire enterprise. As an example<br />

terminated employees or contractors still have physical<br />

access to facilities. As companies grow and acquire is an Operator who works in the Transmission Control<br />

use case for this capability, let us consider Tom. Tom<br />

other facilities and merge with other companies, Access<br />

Control systems from multiple vendors need to be Tom must complete certain on-going training require-<br />

Room for a regulated Utility company we call Utilco.<br />

accounted for. A single command and control console ments to maintain his license to operate. Utilco has a<br />

that can consolidate identities and access rules across Learning Management System (LMS) in place that is<br />

multi-vendor badging systems can eliminate the overlap, linked to the company HR system. AlertEnterprise is<br />

cost burden and manual processes needed to centrally integrated with the HR systems, the Identity Management<br />

as well as the Badge Access system. During the<br />

manage physical access across all these systems without<br />

50


onboarding process, AlertEnterprise automates the<br />

background check process prescribed by Utilco and<br />

proceeds to make sure that all the certification requirements<br />

are met. If the requisite Continuing Education is<br />

not completed, the application reminds Tom that he has<br />

two more weeks to complete it. Tom may want to access<br />

the computer-based training in the evenings to make<br />

up for lost time. If additional reminders don’t have the<br />

desired effect, finally on the last day, when Tom uses his<br />

electronic access badge to get into the control room, it<br />

will automatically lock him out, enforcing the company<br />

policy and avoiding the possibility <strong>of</strong> costly compliance<br />

violations.<br />

With Enterprise Guardian from AlertEnterprise, organizations<br />

can:<br />

• Manage a Common <strong>Digital</strong> Identity for employees,<br />

contractors, etc. for IT and Physical<br />

• Unlike other solutions, provision to both IT Applications<br />

and Physical Access Control<br />

• Meet regulatory compliance requirements and automatically<br />

generate reporting<br />

• Actively enforce termination and transfers<br />

• Have a single console that operates across multiple<br />

vendor Access Control systems<br />

• Single interface to create identity and badge for multiple<br />

Access Control Systems<br />

• Enhanced risk analysis and training validation with<br />

Active Policy Enforcement<br />

• Powerful reporting across physical access vendors<br />

consolidating access and usage<br />

• Support PIV-I and PIV-C for Government and High<br />

<strong>Security</strong> FICAM; HSPD-12; OMB M-11-11<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.alertenterprise.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Enterprise Guardian Data Sheet:<br />

https://alertenterprise.box.com/s/roeqtb8p-<br />

473pf9kz286b<br />

AlertEnterprise Video:<br />

https://www.youtube.com/<br />

watch?v=1GdXEgntzgM<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Pan Kamal,Vice President, Marketing<br />

AlertEnterprise, Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (510) 897-6712<br />

cell: (650) 793-5992<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

pan.kamal@alertenterprise.com<br />

51


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Desktop Alert –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Interoperable First Responder Communications<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert Inter-agency Mass Notification Platform<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert provides early warning mass notification<br />

alerts to over 1 million federal, military and civilian hardware and burdensome configuration logistics. For<br />

personnel daily with ‘less than one minute alerting’ as the first time in the existence <strong>of</strong> Northern Command /<br />

certified by our customer base. After an extensive worldwide<br />

vetting <strong>of</strong> vendors, the world’s most crucial peace network alerting to protect over 25,000 personnel.<br />

NORAD, the entire command is now retro fitted with<br />

keeping organization NATO selected Desktop Alert! Buttressed<br />

by this selection is that <strong>of</strong> the Institute <strong>of</strong> Peace alert all 25,000 personnel in ‘less than one minute’.<br />

The system selected enables emergency operators to<br />

2012 selection <strong>of</strong> Desktop Alert. http://www.virtual-strat-<br />

The system is also integrated with the National Weather<br />

egy.com/2012/04/17/united-states-institute-peace-selects-<br />

desktop-alert-mass-notification-system#axzz3IbIAv3c4 severe weather event, all targeted personnel are alerted<br />

Service using the Common Alerting Protocol. During a<br />

Desktop Alert was chosen over all vendors in this GSN automatically without operator assistance in less than<br />

competition for the coveted mass notification requirements<br />

by NATO HQ in Brussels Belgium. Key in our on-premise phone system. With a single mouse click, in<br />

one minute. The system also integrates with the base<br />

selection by NATO was the platforms ability to operate seconds personnel are reached by e-mail alerts, desktop<br />

popups, text messages, phone calls and mobile<br />

on the customer’s existing computational infrastructure<br />

thus saving several hundred thousand dollars in both apps. The implementation has augmented emergency<br />

52


esponse capability substantially and was recently<br />

reviewed and lauded by Maj. Gen. Jack Briggs, currently<br />

the Director <strong>of</strong> Operations for Headquarters U.S Northern<br />

Command, Peterson Air Force Base, Colorado. The<br />

implementation <strong>of</strong> the Desktop Alert MNS enables interagency<br />

communication during an emergent domestic<br />

event between the following US 1st in line 1st Responders:<br />

• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K personnel)<br />

• ARMY AND AIR NATIONAL GUARD NATIONWIDE<br />

(500+K personnel)<br />

• NORTHERM COMMAND / NORAD (25K personnel)<br />

• U.S. Defense Threat Reduction Agency (DTRA) (10k<br />

Personnel)<br />

• U.S. Army Special Operations Command at Fort Bragg<br />

• AFDW Pentagon (confidential)<br />

• 200+ Army and Air Force locations worldwide<br />

DTA is currently the second largest provider to DoD<br />

and continue to build market share year by year. The<br />

unification <strong>of</strong> alerting between these agencies provides<br />

formidable actionable intelligence during emergent<br />

homeland events. The nation’s most top tier 1st agency<br />

responders are all owners <strong>of</strong> the DTA MNS. NO other<br />

vendor can boast these credentials; especially with these<br />

numerous ‘key’ nation leading 1st inline 1st responder<br />

defense agencies as it relates to not only border security;<br />

but all other security concerns to the nation. While<br />

other vendors may claim more seat licenses within DoD;<br />

only Desktop Alert has unified the nation’s most critical<br />

security agencies with the Military and DHS with one<br />

de-facto system. Desktop Alert is far and away the leading<br />

MNS in use by the <strong>Homeland</strong>s Most Crucial Defense<br />

Agencies! The improved ability to attain actionable<br />

intelligence across all <strong>of</strong> these agencies in less than one<br />

minute during an emergent event provides immense<br />

dividends to the safety and protection <strong>of</strong> the homeland.<br />

53<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.prweb.com/releases/NORAD/<br />

NORTHERNCOMMAND/prweb9115614.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Howard Ryan, CEO<br />

Desktop Alert Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (973) 727-0066<br />

cell: (973) 580-3447<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

howard@desktopalert.net


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Desktop Alert –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Mass Notification Systems<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert Global Connect - Interagency Mass<br />

Notification Platform<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert provides early warning mass notification<br />

alerts to over 1 million federal, military and civilian<br />

personnel daily with ‘less than one minute alerting’ as<br />

certified by our customer base. After an extensive worldwide<br />

vetting <strong>of</strong> vendors, the world’s most crucial peace<br />

keeping organization NATO selected Desktop Alert! Buttressed<br />

by this selection is that <strong>of</strong> the Institute <strong>of</strong> Peace<br />

2012 selection <strong>of</strong> Desktop Alert. http://www.virtual-strategy.com/2012/04/17/united-states-institute-peace-selectsdesktop-alert-mass-notification-system#axzz3IbIAv3c4<br />

Desktop Alert was chosen over all vendors in this GSN<br />

competition for the coveted mass notification requirements<br />

by NATO HQ in Brussels Belgium. Key in our<br />

selection by NATO was the platforms ability to operate<br />

on the customer’s existing computational infrastructure<br />

thus saving several hundred thousand dollars in both<br />

hardware and burdensome configuration logistics.<br />

RECENT NEWS: DTA commended for its platform during<br />

Recent Shooter event at Fort Hood. (The Backup<br />

ARMY EM2P MNS Program alerted several minutes later<br />

than the DTA system!) Reference: http://www.desktopalert.net/News/fort-hood-update/<br />

DTA / Primary MNS at:<br />

• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K personnel)<br />

• ARMY AND AIR NATIONAL GUARD NATIONWIDE<br />

(500+K personnel)<br />

• NORTHERM COMMAND / NORAD (25K personnel)<br />

• U.S. Defense Threat Reduction Agency (DTRA) (10k<br />

Personnel)<br />

• AFDW Pentagon (confidential)<br />

• 200+ Army and Air Force locations worldwide<br />

DTA is currently the second largest provider to DoD<br />

and continue to build market share year by year. The<br />

unification <strong>of</strong> alerting between these agencies provides<br />

formidable actionable intelligence during emergent<br />

homeland events. Desktop Alert is the largest provider<br />

<strong>of</strong> MNS to the US Army Worldwide. Desktop Alert is<br />

the Primary MNS used at over 90% <strong>of</strong> US Army installations<br />

including Fort Hood. (NOTE! The US ARMY EM2P<br />

MNS Program is a BACKUP system only!). The nation’s<br />

54


most top tier 1st agency responders are all owners <strong>of</strong><br />

the DTA MNS. The Desktop Alert System sends desktop<br />

alert popups, text messages (SMS), e-mail and phone<br />

call alerts to all <strong>of</strong> these agencies personnel instantly<br />

in all 50 states and beyond. NO other vendor can boast<br />

these credentials; especially with these numerous ‘key’<br />

nation leading border defense agencies as it relates to<br />

not only border security; but all other security concerns<br />

to the nation. While other vendors may claim more seat<br />

licenses within DoD; only Desktop Alert has unified the<br />

nation’s most critical security agencies with the Military<br />

and DHS with one de-facto system. Desktop Alert is far<br />

and away the leading MNS in use by the <strong>Homeland</strong>s<br />

Most Crucial Defense Agencies! We hang our hat on the<br />

recent NATO selection, our usage by the National Guard<br />

Nationwide, our usage by FEMA HQ locations nationwide<br />

and <strong>of</strong> course the irrefutable fact that Desktop<br />

Alert is the ONLY proven vendor in this competition that<br />

delivers alerts in less than one minute. As a result <strong>of</strong> the<br />

NATO selection our company has also been contacted to<br />

REPLACE the incumbent for the entire US Marines Enterprise!<br />

When lives are at stake, seconds count. Numerous<br />

DoD agencies are unsatisfied with alerts received in<br />

5 to 10 minutes. The best is yet to come! Thank you for<br />

your review and consideration.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.desktopalert.net<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.prweb.com/releases/<strong>2014</strong>/11/<br />

prweb12296096.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Howard Ryan, CEO<br />

Desktop Alert Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(973) 580-3447<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

howard@desktopalert.net<br />

55


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

NICE Systems –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Intelligent Video Surveillance Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NICE Suspect Search<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

An active shooter is on the loose. An airport checkpoint<br />

has just been breached. Police are frantically searching<br />

for a lost child amid a crowded location. A suspicious<br />

bag is left behind in a busy transit station. In each <strong>of</strong><br />

these situations, time is <strong>of</strong> the essence. Surveillance video<br />

can provide clues to finding a suspect, but will you<br />

be able to pinpoint the exact video you need in time?<br />

Here’s where NICE Suspect Search can help. Suspect<br />

Search is a patent-pending video analytics technology<br />

that helps you quickly locate and retrace the movements<br />

<strong>of</strong> a person <strong>of</strong> interest within a video surveillance network.<br />

It can scan an hour <strong>of</strong> video in less than a minute,<br />

automatically filtering out 95 percent <strong>of</strong> irrelevant images.<br />

Suspect searches can be initiated using a recorded<br />

image, an uploaded full body photo, or a suspect composite.<br />

As the search reveals snapshots <strong>of</strong> the suspect<br />

56<br />

over time across different cameras, it evolves into a<br />

history <strong>of</strong> their movements before and potentially after<br />

the incident. Timely situational awareness is critical so<br />

snapshots are presented on an actual map. This answers<br />

questions like how did the suspect get here? Where did<br />

he go? Did he meet up with anyone or was he alone?<br />

And is he still on premise? Suspect Search revolutionizes<br />

video forensics, both for real-time use and for after-thefact<br />

investigations. <strong>Digital</strong>ly stamped images, video, and<br />

location information associated with each search can<br />

easily be shared with police departments and district<br />

attorneys for forensic investigations.


WHAT SETS SUSPECT SEARCH APART<br />

There are technologies on the market that can search<br />

for a specific color, but until now, none <strong>of</strong> them could<br />

search for a specific person, especially not in real-time.<br />

Suspect Search takes into account three parameters -- a<br />

full body image, the unique human signature <strong>of</strong> a person<br />

(e.g. size and the way they walk), and the textures<br />

and colors associated with that person like their clothes,<br />

accessories, hair, or skin. The Suspect Search algorithm<br />

analyzes, tags, sorts, and stores images in a database according<br />

to these parameters, increasing search accuracy.<br />

Furthermore, calculations are done in real-time. Video is<br />

analyzed as it is captured, so searches can begin immediately<br />

and results are available within seconds. Another<br />

differentiator is Suspect Search’s ability to simultaneously<br />

search across multiple camera feeds. Once the<br />

target has been located, Suspect Search’s geo-spacial<br />

capabilities allow operators to trace and retrace the suspect’s<br />

route to predict patterns <strong>of</strong> movement for quick<br />

apprehension.<br />

SUSPECT SEARCH BENEFITS<br />

By providing near real-time, actionable information<br />

about the whereabouts and movements <strong>of</strong> persons <strong>of</strong> interest,<br />

Suspect Search can accelerate response times and<br />

effect positive outcomes, whether that means finding a<br />

lost child faster, apprehending<br />

suspects quicker, or avoiding<br />

costly shutdowns.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.nice.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/nice-suspect-search<br />

https://www.youtube.com/watch?v=PD-hSXOt5<br />

FA&index=54&list=PLC3F1BBC80EE0AA53<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

57


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Automatic Systems –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Perimeter Protection Product/System (Excluding<br />

Video)<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SlimLane Short - Swing Barrier Optical Turnstile<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SlimLane Short swing door optical turnstiles combine<br />

high speed bidirectional throughput with the highest reliability,<br />

security, and footprint variations <strong>of</strong> any barrier<br />

type optical turnstile. Available in narrow or wide lane<br />

versions and single or double swing doors in 24 or 120 able with either low glass height (35”), medium (47”),<br />

volt power configuration, SlimLane is already widely or high (67”) glass versions. The shorter cabinet length<br />

known as the most versatile swinging glass turnstile. allows for easier implementation into most elevator<br />

SlimLane <strong>of</strong>fers IP connectivity – and was the first security<br />

entrance control lane to boast this feature. SlimLane architectural demands in many front lobbies. Automatic<br />

bank openings, as well as to more readily adapt to strict<br />

is UL 2593 listed to help satisfy the most stringent <strong>of</strong> Systems is a leading manufacturer <strong>of</strong> pedestrian and<br />

building and safety codes. The standard and unique vehicle entrance control equipment, with North American<br />

headquarters/manufacturing in Brossard, Quebec,<br />

“SecuriSafe” mode prevents forced entry attempts while<br />

still allowing emergency egress at any time, and Slim- Canada. Under GSA Schedule Contract #GS-07F-0109Y,<br />

Lane is the only lane <strong>of</strong> its kind to <strong>of</strong>fer such a feature. Automatic Systems <strong>of</strong>fers both their full range <strong>of</strong> pedestrian<br />

and vehicle entrance control systems to federal<br />

This new SlimLane <strong>of</strong>fers a 48” cabinet length (existing<br />

standard length is 62”). Both product lengths are avail- government security buyers.<br />

58


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.automatic-systems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Martha Tsiritas, Marketing Manager<br />

Automatic Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(800) 263-6548 xt234<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

mtsiritas@automatic-systems.com<br />

59


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Secure USA –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Crash Barrier (Gates, Fences, Bollards, Guard<br />

Booths)<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SideWALK Shallow Foundation Bollards<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The homeland security threat to urban and corporate<br />

campus facilities makes bollards a necessity for protetive<br />

stand<strong>of</strong>f zones for at-risk structures. SecureUSA ®<br />

invented shallow foundation bollard solutions that<br />

meet stringent ASTM performance specifications in<br />

circumstances which would normally preclude the use<br />

<strong>of</strong> “standard” deep foundation bollards. They do it with<br />

aesthetic style and design sensitivity, without sacrificing<br />

performance. T The SecureUSA ® SideWALK ® Bollard<br />

was developed to overcome the installation challenges<br />

commonly found in any location where underground<br />

infrastructure and utilities prevent deeper excavation.<br />

They carry ASTM-C40 to M50 crash ratings/zero penetration<br />

with a single bollard strike in as little as 6 inch<br />

foundation depths and a footprint designed to fit in virtually<br />

any sidewalk pavement. Standard crash rated bol-<br />

60<br />

lards typically require foundation depths <strong>of</strong> up to three<br />

feet or more to achieve desired crash ratings. In major<br />

metropolitan cities where the area under the pavement<br />

and streets are crowded with utilities and other infrastructure,<br />

a deeper foundation is virtually impossible.<br />

Even other “shallow” bollards that have been subjected<br />

to actual crash tests require deeper foundations than the<br />

minimal 9 inches for SecureUSA’s ASTM-M30 (15,000lb<br />

vehicle @ 30 mph) and M50 (15,000lb vehicle @ 50<br />

mph) product. The SideWALK ® Bollard Series consists<br />

<strong>of</strong> individual bollards that are easy to install even when


the terrain causes each <strong>of</strong> the bollards to change slope,<br />

grade and curvature. This is a unique design for shallow<br />

foundation crash rated bollards as other manufacturers<br />

use a fixed sled design comprising a number <strong>of</strong> bollards<br />

configured into less flexible bollard sets. The SecureUSA ®<br />

SideWALK ® Bollard allows installation spacing to be<br />

more flexible around typical obstructions, such as utility<br />

vents, drains and other typical roadway and sidewalk<br />

restrictions. This makes for cost effective protection in<br />

normally prohibitive environments. SecureUSA ® Side-<br />

WALK ® Bollards shallow foundation bollards provide<br />

ADA compliant, pedestrian friendly stand<strong>of</strong>f zones with<br />

the ability to restrict vehicular access without obstructing<br />

pedestrian access, while meeting ASTM standards.<br />

This is a major technological achievement. SecureUSA ®<br />

also pioneered the development and production <strong>of</strong><br />

all-electric retractable bollards that save time and money<br />

in installation and maintenance over the life <strong>of</strong> the<br />

system. No hydraulics minimize the potentially negative<br />

environmental impact <strong>of</strong> leaks and spills associated with<br />

hydraulic systems. I have found the staff at SecureUSA ®<br />

to be the highest quality pr<strong>of</strong>essionals dedicated to<br />

excellent “post-sale-installation” customer service. It has<br />

been a delight to work with them.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.secureUSA.net<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.secureusa.net/products/sidewalkshallow-bollards/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dr. Stephen R. Crosby, Manager, Entrusted Creative<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(760) 333-7414 (both <strong>of</strong>fice and cell)<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

steve@entrustedcreative.org<br />

61


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

NICE Solutions –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical <strong>Security</strong> Information Management<br />

(PSIM) Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NICE Situator<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NICE remains at the forefront <strong>of</strong> PSIM technology’s<br />

evolution. With a focus on continued growth and expansion,<br />

we’ve extended Situator’s reach beyond the<br />

control room and into the field. Our new innovative<br />

mobile application addresses operational issues, as well<br />

as safety and security. Moreover, NICE Situator was<br />

selected to help secure some <strong>of</strong> the world’s most highpr<strong>of</strong>ile<br />

cities and events in <strong>2014</strong>, including the World<br />

Cup hosted in Brazil, the Winter Olympics in Sochi and<br />

Super Bowl XLVIII in East Rutherford, NJ.<br />

Why it’s the best PSIM solution<br />

New, Innovative Applications:<br />

We’ve extended NICE Situator’s capabilities out and into<br />

the field with a web-based GIS mobile application. First<br />

deployed by the Los Angeles International Airport (LAX),<br />

the NICE Situator Enterprise Geographical Information<br />

System (EGIS) Web application, enables field personnel<br />

to view all open incidents in Situator and log new incidents<br />

from a tablet. This creates a shared environment<br />

for managing incidents, enhanced team collaboration<br />

and increased situational awareness.<br />

NJ TRANSIT, the largest statewide public transportation<br />

system in the U.S. has also deployed a Mobile App. NJ<br />

TRANSIT used the solution for the first time during Super<br />

Bowl XLVII to streamline communications between<br />

the command center and 900 NJ TRANSIT Super Bowl<br />

ambassadors on the ground. In addition to reporting<br />

incidents, field personnel were able to use the App to<br />

62


look up schedules and other information to assist passengers.<br />

Following the successful Super Bowl rollout,<br />

NJ TRANSIT plans to deploy the solution in conjunction<br />

with other future large events and extend the Mobile<br />

App to its maintenance, customer service and transit<br />

police personnel.<br />

Successful Global Deployments:<br />

NICE Situator continues to improve operations and provide<br />

situational awareness, management and resolution<br />

capabilities to organizations across industries and urban<br />

centers around the world. Glasgow, Scotland is using<br />

NICE Situator to consolidate data from various city-wide<br />

services like Public Space CCTV and traffic control<br />

within a single operations center. In Sochi, Russia, NICE<br />

Situator was used to help secure the recent Winter<br />

Olympics in addition to heightening overall security and<br />

safety in the city known as a destination for winter sport<br />

enthusiasts. A large city in Brazil also deployed Situator,<br />

which was used to secure some <strong>of</strong> the World Cup games<br />

this summer – the largest sporting event in the world.<br />

Market Leadership Industry Recognition:<br />

For the third consecutive time, IHS (formerly IMS<br />

Research) has ranked NICE the global leader in PSIM<br />

solutions (Situator) and has named NICE the leading<br />

PSIM vendor worldwide. In addition, Frost & Sullivan<br />

has defined Situator as one <strong>of</strong> the few Tier 1 PSIM<br />

solutions available.<br />

63<br />

Comprehensive investigations:<br />

Through its integration with NICE Inform, NICE Situator<br />

provides the industry’s most comprehensive debriefing<br />

and investigation solution. The integrated reconstruction<br />

platform is the first such solution capable <strong>of</strong> capturing<br />

and synchronizing replay <strong>of</strong> multi-media sources including<br />

video, audio, GIS-based displays and key operational<br />

data. Step-by-step operator actions and 360-degree incident<br />

reconstructions can now be incorporated into the<br />

debriefing process for investigations, training, planning<br />

and prevention.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.nice.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

web page: http://www.nice.com/situation-management/nice-situator<br />

PSIM market leader: http://www.nice.com/niceranked-market-share-leader-global-psim-market<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

Hikvision –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Network IP Cameras<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

3MP 360 Fisheye Camera<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The first <strong>of</strong> its kind to <strong>of</strong>fer a true 30 FPS fisheye view range processing. The inclusion <strong>of</strong> bi-directional audio,<br />

in full resolution, Hikvision’s 3MP 360 Fisheye stands alarm I/O, and in-camera recording with a 64 GB SD<br />

out from its competitors. With five channels <strong>of</strong> video, it card allow the Hikvision Fisheye to become a virtually<br />

single-handedly captures high-quality images from every standalone system. Combined with the special features<br />

corner <strong>of</strong> a particular location, eliminates blind spots, <strong>of</strong> Hikvision’s Smart Series, such as line crossing and<br />

and dewarps the image to allow for multiple viewing intrusion detection, the Fisheye camera is an excellent<br />

modes: a panoramic (180 degree) view, a 360 degree choice for detailed coverage <strong>of</strong> wide, open areas. Airports,<br />

conference rooms, parking lots, building fore-<br />

view, and three virtual PTZ views. The Fisheye does<br />

more on its own than multiple cameras trying to do the courts, storage yards, loading bays, and classrooms are<br />

same thing. The camera’s 1/3” progressive scan CMOS perfect venues for the expansive coverage provided by<br />

sensor provides high resolution images <strong>of</strong> up to 2048 x the Fisheye. In addition, the unique attributes <strong>of</strong> this<br />

1536. Integrated IR allows for even disbursement over camera means that it lends itself to particularly creative<br />

the entire image, eliminating hot spots. In fact, the IR uses. One example involves an educational facility in<br />

functionality boasts up to 50 feet <strong>of</strong> visibility in low- or New Mexico, comprised <strong>of</strong> a middle school and a high<br />

zero-light conditions. Hikvision’s award-winning WDR school, which installed a Fisheye in their gymnasium.<br />

algorithms provide industry-leading 120dB <strong>of</strong> dynamic The Fisheye camera’s panoramic view covers the entire<br />

64


gym, and each <strong>of</strong> the digital PTZs are assigned to different<br />

school administrators. The digital PTZ system lets<br />

users use the camera like a conventional dome camera<br />

without any moving parts, improving reliability. Because<br />

there are different groups <strong>of</strong> students using the gym<br />

throughout the day, the principal <strong>of</strong> the high school has<br />

access to his own PTZ, as do the vice principal <strong>of</strong> the<br />

high school and the principal <strong>of</strong> the middle school. Each<br />

user can manipulate their PTZ remotely and autonomously<br />

without stepping on each other’s toes, while<br />

also viewing the 180 to see the big picture. With over<br />

3000 Hikvision engineers devoted to R&D, it’s no wonder<br />

that cutting-edge cameras such as the Hikvision 360<br />

Fisheye change the landscape <strong>of</strong> modern video surveillance.<br />

Hikvision’s commitment to innovation allows its<br />

customers to maximize surveillance with the Fisheye’s<br />

user-friendly features or incorporate the Fisheye into<br />

unique, unconventional, surveillance solutions.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.hikvision.com/en/us<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Fisheye spec sheet: http://www.hikvision.com/en/<br />

us/products_show.asp?id=9810<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Anna Boudinot, Content Manager<br />

Hikvision USA<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (909) 612-9034<br />

cell: (323) 470-7772<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

anna.boudinot@hikvisionusa.com<br />

65


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Vendors <strong>of</strong> Physical <strong>Security</strong> Products and Solutions<br />

HID Global –<br />

<strong>2014</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Physical <strong>Security</strong> Access Control & Identification<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

pivCLASS 4.3<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Fully tested by the U.S. General Services Administration<br />

for compliance with FICAM, Federal Identity Credential<br />

and Access Management programs, pivCLASS ® 4.3 is the<br />

first GSA FICAM Certified Validation System available in<br />

the security market today. The extensive Government<br />

portfolio <strong>of</strong> credential authentication solutions enables<br />

customers to comply with government physical access<br />

control system (PACS) mandates, outlined in HSPD-12<br />

and FIPS 201, to PIV-enable a PACS. By providing an<br />

end-to-end solution that eliminates the need to rip and<br />

replace the existing access control infrastructures, the<br />

portfolio’s extensive range <strong>of</strong> Personal Identity Verification<br />

(PIV) solutions allow agencies to use PIV-enabled<br />

cards for strong PKI-based validation for physical access.<br />

With its addition <strong>of</strong> the pivCLASS MultiPACS s<strong>of</strong>tware to<br />

the pivCLASS portfolio it is significantly easier for large<br />

government agencies and organizations to provision<br />

identities across many different, unconnected access<br />

control systems located throughout geographically dis-<br />

persed operations. The s<strong>of</strong>tware is designed to streamline<br />

and simplify the process <strong>of</strong> registering Personal<br />

Identity Verification (PIV) credentials into multiple,<br />

disparate physical access control systems (PACS). A key<br />

element <strong>of</strong> HID Global’s expanded pivCLASS portfolio<br />

<strong>of</strong> FIPS 201-based credential registration and verification<br />

solutions, MultiPACS was created for government<br />

agencies that commonly operate in numerous buildings<br />

in several geographic areas, using many different PACS<br />

supplied by multiple vendors No other vendor currently<br />

<strong>of</strong>fers a complete portfolio that provides authentication<br />

at both the enrollment function and at the point <strong>of</strong><br />

access (e.g., door), registration <strong>of</strong> validated credentials<br />

into over 30 different PACS head-end products, and a<br />

variety <strong>of</strong> interoperable readers and reader form factors<br />

including mobile handhelds. Other vendors generally<br />

provide either the readers or s<strong>of</strong>tware for the PACS<br />

head-end enrollment function. HID is the only vendor<br />

that <strong>of</strong>fers this complete FIPS 201 solution from a single<br />

66


source. With the pivCLASS portfolio, customers can use<br />

a phased deployment approach designed to meet their<br />

immediate needs while staying within their budget. For<br />

example, an agency may want to initially enable their facility<br />

to accept PIV cards without moving immediately to<br />

strong authentication at each door. This can be achieved<br />

by deploying the pivCLASS Registration Engine, the<br />

pivCLASS Certificate Manager and pivCLASS Readers<br />

configured in Wiegand output mode. This will enable<br />

PIV cardholders to be registered into the PACS head-end<br />

and to use their cards to gain access. At some later time,<br />

strong authentication can be achieved by deploying the<br />

pivCLASS Reader Services s<strong>of</strong>tware at the PACS head-end<br />

and the pivCLASS Authentication Modules (PAMs) for<br />

the desired access points along with easily reconfiguring<br />

the existing installed pivCLASS readers. pivCLASS<br />

also supports the transition from legacy cards such as<br />

magnetic stripe, proximity and iCLASS, by allowing<br />

simultaneous use <strong>of</strong> these cards along with PIV cards.<br />

This is achieved by adding the PIV card as an additional<br />

credential to an existing PACS cardholder record. At the<br />

appropriate time, the system can be reconfigured to<br />

only accept PIV cards, seamlessly completing the transition.<br />

The pivCLASS best <strong>of</strong> breed federal identity solution<br />

also enables users to:<br />

• Register identification credentials into multiple similar<br />

or disparate PACS<br />

• Register credential and verify FIPS 201-based credentials<br />

• Harvest, validate and register credentials into over 30<br />

different PACS head end products<br />

• Provides strong one-, two- or three-factor authentication<br />

at the door<br />

• Verify cardholders identities and check the cards’<br />

revocation status<br />

• Revalidate the harvested certificates after registration<br />

and suspend the card in the PACS if the certificate is<br />

found to have been revoked<br />

• Via a PAM, cache validation status to deliver PKI-based<br />

high security at the door<br />

• Support both FIPS-201 PKI-based cards and legacy<br />

cards ( PIV, PIV-I, CIV, CAC, TWIC, iCLASS, HID Prox<br />

and others)<br />

67<br />

• Import credentials from an authoritative data source,<br />

card management system or human resource database<br />

and provision these credentials into the PACS<br />

pivCLASS meets FIPS 140 U.S. government computer<br />

security standards that specify requirements for cryptography<br />

modules.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.hidglobal.com/government/piv<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

HID Global’s pivCLASS Government Solutions portfolio<br />

is an extensive product family that makes it easy<br />

for U.S. Federal Government, government contractors<br />

and other facilities to comply with security regulations<br />

and to use their Personal Identity Verification (PIV)<br />

card and other smart cards for physical access control,<br />

resulting in compliance, interoperability and high<br />

security.<br />

New pivCLASS credentials: http://www.hidglobal.<br />

com/products/cards-and-credentials/pivclass/<br />

pivclass-smart-card<br />

New MultiPACS: http://www.hidglobal.com/products/s<strong>of</strong>tware/pivclass/pivclass-multipacs<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

HID Global<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Leah Washington: (917) 701-7601<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

lwashington@hidglobal.com


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

government agency awards<br />

69<br />

70<br />

Roster <strong>of</strong> <strong>2014</strong> Winners<br />

GSN Interview with Distinguished Judge <strong>of</strong> <strong>2014</strong> <strong>Awards</strong>,<br />

K. Denise Rucker Krepp<br />

74<br />

76<br />

78<br />

80<br />

82<br />

84<br />

86<br />

88<br />

90<br />

92<br />

94<br />

96<br />

98<br />

100<br />

Winning entries reproduced with permission <strong>of</strong>:<br />

Los Angeles International Airport (LAX)<br />

NAFTOPORT LTD<br />

Port Freeport<br />

NJ Transit<br />

Denver Regional Transportation District<br />

U.S. Army Garrison (USAG)<br />

Northern Command/Norad<br />

South Bend, Indiana Police Department<br />

City <strong>of</strong> Philadelphia, PA<br />

Community Safety Glasgow, Scotland<br />

New York State Criminal Justice (DCTS)<br />

Center for <strong>Homeland</strong> Defense and <strong>Security</strong><br />

U.S. Customs and Border Protection<br />

Government <strong>Security</strong> News<br />

68


Winners in the <strong>2014</strong><br />

<strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

government agency awards<br />

Most Notable Airport/Aviation<br />

<strong>Security</strong> Program<br />

Los Angeles International Airport – Platinum Winner<br />

Most Notable Maritime/Seaport<br />

<strong>Security</strong> Program<br />

Port <strong>of</strong> Charleston – Platinum Winner<br />

Naftoport Ltd, Gdańsk, Poland – Gold Winner<br />

Port Freeport – Silver Winner<br />

Most Notable Railroad/Mass Transit<br />

<strong>Security</strong> Program<br />

NJ Transit – Gold Winner<br />

Denver Regional Transportation District – Silver Winner<br />

Most Notable Emergency Response<br />

Implementation – Federal, State or Local<br />

Northern Command/NORAD – Platinum Winner<br />

375th <strong>Security</strong> Forces Squadron – Gold Winner<br />

Most Notable<br />

Municipal/County <strong>Security</strong> Program<br />

South Bend, Indiana Police Department – Platinum Winner<br />

City <strong>of</strong> Philadelphia, PA – Gold Winner<br />

Community Safety Glasgow, Scotland – Gold Winner<br />

Orange County, CA Court System – Silver Winner<br />

Most Notable State Government<br />

<strong>Security</strong> Program<br />

New York State Criminal Justice (DCTS) – Gold Winner<br />

Most Notable<br />

Critical Infrastructure Program<br />

U.S. Army Garrison – Silver Winner<br />

Most Notable Federal Government<br />

<strong>Security</strong> Program<br />

Center for <strong>Homeland</strong> Defense and <strong>Security</strong> – Platinum Winner<br />

Pentagon Force Protection Agency – Platinum Winner<br />

U.S. Customs and Border Protection – Platinum Winner<br />

69


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

K. Denise Rucker Krepp, Distinguished Judge,<br />

GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

Denise Krepp is a homeland security and transportation consultant who began her<br />

career as an active duty Coast Guard <strong>of</strong>ficer. After September 11, 2001, Denise was a<br />

member <strong>of</strong> the team that created the Transportation <strong>Security</strong> Administration and the<br />

U.S. Department <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong>. Denise then worked for the House <strong>of</strong> Representatives’<br />

<strong>Homeland</strong> <strong>Security</strong> Committee and advised members on homeland defense,<br />

maritime security, and critical infrastructure issues. She also served as Maritime<br />

Administration Chief Counsel during the first Obama administration. In addition to<br />

consulting, Denise is currently a pr<strong>of</strong>essor at Pennsylvania State University; serves on the Board <strong>of</strong> Directors<br />

for The Infrastructure <strong>Security</strong> Partnership; is a commentator on Backroom Politics, a weekly radio show;<br />

and an Advisory Neighborhood Commissioner, a local elected position in Washington, DC.<br />

GSN: What should the Department <strong>of</strong><br />

<strong>Homeland</strong> <strong>Security</strong> focus on in the next<br />

ten years?<br />

KDRK: DHS should redefine its definition <strong>of</strong> transportation<br />

“stakeholder” and increase stakeholder involvement<br />

in the development <strong>of</strong> security plans and training exercises.<br />

Currently, stakeholders are defined as owners and<br />

operators. For example, freight and passenger rail stakeholders<br />

in Washington, DC are limited to Amtrak, CSX,<br />

Norfolk Southern, Washington Metropolitan Transit Authority<br />

(WMATA), DC <strong>Homeland</strong> <strong>Security</strong> and Emergency<br />

Management Agency, DC Department <strong>of</strong> Transportation,<br />

etc. Individuals who live and work next to the highways<br />

and rail lines that cut through the city are not included.<br />

Excluding local individuals from the definition<br />

<strong>of</strong> stakeholder means that they are not involved in the<br />

development <strong>of</strong> federal policies. When the federal government<br />

develops new regulations and initiatives, it seeks<br />

input from the government coordinating councils (GCCs)<br />

and sector coordinating councils (SCCs). The GCCs are<br />

comprised <strong>of</strong> federal and state agencies. The SCCs are<br />

comprised <strong>of</strong> owners and operators. There is no one at<br />

the table representing the individuals that live and work<br />

along transportation routes.<br />

Local neighbor representation is critical because<br />

these individuals are the ones that will be immediately<br />

impacted when an accident occurred. In 2013, forty-seven<br />

people died when a train derailed in Lac-Megantic, Cana-<br />

70


da. A similar accident could occur in the United States but<br />

neighbors along freight rail routes aren’t being formally<br />

consulted about ways to improve rail safety and security.<br />

The lack <strong>of</strong> stakeholder involvement in rail security<br />

plans was highlighted in a Council <strong>of</strong> the District <strong>of</strong><br />

Columbia hearing last year. According to the Washington<br />

Post, neighbors testified that they weren’t notified about<br />

the hazardous materials that are being routinely transported<br />

through the community. Local DC <strong>of</strong>ficials stated that<br />

they couldn’t share the data because it is sensitive information.<br />

At the same time, DC <strong>of</strong>ficials testified that they<br />

hadn’t conducted rail emergency exercises in several<br />

years. In addition, local <strong>of</strong>ficials also testified that they<br />

needed to update rail vulnerability assessments. The<br />

problem with these answers is that the Implementing Recommendations<br />

<strong>of</strong> the 9/11 Commission Act requires rail<br />

carriers to submit rail security plans to DHS for review and<br />

DHS is supposed to consult local <strong>of</strong>ficials when reviewing<br />

these plans. If local authorities don’t have an up-to-date<br />

list <strong>of</strong> vulnerabilities, how is DHS supposed to know if the<br />

security plans are adequate?<br />

Broadening the definition <strong>of</strong> transportation stakeholder<br />

to include local individuals who live and work next<br />

to transportation lines will ensure that local agencies are<br />

providing quality input. Neighbors know the area, they<br />

will be on-scene when the accident occurs, and including<br />

them in the planning stages will help post-incident<br />

recovery. Additionally, neighborhood involvement will put<br />

pressure on local agencies to maintain accurate risk assessment<br />

information.<br />

Please note that the situation in Washington, DC<br />

is not an anomaly. Neighbors around the country are<br />

expressing similar concerns and DHS should take the opportunity<br />

to change its processes.<br />

As an elected local <strong>of</strong>ficial, what guidance<br />

can you give to your fellow <strong>of</strong>ficials about<br />

working with the Department <strong>of</strong> <strong>Homeland</strong><br />

<strong>Security</strong>?<br />

KDRK: Local <strong>of</strong>ficials have jurisdiction over local agencies<br />

so its important to know what is happening at the<br />

local level before contacting DHS. In DC, there are significant<br />

problems within the DC <strong>Homeland</strong> <strong>Security</strong> and<br />

Emergency Management Agency and the DC Department<br />

<strong>of</strong> Transportation. The rail hearings last year highlighted<br />

appalling dis-functionality and as a result, Councilmembers<br />

Cheh, Allen, and Grosso introduced legislation last<br />

week that will significantly strengthen rail security in the<br />

city.<br />

One important aspect <strong>of</strong> the proposed DC legislation<br />

is increased local oversight over the federal rail security<br />

plans. The legislation requires local agencies to review<br />

them. This requirement is already in the 9/11 Act but by<br />

introducing legislation, local elected <strong>of</strong>ficials are sending<br />

a strong signal to local agencies that they must comply<br />

this requirement. The requirement to submit semi-annual<br />

reports to the DC Council also reinforces this message.<br />

When the DC Council receives the semi-annual reports,<br />

they should work with political appointees in DHS<br />

to address local concerns. From personal past experience,<br />

relying on local agencies and career federal <strong>of</strong>ficials to<br />

solve problems won’t work. Local elected <strong>of</strong>ficials have the<br />

71


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

GSN INTERVIEW<br />

K. Denise Rucker Krepp, Distinguished Judge,GSN <strong>2014</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Program<br />

positional authority to overcome bureaucratic stumbling<br />

blocks and they should use it to best address the needs <strong>of</strong><br />

their constituencies.<br />

What keeps you up at night?<br />

KDRK: Mass transit security in Washington, DC. Eight<br />

years ago, the 9/11 Act mandated mass transit security<br />

plans. These requirements were put in place after the<br />

horrific London and Madrid bombings. I’m concerned that<br />

the Washington, DC plan isn’t sufficient.<br />

On January 12th, one individual died and seventy<br />

more were sent to hospitals when smoke filled a WMATA<br />

subway tunnel. It took almost 45 minutes for firefighters<br />

to begin evacuating stranded passengers. During these<br />

crucial minutes, riders had to depend on one another to<br />

survive. If properly drafted and implemented, the 9/11 Act<br />

mass transit security plan should have prevented this type<br />

<strong>of</strong> delay.<br />

I have personal knowledge about the vulnerabilities<br />

that continue to exist for handicapped passengers.<br />

Last spring, my nine year old daughter and I were forced<br />

to evacuate a WMATA subway train. We were in the last car<br />

and as such, we had to walk through all <strong>of</strong> the cars to get<br />

out. One <strong>of</strong> the individuals in the car with us was in a motorized<br />

wheel chair. The wheel chair could fit through the<br />

regular door openings but it couldn’t fit through the doors<br />

between the rail cars. This design flaw meant that someone<br />

would have to carry the handicapped gentleman out<br />

<strong>of</strong> the train. None <strong>of</strong> my fellow passengers did. Instead, he<br />

was forced to stay behind while my daughter and I went in<br />

search <strong>of</strong> a WMATA representative to help him. There was<br />

no fire that day but what would have happened if there<br />

had been one. Based on what happened on the January<br />

12th, I’m not confident he would have survived.<br />

72


GSN Announces the 2015<br />

Airport/Seaport/Boarder <strong>Security</strong> <strong>Awards</strong> Program<br />

GSN’s second annual awards program recognizing excellence in Airport/Aviation <strong>Security</strong>,<br />

Maritime/Port <strong>Security</strong> and Border <strong>Security</strong> will open for entries on Monday, March 2, 2015.<br />

The updated 2015 edition <strong>of</strong> this exciting program will once again cover basic technology<br />

groups, including Access Control/Identification, Detection Solutions, Air/Land and Sea<br />

Communications and Surveillance, Integrated <strong>Security</strong> Programs and Aviation/Maritime<br />

and Border <strong>Security</strong> Human Resource Development.<br />

In addition to the staples <strong>of</strong> Cargo Screening, Thermal Nightvision, Integrated Harbor<br />

<strong>Security</strong> and Perimeter Protection, you can expect many new categories in Satellite<br />

Communications, Aviation and Military Beacons and Air Traffic Control – plus new categories<br />

recommended by knowledgable vendors or outstanding operators or security teams.<br />

The last group <strong>of</strong> entries will once again be dedicated to the following three categories:<br />

* Most Notable Airport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />

* Most Notable Seaport <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Upgrade<br />

* Most Notable Border <strong>Security</strong> Program, Project or Overall <strong>Security</strong> Initiative<br />

AIRPORT | SEAPORT | BORDER<br />

SECURITY<br />

AWARDS PROGRAM<br />

43 73


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Los Angeles International Airport<br />

(LAX) – <strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Airport/Aviation <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LAX Enterprise Geographical Information System<br />

(EGIS) Web application<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Los Angeles International Airport (LAX) is one <strong>of</strong> the<br />

busiest airports in the world. As such, it has invested<br />

heavily in technology, deploying new solutions to<br />

strengthen its safety, security, and operations. Keeping<br />

things running smoothly hinges on real-time collaboration<br />

and coordination, so LAX sought a faster and more<br />

efficient method for various stakeholders within the<br />

Airport Response Coordination Center (ARCC) and field<br />

operations to share information.<br />

LAX recently deployed an innovative new situational<br />

awareness tool that does exactly that. The airport has<br />

implemented the NICE Situator Enterprise Geographical<br />

Information System (EGIS), a web application that<br />

extends situation management capabilities from the<br />

control room to the field. The solution, jointly devel-<br />

oped by NICE and AECOM, provides real-time information<br />

about all aspects <strong>of</strong> the airport to airport operations<br />

field staff, the ARCC, and other airport <strong>of</strong>ficials, creating<br />

a shared environment for managing incidents as well as<br />

promoting collaboration and coordination. The system<br />

handles security, safety, and operations, including everything<br />

from emergency response to ensuring compliance<br />

with federal regulations.<br />

The Web application uses the sophisticated geospatial<br />

and mapping capabilities <strong>of</strong> Esri’s ArcGIS Server to<br />

provide customized, layered views <strong>of</strong> airport buildings,<br />

property and infrastructure. All relevant incident stakeholders<br />

can visualize the same incident on a map and<br />

74


engage in interactive dialogue via the comments log,<br />

enabling better communicate as events unfold. They can<br />

also share response plans, even an evacuation route, by<br />

drawing on the map, annotating it, and saving it to the<br />

system.<br />

Field personnel can also immediately pull up assets in<br />

an impact zone – for instance, a video camera within<br />

100 feet <strong>of</strong> the incident – or use the application’s robust<br />

search engine to search for nearby geospatial assets,<br />

like the exits closest to an incident location. They can<br />

also create new incidents, manage ongoing ones and<br />

complete specific tasks assigned to them, which reduces<br />

reliance on radio communications and enhances compliance.<br />

The Web application is also helping field operators more<br />

efficiently manage day-to-day tasks, such as Federal Aviation<br />

Administration-mandated Part 139 airfield inspections.<br />

Under Federal Aviation Regulations Part 139, United<br />

States commercial service airports are required to<br />

conduct various assessments <strong>of</strong> each runway; examine<br />

pavement markings, lighting, signs and safety areas; and<br />

oversee ground vehicle operations. If an issue arises,<br />

field operators can easily create a new incident on their<br />

mobile devices, which is resolved through Situator’s<br />

workflows and recorded for compliance purposes.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lawa.org/welcomelax.aspx<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/lax-extends-incident-management-field-operations-nice-situator-webapplication<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

News story: http://mobileenterprise.edgl.com/<br />

news/LAX-Ups-Situational-Awareness,-Mobilizing-Operations97734<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

“The NICE-AECOM solution is allowing us to transform<br />

the way we manage safety, security, and operations at<br />

LAX,” said Dominic Nessi, Deputy Executive Director/<br />

Chief Information Officer at Los Angeles World Airports.<br />

Based on our ongoing success with NICE Situator, we<br />

sought a way to apply these capabilities to our field<br />

operations. Now, not only are we able to maximize the<br />

use <strong>of</strong> our existing PSIM, situation management and GIS<br />

technologies, we are strengthening our entire security<br />

and operations apparatus.”<br />

75<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Naftoport Ltd, Gdańsk, Poland –<br />

<strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Maritime/Seaport <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Naftoport Port <strong>Security</strong> Initiative<br />

Reason this entry deserves to win:<br />

–––––––––––––––––––––––––––––––––––––––– and sensors for detection and physical security. This<br />

Naftoport is the only crude oil and liquid fuels terminal<br />

in Poland. It performs transhipments <strong>of</strong> crude oil and<br />

refined oil products in the Port <strong>of</strong> Gdańsk. The company<br />

is a critical part <strong>of</strong> the petroleum supply chain for Polish<br />

and German refineries and crude oil transit from Russia<br />

and Kazakhstan to the ports <strong>of</strong> Western Europe, the<br />

United States and the Far East.<br />

Due to Naftoport’s close proximity to Poland’s border<br />

and the nature <strong>of</strong> its activities, the port has heightened<br />

security needs that include the threat <strong>of</strong> terrorist and<br />

activist attacks as well as unauthorized entry into the<br />

Naftoport facility.<br />

As a result <strong>of</strong> expansion over the years Naftoport had a<br />

large number <strong>of</strong> non-integrated legacy security systems<br />

caused problems with the speed <strong>of</strong> reaction with each<br />

operator having to act manually to play back incidents<br />

in order to find out what took place.<br />

The primary purpose <strong>of</strong> this project was to integrate<br />

these siloed security systems and sensors, so that security<br />

<strong>of</strong>ficers could more effectively track and analyze<br />

information and respond to threats in real time. Naftoport<br />

also wanted to empower security operators with<br />

the ability to respond to events consistently, regardless<br />

<strong>of</strong> their experience or capabilities.<br />

The port has successfully deployed NICE Situator PSIM<br />

and NiceVision VMS with intrusion detection video analytics<br />

to protect its critical resources. “Our new video<br />

analytics greatly increases facility security. We’ve achieved<br />

our goal <strong>of</strong> being able to reliably detect intruders inside<br />

76


the perimeter,” said Cezary Jozwiak, Chief <strong>Security</strong><br />

Officer – Port Facilities <strong>Security</strong> Officer, Naftoport.<br />

integrates all <strong>of</strong> our security systems and processes,” he<br />

continued. “It has made us much more efficient.”<br />

NICE’s advanced situation management solution, NICE<br />

Situator, <strong>of</strong>fers a single, centralized interface and automated,<br />

adaptive workflows that are helping port authorities<br />

respond quicker and more efficiently to unfolding<br />

incidents.<br />

Working together, NICE and system integrator ISM EuroCenter<br />

S.A. leveraged PSIM to integrate nine security<br />

systems for enhanced situational awareness. These<br />

included: NiceVision intrusion detection analytics, surveillance<br />

cameras, radar, intruder and hold up alarms,<br />

passive infrared, ACS, GPS and automatic identification<br />

systems. Even sonar is being fed into Situator to detect<br />

intrusions from underwater. “Through our NICE Situator<br />

PSIM solution, we were able to successfully integrate<br />

nine security subsystems working in parallel, with mutual<br />

correlation and dedicated procedures,” explained<br />

Jozwiak.<br />

The NICE solutions are also being used by Naftoport<br />

to optimize day-to-day security operations, minimize<br />

downtime and ensure operations continuity. Roughly 40<br />

procedures have been automated through Situator.<br />

“Integrating our disparate security systems within NICE<br />

Situator has made our security team more efficient,<br />

effective, and agile by automating response processes<br />

and administration,” said Jozwiak. “It gives them a single<br />

operating platform through which they can proactively<br />

monitor, manage, and maintain the safety and security<br />

<strong>of</strong> the port, reduce risks and improve incident management.”<br />

“It has simplified our operations because our security<br />

operator is now able to interact with one interface that<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.naftoport.pl/en/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Press release: http://www.nice.com/naftoportprotects-global-petroleum-supply-chain-nicesecurity-solutions<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Naftoport video: https://www.youtube.com/<br />

watch?v=lkyQoodVYiY<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA<br />

77


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Port Freeport –<br />

<strong>2014</strong> Silver Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Maritime/Seaport <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Smart Safety & <strong>Security</strong> Alerts - Port Freeport<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Give staff the power to hit a duress button on their personal<br />

smart phone or tablet in case <strong>of</strong> emergency. This<br />

allows for emergency personnel to immediately find<br />

your location via GPS tracking and share your emergency<br />

event with other management personnel. The<br />

personnel at Freeport have referred to this as the “get<br />

me out <strong>of</strong> here” button where help is just one touch<br />

away – highlighting the importance <strong>of</strong> safeguarding all<br />

employees both remote and on-site. Push notifications<br />

on the smart application allow for reliable and speedy<br />

delivery times. No data-plan necessary.<br />

Specifically, Port Freeport utilizes:<br />

• Mobile Duress Buttons & Field Reporting, with GPS,<br />

for 50 Key Staff Members.<br />

• Push Notifications, SMS text, Email, & Phone calls<br />

for 100 Users.<br />

• Field reporting <strong>of</strong> incidents from smart apps<br />

• Accountability <strong>of</strong> staff by location and status.<br />

• Web-based & Smart App-based alert publishing for 6<br />

Operators.<br />

• 1-888-GO-ATHOC 24/7 support<br />

• Fully hosted service<br />

78


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.portfreeport.com/about.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Fully integrated crisis communication capabilities for<br />

public safety –<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.pdfio.net/k-46504532.html<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (801) 373-7888<br />

cell: (801) 361-4610<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

sherriw@connectmarketing.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

881 West State Street, #140-102<br />

Pleasant Grove, UT 84062<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Sherri Walkenhorst, Senior Partner<br />

Connect Marketing<br />

79


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

NJ TRANSIT –<br />

<strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Railroad/Mass Transit <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NJ TRANSIT Integrated Mobile App<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Video surveillance cameras can’t be everywhere, but<br />

people can. By extending an Integrated Mobile App to<br />

its field personnel for daily use and to transit ambassadors<br />

for large events, NJ TRANSIT is deploying innovative<br />

technology to ensure the highest levels <strong>of</strong> security,<br />

safety, operational efficiency and customer service for<br />

its passengers. It’s a model in mobile technology innovation<br />

that other transit agencies will surely want to<br />

emulate.<br />

NJ TRANSIT is the nation’s largest statewide public<br />

transportation system providing more than 915,900<br />

weekday trips on 262 bus routes, three light rail lines,<br />

12 commuter rail lines and through Access Link paratransit<br />

service. It is the third largest transit system in the<br />

country with 165 rail stations, 62 light rail stations and<br />

more than 19,000 bus stops linking major points in New<br />

Jersey, New York and Philadelphia.<br />

The Mobile App solution, created for NJ TRANSIT by<br />

NICE Systems and CloudScann, turns smartphones into<br />

reporting tools to document incidents as they happen,<br />

allowing <strong>of</strong>ficials to act faster to resolve them.<br />

The solution combines NICE’s situation management<br />

solution, Situator, with CloudScann’s hosted See It Send<br />

It Mobile App. By using the app on their smartphones,<br />

field personnel can report incidents, including sending<br />

video and photos, to a centralized command center<br />

through NICE Situator. Communication is bi-directional,<br />

so Situator can also push incident alerts, task lists, and<br />

links to live video feeds to the Mobile App. This will<br />

extend the real-time awareness <strong>of</strong> safety, security, and<br />

operational issues for the largest statewide public transportation<br />

system in the U.S.<br />

Situator pinpoints the GPS location <strong>of</strong> the sender’s<br />

80


phone or TETRA radio as the incident location, and<br />

can then pull up video feeds from nearby surveillance<br />

cameras. The command center operator immediately<br />

sees who’s sending the alert, where it originated, what’s<br />

happening, and what actions to take. The App is also<br />

equipped with a panic button.<br />

NJ TRANSIT used the solution for the first time during<br />

Super Bowl XLVII to streamline communications<br />

between the command center and NJ TRANSIT ambassadors.<br />

In addition to reporting incidents, ambassadors<br />

were able to use the App to look up<br />

schedules and other information to assist<br />

passengers. Following the successful<br />

Super Bowl rollout, NJ TRANSIT plans<br />

to deploy the solution during other<br />

major events.<br />

NJ TRANSIT will also extend the Ambassador Mobile<br />

App to its maintenance, customer service and transit<br />

police personnel. For example, maintenance staff will<br />

be able to view assigned work orders, their location,<br />

and related video, and report back to the control room<br />

when resolution is complete.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.njtransit.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/situation-management/<br />

nice-situator http://www.cloudscann.com/<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Refers to NJ TRANSIT Ambassador Program:<br />

http://njtransit.com/AR/files/assets/basic-html/<br />

page7.html<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA<br />

81


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Denver Regional Transportation<br />

District – <strong>2014</strong> Silver Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Railroad/Mass Transit <strong>Security</strong> Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Denver RTD Mobile Video Surveillance Initiative<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The Denver Regional Transportation District (RTD)<br />

operates almost 1,100 buses, traveling over 100,000<br />

miles and serving an average <strong>of</strong> 330,000 passengers each<br />

day. To help keep passengers and operators safe, RTD<br />

Transit Police rely on mobile video cameras installed<br />

on RTD’s bus fleet. Video is a vital tool for investigating<br />

crime, claims, ADA complaints and other incidents that<br />

occur in transit.<br />

Unfortunately, RTD’s older analog video system had a<br />

30% failure rate. Even when the cameras were working,<br />

poor quality video sometimes made it difficult to reliably<br />

identify people or understand what really happened.<br />

The cameras also recorded to an analog digital video<br />

recorder (DVR) on the bus. This meant that every time<br />

video was needed for an investigation, a technician<br />

would need to drive to the assigned bus division and<br />

pull the hard drive to physically retrieve video.<br />

Given that RTD does thousands <strong>of</strong> investigations annually,<br />

this was a significant problem. Working with partners<br />

NICE Systems and Panasonic, RTD came up with an<br />

innovative solution. The result was a high-quality digital<br />

video system that enabled RTD to download video wirelessly<br />

<strong>of</strong>f a bus, so investigators could access it without<br />

leaving their desks. The first<br />

<strong>of</strong> a kind mobile video surveillance<br />

solution uses NiceVision<br />

s<strong>of</strong>tware. The NICE s<strong>of</strong>tware<br />

runs on hardware from Panasonic<br />

Corporation and includes<br />

specialty cameras and<br />

a mobile recording platform<br />

specially designed to withstand<br />

vibration and weather<br />

extremes.<br />

RTD has already retr<strong>of</strong>itted<br />

250 new buses, and over the<br />

course <strong>of</strong> the next three years,<br />

plans to retr<strong>of</strong>it about 800<br />

82


more buses with the innovative mobile video solution.<br />

What makes the solution unique is that it automatically<br />

downloads video via Wi-Fi whenever a bus pulls into a<br />

depot, passenger concourse, or RTD facility.<br />

The new system also gives RTD Transit Police investigators<br />

high definition video, which was not available before.<br />

RTD redesigned the camera layouts, and the new system<br />

can support up to nine cameras.<br />

But the biggest benefit, given the thousands <strong>of</strong> investigations<br />

RTD does annually, is the ability to access the video<br />

remotely through the NICE Inform solution. Instead<br />

<strong>of</strong> going to the depot to manually remove hard drives,<br />

investigators can just type in the bus number, date, and<br />

time range into Inform. When the bus pulls into the<br />

depot and connects with Wi-Fi, the video download<br />

process automatically starts. The mobile video recordings<br />

can also be combined with radio recordings, and<br />

fixed surveillance video to create a complete incident<br />

timeline. RTD can also email case file links to other law<br />

enforcement agencies involved in an investigation.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.rtd-denver.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.nice.com/nice-provides-denverregional-transportation-district-mobile-videorecording-and-investigation-solut<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

News story: http://www.securityinfowatch.com/<br />

article/11375266/nice-systems-provides-enhanced-mobile-surveillance-capabilities-to<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA<br />

83


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

U.S. Army Garrison (USAG) in Bavaria –<br />

<strong>2014</strong> Silver Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Critical Infrastructure Protection Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Bavaria Interagency Deployment<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Founded in 1999, AtHoc pioneered interactive crisis<br />

communication. Today, the company protects millions<br />

<strong>of</strong> people around the world – including more than 75%<br />

<strong>of</strong> U.S. Military and <strong>Homeland</strong> <strong>Security</strong> personnel, as<br />

well as leading corporations and universities.<br />

The U.S. Army Garrison (USAG) in Bavaria provides protection<br />

to those in their community by utilizing AtHoc’s<br />

product. The USAG Bavaria strives to provide a quick,<br />

effective response to crisis in order to ensure the security<br />

<strong>of</strong> their infrastructure. They recognize that emergencies<br />

do not occur in isolation, and that efficient communication<br />

with the greater community is paramount in assuring<br />

the safety <strong>of</strong> the community in times <strong>of</strong> crisis. However,<br />

the Garrison had previously encountered many<br />

problems as it attempted to establish an effective way<br />

to communicate within a community <strong>of</strong> organizations<br />

that covers 180 miles. It lacked the efficiency to communicate<br />

between organizations, without having to alert<br />

external points <strong>of</strong> contact, in order to distribute alerts<br />

internally. In addition, USAG Bavaria was challenged<br />

with the prospect <strong>of</strong> maintaining an up-to-date list <strong>of</strong><br />

inter-organizational contacts, gathering them manually,<br />

a time consuming task at the very least.<br />

USAG Bavaria uses AtHoc’s cross-agency communication<br />

system or “Connect” to connect its numerous organizations<br />

via cloud. With this system in place, the commander<br />

responsible for safety and security will now be able<br />

to invite 13 tenant commands and components (such<br />

as the DoD school system, Morale Welfare and Recreation<br />

facilities, NATO schools, USO), as well as <strong>of</strong>f-site<br />

but contiguous affected organizations, to join a secure<br />

network <strong>of</strong> communication in which the tenants will<br />

“connect” with the host command. This allows them to<br />

communicate directly with all desired organizations and<br />

external contacts in times <strong>of</strong> crisis, without the timeconsuming<br />

task <strong>of</strong> relaying the alerts to key contacts in<br />

other organizations. Additionally, each organization has<br />

the ability to enter and manage their own personnel’s<br />

data. All <strong>of</strong> this allows USAGA Bavaria to communicate<br />

effectively and efficiently between their organizations,<br />

and ultimately, within their entire community.<br />

84


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.grafenwoehr.army.mil/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www2.athoc.com/connect<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

No media coverage yet. It hasn’t <strong>of</strong>ficially launched.<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Sherri Walkenhorst, Senior Partner<br />

Connect Marketing<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (801) 373-7888<br />

cell: (801) 361-4610<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

sherriw@connectmarketing.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

881 West State Street, #140-102<br />

Pleasant Grove, UT 84062<br />

85


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Northern Command/NORAD –<br />

<strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Emergency Response Implementation –<br />

Federal/State or Local<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Northern Command / NORAD Enterprise MNS<br />

Network Alert System<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

For the first time in the existence <strong>of</strong> Northern Command<br />

/ NORAD, the entire command is now retro fitted with<br />

network alerting to protect over 25,000 personnel. The<br />

system selected enables emergency operators to alert all<br />

25,000 personnel in ‘less than one minute’. The system<br />

is also integrated with the National Weather Service<br />

using the Common Alerting Protocol. During a severe<br />

weather event, all targeted personnel are alerted automatically<br />

without operator assistance in less than<br />

one minute. The system also integrates with the base<br />

on-premise phone system.<br />

With a single mouse click, in seconds personnel are<br />

reached by e-mail alerts, desktop popups, text messages,<br />

phone calls and mobile apps. The implementation has<br />

augmented emergency response capability substantially<br />

and was recently reviewed and lauded by Maj. Gen. Jack<br />

Briggs, currently the Director <strong>of</strong> Operations for Headquarters<br />

U.S Northern Command, Peterson Air Force<br />

Base, Colorado.<br />

86


The implementation <strong>of</strong> the Desktop Alert MNS enables<br />

interagency communication during an emergent domestic<br />

event between the following US 1st in line 1st<br />

Responders:<br />

• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K<br />

personnel)<br />

• ARMY AND AIR NATIONAL GUARD NATIONWIDE<br />

(500+K personnel)<br />

• NORTHERM COMMAND / NORAD (25K personnel)<br />

• U.S. Defense Threat Reduction Agency (DTRA)<br />

(10k Personnel)<br />

• U.S. Army Special Operations Command at<br />

Fort Bragg<br />

• AFDW Pentagon (confidential)<br />

The improved ability to attain actionable intelligence<br />

across all <strong>of</strong> these agencies in less than one minute<br />

during an emergent event provides immense dividends<br />

to the safety and protection <strong>of</strong> the homeland.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.northcom.mil/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.prweb.com/releases/NORAD/<br />

NORTHERNCOMMAND/prweb9115614.htm<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.northcom.mil/Portals/28/Documents/IA%20CND%20(33-141).pdf<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Howard Ryan, CEO<br />

Desktop Alert Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(973) 580-3447<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

howard@desktopalert.net<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Desktop Alert Inc.<br />

346 Main Street<br />

Chatham, NJ 07928<br />

87


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

South Bend, Indiana Police Dept. –<br />

<strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Municipal/County <strong>Security</strong> Program,<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ShotSpotter in South Bend, Indiana<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

South Bend PD wrestled with how to best control an<br />

increasing amount <strong>of</strong> gunfire activity to reduce crime<br />

and make the community safe. To combat this problem,<br />

it implemented SST’s ShotSpotter technology SST. Now,<br />

police are alerted in seconds <strong>of</strong> authenticated gunfire<br />

incidents, and given location data pinpointed and reliable<br />

to within 25 meters – saving a tremendous amount<br />

<strong>of</strong> time responding. This time could be the difference<br />

that could save a victim’s life and greatly increases its<br />

chances <strong>of</strong> apprehending the perpetrator. After the first<br />

nine months <strong>of</strong> using SpotShotter, Chief Teachman has<br />

seen significant improvements in South Bend. First, the<br />

number <strong>of</strong> 911 calls in the hotspot area has increased<br />

from approximately 8% to 25%. This is a tremendous<br />

help to <strong>of</strong>ficers as the addition <strong>of</strong> citizen’s reporting<br />

helps bolster the effectiveness <strong>of</strong> SpotShotter in solving<br />

crime. Secondly, South Bend has seen an increase in evidence<br />

collection from just 5% <strong>of</strong> the 911 gunfire calls to<br />

50% <strong>of</strong> those calls when accompanied by a ShotSpotter<br />

alert. Thirdly, the summer season usually has the most<br />

incidents <strong>of</strong> gun activity in all cities, and in South Bend<br />

the past summer saw a marked decrease by some 38%<br />

from the average <strong>of</strong> the four years prior. Responding <strong>of</strong>ficers’<br />

safety is also improved as they can be better prepared<br />

when arriving on the scene knowing the number<br />

<strong>of</strong> gunshots, the locations <strong>of</strong> each, and the movement <strong>of</strong><br />

the suspect or suspects.<br />

88


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.southbendpolice.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.shotspotter.com<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.shotspotter.com<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Lisa Hendrickson, PR Consultant<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (516) 767-8390<br />

cell: (516) 643-1642<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

lisa@lchcommunications.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SST<br />

7979 Gateway Blvd,Suite 210<br />

Newark, CA 94560-1156<br />

89


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Cit y <strong>of</strong> Philadelphia, PA –<br />

<strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Municipal/County <strong>Security</strong> Program,<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Department <strong>of</strong> Parks and Recreation Video Surveillance<br />

Initiative<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Committed to its young people, the City <strong>of</strong> Philadelphia<br />

operates recreation centers all over the city that serve<br />

as gathering places for the community and venues for<br />

after-school activities including sports and the arts. To<br />

ensure the safety <strong>of</strong> those using the recreation centers,<br />

the City has installed hundreds <strong>of</strong> Hikvision cameras.<br />

Pedro Pinto, the city’s Chief Engineer, and Susan<br />

Slawson, Deputy Commissioner <strong>of</strong> Parks and Recreation,<br />

worked closely with Fidelity Alarm and Arora Engineers,<br />

Inc. to design a total security solution including IP cam-<br />

eras, NVRs, and VMS s<strong>of</strong>tware by Hikvision.<br />

The highly scalable system allows for a link into a central<br />

management system, and can remain intact as existing<br />

infrastructure is gradually upgraded. This flexibility<br />

ensures longevity <strong>of</strong> the video surveillance solution and<br />

ensures that the Department <strong>of</strong> Parks and Recreation is<br />

prepared for future upgrades as circumstances require.<br />

Since the cameras have been installed, incidents <strong>of</strong><br />

vandalism, loitering, and burglaries have decreased, and<br />

the range <strong>of</strong> the cameras is so broad they can even cover<br />

the surrounding streets, <strong>of</strong>fering support to the Philadelphia<br />

Police Department.<br />

“Fun Safe Philly Summer,” the slogan for Philadelphia’s<br />

Summer <strong>2014</strong> initiative that <strong>of</strong>fered free and low-cost<br />

summer activities to Philadelphia residents, may well be<br />

shortened to “Fun Safe Philly,” as the City has pledged<br />

to include video surveillance systems across all 140 rec<br />

centers by 2016.<br />

90


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.phila.gov/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

N/A<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://us.sourcesecurity.com/news/articles/co-<br />

3425-ga.15124.html<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Anna Boudinot, Content Manager<br />

Hikvision USA<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (909) 612-9034<br />

cell: (323) 470-7772<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

anna.boudinot@hikvisionusa.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hikvision USA<br />

908 Canada Court<br />

City <strong>of</strong> Industry, CA 91748<br />

91


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Communit y Safet y Glasgow, Scotland –<br />

<strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Municipal/County <strong>Security</strong> Program,<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Community Safety Glasgow Initiative<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The Glasgow Operations Center is a state <strong>of</strong> the art facility<br />

that integrates a range <strong>of</strong> pivotal services designed<br />

to ensure the safety and security <strong>of</strong> the City. The Center<br />

is leading the way both nationally and internationally<br />

in redefining service delivery for the public and private<br />

sectors. The Glasgow security initiative involved the colocation<br />

<strong>of</strong> services, multi-agency functionality, tracking,<br />

monitoring and dispatching <strong>of</strong> assets in real time. These<br />

factors, along with the collection <strong>of</strong> intelligence, were<br />

all driving principles throughout the project.<br />

The Operation Center combines Public Space CCTV,<br />

<strong>Security</strong> for the City council’s museums, art galleries,<br />

schools, as well as Traffic Management and Police Intelligence.<br />

Integration <strong>of</strong> council services and Police Scotland<br />

enables a seamless approach as part <strong>of</strong> a smart city<br />

92<br />

management strategy.<br />

NICE Systems was chosen as<br />

the technology partner for<br />

this project for its innovative<br />

PSIM solution (NICE Situator),<br />

Video Management System<br />

(NiceVision) and cutting<br />

edge Video Analytics (NICE<br />

Suspect Search). The resulting<br />

intuitive and scalable<br />

technology platform uses NICE’s market leading PSIM<br />

solution to integrate multiple fragmented systems into a<br />

single user interface.<br />

The project has delivered:<br />

• Cutting edge technology including intelligent<br />

detection video analytics<br />

• Renewal <strong>of</strong> 500 cameras to HD<br />

• Asset management, monitoring and dispatch<br />

• A swifter, safer system for handling images and<br />

integration <strong>of</strong> data


• Live vehicle streaming <strong>of</strong> CCTV<br />

• Secure sharing <strong>of</strong> data for effective intelligent<br />

management <strong>of</strong> security<br />

“Our operators can pull up and display 10 – 500<br />

images, seamlessly from across our integrated camera<br />

network,” said Kalim Uddin, Operations Manager at the<br />

Glasgow Operations Center. “You can never replace an<br />

operator, but what we can do is to make the operator a<br />

lot more efficient, and we have achieved that with this<br />

project. The new functions we have facilitate ease <strong>of</strong><br />

access to a much broader suite <strong>of</strong> cameras, communication<br />

with key partners, tracking <strong>of</strong> individuals, and the<br />

ability to look at incidents from a traffic point <strong>of</strong> view.”<br />

“Community Safety Glasgow’s vision, combined with<br />

the latest technology from NICE Systems, makes the<br />

Glasgow Operations Center the most advanced Safe City<br />

control room in the UK,” said Philip Walker, Managing<br />

Director <strong>of</strong> Community Safety Glasgow. “Technology<br />

is the future for smart cities in terms <strong>of</strong> delivering<br />

better and more effective services and Glasgow is a<br />

benchmark and a role model for other cities around<br />

the world. Working in partnership with NICE we were<br />

able to address a broad spectrum <strong>of</strong> safety and security<br />

requirements across the city <strong>of</strong> Glasgow. What’s more,<br />

the solution can be further scaled in the coming months<br />

and years to help us further improve city services and<br />

bolster crime prevention.”<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.saferglasgow.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Glasgow Case Study video: http://www.nice.com/<br />

nice-situator-video-case-study-communitysafety-glasgow<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Linda Haelsen, Marketing Communications Manager<br />

NICE Systems<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(203) 481-4168<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

linda.haelsen@nice.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Road<br />

Paramus NJ 07652<br />

USA<br />

Through this initiative, Glasgow has demonstrated how<br />

a Smart City Operations Center can look and function.<br />

In fact, the operation center served the strategic hub<br />

and Tactical command for City Operations during the<br />

“best Commonwealth Games ever” this year in Glasgow.<br />

The Center is also future pro<strong>of</strong>ed to add functions such<br />

as intelligent lighting and flood prevention as part <strong>of</strong><br />

Glasgow’s future city program.<br />

93


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

New York State Criminal Justice<br />

(DCTS) – <strong>2014</strong> Gold Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable State Government <strong>Security</strong> Program/<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

New York State Division <strong>of</strong> Criminal Justice Services<br />

(DCJS) – Crime Analysis Centers<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The New York State Division <strong>of</strong> Criminal Justice Services<br />

(DCJS) organized the N.Y. Crime Analysis Centers in<br />

order to assist law enforcement efforts to target, solve<br />

and prevent crime, enhance public safety and build safe<br />

communities.<br />

The purpose <strong>of</strong> the Crime Analysis Centers – and the<br />

technology deployed--is to aid in the reduction <strong>of</strong><br />

violent and property crimes and to promote safe communities.<br />

The establishment <strong>of</strong> Crime Analysis Centers<br />

combined with powerful search and analytic tools<br />

provides a powerful new platform for intelligence-based<br />

policing and inter-jurisdictional cooperation. With the<br />

impetus created by this project, information sharing has<br />

become a policy, not an informal practice.<br />

This program connects the data sources previously not<br />

available or primarily used separately by police departments<br />

and law enforcement; 64 agencies now participate<br />

in data sharing across the Centers’ communities. It promotes<br />

greater success in crime prevention, deterrence<br />

and <strong>of</strong>ficer safety by providing nearly all-source information<br />

access and analysis.<br />

The centers support the work <strong>of</strong> nearly 90 crime analysts<br />

throughout the state – analysts who are responsible for<br />

the strategic, tactical and administrative management <strong>of</strong><br />

law-enforcement data to serve nearly six million New<br />

Yorkers in the participating counties.<br />

Since the centers launched in 2009, total incidents in<br />

94


these communities are down by 12%, and violent crime<br />

is down by 11%.<br />

But the outcomes go far beyond numbers as the state <strong>of</strong><br />

New York has greatly augmented the overall sophistication<br />

<strong>of</strong> its public safety presence.<br />

The Centers use a customized browser-based search<br />

tool, called <strong>Digital</strong> Information Gateway (DIG), designed<br />

for investigative agencies to quickly compile<br />

information on a single subject from all sources. It deploys<br />

DIG and other solutions at the centers to pursue<br />

intelligence-led policing, which is grounded in principles<br />

<strong>of</strong> risk assessment, pattern analysis, community visibility<br />

and continuous improvement. For New York, this<br />

drills down into the three core components <strong>of</strong> incident<br />

prevention: description (identifying what the problems<br />

are), prediction (determining when and where they’ll<br />

happen) and prescription (coming up with strategies<br />

and tactics to deter crime).<br />

With regard to solving (and closing) cases, here’s just<br />

a small sampling <strong>of</strong> both quantitative and anecdotal<br />

highlights:<br />

in the state <strong>of</strong> Virginia. DIG and other center re<br />

sources were able to help police conclude that the<br />

suspect was on his way back to Virginia on a Grey<br />

hound bus. Police stopped the bus in Rochester and<br />

detained the suspect, who confessed to the murder.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.criminaljustice.ny.gov/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

N/A<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

N/A<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Claudia Berth, Product Marketing Manager, Analytics<br />

Raytheon Cyber Products<br />

• Since the DIG implementation, DCJS has reported<br />

a 300 percent gain in efficiency with respect to the<br />

time it takes to gather all information sought for a<br />

person <strong>of</strong> interest in a case.<br />

• In Syracuse, DIG has helped analysts cross-reference<br />

large lists <strong>of</strong> pawn shops with incident reports,<br />

resulting in the successful recovery <strong>of</strong> stolen property<br />

in 47 investigations since Jan. 1, 2013 – and the<br />

majority <strong>of</strong> those cases have produced arrests.<br />

• In Buffalo, DIG played a lead role in the capture<br />

<strong>of</strong> a suspect in a stabbing death. It flagged a series<br />

<strong>of</strong> domestic incidents between the suspect and the<br />

victim, and revealed that he had an arrest record<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(703) 537-7565<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cberth@trustedcs.com<br />

(backup - evan@w2comm.com)<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

12950 Worldgate Drive, Suite 600<br />

Herndon, VA 20170<br />

95


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

Center for <strong>Homeland</strong> Defense &<br />

Securit y – <strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Federal Government <strong>Security</strong> Program/<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Center for <strong>Homeland</strong> Defense & <strong>Security</strong> (CHDS)<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

The Center for <strong>Homeland</strong> Defense and <strong>Security</strong> (CHDS)<br />

is located at the Naval Postgraduate School (NPS) in<br />

Monterey, California. Since 2002, CHDS has conducted<br />

a wide range <strong>of</strong> graduate-level educational programs focused<br />

on assisting homeland security leaders to address<br />

current and emerging threats to the nation’s security.<br />

The programs are developed in partnership with and<br />

are sponsored by the National Preparedness Directorate,<br />

FEMA.<br />

CHDS consistently develops critical thinkers who<br />

implement their education within their agencies. Unlike<br />

other graduate institutions, CHDS only accepts applicants<br />

who are in a position to impart change and are<br />

capable <strong>of</strong> forming new partnerships and reevaluating<br />

their organization’s strategies and policies. The success<br />

<strong>of</strong> CHDS is realized through the student, alumni, and<br />

program involvement in national events such as the<br />

Oso, Washington, landslide, the Washington, D.C., Navy<br />

Yard shooting, and the Boston Marathon bombing. The<br />

CHDS fingerprint is seen in the response to these types<br />

<strong>of</strong> events through critical thinking, cross-disciplinary<br />

knowledge, and multi-agency relationships cultivated by<br />

CHDS.<br />

The CHDS Master’s degree program is the first <strong>of</strong> its<br />

kind, having been established as the first accredited<br />

homeland security degree program in the U.S. Students<br />

are selected from a pool <strong>of</strong> highly qualified candidates<br />

representing a diversified group <strong>of</strong> homeland security<br />

disciplines. Courses are taught by faculty and SMEs who<br />

administer a constantly evolving curriculum in the form<br />

<strong>of</strong> classroom discussions, projects, and network-based<br />

learning. Students develop theses that are directly applicable<br />

to the problems and challenges <strong>of</strong> their respective<br />

organizations.<br />

As the definition <strong>of</strong> homeland security has expanded, so<br />

too has CHDS course <strong>of</strong>ferings. The Executive Leaders<br />

Program (ELP) connects senior local, state, tribal,<br />

territorial, federal, and private sector leaders to create<br />

96


elationships across jurisdictional and disciplinary lines.<br />

An outgrowth <strong>of</strong> the ELP program called the Pacific<br />

Executive Leaders Program (PELP) was designed to<br />

meet homeland security challenges in the Pacific region.<br />

Lastly, the Fusion Center Leaders Program (FCLP) was<br />

created to enhance practices <strong>of</strong> fusion center leaders to<br />

collect, analyze and distribute information pertaining to<br />

crime and terrorism related activities.<br />

CHDS has led homeland security education through numerous<br />

additional initiatives. The University and Agency<br />

Partnership Initiative Program (UAPI) freely shares the<br />

Center’s programs and resources with educational institutions<br />

nationwide. This “multiplier effect” has created<br />

a network <strong>of</strong> over 300 partner institutions and expands<br />

the Center’s academic programs beyond the institution<br />

and across the nation. Additionally, CHDS has conducted<br />

280 Mobile Education Team (MET) seminars, which<br />

are tailored to senior leadership at state and local levels<br />

to address homeland security challenges unique to their<br />

jurisdictions.<br />

While not a large institution, CHDS has a pr<strong>of</strong>ound<br />

national influence on homeland security education<br />

with minimal operational overhead. Its overall reach<br />

includes 700 Master’s alumni, 450 ELP alumni, 10,500<br />

MET program participants, 12,000 Self Study program<br />

participants, 338 UAPI partners, and 136,000 <strong>Homeland</strong><br />

<strong>Security</strong> <strong>Digital</strong> Library documents to date.<br />

97<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.chds.us/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.youtube.com/watch?v=-6TbDti-<br />

FacQ<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.boston.com/news/nation/washington/articles/2005/05/01/in_war_on_terrorism_<br />

us_government_finds_allies_on_campus/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Heather Issvoran,<br />

Director <strong>of</strong> Strategic Communications<br />

CHDS<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (831) 656-2003<br />

cell: (831) 402-4672<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hissvora@nps.edu<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1 University Circle<br />

Building 220, Room 64<br />

Monterey, CA 93943


GSN <strong>2014</strong> <strong>Digital</strong> <strong>Yearbook</strong> <strong>of</strong> <strong>Homeland</strong> <strong>Security</strong> <strong>Awards</strong> Recipients<br />

Government Agency <strong>Awards</strong><br />

U.S. Customs and Border Protection<br />

– <strong>2014</strong> Platinum Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Federal Government <strong>Security</strong> Program/<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Securing America’s Borders: The Non-Intrusive<br />

Inspection (NII) Systems Program, Southwestern Ports<br />

<strong>of</strong> Entry<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

There are many challenges to CBP’s mission <strong>of</strong> securing<br />

America’s borders, including smuggling <strong>of</strong> drugs, currency,<br />

weapons, ammunition, illegal goods, and humans.<br />

The Southwestern border is extremely difficult to<br />

protect, 2,000 miles long and one <strong>of</strong> the world’s busiest<br />

borders, with more than 5 million trucks and 166 million<br />

people crossing each year*. Drug trafficking organizations<br />

pose a grave threat to border security, as Mexico is<br />

the source and/or transit country for heroin and most <strong>of</strong><br />

the cocaine, marijuana, and methamphetamine illegally<br />

imported into the U.S. Those same organizations also<br />

attempt to smuggle currency and weapons back into<br />

Mexico.<br />

To address these threats, CBP has implemented a<br />

layered security strategy which involves thousands<br />

<strong>of</strong> personnel, canine teams, and air/maritime/remote<br />

surveillance, and state-<strong>of</strong>-the-art detection technology.<br />

One component, the Non-Intrusive Inspection (NII)<br />

Systems Program, utilizes advanced inspection technology<br />

to more effectively screen conveyances/cargo while<br />

improving processing time. As <strong>of</strong> 2013, 310 large-scale<br />

NII systems were deployed on U.S. borders.** Many NII<br />

systems are deployed along the Southwestern border,<br />

including 26 Z Portal ® cargo and vehicle inspection<br />

systems and 61 Z Backscatter ® Van (ZBV ® ) mobile cargo<br />

and vehicle inspection systems, both manufactured by<br />

American Science and Engineering, Inc. (AS&E).<br />

In order to bolster its detection capabilities without<br />

98


impeding the flow <strong>of</strong> legal traffic, CBP added Z Portals<br />

to the Southwestern border starting in 2011. The NII<br />

Program Office worked closely with the Interdiction<br />

Technology Office to ensure an efficient, well-managed<br />

project, averaging one deployment per month. Both the<br />

Z Portal and ZBV systems have proven very successful,<br />

expediting operations and using low-energy Z Backscatter<br />

technology to quickly detect organic materials (e.g.<br />

explosives, drugs, currency, etc.). By expanding NII<br />

operations to include more Z Portal systems, CBP can<br />

now inspect cars much more rapidly, enabling scanning<br />

<strong>of</strong> almost 100% <strong>of</strong> cars designated for secondary inspection.<br />

“[Z Portal/ZBV technology] has been a tremendously<br />

effective tool for us in identifying and seizing additional<br />

illicit drugs … [The Z Portal/ZBV systems] are more<br />

efficient because they work faster and they have a lower<br />

energy level that allows us to put more vehicles through<br />

them … we have been able to benefit from an improving<br />

continual technology.”***<br />

Notable Z Portal/ZBV detections along the Southwestern<br />

border include: $1.1 million <strong>of</strong> heroin inside an SUV’s<br />

hidden compartment; more than $900,000 <strong>of</strong> cocaine<br />

hidden in a truck bed; and more than $500,000 (656<br />

lbs) <strong>of</strong> marijuana concealed in the floor and bed area <strong>of</strong><br />

a pickup truck.<br />

Overall, the NII Systems Program has had a significant<br />

impact on the detection <strong>of</strong> drugs, currency, and weapons<br />

along the Southwestern border. For example, during<br />

FY 2009-12, CBP seized 71% more currency, 39% more<br />

drugs, and 189% more weapons along the Southwestern<br />

Border than FY 2006-8.**<br />

* U.S. Department <strong>of</strong> Transportation, Research and Innovative<br />

Technology Administration, Bureau <strong>of</strong> Transportation Statistics<br />

**CBP testimony to the House Committee on <strong>Homeland</strong> <strong>Security</strong>,<br />

Subcommittee on Border and Maritime <strong>Security</strong>, 2/26/2013<br />

***CBP testimony to the House Committee on <strong>Homeland</strong> <strong>Security</strong>,<br />

Subcommittee on Border and Maritime <strong>Security</strong>, 3/20/2013<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.cbp.gov/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.cbp.gov/border-security/portsentry<br />

http://www.cbp.gov/sites/default/files/<br />

documents/z_portal_2.pdf<br />

Link to Web page or Document with independent<br />

media coverage, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.as-e.com/uploads/media/CBP_Z_<br />

Portal_and_ZBV_Seizures_<strong>2014</strong>.pdf<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Laura Berman<br />

Vice President, Corporate Communications<br />

AS&E<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

(978) 262-8700<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

lberman@as-e.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

American Science and Engineering, Inc.<br />

829 Middlesex Turnpike<br />

Billerica, MA 01821<br />

99


The News Leader in Physical, IT and <strong>Homeland</strong> <strong>Security</strong><br />

Publisher:<br />

Michael Madsen<br />

(O) 212-344-0759, X1<br />

(C) 732-233-8119<br />

mmadsen@gsnmagazine.com<br />

Executive Editor:<br />

John Wagley<br />

(O) 212-344-0759, X2<br />

(C) 202-425-0196<br />

wagley.jr@gmail.com<br />

Senior Writer:<br />

Lorrie Barclay<br />

(O) 212-344-0759, X5<br />

(C) 508-685-0652<br />

lorriebarclay@gmail.com<br />

Columnist:<br />

John Convy<br />

Convy on Netcentric <strong>Security</strong><br />

john@convyassociates.com<br />

Columnist:<br />

John Romanowich<br />

Romanowich on Video Surveillance<br />

jromanowich@sightloxic.com<br />

Guest Expert Contributor:<br />

Denise Rucker Krepp<br />

(C) 202-546-2533<br />

kdrkrepp@hotmail.com<br />

Art Director:<br />

Gerry O’Hara<br />

OHDesign3<br />

(C) 203-249-0626<br />

gerry@ohd3.com<br />

Production/Design Specialist:<br />

Brenden Hitt<br />

(C) 315-723-6203<br />

brenden@ihitt.com<br />

Editorial Director/CEO:<br />

Adrian Courtenay<br />

(O) 212-344-0759, X3<br />

(C) 917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Mailing Address:<br />

Government <strong>Security</strong> News<br />

P.O. Box 7608<br />

Greenwich, CT 06836<br />

Government <strong>Security</strong> News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing <strong>of</strong>fices. POSTMASTER: Send address<br />

changes to GSN: Government <strong>Security</strong> News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />

decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />

GSN: Government <strong>Security</strong> News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />

foreign subscribers are charged $140 International Airmail. Copyright 2015 by GSN: Government <strong>Security</strong> News. All rights reserved.<br />

Printed in the U.S.A. GSN: Government <strong>Security</strong> News assumes resonsibility for validity <strong>of</strong> claims in items reported.<br />

100

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!