2014 Digital Yearbook of Homeland Security Awards

openthink

The GSN 2014

Digital

Yearbook

of

Homeland

Security

Awards


Thanks to our

generous sponsors

for making this

important program

possible.

Thanks to our

generous sponsors

for making this

yearbook possible

About the GSN Homeland

Security Awards Program

The Government Security News Awards Program was

organized in 2009 to honor the distinguished vendors of

IT and Physical Security products and solutions, and the

dedicated officials in federal, state, county and municipal

government, whose combined efforts keep our nation

safe and secure 24/7.

We are also pleased to honor the vendors and government

officials of other nations that have chosen to participate in

this year’s program with their prize-winning entries.

Homeland Security in many nations benefits from remarkable

technology breakthroughs and ever-more sophisticated

programs from government agencies, often produced in

productive collaboration with private industry.

We hope you find our awards program’s findings regarding

the great achievements of the past year in the field of

Homeland Security to be interesting and informative.

Adrian Courtenay, CEO

Government Security News

2


TABLE OF CONTENTS

4

6

8

10

12

16-37

39

42

46-67

68

70

74-99

100

Meet the Sponsors: Tenable

Meet the Sponsors: HID Global

Meet the Sponsors: Agiliance

Vendors of IT Security Solutions

GSN Interview – Chuck Brooks,

Distinguished Judge

Winners in IT Security Categories

Vendors of Physical Security Solutions

GSN Interview – Scott Greiper,

Distinguished Judge

Winners in Physical Security Solutions

Government Agency Awards

GSN Interview – K. Denise Krepp,

Distinguished Judge

Winners of Government Agency Awards

Government Security News

About the Statute:

The Statue of Liberty, a symbol

of freedom and the United

States, was designed by the

French sculptor Frederic

Auguste Bartholdi, given to the

United States by the people

of France and dedicated on

October 28, 1886. The robed

female figure representing the

Roman goddess Libertas bears

a torch and a tablet evoking

the law, on which is inscribed

the date of the American

Declaration of Independence,

July 4, 1776. The statue is an

icon of freedom and a welcoming

signal to immigrations

arriving from abroad.

3


MEET THE SPONSORS

Continuous Network Monitoring for

Government Agencies

by Jennifer Collis, Government Solutions Marketing

Manager, Tenable Network Security

When Tenable Network Security ® was founded in 2002, its

founders knew that there were no quick and easy solutions

for solving complex security problems. Tenable’s first

product, Nessus ® , went on to become the most widely deployed

vulnerability scanner in the world and is acknowledged

as the global standard in detecting and assessing

network data.

4

But a lot has changed since 2002. The modern IT landscape

has expanded to include laptops, mobile devices,

virtual systems, and cloud-based applications. In a BYOD

(“bring your own device”) environment, employees use

their own personal devices for work, introducing a significant

risk into the traditional IT infrastructure. While these

devices increase the agility of an organization, they also

introduce visibility and security gaps, leaving the organization

open to vulnerabilities and breaches. Periodic scanning

helps, but it can miss devices that are not connected

to the network 100% of the time. And if those devices have

been surfing the Internet or shopping online, they may be

completely unprotected from exploits and attacks.

Another significant risk on the modern IT network is the

prevalence of cloudbased

applications

and virtual systems.

IT security managers

may not be aware of

all virtual machines,

many of which might

be created and used

for transient purposes.

And the security

team may also be unaware of the many cloud-based

hosted services used by various departments.

This is why Tenable has been pioneering continuous

network monitoring since 2004: to ensure that your entire

security program is aligned and working 24/7 to assess

and protect today’s hybrid network systems. Continuous,


automated testing of a network’s defenses against a security

policy is the best method to monitor the health and

assurance of your network.

NIST defines continuous network monitoring as “maintaining

ongoing awareness of information security, vulnerabilities,

and threats to support organizational risk management

decisions.”

Continuous network monitoring is one of the most

promising developments in Next Generation Vulnerability

Management (NGVM). Instead of scanning periodically,

agencies can now implement real-time scanning to

eliminate blind spots. A well-run network should include

solutions that accurately measure security risks in real

time and bring together the processes of asset discovery,

vulnerability detection and configuration auditing.

Tenable’s SecurityCenter Continuous View (Security-

Center CV) includes innovative continuous network

monitoring tools, such

as passive vulnerability

scanning on devices

that are not always

connected to the

network, log correlation

and analysis, tight

integrations with the

security ecosystem, and

advanced threat detection

technologies. SecurityCenter CV’s centralized console

manages distributed Nessus vulnerability scanners for

agency-wide security and compliance visibility. Sensors

automatically discover and assess traditional IT systems,

mobile users, virtual networks, and cloud-based applications.

Advanced analytics, including extensive dashboards

and customizable reports, aggregate scan data to help

5

you identify and remediate security and compliance

issues.

In today’s IT environment, an unknown risk can compromise

your agency and put your executive management

at the center of media attention. Continuous

network monitoring provides peace of mind by reporting

against any number of compliance standards and

your own security policy. Only a well-run, carefully managed

network can achieve security that is “obtainable

and defendable,” which is the very meaning of the word

tenable.

About Tenable Network Security

Tenable Network Security provides continuous network

monitoring to identify vulnerabilities, reduce risk and

ensure compliance. Our family of products includes

SecurityCenter Continuous View, which provides the

most comprehensive and integrated view of network

health, and Nessus ® , the global standard in detecting

and assessing network data. Tenable is relied upon by

many of the world’s largest corporations, not-for-profit

organizations and public sector agencies, including the

entire U.S. Department of Defense. For more information,

please visit tenable.com.


MEET THE SPONSORS

HID Global completes consolidation

at its Austin, TX, world headquarters

and North American operations center

Austin, TX-based HID Global, a worldwide provider of

secure identity solutions, has announced it has completed

the consolidation of its world headquarters and North

American Operations Center. The company has also

achieved recognition by three organizations for successfully

implementing some of the industry’s most stringent

sustainability guidelines in the design, construction and

operation of its 250,000 square feet of manufacturing, office

and warehouse space.

“We are very proud of our accomplishments, and grateful

for the tremendous support we’ve received from the

Austin community during this process,” said Jason Bohrer,

vice president and general manager for HID Global’s

North American Operations Center. “This facility has

become our focal point for worldwide manufacturing

excellence and a showcase for operational quality and

sustainability that will enable us to strengthen and expand

6

our leadership offering of world-class secure identity solutions.”

Since opening its Austin facility in January 2014, HID

Global has successfully achieved the following:

• Hired 310 employees.

• Completed consolidation of all North American manufacturing

operations, with 45 percent of all global

revenue now being generated out of the new facility.

The facility is also expected to become the cornerstone

for manufacturing government ID credentials that will

be shipped around the globe. HID Global will be pursuing

a number of additional security certifications for its

operation in the coming 12 to 18 months.

• Earned recognition as the only industrial manufacturing

facility in the state of Texas to achieve the highest, platinum-level

distinction in the U.S. Green Building Council

(USGBC) LEED rating program.

• Received a four- out of five-star rating from Austin Energy

Green Building (AEGB), which focuses on the city’s

more stringent energy, water and indoor environmental

quality requirements.


• Was named one of the city’s best new buildings in

Austin Business Journal’s 15th annual Commercial Real

Estate Awards competition.

HID Global is a trusted source for innovative products,

services, solutions, and know-how related to the creation,

management, and use of secure identities for millions of

customers around the world. The company’s served markets

include physical and logical access control, including

strong authentication and credential management; card

printing and personalization; visitor management systems;

highly secure government and citizen ID; and identification

RFID technologies used in animal ID and industry

and logistics applications. The company’s primary brands

include ActivID, EasyLobby, FARGO, IdenTrust, LaserCard,

Lumidigm, and HID. HID Global has over 2,200 employees

worldwide and operates international offices that

support more than 100 countries. HID Global is an ASSA

ABLOY Group brand. For more information, visit http://

www.hidglobal.com.

7


MEET THE SPONSORS

GSN INTERVIEW

Joe Fantuzzi, President and CEO, Agiliance, Inc.

2014 Winner, Best Compliance / Vulnerability Assessment Solution

2014 Finalist, Best Big Data Analytics Solution

2014 Finalist, Best Continuous Monitoring Solution

Joe Fantuzzi has been president and CEO of Agiliance since January 2010. He drives the company’s business direction,

strategy, and execution. His team successfully pioneered and delivered the first massively scaled, real-time Cyber Security

Operational Risk solution in the market. Bringing 25 years of software experience to Agiliance, Joe is an expert in

creating high-growth, venture-backed businesses in emerging technology markets, and has helped building over

$3 billion in market valuation as an executive for industry leading companies throughout his career.

GSN: Tell us a little bit more about Agiliance.

JF: Agiliance is known as the Big Data Risk Management

Company. We deliver integrated Cyber Security and Operational

Risk Intelligence via cloud-managed services and

software. Agiliance solutions automate how Global 2000

companies and government agencies achieve continuous

monitoring of big data across financial, operations, and IT

domains to orchestrate incident, threat, and vulnerability

actions. RiskVision customers demonstrate automation use

cases within 30 days on-demand, and within 60 days onpremise,

made possible by a configurable, purpose-built

platform and applications, leveraging over 70 data integrations

to off-the-shelf software, and mapping content from

over 300 domains and regulations. RiskVision scales with

organizations, effectively managing assets, data, people,

and processes to achieve 100 percent risk and compliance

coverage. Its real-time risk analysis leads executives

8

to optimized business performance and better investment

decisions.

What key issues does RiskVision resolve

for organizations?

JF: RiskVision delivers real-time ‘data-to-command’ risk

intelligence. Customer use cases are Incident Risk Response

(IRR), Threat and Vulnerability Mitigation (TVM),

Third-Party Risk (TPR), and Operational Risk Management

(ORM). Previous approaches cost $10s of millions to piece

together data from the mission, security, and IT operations,

only to learn the data was obsolete once presented,

and cyber-attackers had been inside the infrastructure for

months. RiskVision’s integrated data model and massively

scalable architecture change the game on cyber-attackers

by speeding up the process to make cyber risks visible,

measureable, and actionable. Inaccuracies are reduced


and legacy systems are retired, saving both time and money.

Some production clients manage over 1 million assets

and have over 10,000 daily users. Benefits are incident

reduction, 5 – 10x faster time-to-remediation, less audit

failures, and 2 – 3x operational efficiency gains.

Please describe a major federal agency

using the Agiliance RiskVision approach.

JF: The U.S. Department of Veterans Affairs (VA) is one

such example. They were experiencing major operational

efficiency issues stemming from their Assessment and

Authorization (A&A) procedures. Per FISMA law, every

online system must maintain an Authority to Operate

(ATO) certification, and FISMA subjects must renew their

ATOs for every major

system change. For the

agency, this meant manual

gathering and assessing

millions of check results

generated by third-party

security monitoring tools.

The problem with this approach

was the vast amounts of data it produced and great

difficulty understanding the real meaning of the collected

data and correlating it to the agency’s compliance posture.

And by time the data was processed and analyzed, it

was no longer actionable. All the time and money spent

collecting it, was wasted. As a result, completing each

ATO was a labor- and time-intense process, inhibiting the

agency’s ability to meet their audit deadlines.

The agency implemented RiskVision to collect data

from their IT and security tools and perform real-time

diagnostics and mitigation using NIST SP 800-137 and the

NIST IR 7756 (CEASARS) risk frameworks. The VA project

is the largest cyber security risk project in the world, conducting

daily control checks for 1+ million systems for

more than 130 technical controls at the VA centers in DC

and Austin, Texas; providing access to 4,000 workflow and

reporting users, as well as 400,000 policy attestation users.

9

Now the VA can cross-verify controls between federal regulatory

risk management frameworks such as FISMA, NIST

SP 800-53, and CyberScope. After deploying RiskVision, the

agency achieved significant cost and time saving. Rather

than collecting each bit of data generated by more than 1

million data collection points, the IT personnel now gathers

and stores highly relevant information and attends to

high-risk issues in a timely manner.

How does Agiliance see the future of Cyber

Security Operational Risk?

JF: Notwithstanding better analytics and decision-making

from use of big data technologies, cloud-managed services

is the new way to informed risk management. In

2014 alone, our clouddelivered

clients grew

over 600 percent versus

2013, led by customers in

the Financial Services and

Healthcare industries.

One of our Financial Services

customers is already

managing 200,000 critical assets with an end-to-end threat,

vulnerability, and ticketing solution delivered on the

RiskVision platform and several connected technologies,

all in the cloud. We’ve developed RiskVision’s managed

services to be cloud security hardened and ready for cloud

risk programs that are deploying in the DoD, IC, and civilian

agencies. With pioneering efforts of CSA, FedRAMP,

NIST, and others on cloud security, and the need to stand

up solutions with operational efficiency, over 70% of cyber

security operation risk management will be centered in

the cloud by 2018.

I can be reached by Twitter: @joe_fantuzzi and

by email: jfantuzzi@agiliance.com

On behalf of Agiliance and our customers, thank

you for an opportunity to share our perspectives with

your readers.


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

VENDORS OF IT SECURITY SOLUTIONS

11

12

Roster of 2014 Winners

GSN Interview with Distinguished Judge of 2014 Awards,

Chuck Brooks

16

18

22

24

26

28

30

32

34

36

38

Winning entries reproduced with permission of:

Blue Ridge Networks

Agiliance

RSA Security Division of EMC

RSA Security Division of EMC

RSA Security Division of EMC

Encryptics

NICE Systems

Solar Wind

Tenable Network Security

Event Tracker

Applied Visions, Inc. / Secure Decisions Division

10


Winners in the 2014

Homeland Security Awards Program

VENDORS OF IT SECURITY SOLUTIONS

Best Anti-Malware Solution

Blue-Ridge Networks – Winner

Palo Alto Networks – Finalist

Cyphort Inc – Finalist

Best Identity Management Platform

RSA Security Division of EMC – Winner

NetIQ – Winner

Real Time Technology Network – Finalist

Best Compliance/Vulnerability Solutions

Agiliance Inc – Winner

Solar Winds – Finalist

Proofpoint, Inc – Finalist

Applied Visions, Inc Security Division – Finalist

RSA, Security Division of EMC – Finalist

TSA Advantage – Finalist

Best Data Security/Loss

Management Solution

Imperva – Winner

RSA, Security Division of EMC – Winner

Waratec – Finalist

Power Amin LLC – Finalist

Watchful Software – Finalist

Best Email Security &

Integration Solution

Encryptics – Winner

Good Technology – Finalist

Proofpoint, Inc – Finalist

Best Endpoint Securty Systems

Bromium – Winner

RSA, Security Division of EMC – Finalist

11

Best Forensic Software

NICE Systems – Winner

RSA, Division of EMC – Finalist

Big Data Analytics Solution

Splunk – Winner

RSA Division of EMC – Finalist

Agiliance – Finalist

Best Intrusion Detection/Prevention Solution

Venyu Solutions – Winner

Best Network Security/Enterprise Firewall

Palo Alto Networks – Winner

Black Lotus Communications – Finalist

Firemon – Finalist

Forescout – Winner – Finalist

Best Privileged Access

Management Solution

RSA Security Division of EMC – Winner

Beyond Trust – Winner

Best Continuous Monitoring Solution

Solarwinds – Winner

Tenable Network Security – Winner

Agiliance – Finalist

Firemon –

Lancope – Finalist

Power Admin – Finalist

Best Security Incident &

Event Management Solution (SIEM)

Event Tracker – Winner

RSA, Security Division of EMC – Winner

NetIQ – Finalist

LogRhythm, Inc – Finalist

Solarwinds – Finalist


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

GSN INTERVIEW

Chuck Brooks, Distinguished Judge,

GSN 2014 Homeland Security Awards Program

Charles (Chuck) Brooks serves as Vice President/Client Executive for DHS at Xerox. Chuck

served as the first Director of Legislative Affairs for the Science & Technology Directorate within

the Department of Homeland Security. He was an Adjunct Faculty Member at Johns Hopkins

University, where he taught a graduate course on “Congress and Homeland Security.” He also

spent 6 years on Capitol Hill as a Senior Advisor on national security issues to the late Senator

Arlen Specter. Chuck has an MA in International Relations from the University of Chicago and

a BA in Political Science from DePauw University. He has served in several senior executive

corporate roles and is widely published as a thought leader on subjects relating to homeland security, technology,

innovation, CBRNE, and cybersecurity. He also operates two of the largest homeland security groups on LinkedIn

and is a featured speaker at government and industry conferences. Chuck has also served as a judge for three recent

Government Security News industry homeland security awards events.

GSN: What is the threat landscape for the

Department of Homeland Security as it

enters its second decade of operations?

CB: DHS has made great progress over the last decade

but the current threat level is now heightened for DHS,

the intelligence community, and law enforcement as a

result of evolving threats. The most immediate threat is

posed by ISIS and affiliated Islamic extremists who have

gained combat experience in Iraq and Syria and have access

to Western passports. Rep. Michael McCaul (R-Texas),

chairman of the House Homeland Security Committee,

said these terrorists “present the greatest threat we’ve

seen since 9/11.” Also, a decade ago terrorists’ ability to

12

organize and mobilize was more limited because of communication

capabilities. The exponential growth in smart

phones (there are now 14B smartphones worldwide) and

the terrorists’ use of social media has made surveillance

and monitoring of those who might threaten the homeland

a bigger challenge.

The defense against CBRNE (chemical, biological,

radiological, nuclear, and explosive) threats will continue

to be priorities of DHS because of the asymmetrical terror

consequences they present. The recent Ebola outbreak

illustrates our vulnerability to pandemics and infectious

disease outbreaks. The potential for bio-terrorism directed

by non-state actors is a frightening but real scenario. Right-


fully so, countering biological threats remains a high priority

at DHS. As our experiences in Afghanistan and Iraq

have shown, man portable improvised explosive devices

(IEDS) and vehicle-borne IEDS are still a major concern,

especially against soft targets.

Other threats such as chemical and radiological

substance releases, and natural disasters from floods, hurricanes

and earthquakes all still pose plausible and dire

threats to the homeland. Unfortunately, it is likely that the

nation’s preparedness will be tested again in the coming

decade.

One area where DHS has taken on an increasingly

larger role is in cybersecurity. Presidential Directives have

mandated DHS to play the primary role in the civilian side

of government for cybersecurity. A major reason for the

new focus on cybersecurity has been the rapid changes

in the information technology landscape. Since 2003, the

capabilities and connectivity of cyber devices and communications

has grown exponentially. Concurrently, so

have the cyber intrusions and threats from malware and

hackers. This has required restructuring of priorities and

the cybersecurity missions at DHS. The cyber threat to the

homeland reaches far beyond terrorists and includes various

criminal enterprises and adversarial nation states.

What do government and industry perceive

to be the main cybersecurity threats and

required responses?

CB: Both government and industry have prioritized

critical infrastructure as a focus of threat and hardened

response. There is a growing understanding of the seriousness

and sophistication of the cyber threats, especially

denial of service. In terms of preparation, the financial and

13

retail communities have been at the forefront of addressing

these threats with significant investment in technologies

and in training. However, 43% of companies had

breaches last year (including companies such as Home

Depot, JPMorgan, and Target) and the intrusion threats

are not diminishing.

According to the think tank Center For Strategic

and International Studies (CSIS), cyber related crime now

costs the global economy about $445-billion every year.

These breaches demonstrate that there is a continued

need for protocols and enhanced collaboration between

government and industry.

Last year, The Council on CyberSecurity, an influential

not-for–profit organization, formed a “20 Critical Security

Controls list” with collaboration between the public

and private sectors. The list provides an emerging working

framework for protecting the critical infrastructure and

provides a recommended set of actions for cyber defense

that includes specific and actionable ways to stop today’s

most pervasive attacks. I was honored to participate in

that working group.

Indeed, cyber security controls are very important.

In the U.S., most (approximately 85%) of the cybersecurity

critical infrastructure including defense, oil and gas,

electric power grids, healthcare, utilities, communications,

transportation, banking, and finance is owned by the

private sector and regulated by the public sector. DHS has

recognized the importance for private sector input into

cybersecurity requirements across these verticals and has

played a major part in bringing government and industry

together to develop a strategy to protect critical infrastructure.


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

GSN INTERVIEW

Chuck Brooks, Distinguished Judge,GSN 2014 Homeland Security Awards Program

There will always be a need for better encryption,

biometrics, analytics, and automated network security to

protect critical infrastructure in all categories. Also, cyber

resilience is an area that must be further developed both

in processes and technologies. In the future, cybersecurity

for the “Internet of Things,” consisting of hundreds of millions

connected IP enabled smart devices, will certainly be

a main priority

What would be on your own master list

of cybersecurity priorities and emerging

trends?

Emerging Technology Areas:

• Internet of Things (society on new verge of

exponential interconnectivity)

• Wearables

• Drones and Robots

• Artificial intelligence

• Smart Cities

• Connected transportation

Priorities:

• Protecting critical infrastructure through technologies

and Public/Private cooperation

• Better encryption and biometrics (quantum encryp

tion, keyless authentication)

• Automated network-security correcting systems (selfencrypting

drives)

14

• Technologies for “real time” horizon scanning and

monitoring of networks

• Diagnostics and forensics (network traffic analysis,

payload analysis, and endpoint behavior analysis)

• Advanced defense for framework layers (network,

payload, endpoint, firewalls, and anti-virus)

• Mobility and BYOD security

• Big data

• Predictive analytics

• Interoperability

Trends:

• Informed risk management

• Emergence of Public/Private sector partnerships

• More information sharing and collaboration

between the public and private sectors

• Shared R & D spending

• Increased spending for cloud computing

• Consolidation of data centers

• Expansion of hiring and training of cybersecurity

workforce

• Tech foraging

What is Xerox’s focus in the homeland security

space?

CB: Xerox has a great tradition of innovation and has

become a world leader in digitization, contact centers,

document management, IT, and data analytics. Xerox is


a recognized leader in “digitization” of documents in the

Federal government. The company has been providing

mailroom, scanning, imaging, indexing, and data capture

for nearly three decades, including with DHS. Xerox uses

innovative technologies, including Optical Character

Recognition (OCR). OCR automatically extracts data from

scanned images and makes those data available for electronic

processing for millions of images each day. Having

electronic access to data and files provides for more

efficient planning and operations in the security environment.

Xerox is also known for its contact center expertise.

The company uses multi-channel contact technology

tools via phone, email, web, and mobility to optimize,

automate, and help scale customer service agent response.

Contact center management solutions are designed to

minimize impact, assure end-user incidents are addressed

quickly, and prevent reoccurrence that is important for a

public safety mission.

Xerox has also developed and deployed a disease

surveillance and outbreak management software called

Maven that is of interest to homeland security and public

health agencies. It is configured to provide “contact

tracing” for Ebola and other communicable diseases. The

software manages the identification and diagnosis of those

who may have come in contact with an infected person.

Federal government employees who regularly use LinkedIn,

including over 65,000 from DHS. Social media has become

part of the fabric of how we communicate, operate,

and conduct business. The two homeland security groups

I run on LinkedIn –“U.S. Department of Homeland Security

and “Homeland Security”– have grown to over 50,000

members. (Please look them up and join and post!) I have

become active now on Twitter too. Please follow me:

@ChuckDBrooks

I have also been active on the speaking circuit at

conferences, including recent presentations at the National

Press Club, Homeland Security Week, Secure Cities,

George Washington University, Bowie State University,

and CyberMaryland. Please check out my recent article

in The Hill newspaper called “Navigating the Four Pillars

of Washington, DC” that explores the interplay between

government, industry, media, and policy organizations in

the nation’s capitol.

Thank you for speaking to me and letting me

share my perspectives. GSN serves as an excellent media

resource for all those active in the homeland security and

national security fields. I strongly encourage others to

become regular readers of your publication online and in

print.

Can you update us on your social media

and thought leadership activities?

CB: Many senior level executives in the Federal government

are on social sites such as LinkedIn, GovLoop,

Facebook, and Twitter. There are an estimated 1.4 million 15


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

Blue Ridge Net works –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Anti-Malware Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

AppGuard

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

It is evident with all the reported breaches in government,

retail, banking, and consumers that there is a

need for an innovative security solution that will protect

computers. AppGuard is a patented solution that

would have absolutely blocked all the reported breaches

including Target, JP Morgan, community health systems,

and all the cyber espionage that is happening at all

levels of government. AppGuard’s unique approach is

simple, cost effective, and stops the advanced threats

that no other security capability has been able to defeat.

AppGuard is proven technology, deployed in over 100

countries, and is the best line of defense when malware

strikes. It protects the endpoint from malvertising, mal-

John Higginbotham

Chairman and CEO

Mike Fumai

COO and Director

warized documents, drive by downloads, watering hole

attacks, phishing attacks, ransomware, advanced volatile

threats, and others. It provides in-depth host-based

threat intelligence complementing network based threat

intelligence. All of this is accomplished with an easy to

use, easy to deploy client with out-of-the box settings.

16


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.appguardus.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.blueridge.com/index.php/products/

appguard/enterprise

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Maureen Gray, VP of Operations

Blue Ridge Networks

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (703) 631-9713

cell: (571) 259-8428

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

maureen@blueridge.com

17


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

Agiliance –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Compliance/Vulnerability Assessment Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

RiskVision 7

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The biggest inhibitor of effective security and vulnerability

management lies in the fact that the number of

threats to organizations has grown exponentially over nal resources. As a result, government organizations are

the past few years. This is largely due to the increasing

number of IT assets under management, which are tion, normalization, and business impact correlation.

seeking technical solutions to automate data aggrega-

creating a big data challenge. To ensure proper coverage,

government organizations in many cases are relying ers have to exploit a software flaw, thereby reducing the

The ultimate objective is to shorten the window attack-

on multiple tools to produce the necessary vulnerability overall risk of cyber-attacks and insider threats. Agiliance

assessment data. This only adds to the volume, velocity,

and complexity of data feeds that must be analyzed, achieving continuous monitoring and enabling them to

is assisting civilian, defense, and intelligence agencies in

normalized, and prioritized. Relying on human labor report on their organizations risk and security posture

to comb through mountains of data logs is one of the in near real time. The company’s RiskVision software

main reasons that critical vulnerabilities are not being gathers data feeds from otherwise silo-based security

addressed in a timely fashion. According to the Verizon and IT tools such as SIEMs, configuration management

Data Breach Investigations Report, 92% of breaches databases, vulnerability scanners, threat data feeds and

were discovered by a third party and not through inter- advisory services, database security management, etc.

18


and then aggregates, normalizes, and correlates this

information based on business criticality. This enables

a near real time snap shot of an organization’s security

posture. In addition, RiskVision automates an organization’s

governance processes, providing insight into the

agency’s compliance posture. The final result is a riskbased

assessment of the organization’s infrastructure

which prioritizes remediation actions based on business

criticality. If needed, RiskVision can also assist with automatic

ticket creation. By using the Agiliance ticketing

system or integrating with leading ticketing and patch

management systems, an organization’s security operations

team can shadow the progress the IT team makes

in mitigating the vulnerabilities. This eliminates the

traditional approach best described as throwing something

over the fence and praying for the best outcome.

For one major government agency, using RiskVision

resulted in a dramatic increase in operational efficiency.

Prior to using Agiliance, it took 60 full-time employees

working 24 x 7 for a month to manually create 180,000

remediation tickets. With RiskVision, the agency was

able to reduce the headcount required to oversee ticket

creation by more than 80% and shrink the processing

time from one month to a couple of days. RiskVision

is considered by many to be the best compliance and

vulnerability management solution on the market for

its ability to combine risk intelligence, using big data

gathered and correlated from security operations tools,

with automated remediation that establishes bi-directional

workflows with IT operations. The end result is

improved operational efficiency through automated

continuous monitoring and ticketing to remediate only

business critical risks.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.agiliance.com

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Torsten George, Vice President of Worldwide

Marketing and Products

Agiliance, Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (408) 200-0461

cell: (408) 431-3250

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

tgeorge@agiliance.com

Links to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Agiliance Named Most Innovative Tech Company for 2014:

http://www.agiliance.com/news/pr_20140916_American_

Business_Awards_Stevie_Competition.html

Agiliance Wins Three 2014 Golden Bridge Awards:

http://www.agiliance.com/news/pr_20140911_Agiliance_

Wins_3_Golden_Bridge_Awards.html

RiskVision Shortlisted for CIR Risk Management Award

2014:

http://www.agiliance.com/news/pr_20140904_CIR_Risk_

Management_Award_2014.html

Agiliance Named Finalist for Two 2014 Computing Security

Awards:

http://www.agiliance.com/news/pr_20140821_2014_Computing_Security_Awards.html

Agiliance Receives International Recognition from Stevie

Awards:

http://www.agiliance.com/news/pr_20140815_Stevie_

Awards_Winner_2014.html

19

Links continued on next page


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

Agiliance – 2014 Winner

Best Compliance/Vulnerability Assessment Solution

Links to additional information, continued:

Agiliance Expands Threat-Based, Real-Time Risk Remediation

with CrowdStrike Falcon Intelligence:

http://www.agiliance.com/news/pr_20140624_Crowd-

Strike_Falcon_Intelligence.html

RiskVision Earns Gold in the 2014 Network Products

Guide Awards:

http://www.agiliance.com/news/pr_20140624_2014_Networks_Products_Guide.html

Agiliance Introduces First NIST Cybersecurity Framework

Security Checklist Content Pack:

http://www.agiliance.com/news/pr_20140623_NIST_Cybersecurity_Framework.html

RiskVision is Platinum Winner in the 2014 Govies Government

Security Awards:

http://www.agiliance.com/news/pr_20140514_RV_Platinum_Winner_2014_Govies_Awards.html

RiskVision Architecture and Cloud Services Set New Standard:

http://www.agiliance.com/news/pr_20140505_RV_Architecture_Cloud_Services.html

Agiliance Issues Updated ISO Information Security Management

Process Controls Content:

http://www.agiliance.com/news/pr_20140304_ISO_Content_Packs.html

RiskVision Scores Big at Info Security Product Guide’s

2014 Awards:

http://www.agiliance.com/news/pr_20140225_Info_Security_Products_Guide_2014.html

RiskVision 7 Ushers New Era of Big Data Risk Management:

http://www.agiliance.com/news/pr_20140224_RV7_Ushers_New_Era.html

20


Cyber Defense Magazine Names RiskVision Most Innovative

Risk Management Product:

http://www.agiliance.com/news/pr_20140224_Cyber_Defense_Magazine.html

RiskVision Helps Retailers to Strengthen their Cyber Defenses:

http://www.agiliance.com/news/pr_20140131_Retailers_

Strengthen_Cyber_Defenses.html

Agiliance to Showcase Continuous Diagnostics and Mitigation

Capabilities:

http://www.agiliance.com/news/pr_20140124_Cybersecruity_Innovation_Forum.html

RiskVision Assists Financial Services Organizations Raise

Quality of Third-Party Risk Management:

http://www.agiliance.com/news/pr_20140123_Financial_

Services_Organization.html

Agiliance / ESG White Paper: Beyond GRC: SRM and the

Move to Integrated Risk Management:

http://www.agiliance.com/forms/WhitePaperReg.

html?doc=Beyond_GRC

Agiliance White Paper: How to Achieve a Continuous

Monitoring Framework:

http://www.agiliance.com/infocenter/whitepaper.html

Agiliance Data Sheets:

http://www.agiliance.com/infocenter/ Agiliance

Case Studies:

http://www.agiliance.com/infocenter/casestudy.html

Agiliance Recorded Webcasts:

http://www.agiliance.com/news/webcasts.html

Agiliance Product Tours:

http://www.agiliance.com/infocenter/tour.html

21


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

RSA Securit y Division of EMC –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Identity Management Platform

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

RSA SecurID

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

RSA SecurID has a long and successful history in protecting

sensitive information of the government. Go-

changes every 60 seconds. By requiring users to provide

rithms available) to generate a one-time password that

ing back to before the Internet and continuing with a combination of something they know (their password)

innovations that strengthen passwords in new and and something they have (the RSA SecurID one-time

emerging infrastructures including cloud and mobility, password), RSA SecurID allows users gain secure access

RSA SecurID is the industry’s most trusted two-factor to VPNs, wireless access points, cloud applications, web

authentication solution. With government being an early applications, mobile applications and network operating

innovator in interconnected networking (i.e. DARPA and systems – ensuring that private information is protected

ARPANET) RSA SecurID was the first solution there to and the the identities of people, devices and applications

exchanging that information are legitimate. Build-

protect sensitive government information and applications.

Used by more than 40 million users within 30,000 ing on its market-leading capabilities, RSA introduced

organizations worldwide, RSA SecurID is the standard the industry’s first authentication platform that combines

strong two-factor authentication with intelligence-

for two-factor authentication solutions, reliably assuring

the identities of users, devices and applications by driven, risk-based authentication. RSA Authentication

using a proven algorithm (AES-128 which is recognized Manager (the brains behind RSA SecurID) uses Big Data

by NIST as one of the strongest symmetric key algo- analytics to increase identity assurance by transparently

22


uilding rich user profiles based on device and behavioral

characteristics. Leveraging dozens of risk factors

in near infinite combinations, it detects and permits

normal behavior, and challenges or blocks anomalous

activity to provide secure access control that exceeds

stand-alone multifactor authentication methods. User

login processes are fast, familiar and simple and yet

still provides secure access control that goes well beyond

stand-alone two- and multi-factor authentication

methods giving organizations a higher level of identity

assurance without compromising user convenience or

productivity. What’s more the risk-based authentication

is tokenless and invisible, greatly aiding in the protection

of government portals and online benefits and

health information and enables tens of thousands of

organizations to maintain various regulations and compliance

needs including HIPPA, FACTA, FISMA, FFIEC,

HSPD-12, CJIS, PCI-DSS and more. RSA SecurID includes

management and administration tools that lower

an organization’s overall TCO and make the solution

easy to manage. Complementing RSA SecurID’s intuitive

browser-based management console, RSA Authentication

Manager’s single-pane view dashboard enables Help

Desk administrators to quickly address common user

inquiries. Also, a customizable Self-Service Console empowers

users to manage their authentication needs and

methods, and various aspects of their token lifecycles,

enabling IT teams to apply time and resources – typically

dedicated to managing a traditional authentication

deployment – to other critical tasks. And, available as a

VMware Virtual Appliance, RSA Authentication Manager

enables customers to leverage existing virtual infrastructures

and accelerate time to value.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.emc.com/domains/rsa/index.htm

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

RSA SecurID Homepage:

www.emc.com/security/rsa-securid.htm

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Shannon Todesca, Account Executive

CHEN PR, Inc. (for RSA)

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (781) 672-3147

cell: (508) 494-4607

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

stodesca@chenpr.com

23


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

RSA Securit y Division of EMC –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Data Security/Loss Management Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

RSA Data Loss Prevention (DLP)

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

In this era of knowledge economy, the most valuable

asset for organizations, after people, is information. We

are seeing, nearly every day, headlines focused on data

breaches and loss of sensitive information. Organizations

need to adequately protect this information – not

only for the well being of the business and brand, but

also that of their customers and partners. RSA DLP is

used by over 3,500 organizations to gain visibility into

risk and prevent the loss of sensitive data from accidents,

malicious insiders and external attackers. RSA

DLP discovers and monitors the location and flow of

sensitive data, including regulated data or corporate IP,

across the infrastructure including cloud, virtual and

mobile devices. Through real-time alerts and enforcement

controls including encryption, quarantine, block

and notify, RSA DLP prevents the loss of sensitive data

24

via email, web, mobile devices, etc. The web-based

management console allows organizations to set up a

single DLP policy to protect sensitive data across the

network, endpoints (connected or disconnected including

mobile) and datacenter, with centralized incident

management for complete visibility into risk. What sets

RSA DLP apart is that it is protocol-and port-agnostic

and can analyze traffic from all network layers and is the

only DLP offering that has exceptionally customizable

workflows for incident management and investigations.

RSA DLP can also be extended into GRC use cases for

managing risk and audits, features native encryption

functionality and open APIs for partners, and provides

a single pane of glass view with native integrations with

Big Data analytical tools.


Offering the lowest TCO on the market, RSA DLP provides:

• The lowest number of false positives, significantly

reducing the number of FTEs required and

operational costs.

• 170+ out-of-the-box policies based on industry/

regional regulations, dramatically reducing set-up

and tuning time.

• A distributed architecture that easily scales to the

largest environments, with the ability to run on

virtual machines to reduce implementation costs.

• The most extensive ecosystem of partners, enabling

customers to leverage their existing infrastructure

and built-in infrastructure integrations to further

reduce deployment costs.

By centralizing incident management, integrating with

existing infrastructure, automating the enforcement

of controls to protect data and establishing repeatable

incident workflows, RSA DLP improves cost effectiveness

for customers’ ongoing operations. In addition, with the

RSA DLP Risk Remediation Manager module, customers

can remediate tens of thousands of sensitive files in a

matter of weeks – a manual process that previously took

more than nine months to complete, with resources

being pulled from other projects or hired as contractors.

RSA DLP has also helped prevent loss of tens of thousands

of customer records which would have resulted

in millions of dollars in losses. In one example, RSA DLP

prevented two contracted employees attempting to steal

trade secrets and alerted the appropriate security teams

to prevent damage, saving millions of dollars. RSA DLP

also helps organizations prevent fines and pass audits

more efficiently. Customers have reported audit savings

of more than 25% thanks to the ability of RSA DLP to

scan the infrastructure and auto-remediate violations.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.emc.com/domains/rsa/index.htm

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

RSA DLP Homepage:

www.emc.com/security/rsa-data-loss-prevention.htm

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Shannon Todesca, Account Executive

CHEN PR, Inc. (for RSA)

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (781) 672-3147

cell: (508) 494-4607

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

stodesca@chenpr.com

25


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

RSA Securit y Division of EMC –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Privileged Access Management Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

RSA Identity Management and Governance

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

In the era of big data, mobile, cloud, and social media,

identity and access management (IAM) has become a

significant challenge for many organizations. Add on

heightened threats, strict regulatory requirements, and

a growing and demanding population of business users,

securing access and enabling trusted interactions between

users and resources can feel like a never ending

game of whack-a-mole. The RSA Identity Management

and Governance (IMG) solution helps organizations

transform IAM into an enabler for a faster and more

secure network by taking aim at three key ways in which

organizations can deliver a strong Identity Management

program:

1. Identity Lifecycle Management — Streamlined selfservice

user registration allows users to create accounts

and choose access rights for themselves, new employees

and contractors. The UI automatically enforces policies

while suggesting entitlements based on similar users.

Automated approval workflows and provisioning

ensures that user access is delivered rapidly, while maintaining

compliance with process and policy requirements.

2. Data Access Governance. – With an increase in both

data breaches and compliance requirements, it is critical

to extend access governance to data as well as applications.

RSA IMG is designed to provide ubiquitous support

across all major file systems, providing one place to

centrally manage and govern the access to all data. RSA

IMG leverages identity context and data attributes (such

as user access frequency) to establish a line-of-business

owner for data resources.

26


3. Provisioning 2.0 – RSA IMG is engineered to take a

governance-driven approach, dramatically simplifying

application onboarding, and enabling organizations to

automate many more applications. For example, one

customer in the transportation industry reduced

application onboarding time by approximately 75%. The

RSA IMG platform enables organizations to meet their

security, regulatory and business access needs through

a collaborative set of business processes. By automating

manual tasks, providing evidence of compliance, reducing

access-related business risk, and efficiently delivering

business access, enterprises can confidently manage,

control and enforce access to applications and data

across the enterprise and the cloud. Beyond the immediate

benefits seen after implementation, RSA IMG aids

organizations by improving security, visibility, and compliance.

By deploying the RSA IMG platform organizations

experience significant reduction in effort for access

reviews and audits, faster time to value with reduced

deployment times from installation to production and

orphaned accounts become a thing of the past. Without

an automated approach to IAM, organizations are more

susceptible to regulatory compliance violations and data

breaches, some of which can cost millions of dollars

in lost revenue and fines as well as significant brand

damage. RSA IMG establishes increased security over

sensitive information, visibility into the complete user

access lifecycle, and ensured compliance to increasingly

stringent regulations, potentially saving millions and

protecting long-term vitality.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.emc.com/domains/rsa/index.htm

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

RSA Identity Management and Governance Homepage:

http://www.emc.com/security/rsa-identity-management-and-governance.htm#

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Shannon Todesca, Account Executive

CHEN PR, Inc. (for RSA)

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (781) 672-3147

cell: (508) 494-4607

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

stodesca@chenpr.com

27


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

Encryptics –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Email Security and Integrity Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Encryptics for Email

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Encryptics’ flagship product, Encryptics for Email,

showcases this data protection company’s commitment

to true end-to-end data protection. This product

utilizes a hybrid security model unlike any other on the

market today. By eliminating the flaws inherent in existing

models, Encryptics offers the most innovative and

effective solution for the email security space. Most data

protection solutions utilize one of two standard security

models: trusted server or peer-to-peer. In a trusted

server model, encryption and authentication take place

at a centralized location (a server, gateway, or router).

This model makes it easy to manage authentication

and control who has access to data once it’s encrypted.

Unfortunately, data is not encrypted until it leaves the

device it was created on and travels to an external appliance

where the encryption will occur. Furthermore,

if the encrypted data and the keys to unlock that data

are stored in the same location, this single point within

the transmission constitutes a serious security risk. The

peer-to-peer model attempts to counter these drawbacks

by decentralizing the process. Because encryption

occurs at the user device level, this model addresses the

security gap between the user’s device and an external

appliance. However, in this model, authentication and

key exchange are also handled at the user device level

and are difficult to manage. Unfortunately, this model

does not eliminate the potential for a single point of

failure: if the encryption keys travel alongside the encrypted

data at any time, there is always risk of interception

and exposure. Rather than choosing between these

existing security models, Encryptics resolved to blend

the best of both models in a patented, Trusted Peer-to-

28


Peer platform. This innovative approach resulted in

a superior solution designed to protect data over the

course of its entire lifecycle, leaving no security gaps

and no single points at risk of failure to secure the data.

Taking it even further, Encryptics devised Data Rights

Management (DRM) tools to empower data owners and

preserve document integrity. With DRM, data owners

can manage and maintain control of their data in real

time, even when it resides on remote email servers

and recipient devices. As its email product is gaining

momentum, Encryptics hopes not only to shed light

on the significance of

data security and Policy-

Based Protection (PBP),

an add-on that works

with Encryptics for Email

to prevent data loss, but

also to revolutionize the

way in which we protect

important information in

an increasingly unsecure

technological landscape.

With an easy-to-use product that brings convenience

to our busy lives, Encryptics ensures that we can share

and store almost any data without ever having to worry

about leaks, hacks, or theft.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

https://www.encryptics.com/default.aspx

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Texas Department of Information Resources Case Study: Overview

of how Encryptics empowered the first ever email security

plan for Texas Department of Information Resources, home to

the state’s technology solutions for government and education.

https://www.encryptics.com/case_studies/DIR-EncrypticsCaseStudy.pdf

Law Enforcement Association Case Study: Summary

of a successful 30-day trial, resulting in a prominent state law

enforcement association adopting Encryptics for Email to protect

the personal identifiable information (PII) of its members.

https://www.encryptics.com/case_studies/

Law_Enforcement_Association.pdf

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Erika Swanner, Vice President of Marketing

Encryptics

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (512) 657-2685

cell: (214) 864-7486

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

eswanner@encryptics.com

29


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

NICE Systems –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Forensic Software

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

NICE Suspect Search

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

An active shooter is on the loose. An airport checkpoint

has just been breached. Police are frantically searching

for a lost child amid a crowded location. A suspicious

bag is left behind in a busy transit station. In each of

these situations, time is of the essence. Surveillance

video can provide clues to finding a suspect, but will

you be able to pinpoint the exact video you need in

time? Here’s where NICE Suspect Search can help.

Suspect Search is a patent-pending video analytics

technology that helps you quickly locate and retrace

the movements of a person of interest within a video

surveillance network. It can scan an hour of video in

less than a minute, automatically filtering out 95 percent

of irrelevant images. Suspect searches can be initiated

using a recorded image, an uploaded full body photo,

or a suspect composite. As the search reveals snapshots

of the suspect over time across different cameras, it

evolves into a history of their movements before and potentially

after the incident. Timely situational awareness

is critical so snapshots are presented on an actual map.

This answers questions like how did the suspect get

here? Where did he go? Did he meet up with anyone or

was he alone? And is he

still on premise? Suspect

Search revolutionizes

video forensics, both

for real-time use and for

after-the-fact investigations.

Digitally stamped

images, video, and location

information associated

with each search

can easily be shared with

police departments and

district attorneys for

forensic investigations.

WHAT SETS SUSPECT SEARCH APART

There are technologies on the market that can search

for a specific color, but until now, none of them could

search for a specific person, especially not in real-time.

30


Suspect Search takes into account three parameters -- a

full body image, the unique human signature of a person

(e.g. size and the way they walk), and the textures

and colors associated with that person like their clothes,

accessories, hair, or skin. The Suspect Search algorithm

analyzes, tags, sorts, and stores images in a database according

to these parameters, increasing search accuracy.

Furthermore, calculations are done in real-time. Video is

analyzed as it is captured, so searches can begin immediately

and results are available within seconds. Another

differentiator is Suspect Search’s ability to simultaneously

search across multiple camera feeds. Once the

target has been located, Suspect Search’s geo-spacial

capabilities allow operators to trace and retrace the suspect’s

route to predict patterns of movement for quick

apprehension.

SUSPECT SEARCH BENEFITS

By providing near real-time, actionable information

about the whereabouts

and movements of

persons of interest,

Suspect Search can

accelerate response

times and effect positive

outcomes, whether

that means finding

a lost child faster,

apprehending suspects

quicker, or avoiding

costly shutdowns.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.nice.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.nice.com/nice-suspect-search

https://www.youtube.com/watch?v=PD-hSXOt5

FA&index=54&list=PLC3F1BBC80EE0AA53

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Linda Haelsen, Marketing Communications Manager

NICE Systems

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(203) 481-4168

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

linda.haelsen@nice.com

31


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

Solar Winds –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Continuous Monitoring Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

SolarWinds User Device Tracker

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

SolarWinds User Device Tracker (UDT) delivers automated

user and device tracking with powerful switch

port management capabilities empowering federal IT

Pros with strong continuous monitoring capabilities and

visibility into who or what is connected to their network.

Highlights include:

• Automatically discovers, maps and monitors switches,

ports and network devices

• Quickly finds devices and retrievers user name, port

details, connection history and more

• Enables searching on IP address, user name, hostname

or MAC address to track endpoints

• Allows whitelisting and watch lists with automatic

alerts and click-of-a-button port shutdown

• Provides detailed switch port usage data, capacity

analysis and built-in reporting

With the ever-increasing use of personal devices and

applications, SolarWinds UDT provides federal IT Pros

with peace of mind about the security of their network

and the devices on it by continuously monitoring who

and what connects to their network. Additionally,

SolarWinds UDT can track down lost or rogue devices

with a simple search of a user name, IP address, hostname

or MAC address ensuring that all devices that can

connect to federal networks stay in the right hands.

SolarWinds UDT also features alerting that signifies

unauthorized network access

and provides the ability to

quickly shut down switch

ports to secure access to sensitive

information. Updates

to SolarWinds UDT coincide

with the latest issues being

tackled by IT Pros such as

BYOD. In the latest update

to scalability and additional

support and optimization for

varying devices and vendors

was a priority. And, by work-

32


ing closely with and listening to its user community,

SolarWinds is able to gain real-time and candid feedback

from IT practitioners, so its products can address the

problems and challenges prevalent in IT security today.

SolarWinds UDT provides three critical capabilities for

network and systems managers. First, it makes it possible

to physically locate an end-user device or user on

the network extremely quickly. Second, it allows for

rapid quarantine of users or systems by remotely shutting

down a switch port. Finally, it supports watch-lists

and can alert when certain types of devices or specific

users connect to the network and even take pre-defined

actions to help protect information and other assets. SolarWinds

software is built to scale and can support an IT

environment of any size and is used by nearly every U.S.

federal civilian agency, DoD branch and intelligence

agency. SolarWinds UDT complements other products,

such as SolarWinds Network Configuration Monitor,

SolarWinds Log & Event Manager, SolarWinds Firewall

Security Manager and SolarWinds Server & Application

Monitor, to name a few, providing additional breadth

and depth for continuous monitoring. SolarWinds software

can “collect once and report to many,” which gives

IT, information assurance, and security departments

the unique functionality they each need from a single,

cost-effective set of tools.

SolarWinds UDT licensing

is based on the number of

switch ports to being monitored.

The licensing model

features large jumps in

switch port count allowing

for rapid growth of an organization

before an additional

licensing level is reached and

can scale to an unlimited

number of switch ports.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.solarwinds.com/user-device-tracker.aspx

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

https://www.youtube.com/watch?v=s4G_

yPZq7Jc

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Rebecca Orr, Corporate Communications Associate

SolarWinds

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(512) 498-6372

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

rebecca.orr@solarwinds.com

33


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

Tenable Net work Securit y –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Continuous Monitoring Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

SecurityCenter

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Founded in 2002, Tenable Network Security provides

continuous network monitoring to identify vulnerabilities,

reduce risk and ensure compliance. Relied

upon by more than 20,000 organizations around the

world, Tenable’s key clients include Fortune Global 500

companies across industries as well as the entire U.S.

Department of Defense (DoD) and many of the world’s

leading governments. With the largest install base and

best expertise in the industry, Tenable gives customers

the ability to identify their biggest threats and respond

quickly. Through its work with the DoD, Tenable’s

technology is meeting the vulnerability, compliance and

real-time risk management requirements of one of the

largest, most demanding government organizations in

the world. The Defense Information System Agency was

confronted with a limited capability to quickly and accu-

rately assess the network security of Department of Defense

(DoD) enterprise networks. To address this, DISA

established Tenable Network Security as the foundation

of its Assured Compliance Assessment Solution (ACAS)

which replaced the Secure Configuration Compliance

Validation Initiative (SCCVI) suite of software previously

acquired by the DoD.

ACAS was created to fulfill a combination of operational

and strategic objectives, including:

• Provide an innovative technical solution with a flexible

cost structure.

• Employ a commercial solution that could be easily

ordered and quickly deployed across the DoD infrastructure.

• Support enterprise-wide deployment across the

34


Department of Defense, with the ability to tier system

evaluation and management throughout the

organization.

Ultimately, DISA wanted fast and accurate enterprisewide

network security assessment that could satisfy the

goal of increasing the accuracy of risk assessment and

standards compliance verification. They wanted realtime

risk assessment across DoD networks to provide essential

situational awareness and enable true, risk-based

management decisions consistent with existing and

emerging federal guidelines for continuous monitoring.

DISA’s selection of Tenable

followed an extensive evaluation

process culminating with

a 6-month, multi-site implementation.

As part of Tenable’s

solution, DISA implemented

Tenable SecurityCenter, which

provided continuous assetbased

security and compliance

monitoring, bringing together

the processes of asset discovery, vulnerability detection

and configuration auditing. The SecurityCenter console

works with Tenable’s Nessus vulnerability scanners, the

global standard in detecting and assessing network data,

to look for policy changes every time a scan is requested.

This provides the ability to assess an organization’s

vulnerability and compliance posture, as well as deliver

analysis and workflow tools that allow the user to easily

perform reporting, auditing and remediation tasks. Tenable

SecurityCenter streamlines vulnerability scanning,

administration and reporting. For organizations with

large and complex networks, SecurityCenter provides a

comprehensive view of enterprise security, compliance

and risk, combining the power of Nessus scanning with

an enterprise-class vulnerability and threat management

platform. SecurityCenter simplifies administration

35

using a single console that manages distributed Nessus

scanners for enterprise-wide security and compliance

visibility. It also accelerates scans with a distributed and

load balanced scanning, and delivers advanced analytics

including extensive dashboard and built-in and customizable

reports that aggregate scan data to help you

identify and respond to security and compliance issues.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.tenable.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Continuous Monitoring:

http://www.tenable.com/solutions/continuousmonitoring

Whitepaper:

http://www.tenable.com/whitepapers/continuous-monitoring-for-the-new-it-landscape

Blog:

http://www.tenable.com/blog

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Chris Petty, Communications Coordinator

Tenable Network Security

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(410) 872-0555 ext. 522

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

cpetty@tenable.com


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

EventTracker –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Security Incident & Event Management (SIEM)

Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

EventTracker Enterprise

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

EventTracker offers a suite of award-winning products

for Security Information and Event Management (SIEM)

and event log management including EventTracker

Enterprise. EventTracker Enterprise enables organizations

to be constantly aware of potential security risks

and internal or external threats can be identified and

eliminated before they are exploited. Increasingly, Department

of Defense, state and local government departments

are deploying EventTracker’s (SIEM) solutions

to meet their cyber security needs and to comply with

FISMA and SCAP/FDCC initiatives by supporting NIST

800-X and other regulatory guidelines.

ments, including:

• Real time collection and secure storage of all network

system and device logs for as long as you require

• Reporting & analytics

• Powerful FISMA compliance reporting

• Correlation and alerting on all event log sources

• Behavior analysis and anomaly detection

• FIPS 140-2 compliant transmission of event data

Going beyond simple SIEM, EventTracker’s continuous

monitoring solutions provide unequalled network visibility

with integrated:

• Registry and file integrity monitoring

• User activity monitoring

• Advanced USB monitoring

• SCAP certified Configuration Assessment

EventTracker offers a unique, flexible and cost effective

automated continuous monitoring solution that meets

government information and network security require-

These combined features enable security personnel

to continuously monitor your environment in either

real time, for a preventative approach, or in a forensic

36


capacity to analyze what activity has occurred. The end

result is a robust, customizable monitoring solution that

utilizes best practices for determining risk and preventing

incidents to give you the confidence that your

organization is secure, all while helping demonstrate

compliance.

Other Benefits to government agencies and contractors

include:

• Simple Straight-forward Licensing

• Software Only Solution – fully virtual ready

• Flexible, Component-based Architecture

• All Compliance Packs Included SIEM Simplified,

EventTracker’s award winning services offering, augments

IT security teams and provides additional resources

to effectively extract actionable information

about the IT infrastructure. As an option, our experienced

staff assumes responsibility for all SIEM related

tasks including daily incident reviews, daily/weekly log

reviews, configuration assessments, incident investigation

support and audit support. EventTracker Enterprise

empowers organizations to maintain regulatory compliance

and simplifies the audit process, reducing audit

times by up to 90%. Detailed reporting minimizes the

time and effort to determine potential gaps in compliance

requirements, and address them efficiently. Event-

Tracker Enterprise processes hundreds of millions of

discrete log messages to distill critical information to the

organization and provides a 360o view of the entire IT

infrastructure, offering real-time alerting and reporting.

EventTracker Enterprise allows organizations to maintain

continuous compliance.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.eventtracker.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.eventtracker.com/eventtracker/enterprise/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Dina Petrosky

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (860) 495-5566

cell: (860) 912-3201

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

dina@smartconnectionspr.com

37


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of IT Security Products and Solutions

Applied Visions, Inc. / Secure Decisions

Division – 2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Compliance/Vulnerability Assessment Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Code Dx ®

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Corporate and government enterprises are all potential

victims of cyber-attacks that can adversely impact a

company’s bottom line, damage public reputation,

compromise sensitive government data, and diminish

the public trust. Industry experts and the Department

of Homeland Security (DHS) have traced most compromises

to poorly written software. 70-80% of security

breaches occur because of poorly written code containing

numerous security vulnerabilities. Consequently,

software development and acquisition organizations

are under increased pressure to find and fix software

vulnerabilities before they are deployed. DHS, NASA,

DoD and commercial businesses have begun to use

static application security testing (SAST) tools to find

software vulnerabilities during the development cycle

and as part of the acquisition process. One problem,

however, is that no single source code analysis tool finds

most of the vulnerabilities in an application. Different

tools identify different vulnerabilities. Benchmark tests

by NIST and NSA reveal that, on average, a single static

analysis tool will detect only 14% of all of the software

weaknesses in code. Consequently, one needs to use

multiple source code analysis tools to find a majority of

the vulnerabilities. A second problem is that each tool

outputs its results in a different format with different

severity scales, making it difficult to combine the results

and present them in a unified report. A third problem

is related to expense: each commercial tool added to

the vulnerability analysis adds significant cost; and each

open-source SAST tool requires additional resources to

find and configure them. Code Dx ® finds, prioritizes,

and visualizes software vulnerabilities – fast and afford-

38


ably. Code Dx ® makes it easy for software developers

and security analysts to start checking their software for

vulnerabilities without a significant investment of time

or money. It embeds, automatically selects, and runs the

appropriate open-source static application security testing

(SAST) tools for each language in a software code

base. It also adds in results from commercial analysis

tools and manual code analyses, combines these with

the results of the open-source tools, and unifies the

results into a common severity scale and display. Its

visual analytics help to triage and prioritize software

vulnerabilities so that the most important vulnerabilities

are fixed first, and false positives are removed from

future vulnerability scans. Code Dx provides advanced

collaboration and reporting tools to ensure expeditious

communication of findings and remediation recommendations.

Compliance reports can be customized to

show which vulnerabilities are potential violations of

regulations such as PCI or HIPAA. Code Dx removes the

most prominent barriers to finding and fixing software

vulnerabilities: time to get started, complexity, and expense.

Its entry point of $2,500 for an annual subscription

makes it affordable even for small businesses.

39

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.codedx.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Code Dx finds, prioritizes, and visualizes software

vulnerabilities fast and affordably: http://securedecisions.com/products/codedx/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Dr. Anita D’Amico / Director Secure Decisions

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

Applied Visions, Inc. Secure Decisions Division

office: (631) 759-3909

cell: (516) 702-7706

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

Anita.Damico@SecureDecisions.com


GSN Announces the 2015

Airport/Seaport/Boarder Security Awards Program

GSN’s second annual awards program recognizing excellence in Airport/Aviation Security,

Maritime/Port Security and Border Security will open for entries on Monday, March 2, 2015.

The updated 2015 edition of this exciting program will once again cover basic technology

groups, including Access Control/Identification, Detection Solutions, Air/Land and Sea

Communications and Surveillance, Integrated Security Programs and Aviation/Maritime

and Border Security Human Resource Development.

In addition to the staples of Cargo Screening, Thermal Nightvision, Integrated Harbor

Security and Perimeter Protection, you can expect many new categories in Satellite

Communications, Aviation and Military Beacons and Air Traffic Control – plus new categories

recommended by knowledgable vendors or outstanding operators or security teams.

The last group of entries will once again be dedicated to the following three categories:

* Most Notable Airport Security Program, Project or Overall Security Initiative

* Most Notable Seaport Security Program, Project or Overall Security Upgrade

* Most Notable Border Security Program, Project or Overall Security Initiative

AIRPORT | SEAPORT | BORDER

SECURITY

AWARDS PROGRAM

43 38


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products & Solutions

40

42

Roster of 2014 Winners

GSN Interview with Distinguished Judge of 2014 Awards,

Scott Greiper

46

48

50

52

54

56

58

60

62

64

66

Winning entries reproduced with permission of:

IRIS ID

EID Passport

Alert Enterprise

Desktop Alert

Desktop Alert

NICE Systems

Automative Systems

SecureUSA

NICE Systems

HIKVISION

HID Global

39


Winners in the 2014

Homeland Security Awards Program

Vendors of Physical Security Products & Solutions

PHYSICAL ACCESS CONTROL

AND IDENTIFICATION

Best Biometric Identification Solution

IRIS ID – Winner

Best Intergrated System

for HSPF-12/FIPS 201 Compliance

Eid Passport – Winner

Best Smart Card Solution

WAVE Systems – Winner

Best Platform for Physical/Logical Access

Viscount Systems – Winner

Alert Enterprise – Finalist

HID – Finalist

Honeywell – Finalist

COMMUNICATION PRODUCTS

Best Interoperable First Responder

Communications

Desktop Alert –Winner

AtHoc – Finalist

Best Mass Notification Systems

Desktop Alert – Winner

AtHoc – Finalist

Best Regional or National Public Safety

Communications Deployment

AtHoc – Winner

Alastar Software – Finalist

DETECTION PRODUCTS

Best Explosive Detection Product or Solution

Implant Sciences – Winner

American Science and Engineering (AS&E) – Finalist

Best Long Range Detection Product,

Service or System

Rapiscan – Winner

Pure Tech Systems – Finalist

VIDEO SURVEILLANCE PRODUCTS

Best Intelligent Video Surveillance Solution

NICE Systems – Winner

AXIS Communications – Finalist

Panasonic – Finalist

Puretech Systems – Finalist

Best Network IP Cameras

AXIS Communications – Winner

Bosch – Finalist

Hikvision – Finalist

40


OTHER PRODUCTS

Best Perimeter Protection System

Automatic Systems – Winner

Best Crash Barriers

(Gates, Fences, Bollards, Guard Booths)

Secure USA – Winner

Best Physical Security

Information Management Solution (PSIM)

NICE Systems – Winner

Best Crash Barriers

(Gates, Fences, Bollards, Guard Booths)

Secure USA -- #609 – Winner

SERVICES

Best Disaster Preparedness and/or

Disaster Recovery and Clean-up Services

High Rise Esacape – [win status?]

Best Homeland Security Training,

Higher Education Program

Bellevue University – Winner

41


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

GSN INTERVIEW

Scott Greiper, Distinguished Judge,

GSN 2014 Homeland Security Awards Program

Mr. Greiper is the President and Founding Partner of Secure Strategy Group (SSG), a boutique

advisory and investment banking platform in the physical and cyber security sectors. He has

had a distinguished 15-year career in the security and technology sectors as both a research

analyst and investment banker, and is known as a thought leader in the industry. Before

forming Secure Strategy Group, he was a Managing Director at Legend Merchant Group and

Head of the firm’s Convergent Security Group, which provided capital, strategic advisory and

M&A services to growth companies in the security and defense technology markets. Previously,

Mr. Greiper was a Principal and Senior Analyst at C. E. Unterberg, Towbin, where he covered public companies in the

Global Security industry and was consistently ranked as one of the top analysts in the sector. He has worked with a

range of industry leaders and is a frequent guest speaker and moderator at conferences and seminars across the country.

Mr. Greiper attended the Executive MBA program at Columbia University and holds a B. A. in Economics from The

University of Chicago. He is a member of the FBI InfraGard program, BENS (Business Executives for National Security),

ASIS (American Society for Industrial Security) and NYSSA (New York Society for Security Analysts).

GSN: What is the key trend you’re seeing in

the security industry as we enter 2015?

SG: The massive global security industry is being transformed

from “guns, guards and gates” into highly integrated

technology solutions that must protect against both

physical and cyber threats while at the same time demonstrating

ROI. The distinction between cyber and physical

security is blurring and the requirement for unified

management of threats in different domains growing. This

“unification” is in my mind the most important transformation

impacting the security industry.

42

What is “Unified Security”? It is the growing integration

of security and resilience solutions – themselves

increasingly digital – across the full spectrum of requirements

and threats, from cyber to physical. It is the integration

of physical security solutions – surveillance, access

control, fire alarms – onto the same common operating

platform of cyber security solutions – anti-virus, intrusion

detection. This in an effort to create full situational awareness

of an organizations security systems and sensors, and

to more readily coordinate response.

More and more building automation systems,


such as HVAC, access control, utilities, and communications,

and being monitored and driven by an enterprise’s

network. As such, these systems provide an easier route

to hack into the network, because they often sit in front

of the firewall and don’t contain the same level of security

as network systems do. The theft of over one hundred

million customer accounts during the Target Stores breach

was enabled by the theft of a password from an HVAC

technician that was subsequently used to breach the Target

network.

What are the drivers of demand for Unified Security

Solutions?

Improved Technology & ROI:

• Technology and ROI: analog to digital video surveil

lance; new capabilities in simulation, ROIP, etc –

better security and ROI?

• New capabilities to combine physical and digital

access control and identity management

• “Software trumps hardware”

• Requirements for security technology to keep up with

“smart buildings”

• M2M/Internet of Things/smart sensors

• Securing the “last mile”

Security integration with external partners (from

warning to video sharing, a la Boston)

• Critical Infrastructure Regulations like FERC, PPD-21

• Federal specific regs (eg, FIPS 201-2) and new security

requirements for products sold to the U.S. Government

How does the investment community perceive

the opportunities in the security market?

SG: Investment returns in the security sector were strong

in 2014, mirroring the healthy growth in the industry. Secure

Strategy Group publishes the SSG Small Cap Homeland

Security Report and Index, which tracks the top small

and mid-sized public companies in the security industry,

categorized across 11 different technology sectors.

As you can see in the table below, our SSG Small

Cap Security Industry Index returned 22.5% for 2014,

handily beating the Dow Jones Industrial Average (up

10.0%), the S&P 500 (up 13.7%), the Nasdaq Composite

(up 14.7%) and the Russell 2000 (up 4.9%). Moreover, 7 of

our 11 sectors showed positive returns.

Regulations:

• SEC cyber reporting guidance; Sarbanes Oxley

requirements

• Federal regulations such as FICAM and HSPD-12 that

mandate improved security for federal buildings by

implementing “cyber proof ” access control systems

43


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

GSN INTERVIEW

Scott Greiper, Distinguished Judge,GSN 2014 Homeland Security Awards Program

You act as both advisor and banker to your

client companies. What are the key variables

you look for before taking on a new

client?

SG: There are three key variables we measure when

evaluating a new potential client assignment. We don’t

assign a specific ranking to each, but at the end of the day

the quality, integrity and experience of the management

team is the tipping point between success and failure.

Since we act in a capital raising capacity for our clients, we

always position ourselves in the mind of an investor as we

do our due diligence.

Technology:

• Does the technology fill a market gap and have real

functional differentiation vs. the competition?

• Does the technology offer an ROI to the end user,

either in terms of upfront acquisition cost or the total

life cycle cost of ownership?

• Does the technology offer flexibility in terms of size,

portability, weight, and mobility?

• Can the technology be easily and cost-effectively up

graded over time?

• Can the technology maintain its functional and/or cost

advantages over time?

Management:

• What is management’s background and experience in

the specific technology sector?

• Has management previously taken a company from

early-stage, to growth stage to a successful exit in the

past?

• Is there a strong Board of Directors that brings exper

tise in governance, operations and management?

• Is there a strong ethical culture in the organization

that starts “at the top”?

• Has there been continuity in the core management

team over time?

Business Model:

• Is there sustainability in the Company’s pricing model?

• Can gross and operating margins be sustained or

increased over time?

• Is there both a direct and channel sales model in

order to cost-effectively access end-user opportunities?

• Is there a component of a recurring revenue or SaaS

revenue model?

• Are there customer concentration issues/is the sales

cycle elongated?

44


Tell us about some of the recent additions

to your team.

SG: We made a number of important additions to our

team and our advisory board in 2014 to prepare us for

growth in 2015.

We added Mark Sauter as our Head of M&A. Mark

was a co-founder of America’s first business accelerator for

national security technology and manager of its contract

with the NSA. Just prior to joining SSG, Mark was a principal

in the Spectrum Group, one of the country’s leading

M&A due diligence firms. He served as an Army office

in Special Forces and infantry units and is a graduate of

Harvard University and the Columbia University Graduate

School of Journalism. He is also co-author of McGraw

Hill’s leading university textbook, “Homeland Security: A

Complete Guide.”

We added Tom DiNanno as our Head of Government

Affairs. Tom served as Deputy Assistant Secretary for

Critical Infrastructure Protection at the U.S. Department of

Homeland Security, served as Special Assistant to the Chief

of Staff in the Department of Homeland Security, and in

the White House Office of Homeland Security as Director

of Corporate Relations. He received his MS in Business

and Urban Planning from MIT, and an MA in Government

Administration from the University of Pennsylvania.

We added Brian Tuskan to our advisory board late

last year. Brian serves as Senior Director of Microsoft Global

Security, where he oversees global strategic development,

integration and growth for Technology, Showcase,

Investigations, and Communications for the Microsoft

Global Security team. He joined Microsoft in 2000, after

serving more than 12 years in law enforcement with the

City of Redmond Police (Washington) and the Honolulu

Police Department. During his distinguished law enforcement

career he served as a metropolitan police officer,

patrol, SWAT tactical team member, undercover narcotics

detective, major crimes detective, and officer-in-charge.

45


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

IRIS ID –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Biometric Identification Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

IrisAccess - Iris Recognition Systems

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Iris ID ® (formerly LG Iris) has been active in the development

and deployment of iris recognition technology

since 1997. The IrisAccess ® platform has been widely

deployed around the world. Iris ID’s first generation

product was the IrisAccess ® 2200 iris recognition system

released in 1999, which paved the way for the first successful

commercialization of iris

recognition. This generation was

subsequently followed by the releases

of the IrisAccess 3000, iCAM

4000, iCAM 7000 series, iCAM

TD100, iCAM D1000, iCAM T10,

iData ® EAC software, IrisAccelerator

® and iData ® Software Development

tools. Twentieth-century security

infrastructures are straining

against the demand of twenty-first

46

century security implementation. The crushing pressure

of an unpredictable global threats, stringent regulatory

constrains increasing exceptions and escalating security

threats are stressing facilities, and IT systems to the

breaking point. In this volatile business environment,

the world over are confronting extraordinary challenges

including the inherent contradiction between improving

operational efficiency, customer service, and the overall

“experience” while anticipating and combating a broad

range of security threats. This dual high service/high security

challenge has created significant operational gaps

in the homeland environment that require innovative

process reengineering and comprehensive operational

improvements. IrisAccess iris-based access control is one

of an array of new and innovate

business processes and automated

technology solutions homeland

security agencies are adopting to

close these gaps, remain vegilant,

and breakthrough to the customer

experience. Secure access control

is critical to addressing existing

airport security/service operational

gaps. This is particularly

true for managing staff and third


party vendor access to restricted zones within a facility.

IrisAccess ® solutions most effectively and reliably balance

a number of seemingly irreconcilable constraints,

including:

• Regulatory Compliance

• Cost minimization and reduction

• Leveraging security infrastructure and investments

• Comprehensive, multi-layered security

• Balancing security with speed of access

• Uniform access to multiple locations and facilities

• Flexible solutions that evolve with planning process

• User friendly, easily adopted, and accepted solutions

• Integrating access control with existing and planned

airport ID systems

• Unique facility/location issues – environmental, local

rules/regulation, end-user concerns

IrisAccess highly reliable identification process can be a

key component of any homeland security access control

solution that successfully balancing these requirements.

Iris ID IrisAccess solution is uniquely suited to quickly

and accurately establish and verify identity enabling

secure and reliable access control in the highly sensitive

places. Iris ID IrisAccess systems provide high integrity

mass enrolment applications, physical access security

for airports, national ID programs, secure border crossings,

data centers, biotech labs and HAZMAT environments,

as well as other critical infrastructures. The only

biometric technology designed for operation in oneto-many

search mode, the technology also integrates

with traditional system architectures which may include

smart-cards as well as other tokens or PINs. Readily

accommodating expansion and scalability in terms of

system and database size requirements, Iris ID continues

to advance the “doorway to desktop” and global

security solution that enterprise and governments seek

today, as well as offering the robust authentication

47

that will be required in an increasingly wireless world.

IrisAccelerator and associated development tools have

been proven to provide highly accurate and fast identification

of individuals. Iris ID has been providing iris

technology solutions for Homeland Security for past

14 years. Iris ID products and solutions are currently

used in more than 50 airports, high value assets such as

nuclear power plants, critical infrastructure government

or commercial security around the world for employee

access control and homeland security. Recently Iris ID

was awarded the honor of providing a border security

solution for Canada Border Security Agency (CBSA) and

Hammad International Airport, Doha Qatar.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.irisid.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Mohammed Murad

Vice President, Iris ID Systems Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(609) 819-4747

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

murad@irisid.com


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

Eid Passport –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Integrated System for HSP D-12/FIPS 201

Compliance

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

The RAPIDGate Program

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The RAPIDGate ® Program, from Eid Passport, Inc., is

an end-to-end high assurance identity management

and installation access control solution for vendors,

contractors, and service providers. This field-proven,

accredited, and widely-accepted credentialing and

vetting program has been deployed at more than 450

federal facility access control points across the United

States and its territories, helping the U.S. military guard

against such threats as unauthorized access, identity

theft, fraud and cyber-crime. These threats put the safety

of military personnel, critical infrastructure, and other

valuable assets at risk every day. This DIACAP ATOcertified

program was specifically designed to enhance

installation safety and security and improve operational

efficiency and effectiveness in aligning with HSPD-12/

FIPS 201 requirements by utilizing our proprietary,

48

self-contained physical access control system for card

validation, authentication, and registration. Since 2004,

the RAPIDGate Program has identity-proofed, performed

suitability risk analysis and credentialed more

than 790,000 vendor/contractor employees representing

approximately 59,000 companies doing business

with the U.S. Navy, Army, Marine Corps, and Coast

Guard. Over 130,000,000 authentication events have

been recorded, the majority of which are vendors and

contractors requiring identity verification and access to

military and government bases/buildings. As a result,

Eid Passport is the leading commercial provider of U.S

Department of Defense recognized vendor credentials.

The time required to screen and verify vendors and

contractors for base access cuts deeply into productivity,

particularly for smaller companies who can least


afford to wait in line. This results in higher vendor costs,

which ends up increasing military costs. To significantly

reduce the time it takes for thousands of personnel to

gain needed access to military facilities, the RAPID-RCx ®

Program was developed. It seamlessly integrates access

control point systems and biometric identity verification

into a single, RAPIDGate credential. Additionally,

Eid Passport is currently implementing its RAPIDGate

Premier credentialing program for the U.S. Navy.

This advanced program adds Personal Identity Verification

Interoperable (PIV-I) credentials to the RAPIDGate

Program. These enhanced, tamper-resistant credentials

meets PIV-I credentialing standards and are in accordance

with HSPD-12 and FIPS 201. RAPIDGate Premier

PIV-I credentials contain: a unique ID code; a color

photograph; the credential holder’s full name; organizational

affiliation/company name; issued and expiration

dates; and program seal of authenticity. Furthermore,

the RAPIDGate Premier Program credentials are the

only PIV-I credentials with integrated background vetting.

Incorporating this enhanced credential with PIV-I

compliant PACS systems provides participants with a

single, interoperable credential granting them access to

controlled areas such as flight lines, secure buildings,

spaces, vaults, and other areas where authorized access

is required. Once RAPIDGate has been deployed,

security personnel can verify that anyone arriving with

a RAPIDGate badge has been Registered And Previously

ID’d. That means they’ve passed a thorough background

screen, been photographed, fingerprinted and badged.

Vendors like RAPIDGate because it saves them hours

of time and improves worker productivity by providing

rapid base access. Force Protection likes RAPIDGate

because it allows security personnel to spend less time

and resources screening “Registered And Previously

ID’d” visitors who have already been vetted and allows

them to meet security policy requirements.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

High-assurance identity management for vendors, contractors,

suppliers, & service providers

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Eid Passport, Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

John Nee : (503) 924-5293

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

jnee@eidpassport.com

49


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

Alert Enterprise –

2014 Finalist

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Platform for Physical and Logical Access

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Enterprise Guardian

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Companies are faced with the daunting task of reconciling

employee, contractor and visitor lists against HR that are working fine. AlertEnterprise has developed a

resorting to cost prohibitive replacement of systems

Management Systems, Manual Contractor acquisition solution to bridge the security gaps across these silos of

processes and the list of electronic access cards that are Physical and Logical systems with a Converged Identity

actually active. Add to that the complexity of monitoring Governance and Management solution that extends

the system access that they have in enterprise and legacy beyond IT and enables you to manage and control user

applications. Organizations are living with the risk that access risks across the entire enterprise. As an example

terminated employees or contractors still have physical

access to facilities. As companies grow and acquire is an Operator who works in the Transmission Control

use case for this capability, let us consider Tom. Tom

other facilities and merge with other companies, Access

Control systems from multiple vendors need to be Tom must complete certain on-going training require-

Room for a regulated Utility company we call Utilco.

accounted for. A single command and control console ments to maintain his license to operate. Utilco has a

that can consolidate identities and access rules across Learning Management System (LMS) in place that is

multi-vendor badging systems can eliminate the overlap, linked to the company HR system. AlertEnterprise is

cost burden and manual processes needed to centrally integrated with the HR systems, the Identity Management

as well as the Badge Access system. During the

manage physical access across all these systems without

50


onboarding process, AlertEnterprise automates the

background check process prescribed by Utilco and

proceeds to make sure that all the certification requirements

are met. If the requisite Continuing Education is

not completed, the application reminds Tom that he has

two more weeks to complete it. Tom may want to access

the computer-based training in the evenings to make

up for lost time. If additional reminders don’t have the

desired effect, finally on the last day, when Tom uses his

electronic access badge to get into the control room, it

will automatically lock him out, enforcing the company

policy and avoiding the possibility of costly compliance

violations.

With Enterprise Guardian from AlertEnterprise, organizations

can:

• Manage a Common Digital Identity for employees,

contractors, etc. for IT and Physical

• Unlike other solutions, provision to both IT Applications

and Physical Access Control

• Meet regulatory compliance requirements and automatically

generate reporting

• Actively enforce termination and transfers

• Have a single console that operates across multiple

vendor Access Control systems

• Single interface to create identity and badge for multiple

Access Control Systems

• Enhanced risk analysis and training validation with

Active Policy Enforcement

• Powerful reporting across physical access vendors

consolidating access and usage

• Support PIV-I and PIV-C for Government and High

Security FICAM; HSPD-12; OMB M-11-11

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.alertenterprise.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Enterprise Guardian Data Sheet:

https://alertenterprise.box.com/s/roeqtb8p-

473pf9kz286b

AlertEnterprise Video:

https://www.youtube.com/

watch?v=1GdXEgntzgM

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Pan Kamal,Vice President, Marketing

AlertEnterprise, Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (510) 897-6712

cell: (650) 793-5992

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

pan.kamal@alertenterprise.com

51


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

Desktop Alert –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Interoperable First Responder Communications

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Desktop Alert Inter-agency Mass Notification Platform

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Desktop Alert provides early warning mass notification

alerts to over 1 million federal, military and civilian hardware and burdensome configuration logistics. For

personnel daily with ‘less than one minute alerting’ as the first time in the existence of Northern Command /

certified by our customer base. After an extensive worldwide

vetting of vendors, the world’s most crucial peace network alerting to protect over 25,000 personnel.

NORAD, the entire command is now retro fitted with

keeping organization NATO selected Desktop Alert! Buttressed

by this selection is that of the Institute of Peace alert all 25,000 personnel in ‘less than one minute’.

The system selected enables emergency operators to

2012 selection of Desktop Alert. http://www.virtual-strat-

The system is also integrated with the National Weather

egy.com/2012/04/17/united-states-institute-peace-selects-

desktop-alert-mass-notification-system#axzz3IbIAv3c4 severe weather event, all targeted personnel are alerted

Service using the Common Alerting Protocol. During a

Desktop Alert was chosen over all vendors in this GSN automatically without operator assistance in less than

competition for the coveted mass notification requirements

by NATO HQ in Brussels Belgium. Key in our on-premise phone system. With a single mouse click, in

one minute. The system also integrates with the base

selection by NATO was the platforms ability to operate seconds personnel are reached by e-mail alerts, desktop

popups, text messages, phone calls and mobile

on the customer’s existing computational infrastructure

thus saving several hundred thousand dollars in both apps. The implementation has augmented emergency

52


esponse capability substantially and was recently

reviewed and lauded by Maj. Gen. Jack Briggs, currently

the Director of Operations for Headquarters U.S Northern

Command, Peterson Air Force Base, Colorado. The

implementation of the Desktop Alert MNS enables interagency

communication during an emergent domestic

event between the following US 1st in line 1st Responders:

• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K personnel)

• ARMY AND AIR NATIONAL GUARD NATIONWIDE

(500+K personnel)

• NORTHERM COMMAND / NORAD (25K personnel)

• U.S. Defense Threat Reduction Agency (DTRA) (10k

Personnel)

• U.S. Army Special Operations Command at Fort Bragg

• AFDW Pentagon (confidential)

• 200+ Army and Air Force locations worldwide

DTA is currently the second largest provider to DoD

and continue to build market share year by year. The

unification of alerting between these agencies provides

formidable actionable intelligence during emergent

homeland events. The nation’s most top tier 1st agency

responders are all owners of the DTA MNS. NO other

vendor can boast these credentials; especially with these

numerous ‘key’ nation leading 1st inline 1st responder

defense agencies as it relates to not only border security;

but all other security concerns to the nation. While

other vendors may claim more seat licenses within DoD;

only Desktop Alert has unified the nation’s most critical

security agencies with the Military and DHS with one

de-facto system. Desktop Alert is far and away the leading

MNS in use by the Homelands Most Crucial Defense

Agencies! The improved ability to attain actionable

intelligence across all of these agencies in less than one

minute during an emergent event provides immense

dividends to the safety and protection of the homeland.

53

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.prweb.com/releases/NORAD/

NORTHERNCOMMAND/prweb9115614.htm

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Howard Ryan, CEO

Desktop Alert Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (973) 727-0066

cell: (973) 580-3447

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

howard@desktopalert.net


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

Desktop Alert –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Mass Notification Systems

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Desktop Alert Global Connect - Interagency Mass

Notification Platform

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Desktop Alert provides early warning mass notification

alerts to over 1 million federal, military and civilian

personnel daily with ‘less than one minute alerting’ as

certified by our customer base. After an extensive worldwide

vetting of vendors, the world’s most crucial peace

keeping organization NATO selected Desktop Alert! Buttressed

by this selection is that of the Institute of Peace

2012 selection of Desktop Alert. http://www.virtual-strategy.com/2012/04/17/united-states-institute-peace-selectsdesktop-alert-mass-notification-system#axzz3IbIAv3c4

Desktop Alert was chosen over all vendors in this GSN

competition for the coveted mass notification requirements

by NATO HQ in Brussels Belgium. Key in our

selection by NATO was the platforms ability to operate

on the customer’s existing computational infrastructure

thus saving several hundred thousand dollars in both

hardware and burdensome configuration logistics.

RECENT NEWS: DTA commended for its platform during

Recent Shooter event at Fort Hood. (The Backup

ARMY EM2P MNS Program alerted several minutes later

than the DTA system!) Reference: http://www.desktopalert.net/News/fort-hood-update/

DTA / Primary MNS at:

• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K personnel)

• ARMY AND AIR NATIONAL GUARD NATIONWIDE

(500+K personnel)

• NORTHERM COMMAND / NORAD (25K personnel)

• U.S. Defense Threat Reduction Agency (DTRA) (10k

Personnel)

• AFDW Pentagon (confidential)

• 200+ Army and Air Force locations worldwide

DTA is currently the second largest provider to DoD

and continue to build market share year by year. The

unification of alerting between these agencies provides

formidable actionable intelligence during emergent

homeland events. Desktop Alert is the largest provider

of MNS to the US Army Worldwide. Desktop Alert is

the Primary MNS used at over 90% of US Army installations

including Fort Hood. (NOTE! The US ARMY EM2P

MNS Program is a BACKUP system only!). The nation’s

54


most top tier 1st agency responders are all owners of

the DTA MNS. The Desktop Alert System sends desktop

alert popups, text messages (SMS), e-mail and phone

call alerts to all of these agencies personnel instantly

in all 50 states and beyond. NO other vendor can boast

these credentials; especially with these numerous ‘key’

nation leading border defense agencies as it relates to

not only border security; but all other security concerns

to the nation. While other vendors may claim more seat

licenses within DoD; only Desktop Alert has unified the

nation’s most critical security agencies with the Military

and DHS with one de-facto system. Desktop Alert is far

and away the leading MNS in use by the Homelands

Most Crucial Defense Agencies! We hang our hat on the

recent NATO selection, our usage by the National Guard

Nationwide, our usage by FEMA HQ locations nationwide

and of course the irrefutable fact that Desktop

Alert is the ONLY proven vendor in this competition that

delivers alerts in less than one minute. As a result of the

NATO selection our company has also been contacted to

REPLACE the incumbent for the entire US Marines Enterprise!

When lives are at stake, seconds count. Numerous

DoD agencies are unsatisfied with alerts received in

5 to 10 minutes. The best is yet to come! Thank you for

your review and consideration.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.desktopalert.net

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.prweb.com/releases/2014/11/

prweb12296096.htm

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Howard Ryan, CEO

Desktop Alert Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(973) 580-3447

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

howard@desktopalert.net

55


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

NICE Systems –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Intelligent Video Surveillance Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

NICE Suspect Search

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

An active shooter is on the loose. An airport checkpoint

has just been breached. Police are frantically searching

for a lost child amid a crowded location. A suspicious

bag is left behind in a busy transit station. In each of

these situations, time is of the essence. Surveillance video

can provide clues to finding a suspect, but will you

be able to pinpoint the exact video you need in time?

Here’s where NICE Suspect Search can help. Suspect

Search is a patent-pending video analytics technology

that helps you quickly locate and retrace the movements

of a person of interest within a video surveillance network.

It can scan an hour of video in less than a minute,

automatically filtering out 95 percent of irrelevant images.

Suspect searches can be initiated using a recorded

image, an uploaded full body photo, or a suspect composite.

As the search reveals snapshots of the suspect

56

over time across different cameras, it evolves into a

history of their movements before and potentially after

the incident. Timely situational awareness is critical so

snapshots are presented on an actual map. This answers

questions like how did the suspect get here? Where did

he go? Did he meet up with anyone or was he alone?

And is he still on premise? Suspect Search revolutionizes

video forensics, both for real-time use and for after-thefact

investigations. Digitally stamped images, video, and

location information associated with each search can

easily be shared with police departments and district

attorneys for forensic investigations.


WHAT SETS SUSPECT SEARCH APART

There are technologies on the market that can search

for a specific color, but until now, none of them could

search for a specific person, especially not in real-time.

Suspect Search takes into account three parameters -- a

full body image, the unique human signature of a person

(e.g. size and the way they walk), and the textures

and colors associated with that person like their clothes,

accessories, hair, or skin. The Suspect Search algorithm

analyzes, tags, sorts, and stores images in a database according

to these parameters, increasing search accuracy.

Furthermore, calculations are done in real-time. Video is

analyzed as it is captured, so searches can begin immediately

and results are available within seconds. Another

differentiator is Suspect Search’s ability to simultaneously

search across multiple camera feeds. Once the

target has been located, Suspect Search’s geo-spacial

capabilities allow operators to trace and retrace the suspect’s

route to predict patterns of movement for quick

apprehension.

SUSPECT SEARCH BENEFITS

By providing near real-time, actionable information

about the whereabouts and movements of persons of interest,

Suspect Search can accelerate response times and

effect positive outcomes, whether that means finding a

lost child faster, apprehending

suspects quicker, or avoiding

costly shutdowns.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.nice.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.nice.com/nice-suspect-search

https://www.youtube.com/watch?v=PD-hSXOt5

FA&index=54&list=PLC3F1BBC80EE0AA53

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Linda Haelsen, Marketing Communications Manager

NICE Systems

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(203) 481-4168

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

linda.haelsen@nice.com

57


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

Automatic Systems –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Perimeter Protection Product/System (Excluding

Video)

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

SlimLane Short - Swing Barrier Optical Turnstile

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

SlimLane Short swing door optical turnstiles combine

high speed bidirectional throughput with the highest reliability,

security, and footprint variations of any barrier

type optical turnstile. Available in narrow or wide lane

versions and single or double swing doors in 24 or 120 able with either low glass height (35”), medium (47”),

volt power configuration, SlimLane is already widely or high (67”) glass versions. The shorter cabinet length

known as the most versatile swinging glass turnstile. allows for easier implementation into most elevator

SlimLane offers IP connectivity – and was the first security

entrance control lane to boast this feature. SlimLane architectural demands in many front lobbies. Automatic

bank openings, as well as to more readily adapt to strict

is UL 2593 listed to help satisfy the most stringent of Systems is a leading manufacturer of pedestrian and

building and safety codes. The standard and unique vehicle entrance control equipment, with North American

headquarters/manufacturing in Brossard, Quebec,

“SecuriSafe” mode prevents forced entry attempts while

still allowing emergency egress at any time, and Slim- Canada. Under GSA Schedule Contract #GS-07F-0109Y,

Lane is the only lane of its kind to offer such a feature. Automatic Systems offers both their full range of pedestrian

and vehicle entrance control systems to federal

This new SlimLane offers a 48” cabinet length (existing

standard length is 62”). Both product lengths are avail- government security buyers.

58


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.automatic-systems.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Martha Tsiritas, Marketing Manager

Automatic Systems

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(800) 263-6548 xt234

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

mtsiritas@automatic-systems.com

59


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

Secure USA –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Crash Barrier (Gates, Fences, Bollards, Guard

Booths)

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

SideWALK Shallow Foundation Bollards

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The homeland security threat to urban and corporate

campus facilities makes bollards a necessity for protetive

standoff zones for at-risk structures. SecureUSA ®

invented shallow foundation bollard solutions that

meet stringent ASTM performance specifications in

circumstances which would normally preclude the use

of “standard” deep foundation bollards. They do it with

aesthetic style and design sensitivity, without sacrificing

performance. T The SecureUSA ® SideWALK ® Bollard

was developed to overcome the installation challenges

commonly found in any location where underground

infrastructure and utilities prevent deeper excavation.

They carry ASTM-C40 to M50 crash ratings/zero penetration

with a single bollard strike in as little as 6 inch

foundation depths and a footprint designed to fit in virtually

any sidewalk pavement. Standard crash rated bol-

60

lards typically require foundation depths of up to three

feet or more to achieve desired crash ratings. In major

metropolitan cities where the area under the pavement

and streets are crowded with utilities and other infrastructure,

a deeper foundation is virtually impossible.

Even other “shallow” bollards that have been subjected

to actual crash tests require deeper foundations than the

minimal 9 inches for SecureUSA’s ASTM-M30 (15,000lb

vehicle @ 30 mph) and M50 (15,000lb vehicle @ 50

mph) product. The SideWALK ® Bollard Series consists

of individual bollards that are easy to install even when


the terrain causes each of the bollards to change slope,

grade and curvature. This is a unique design for shallow

foundation crash rated bollards as other manufacturers

use a fixed sled design comprising a number of bollards

configured into less flexible bollard sets. The SecureUSA ®

SideWALK ® Bollard allows installation spacing to be

more flexible around typical obstructions, such as utility

vents, drains and other typical roadway and sidewalk

restrictions. This makes for cost effective protection in

normally prohibitive environments. SecureUSA ® Side-

WALK ® Bollards shallow foundation bollards provide

ADA compliant, pedestrian friendly standoff zones with

the ability to restrict vehicular access without obstructing

pedestrian access, while meeting ASTM standards.

This is a major technological achievement. SecureUSA ®

also pioneered the development and production of

all-electric retractable bollards that save time and money

in installation and maintenance over the life of the

system. No hydraulics minimize the potentially negative

environmental impact of leaks and spills associated with

hydraulic systems. I have found the staff at SecureUSA ®

to be the highest quality professionals dedicated to

excellent “post-sale-installation” customer service. It has

been a delight to work with them.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.secureUSA.net

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.secureusa.net/products/sidewalkshallow-bollards/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Dr. Stephen R. Crosby, Manager, Entrusted Creative

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(760) 333-7414 (both office and cell)

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

steve@entrustedcreative.org

61


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

NICE Solutions –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Physical Security Information Management

(PSIM) Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

NICE Situator

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

NICE remains at the forefront of PSIM technology’s

evolution. With a focus on continued growth and expansion,

we’ve extended Situator’s reach beyond the

control room and into the field. Our new innovative

mobile application addresses operational issues, as well

as safety and security. Moreover, NICE Situator was

selected to help secure some of the world’s most highprofile

cities and events in 2014, including the World

Cup hosted in Brazil, the Winter Olympics in Sochi and

Super Bowl XLVIII in East Rutherford, NJ.

Why it’s the best PSIM solution

New, Innovative Applications:

We’ve extended NICE Situator’s capabilities out and into

the field with a web-based GIS mobile application. First

deployed by the Los Angeles International Airport (LAX),

the NICE Situator Enterprise Geographical Information

System (EGIS) Web application, enables field personnel

to view all open incidents in Situator and log new incidents

from a tablet. This creates a shared environment

for managing incidents, enhanced team collaboration

and increased situational awareness.

NJ TRANSIT, the largest statewide public transportation

system in the U.S. has also deployed a Mobile App. NJ

TRANSIT used the solution for the first time during Super

Bowl XLVII to streamline communications between

the command center and 900 NJ TRANSIT Super Bowl

ambassadors on the ground. In addition to reporting

incidents, field personnel were able to use the App to

62


look up schedules and other information to assist passengers.

Following the successful Super Bowl rollout,

NJ TRANSIT plans to deploy the solution in conjunction

with other future large events and extend the Mobile

App to its maintenance, customer service and transit

police personnel.

Successful Global Deployments:

NICE Situator continues to improve operations and provide

situational awareness, management and resolution

capabilities to organizations across industries and urban

centers around the world. Glasgow, Scotland is using

NICE Situator to consolidate data from various city-wide

services like Public Space CCTV and traffic control

within a single operations center. In Sochi, Russia, NICE

Situator was used to help secure the recent Winter

Olympics in addition to heightening overall security and

safety in the city known as a destination for winter sport

enthusiasts. A large city in Brazil also deployed Situator,

which was used to secure some of the World Cup games

this summer – the largest sporting event in the world.

Market Leadership Industry Recognition:

For the third consecutive time, IHS (formerly IMS

Research) has ranked NICE the global leader in PSIM

solutions (Situator) and has named NICE the leading

PSIM vendor worldwide. In addition, Frost & Sullivan

has defined Situator as one of the few Tier 1 PSIM

solutions available.

63

Comprehensive investigations:

Through its integration with NICE Inform, NICE Situator

provides the industry’s most comprehensive debriefing

and investigation solution. The integrated reconstruction

platform is the first such solution capable of capturing

and synchronizing replay of multi-media sources including

video, audio, GIS-based displays and key operational

data. Step-by-step operator actions and 360-degree incident

reconstructions can now be incorporated into the

debriefing process for investigations, training, planning

and prevention.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.nice.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

web page: http://www.nice.com/situation-management/nice-situator

PSIM market leader: http://www.nice.com/niceranked-market-share-leader-global-psim-market

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Linda Haelsen, Marketing Communications Manager

NICE Systems

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(203) 481-4168

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

linda.haelsen@nice.com


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

Hikvision –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Network IP Cameras

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

3MP 360 Fisheye Camera

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The first of its kind to offer a true 30 FPS fisheye view range processing. The inclusion of bi-directional audio,

in full resolution, Hikvision’s 3MP 360 Fisheye stands alarm I/O, and in-camera recording with a 64 GB SD

out from its competitors. With five channels of video, it card allow the Hikvision Fisheye to become a virtually

single-handedly captures high-quality images from every standalone system. Combined with the special features

corner of a particular location, eliminates blind spots, of Hikvision’s Smart Series, such as line crossing and

and dewarps the image to allow for multiple viewing intrusion detection, the Fisheye camera is an excellent

modes: a panoramic (180 degree) view, a 360 degree choice for detailed coverage of wide, open areas. Airports,

conference rooms, parking lots, building fore-

view, and three virtual PTZ views. The Fisheye does

more on its own than multiple cameras trying to do the courts, storage yards, loading bays, and classrooms are

same thing. The camera’s 1/3” progressive scan CMOS perfect venues for the expansive coverage provided by

sensor provides high resolution images of up to 2048 x the Fisheye. In addition, the unique attributes of this

1536. Integrated IR allows for even disbursement over camera means that it lends itself to particularly creative

the entire image, eliminating hot spots. In fact, the IR uses. One example involves an educational facility in

functionality boasts up to 50 feet of visibility in low- or New Mexico, comprised of a middle school and a high

zero-light conditions. Hikvision’s award-winning WDR school, which installed a Fisheye in their gymnasium.

algorithms provide industry-leading 120dB of dynamic The Fisheye camera’s panoramic view covers the entire

64


gym, and each of the digital PTZs are assigned to different

school administrators. The digital PTZ system lets

users use the camera like a conventional dome camera

without any moving parts, improving reliability. Because

there are different groups of students using the gym

throughout the day, the principal of the high school has

access to his own PTZ, as do the vice principal of the

high school and the principal of the middle school. Each

user can manipulate their PTZ remotely and autonomously

without stepping on each other’s toes, while

also viewing the 180 to see the big picture. With over

3000 Hikvision engineers devoted to R&D, it’s no wonder

that cutting-edge cameras such as the Hikvision 360

Fisheye change the landscape of modern video surveillance.

Hikvision’s commitment to innovation allows its

customers to maximize surveillance with the Fisheye’s

user-friendly features or incorporate the Fisheye into

unique, unconventional, surveillance solutions.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.hikvision.com/en/us

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Fisheye spec sheet: http://www.hikvision.com/en/

us/products_show.asp?id=9810

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Anna Boudinot, Content Manager

Hikvision USA

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (909) 612-9034

cell: (323) 470-7772

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

anna.boudinot@hikvisionusa.com

65


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Vendors of Physical Security Products and Solutions

HID Global –

2014 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Physical Security Access Control & Identification

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

pivCLASS 4.3

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Fully tested by the U.S. General Services Administration

for compliance with FICAM, Federal Identity Credential

and Access Management programs, pivCLASS ® 4.3 is the

first GSA FICAM Certified Validation System available in

the security market today. The extensive Government

portfolio of credential authentication solutions enables

customers to comply with government physical access

control system (PACS) mandates, outlined in HSPD-12

and FIPS 201, to PIV-enable a PACS. By providing an

end-to-end solution that eliminates the need to rip and

replace the existing access control infrastructures, the

portfolio’s extensive range of Personal Identity Verification

(PIV) solutions allow agencies to use PIV-enabled

cards for strong PKI-based validation for physical access.

With its addition of the pivCLASS MultiPACS software to

the pivCLASS portfolio it is significantly easier for large

government agencies and organizations to provision

identities across many different, unconnected access

control systems located throughout geographically dis-

persed operations. The software is designed to streamline

and simplify the process of registering Personal

Identity Verification (PIV) credentials into multiple,

disparate physical access control systems (PACS). A key

element of HID Global’s expanded pivCLASS portfolio

of FIPS 201-based credential registration and verification

solutions, MultiPACS was created for government

agencies that commonly operate in numerous buildings

in several geographic areas, using many different PACS

supplied by multiple vendors No other vendor currently

offers a complete portfolio that provides authentication

at both the enrollment function and at the point of

access (e.g., door), registration of validated credentials

into over 30 different PACS head-end products, and a

variety of interoperable readers and reader form factors

including mobile handhelds. Other vendors generally

provide either the readers or software for the PACS

head-end enrollment function. HID is the only vendor

that offers this complete FIPS 201 solution from a single

66


source. With the pivCLASS portfolio, customers can use

a phased deployment approach designed to meet their

immediate needs while staying within their budget. For

example, an agency may want to initially enable their facility

to accept PIV cards without moving immediately to

strong authentication at each door. This can be achieved

by deploying the pivCLASS Registration Engine, the

pivCLASS Certificate Manager and pivCLASS Readers

configured in Wiegand output mode. This will enable

PIV cardholders to be registered into the PACS head-end

and to use their cards to gain access. At some later time,

strong authentication can be achieved by deploying the

pivCLASS Reader Services software at the PACS head-end

and the pivCLASS Authentication Modules (PAMs) for

the desired access points along with easily reconfiguring

the existing installed pivCLASS readers. pivCLASS

also supports the transition from legacy cards such as

magnetic stripe, proximity and iCLASS, by allowing

simultaneous use of these cards along with PIV cards.

This is achieved by adding the PIV card as an additional

credential to an existing PACS cardholder record. At the

appropriate time, the system can be reconfigured to

only accept PIV cards, seamlessly completing the transition.

The pivCLASS best of breed federal identity solution

also enables users to:

• Register identification credentials into multiple similar

or disparate PACS

• Register credential and verify FIPS 201-based credentials

• Harvest, validate and register credentials into over 30

different PACS head end products

• Provides strong one-, two- or three-factor authentication

at the door

• Verify cardholders identities and check the cards’

revocation status

• Revalidate the harvested certificates after registration

and suspend the card in the PACS if the certificate is

found to have been revoked

• Via a PAM, cache validation status to deliver PKI-based

high security at the door

• Support both FIPS-201 PKI-based cards and legacy

cards ( PIV, PIV-I, CIV, CAC, TWIC, iCLASS, HID Prox

and others)

67

• Import credentials from an authoritative data source,

card management system or human resource database

and provision these credentials into the PACS

pivCLASS meets FIPS 140 U.S. government computer

security standards that specify requirements for cryptography

modules.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.hidglobal.com/government/piv

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

HID Global’s pivCLASS Government Solutions portfolio

is an extensive product family that makes it easy

for U.S. Federal Government, government contractors

and other facilities to comply with security regulations

and to use their Personal Identity Verification (PIV)

card and other smart cards for physical access control,

resulting in compliance, interoperability and high

security.

New pivCLASS credentials: http://www.hidglobal.

com/products/cards-and-credentials/pivclass/

pivclass-smart-card

New MultiPACS: http://www.hidglobal.com/products/software/pivclass/pivclass-multipacs

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

HID Global

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

Leah Washington: (917) 701-7601

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

lwashington@hidglobal.com


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

government agency awards

69

70

Roster of 2014 Winners

GSN Interview with Distinguished Judge of 2014 Awards,

K. Denise Rucker Krepp

74

76

78

80

82

84

86

88

90

92

94

96

98

100

Winning entries reproduced with permission of:

Los Angeles International Airport (LAX)

NAFTOPORT LTD

Port Freeport

NJ Transit

Denver Regional Transportation District

U.S. Army Garrison (USAG)

Northern Command/Norad

South Bend, Indiana Police Department

City of Philadelphia, PA

Community Safety Glasgow, Scotland

New York State Criminal Justice (DCTS)

Center for Homeland Defense and Security

U.S. Customs and Border Protection

Government Security News

68


Winners in the 2014

Homeland Security Awards Program

government agency awards

Most Notable Airport/Aviation

Security Program

Los Angeles International Airport – Platinum Winner

Most Notable Maritime/Seaport

Security Program

Port of Charleston – Platinum Winner

Naftoport Ltd, Gdańsk, Poland – Gold Winner

Port Freeport – Silver Winner

Most Notable Railroad/Mass Transit

Security Program

NJ Transit – Gold Winner

Denver Regional Transportation District – Silver Winner

Most Notable Emergency Response

Implementation – Federal, State or Local

Northern Command/NORAD – Platinum Winner

375th Security Forces Squadron – Gold Winner

Most Notable

Municipal/County Security Program

South Bend, Indiana Police Department – Platinum Winner

City of Philadelphia, PA – Gold Winner

Community Safety Glasgow, Scotland – Gold Winner

Orange County, CA Court System – Silver Winner

Most Notable State Government

Security Program

New York State Criminal Justice (DCTS) – Gold Winner

Most Notable

Critical Infrastructure Program

U.S. Army Garrison – Silver Winner

Most Notable Federal Government

Security Program

Center for Homeland Defense and Security – Platinum Winner

Pentagon Force Protection Agency – Platinum Winner

U.S. Customs and Border Protection – Platinum Winner

69


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

GSN INTERVIEW

K. Denise Rucker Krepp, Distinguished Judge,

GSN 2014 Homeland Security Awards Program

Denise Krepp is a homeland security and transportation consultant who began her

career as an active duty Coast Guard officer. After September 11, 2001, Denise was a

member of the team that created the Transportation Security Administration and the

U.S. Department of Homeland Security. Denise then worked for the House of Representatives’

Homeland Security Committee and advised members on homeland defense,

maritime security, and critical infrastructure issues. She also served as Maritime

Administration Chief Counsel during the first Obama administration. In addition to

consulting, Denise is currently a professor at Pennsylvania State University; serves on the Board of Directors

for The Infrastructure Security Partnership; is a commentator on Backroom Politics, a weekly radio show;

and an Advisory Neighborhood Commissioner, a local elected position in Washington, DC.

GSN: What should the Department of

Homeland Security focus on in the next

ten years?

KDRK: DHS should redefine its definition of transportation

“stakeholder” and increase stakeholder involvement

in the development of security plans and training exercises.

Currently, stakeholders are defined as owners and

operators. For example, freight and passenger rail stakeholders

in Washington, DC are limited to Amtrak, CSX,

Norfolk Southern, Washington Metropolitan Transit Authority

(WMATA), DC Homeland Security and Emergency

Management Agency, DC Department of Transportation,

etc. Individuals who live and work next to the highways

and rail lines that cut through the city are not included.

Excluding local individuals from the definition

of stakeholder means that they are not involved in the

development of federal policies. When the federal government

develops new regulations and initiatives, it seeks

input from the government coordinating councils (GCCs)

and sector coordinating councils (SCCs). The GCCs are

comprised of federal and state agencies. The SCCs are

comprised of owners and operators. There is no one at

the table representing the individuals that live and work

along transportation routes.

Local neighbor representation is critical because

these individuals are the ones that will be immediately

impacted when an accident occurred. In 2013, forty-seven

people died when a train derailed in Lac-Megantic, Cana-

70


da. A similar accident could occur in the United States but

neighbors along freight rail routes aren’t being formally

consulted about ways to improve rail safety and security.

The lack of stakeholder involvement in rail security

plans was highlighted in a Council of the District of

Columbia hearing last year. According to the Washington

Post, neighbors testified that they weren’t notified about

the hazardous materials that are being routinely transported

through the community. Local DC officials stated that

they couldn’t share the data because it is sensitive information.

At the same time, DC officials testified that they

hadn’t conducted rail emergency exercises in several

years. In addition, local officials also testified that they

needed to update rail vulnerability assessments. The

problem with these answers is that the Implementing Recommendations

of the 9/11 Commission Act requires rail

carriers to submit rail security plans to DHS for review and

DHS is supposed to consult local officials when reviewing

these plans. If local authorities don’t have an up-to-date

list of vulnerabilities, how is DHS supposed to know if the

security plans are adequate?

Broadening the definition of transportation stakeholder

to include local individuals who live and work next

to transportation lines will ensure that local agencies are

providing quality input. Neighbors know the area, they

will be on-scene when the accident occurs, and including

them in the planning stages will help post-incident

recovery. Additionally, neighborhood involvement will put

pressure on local agencies to maintain accurate risk assessment

information.

Please note that the situation in Washington, DC

is not an anomaly. Neighbors around the country are

expressing similar concerns and DHS should take the opportunity

to change its processes.

As an elected local official, what guidance

can you give to your fellow officials about

working with the Department of Homeland

Security?

KDRK: Local officials have jurisdiction over local agencies

so its important to know what is happening at the

local level before contacting DHS. In DC, there are significant

problems within the DC Homeland Security and

Emergency Management Agency and the DC Department

of Transportation. The rail hearings last year highlighted

appalling dis-functionality and as a result, Councilmembers

Cheh, Allen, and Grosso introduced legislation last

week that will significantly strengthen rail security in the

city.

One important aspect of the proposed DC legislation

is increased local oversight over the federal rail security

plans. The legislation requires local agencies to review

them. This requirement is already in the 9/11 Act but by

introducing legislation, local elected officials are sending

a strong signal to local agencies that they must comply

this requirement. The requirement to submit semi-annual

reports to the DC Council also reinforces this message.

When the DC Council receives the semi-annual reports,

they should work with political appointees in DHS

to address local concerns. From personal past experience,

relying on local agencies and career federal officials to

solve problems won’t work. Local elected officials have the

71


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

GSN INTERVIEW

K. Denise Rucker Krepp, Distinguished Judge,GSN 2014 Homeland Security Awards Program

positional authority to overcome bureaucratic stumbling

blocks and they should use it to best address the needs of

their constituencies.

What keeps you up at night?

KDRK: Mass transit security in Washington, DC. Eight

years ago, the 9/11 Act mandated mass transit security

plans. These requirements were put in place after the

horrific London and Madrid bombings. I’m concerned that

the Washington, DC plan isn’t sufficient.

On January 12th, one individual died and seventy

more were sent to hospitals when smoke filled a WMATA

subway tunnel. It took almost 45 minutes for firefighters

to begin evacuating stranded passengers. During these

crucial minutes, riders had to depend on one another to

survive. If properly drafted and implemented, the 9/11 Act

mass transit security plan should have prevented this type

of delay.

I have personal knowledge about the vulnerabilities

that continue to exist for handicapped passengers.

Last spring, my nine year old daughter and I were forced

to evacuate a WMATA subway train. We were in the last car

and as such, we had to walk through all of the cars to get

out. One of the individuals in the car with us was in a motorized

wheel chair. The wheel chair could fit through the

regular door openings but it couldn’t fit through the doors

between the rail cars. This design flaw meant that someone

would have to carry the handicapped gentleman out

of the train. None of my fellow passengers did. Instead, he

was forced to stay behind while my daughter and I went in

search of a WMATA representative to help him. There was

no fire that day but what would have happened if there

had been one. Based on what happened on the January

12th, I’m not confident he would have survived.

72


GSN Announces the 2015

Airport/Seaport/Boarder Security Awards Program

GSN’s second annual awards program recognizing excellence in Airport/Aviation Security,

Maritime/Port Security and Border Security will open for entries on Monday, March 2, 2015.

The updated 2015 edition of this exciting program will once again cover basic technology

groups, including Access Control/Identification, Detection Solutions, Air/Land and Sea

Communications and Surveillance, Integrated Security Programs and Aviation/Maritime

and Border Security Human Resource Development.

In addition to the staples of Cargo Screening, Thermal Nightvision, Integrated Harbor

Security and Perimeter Protection, you can expect many new categories in Satellite

Communications, Aviation and Military Beacons and Air Traffic Control – plus new categories

recommended by knowledgable vendors or outstanding operators or security teams.

The last group of entries will once again be dedicated to the following three categories:

* Most Notable Airport Security Program, Project or Overall Security Initiative

* Most Notable Seaport Security Program, Project or Overall Security Upgrade

* Most Notable Border Security Program, Project or Overall Security Initiative

AIRPORT | SEAPORT | BORDER

SECURITY

AWARDS PROGRAM

43 73


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

Los Angeles International Airport

(LAX) – 2014 Platinum Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Airport/Aviation Security Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

LAX Enterprise Geographical Information System

(EGIS) Web application

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Los Angeles International Airport (LAX) is one of the

busiest airports in the world. As such, it has invested

heavily in technology, deploying new solutions to

strengthen its safety, security, and operations. Keeping

things running smoothly hinges on real-time collaboration

and coordination, so LAX sought a faster and more

efficient method for various stakeholders within the

Airport Response Coordination Center (ARCC) and field

operations to share information.

LAX recently deployed an innovative new situational

awareness tool that does exactly that. The airport has

implemented the NICE Situator Enterprise Geographical

Information System (EGIS), a web application that

extends situation management capabilities from the

control room to the field. The solution, jointly devel-

oped by NICE and AECOM, provides real-time information

about all aspects of the airport to airport operations

field staff, the ARCC, and other airport officials, creating

a shared environment for managing incidents as well as

promoting collaboration and coordination. The system

handles security, safety, and operations, including everything

from emergency response to ensuring compliance

with federal regulations.

The Web application uses the sophisticated geospatial

and mapping capabilities of Esri’s ArcGIS Server to

provide customized, layered views of airport buildings,

property and infrastructure. All relevant incident stakeholders

can visualize the same incident on a map and

74


engage in interactive dialogue via the comments log,

enabling better communicate as events unfold. They can

also share response plans, even an evacuation route, by

drawing on the map, annotating it, and saving it to the

system.

Field personnel can also immediately pull up assets in

an impact zone – for instance, a video camera within

100 feet of the incident – or use the application’s robust

search engine to search for nearby geospatial assets,

like the exits closest to an incident location. They can

also create new incidents, manage ongoing ones and

complete specific tasks assigned to them, which reduces

reliance on radio communications and enhances compliance.

The Web application is also helping field operators more

efficiently manage day-to-day tasks, such as Federal Aviation

Administration-mandated Part 139 airfield inspections.

Under Federal Aviation Regulations Part 139, United

States commercial service airports are required to

conduct various assessments of each runway; examine

pavement markings, lighting, signs and safety areas; and

oversee ground vehicle operations. If an issue arises,

field operators can easily create a new incident on their

mobile devices, which is resolved through Situator’s

workflows and recorded for compliance purposes.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.lawa.org/welcomelax.aspx

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.nice.com/lax-extends-incident-management-field-operations-nice-situator-webapplication

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

News story: http://mobileenterprise.edgl.com/

news/LAX-Ups-Situational-Awareness,-Mobilizing-Operations97734

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Linda Haelsen, Marketing Communications Manager

NICE Systems

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(203) 481-4168

“The NICE-AECOM solution is allowing us to transform

the way we manage safety, security, and operations at

LAX,” said Dominic Nessi, Deputy Executive Director/

Chief Information Officer at Los Angeles World Airports.

Based on our ongoing success with NICE Situator, we

sought a way to apply these capabilities to our field

operations. Now, not only are we able to maximize the

use of our existing PSIM, situation management and GIS

technologies, we are strengthening our entire security

and operations apparatus.”

75

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

linda.haelsen@nice.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

461 From Road

Paramus NJ 07652

USA


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

Naftoport Ltd, Gdańsk, Poland –

2014 Gold Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Maritime/Seaport Security Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Naftoport Port Security Initiative

Reason this entry deserves to win:

–––––––––––––––––––––––––––––––––––––––– and sensors for detection and physical security. This

Naftoport is the only crude oil and liquid fuels terminal

in Poland. It performs transhipments of crude oil and

refined oil products in the Port of Gdańsk. The company

is a critical part of the petroleum supply chain for Polish

and German refineries and crude oil transit from Russia

and Kazakhstan to the ports of Western Europe, the

United States and the Far East.

Due to Naftoport’s close proximity to Poland’s border

and the nature of its activities, the port has heightened

security needs that include the threat of terrorist and

activist attacks as well as unauthorized entry into the

Naftoport facility.

As a result of expansion over the years Naftoport had a

large number of non-integrated legacy security systems

caused problems with the speed of reaction with each

operator having to act manually to play back incidents

in order to find out what took place.

The primary purpose of this project was to integrate

these siloed security systems and sensors, so that security

officers could more effectively track and analyze

information and respond to threats in real time. Naftoport

also wanted to empower security operators with

the ability to respond to events consistently, regardless

of their experience or capabilities.

The port has successfully deployed NICE Situator PSIM

and NiceVision VMS with intrusion detection video analytics

to protect its critical resources. “Our new video

analytics greatly increases facility security. We’ve achieved

our goal of being able to reliably detect intruders inside

76


the perimeter,” said Cezary Jozwiak, Chief Security

Officer – Port Facilities Security Officer, Naftoport.

integrates all of our security systems and processes,” he

continued. “It has made us much more efficient.”

NICE’s advanced situation management solution, NICE

Situator, offers a single, centralized interface and automated,

adaptive workflows that are helping port authorities

respond quicker and more efficiently to unfolding

incidents.

Working together, NICE and system integrator ISM EuroCenter

S.A. leveraged PSIM to integrate nine security

systems for enhanced situational awareness. These

included: NiceVision intrusion detection analytics, surveillance

cameras, radar, intruder and hold up alarms,

passive infrared, ACS, GPS and automatic identification

systems. Even sonar is being fed into Situator to detect

intrusions from underwater. “Through our NICE Situator

PSIM solution, we were able to successfully integrate

nine security subsystems working in parallel, with mutual

correlation and dedicated procedures,” explained

Jozwiak.

The NICE solutions are also being used by Naftoport

to optimize day-to-day security operations, minimize

downtime and ensure operations continuity. Roughly 40

procedures have been automated through Situator.

“Integrating our disparate security systems within NICE

Situator has made our security team more efficient,

effective, and agile by automating response processes

and administration,” said Jozwiak. “It gives them a single

operating platform through which they can proactively

monitor, manage, and maintain the safety and security

of the port, reduce risks and improve incident management.”

“It has simplified our operations because our security

operator is now able to interact with one interface that

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.naftoport.pl/en/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Press release: http://www.nice.com/naftoportprotects-global-petroleum-supply-chain-nicesecurity-solutions

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

Naftoport video: https://www.youtube.com/

watch?v=lkyQoodVYiY

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Linda Haelsen, Marketing Communications Manager

NICE Systems

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(203) 481-4168

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

linda.haelsen@nice.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

461 From Road

Paramus NJ 07652

USA

77


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

Port Freeport –

2014 Silver Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Maritime/Seaport Security Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Smart Safety & Security Alerts - Port Freeport

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Give staff the power to hit a duress button on their personal

smart phone or tablet in case of emergency. This

allows for emergency personnel to immediately find

your location via GPS tracking and share your emergency

event with other management personnel. The

personnel at Freeport have referred to this as the “get

me out of here” button where help is just one touch

away – highlighting the importance of safeguarding all

employees both remote and on-site. Push notifications

on the smart application allow for reliable and speedy

delivery times. No data-plan necessary.

Specifically, Port Freeport utilizes:

• Mobile Duress Buttons & Field Reporting, with GPS,

for 50 Key Staff Members.

• Push Notifications, SMS text, Email, & Phone calls

for 100 Users.

• Field reporting of incidents from smart apps

• Accountability of staff by location and status.

• Web-based & Smart App-based alert publishing for 6

Operators.

• 1-888-GO-ATHOC 24/7 support

• Fully hosted service

78


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.portfreeport.com/about.htm

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Fully integrated crisis communication capabilities for

public safety –

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.pdfio.net/k-46504532.html

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (801) 373-7888

cell: (801) 361-4610

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

sherriw@connectmarketing.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

881 West State Street, #140-102

Pleasant Grove, UT 84062

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Sherri Walkenhorst, Senior Partner

Connect Marketing

79


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

NJ TRANSIT –

2014 Gold Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Railroad/Mass Transit Security Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

NJ TRANSIT Integrated Mobile App

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Video surveillance cameras can’t be everywhere, but

people can. By extending an Integrated Mobile App to

its field personnel for daily use and to transit ambassadors

for large events, NJ TRANSIT is deploying innovative

technology to ensure the highest levels of security,

safety, operational efficiency and customer service for

its passengers. It’s a model in mobile technology innovation

that other transit agencies will surely want to

emulate.

NJ TRANSIT is the nation’s largest statewide public

transportation system providing more than 915,900

weekday trips on 262 bus routes, three light rail lines,

12 commuter rail lines and through Access Link paratransit

service. It is the third largest transit system in the

country with 165 rail stations, 62 light rail stations and

more than 19,000 bus stops linking major points in New

Jersey, New York and Philadelphia.

The Mobile App solution, created for NJ TRANSIT by

NICE Systems and CloudScann, turns smartphones into

reporting tools to document incidents as they happen,

allowing officials to act faster to resolve them.

The solution combines NICE’s situation management

solution, Situator, with CloudScann’s hosted See It Send

It Mobile App. By using the app on their smartphones,

field personnel can report incidents, including sending

video and photos, to a centralized command center

through NICE Situator. Communication is bi-directional,

so Situator can also push incident alerts, task lists, and

links to live video feeds to the Mobile App. This will

extend the real-time awareness of safety, security, and

operational issues for the largest statewide public transportation

system in the U.S.

Situator pinpoints the GPS location of the sender’s

80


phone or TETRA radio as the incident location, and

can then pull up video feeds from nearby surveillance

cameras. The command center operator immediately

sees who’s sending the alert, where it originated, what’s

happening, and what actions to take. The App is also

equipped with a panic button.

NJ TRANSIT used the solution for the first time during

Super Bowl XLVII to streamline communications

between the command center and NJ TRANSIT ambassadors.

In addition to reporting incidents, ambassadors

were able to use the App to look up

schedules and other information to assist

passengers. Following the successful

Super Bowl rollout, NJ TRANSIT plans

to deploy the solution during other

major events.

NJ TRANSIT will also extend the Ambassador Mobile

App to its maintenance, customer service and transit

police personnel. For example, maintenance staff will

be able to view assigned work orders, their location,

and related video, and report back to the control room

when resolution is complete.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.njtransit.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.nice.com/situation-management/

nice-situator http://www.cloudscann.com/

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

Refers to NJ TRANSIT Ambassador Program:

http://njtransit.com/AR/files/assets/basic-html/

page7.html

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Linda Haelsen, Marketing Communications Manager

NICE Systems

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(203) 481-4168

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

linda.haelsen@nice.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

461 From Road

Paramus NJ 07652

USA

81


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

Denver Regional Transportation

District – 2014 Silver Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Railroad/Mass Transit Security Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Denver RTD Mobile Video Surveillance Initiative

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The Denver Regional Transportation District (RTD)

operates almost 1,100 buses, traveling over 100,000

miles and serving an average of 330,000 passengers each

day. To help keep passengers and operators safe, RTD

Transit Police rely on mobile video cameras installed

on RTD’s bus fleet. Video is a vital tool for investigating

crime, claims, ADA complaints and other incidents that

occur in transit.

Unfortunately, RTD’s older analog video system had a

30% failure rate. Even when the cameras were working,

poor quality video sometimes made it difficult to reliably

identify people or understand what really happened.

The cameras also recorded to an analog digital video

recorder (DVR) on the bus. This meant that every time

video was needed for an investigation, a technician

would need to drive to the assigned bus division and

pull the hard drive to physically retrieve video.

Given that RTD does thousands of investigations annually,

this was a significant problem. Working with partners

NICE Systems and Panasonic, RTD came up with an

innovative solution. The result was a high-quality digital

video system that enabled RTD to download video wirelessly

off a bus, so investigators could access it without

leaving their desks. The first

of a kind mobile video surveillance

solution uses NiceVision

software. The NICE software

runs on hardware from Panasonic

Corporation and includes

specialty cameras and

a mobile recording platform

specially designed to withstand

vibration and weather

extremes.

RTD has already retrofitted

250 new buses, and over the

course of the next three years,

plans to retrofit about 800

82


more buses with the innovative mobile video solution.

What makes the solution unique is that it automatically

downloads video via Wi-Fi whenever a bus pulls into a

depot, passenger concourse, or RTD facility.

The new system also gives RTD Transit Police investigators

high definition video, which was not available before.

RTD redesigned the camera layouts, and the new system

can support up to nine cameras.

But the biggest benefit, given the thousands of investigations

RTD does annually, is the ability to access the video

remotely through the NICE Inform solution. Instead

of going to the depot to manually remove hard drives,

investigators can just type in the bus number, date, and

time range into Inform. When the bus pulls into the

depot and connects with Wi-Fi, the video download

process automatically starts. The mobile video recordings

can also be combined with radio recordings, and

fixed surveillance video to create a complete incident

timeline. RTD can also email case file links to other law

enforcement agencies involved in an investigation.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.rtd-denver.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.nice.com/nice-provides-denverregional-transportation-district-mobile-videorecording-and-investigation-solut

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

News story: http://www.securityinfowatch.com/

article/11375266/nice-systems-provides-enhanced-mobile-surveillance-capabilities-to

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Linda Haelsen, Marketing Communications Manager

NICE Systems

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(203) 481-4168

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

linda.haelsen@nice.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

461 From Road

Paramus NJ 07652

USA

83


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

U.S. Army Garrison (USAG) in Bavaria –

2014 Silver Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Critical Infrastructure Protection Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Bavaria Interagency Deployment

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Founded in 1999, AtHoc pioneered interactive crisis

communication. Today, the company protects millions

of people around the world – including more than 75%

of U.S. Military and Homeland Security personnel, as

well as leading corporations and universities.

The U.S. Army Garrison (USAG) in Bavaria provides protection

to those in their community by utilizing AtHoc’s

product. The USAG Bavaria strives to provide a quick,

effective response to crisis in order to ensure the security

of their infrastructure. They recognize that emergencies

do not occur in isolation, and that efficient communication

with the greater community is paramount in assuring

the safety of the community in times of crisis. However,

the Garrison had previously encountered many

problems as it attempted to establish an effective way

to communicate within a community of organizations

that covers 180 miles. It lacked the efficiency to communicate

between organizations, without having to alert

external points of contact, in order to distribute alerts

internally. In addition, USAG Bavaria was challenged

with the prospect of maintaining an up-to-date list of

inter-organizational contacts, gathering them manually,

a time consuming task at the very least.

USAG Bavaria uses AtHoc’s cross-agency communication

system or “Connect” to connect its numerous organizations

via cloud. With this system in place, the commander

responsible for safety and security will now be able

to invite 13 tenant commands and components (such

as the DoD school system, Morale Welfare and Recreation

facilities, NATO schools, USO), as well as off-site

but contiguous affected organizations, to join a secure

network of communication in which the tenants will

“connect” with the host command. This allows them to

communicate directly with all desired organizations and

external contacts in times of crisis, without the timeconsuming

task of relaying the alerts to key contacts in

other organizations. Additionally, each organization has

the ability to enter and manage their own personnel’s

data. All of this allows USAGA Bavaria to communicate

effectively and efficiently between their organizations,

and ultimately, within their entire community.

84


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.grafenwoehr.army.mil/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www2.athoc.com/connect

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

No media coverage yet. It hasn’t officially launched.

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Sherri Walkenhorst, Senior Partner

Connect Marketing

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (801) 373-7888

cell: (801) 361-4610

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

sherriw@connectmarketing.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

881 West State Street, #140-102

Pleasant Grove, UT 84062

85


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

Northern Command/NORAD –

2014 Platinum Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Emergency Response Implementation –

Federal/State or Local

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Northern Command / NORAD Enterprise MNS

Network Alert System

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

For the first time in the existence of Northern Command

/ NORAD, the entire command is now retro fitted with

network alerting to protect over 25,000 personnel. The

system selected enables emergency operators to alert all

25,000 personnel in ‘less than one minute’. The system

is also integrated with the National Weather Service

using the Common Alerting Protocol. During a severe

weather event, all targeted personnel are alerted automatically

without operator assistance in less than

one minute. The system also integrates with the base

on-premise phone system.

With a single mouse click, in seconds personnel are

reached by e-mail alerts, desktop popups, text messages,

phone calls and mobile apps. The implementation has

augmented emergency response capability substantially

and was recently reviewed and lauded by Maj. Gen. Jack

Briggs, currently the Director of Operations for Headquarters

U.S Northern Command, Peterson Air Force

Base, Colorado.

86


The implementation of the Desktop Alert MNS enables

interagency communication during an emergent domestic

event between the following US 1st in line 1st

Responders:

• FEMA HQ- ALL LOCATIONS NATIONWIDE (58K

personnel)

• ARMY AND AIR NATIONAL GUARD NATIONWIDE

(500+K personnel)

• NORTHERM COMMAND / NORAD (25K personnel)

• U.S. Defense Threat Reduction Agency (DTRA)

(10k Personnel)

• U.S. Army Special Operations Command at

Fort Bragg

• AFDW Pentagon (confidential)

The improved ability to attain actionable intelligence

across all of these agencies in less than one minute

during an emergent event provides immense dividends

to the safety and protection of the homeland.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.northcom.mil/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.prweb.com/releases/NORAD/

NORTHERNCOMMAND/prweb9115614.htm

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.northcom.mil/Portals/28/Documents/IA%20CND%20(33-141).pdf

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Howard Ryan, CEO

Desktop Alert Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(973) 580-3447

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

howard@desktopalert.net

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

Desktop Alert Inc.

346 Main Street

Chatham, NJ 07928

87


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

South Bend, Indiana Police Dept. –

2014 Platinum Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Municipal/County Security Program,

Project or Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

ShotSpotter in South Bend, Indiana

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

South Bend PD wrestled with how to best control an

increasing amount of gunfire activity to reduce crime

and make the community safe. To combat this problem,

it implemented SST’s ShotSpotter technology SST. Now,

police are alerted in seconds of authenticated gunfire

incidents, and given location data pinpointed and reliable

to within 25 meters – saving a tremendous amount

of time responding. This time could be the difference

that could save a victim’s life and greatly increases its

chances of apprehending the perpetrator. After the first

nine months of using SpotShotter, Chief Teachman has

seen significant improvements in South Bend. First, the

number of 911 calls in the hotspot area has increased

from approximately 8% to 25%. This is a tremendous

help to officers as the addition of citizen’s reporting

helps bolster the effectiveness of SpotShotter in solving

crime. Secondly, South Bend has seen an increase in evidence

collection from just 5% of the 911 gunfire calls to

50% of those calls when accompanied by a ShotSpotter

alert. Thirdly, the summer season usually has the most

incidents of gun activity in all cities, and in South Bend

the past summer saw a marked decrease by some 38%

from the average of the four years prior. Responding officers’

safety is also improved as they can be better prepared

when arriving on the scene knowing the number

of gunshots, the locations of each, and the movement of

the suspect or suspects.

88


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.southbendpolice.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

www.shotspotter.com

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

www.shotspotter.com

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Lisa Hendrickson, PR Consultant

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (516) 767-8390

cell: (516) 643-1642

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

lisa@lchcommunications.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

SST

7979 Gateway Blvd,Suite 210

Newark, CA 94560-1156

89


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

Cit y of Philadelphia, PA –

2014 Gold Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Municipal/County Security Program,

Project or Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Department of Parks and Recreation Video Surveillance

Initiative

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Committed to its young people, the City of Philadelphia

operates recreation centers all over the city that serve

as gathering places for the community and venues for

after-school activities including sports and the arts. To

ensure the safety of those using the recreation centers,

the City has installed hundreds of Hikvision cameras.

Pedro Pinto, the city’s Chief Engineer, and Susan

Slawson, Deputy Commissioner of Parks and Recreation,

worked closely with Fidelity Alarm and Arora Engineers,

Inc. to design a total security solution including IP cam-

eras, NVRs, and VMS software by Hikvision.

The highly scalable system allows for a link into a central

management system, and can remain intact as existing

infrastructure is gradually upgraded. This flexibility

ensures longevity of the video surveillance solution and

ensures that the Department of Parks and Recreation is

prepared for future upgrades as circumstances require.

Since the cameras have been installed, incidents of

vandalism, loitering, and burglaries have decreased, and

the range of the cameras is so broad they can even cover

the surrounding streets, offering support to the Philadelphia

Police Department.

“Fun Safe Philly Summer,” the slogan for Philadelphia’s

Summer 2014 initiative that offered free and low-cost

summer activities to Philadelphia residents, may well be

shortened to “Fun Safe Philly,” as the City has pledged

to include video surveillance systems across all 140 rec

centers by 2016.

90


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.phila.gov/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

N/A

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://us.sourcesecurity.com/news/articles/co-

3425-ga.15124.html

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Anna Boudinot, Content Manager

Hikvision USA

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (909) 612-9034

cell: (323) 470-7772

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

anna.boudinot@hikvisionusa.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

Hikvision USA

908 Canada Court

City of Industry, CA 91748

91


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

Communit y Safet y Glasgow, Scotland –

2014 Gold Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Municipal/County Security Program,

Project or Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Community Safety Glasgow Initiative

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The Glasgow Operations Center is a state of the art facility

that integrates a range of pivotal services designed

to ensure the safety and security of the City. The Center

is leading the way both nationally and internationally

in redefining service delivery for the public and private

sectors. The Glasgow security initiative involved the colocation

of services, multi-agency functionality, tracking,

monitoring and dispatching of assets in real time. These

factors, along with the collection of intelligence, were

all driving principles throughout the project.

The Operation Center combines Public Space CCTV,

Security for the City council’s museums, art galleries,

schools, as well as Traffic Management and Police Intelligence.

Integration of council services and Police Scotland

enables a seamless approach as part of a smart city

92

management strategy.

NICE Systems was chosen as

the technology partner for

this project for its innovative

PSIM solution (NICE Situator),

Video Management System

(NiceVision) and cutting

edge Video Analytics (NICE

Suspect Search). The resulting

intuitive and scalable

technology platform uses NICE’s market leading PSIM

solution to integrate multiple fragmented systems into a

single user interface.

The project has delivered:

• Cutting edge technology including intelligent

detection video analytics

• Renewal of 500 cameras to HD

• Asset management, monitoring and dispatch

• A swifter, safer system for handling images and

integration of data


• Live vehicle streaming of CCTV

• Secure sharing of data for effective intelligent

management of security

“Our operators can pull up and display 10 – 500

images, seamlessly from across our integrated camera

network,” said Kalim Uddin, Operations Manager at the

Glasgow Operations Center. “You can never replace an

operator, but what we can do is to make the operator a

lot more efficient, and we have achieved that with this

project. The new functions we have facilitate ease of

access to a much broader suite of cameras, communication

with key partners, tracking of individuals, and the

ability to look at incidents from a traffic point of view.”

“Community Safety Glasgow’s vision, combined with

the latest technology from NICE Systems, makes the

Glasgow Operations Center the most advanced Safe City

control room in the UK,” said Philip Walker, Managing

Director of Community Safety Glasgow. “Technology

is the future for smart cities in terms of delivering

better and more effective services and Glasgow is a

benchmark and a role model for other cities around

the world. Working in partnership with NICE we were

able to address a broad spectrum of safety and security

requirements across the city of Glasgow. What’s more,

the solution can be further scaled in the coming months

and years to help us further improve city services and

bolster crime prevention.”

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.saferglasgow.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Glasgow Case Study video: http://www.nice.com/

nice-situator-video-case-study-communitysafety-glasgow

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Linda Haelsen, Marketing Communications Manager

NICE Systems

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(203) 481-4168

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

linda.haelsen@nice.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

461 From Road

Paramus NJ 07652

USA

Through this initiative, Glasgow has demonstrated how

a Smart City Operations Center can look and function.

In fact, the operation center served the strategic hub

and Tactical command for City Operations during the

“best Commonwealth Games ever” this year in Glasgow.

The Center is also future proofed to add functions such

as intelligent lighting and flood prevention as part of

Glasgow’s future city program.

93


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

New York State Criminal Justice

(DCTS) – 2014 Gold Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable State Government Security Program/

Project or Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

New York State Division of Criminal Justice Services

(DCJS) – Crime Analysis Centers

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The New York State Division of Criminal Justice Services

(DCJS) organized the N.Y. Crime Analysis Centers in

order to assist law enforcement efforts to target, solve

and prevent crime, enhance public safety and build safe

communities.

The purpose of the Crime Analysis Centers – and the

technology deployed--is to aid in the reduction of

violent and property crimes and to promote safe communities.

The establishment of Crime Analysis Centers

combined with powerful search and analytic tools

provides a powerful new platform for intelligence-based

policing and inter-jurisdictional cooperation. With the

impetus created by this project, information sharing has

become a policy, not an informal practice.

This program connects the data sources previously not

available or primarily used separately by police departments

and law enforcement; 64 agencies now participate

in data sharing across the Centers’ communities. It promotes

greater success in crime prevention, deterrence

and officer safety by providing nearly all-source information

access and analysis.

The centers support the work of nearly 90 crime analysts

throughout the state – analysts who are responsible for

the strategic, tactical and administrative management of

law-enforcement data to serve nearly six million New

Yorkers in the participating counties.

Since the centers launched in 2009, total incidents in

94


these communities are down by 12%, and violent crime

is down by 11%.

But the outcomes go far beyond numbers as the state of

New York has greatly augmented the overall sophistication

of its public safety presence.

The Centers use a customized browser-based search

tool, called Digital Information Gateway (DIG), designed

for investigative agencies to quickly compile

information on a single subject from all sources. It deploys

DIG and other solutions at the centers to pursue

intelligence-led policing, which is grounded in principles

of risk assessment, pattern analysis, community visibility

and continuous improvement. For New York, this

drills down into the three core components of incident

prevention: description (identifying what the problems

are), prediction (determining when and where they’ll

happen) and prescription (coming up with strategies

and tactics to deter crime).

With regard to solving (and closing) cases, here’s just

a small sampling of both quantitative and anecdotal

highlights:

in the state of Virginia. DIG and other center re

sources were able to help police conclude that the

suspect was on his way back to Virginia on a Grey

hound bus. Police stopped the bus in Rochester and

detained the suspect, who confessed to the murder.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.criminaljustice.ny.gov/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

N/A

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

N/A

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Claudia Berth, Product Marketing Manager, Analytics

Raytheon Cyber Products

• Since the DIG implementation, DCJS has reported

a 300 percent gain in efficiency with respect to the

time it takes to gather all information sought for a

person of interest in a case.

• In Syracuse, DIG has helped analysts cross-reference

large lists of pawn shops with incident reports,

resulting in the successful recovery of stolen property

in 47 investigations since Jan. 1, 2013 – and the

majority of those cases have produced arrests.

• In Buffalo, DIG played a lead role in the capture

of a suspect in a stabbing death. It flagged a series

of domestic incidents between the suspect and the

victim, and revealed that he had an arrest record

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(703) 537-7565

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

cberth@trustedcs.com

(backup - evan@w2comm.com)

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

12950 Worldgate Drive, Suite 600

Herndon, VA 20170

95


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

Center for Homeland Defense &

Securit y – 2014 Platinum Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Federal Government Security Program/

Project or Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Center for Homeland Defense & Security (CHDS)

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The Center for Homeland Defense and Security (CHDS)

is located at the Naval Postgraduate School (NPS) in

Monterey, California. Since 2002, CHDS has conducted

a wide range of graduate-level educational programs focused

on assisting homeland security leaders to address

current and emerging threats to the nation’s security.

The programs are developed in partnership with and

are sponsored by the National Preparedness Directorate,

FEMA.

CHDS consistently develops critical thinkers who

implement their education within their agencies. Unlike

other graduate institutions, CHDS only accepts applicants

who are in a position to impart change and are

capable of forming new partnerships and reevaluating

their organization’s strategies and policies. The success

of CHDS is realized through the student, alumni, and

program involvement in national events such as the

Oso, Washington, landslide, the Washington, D.C., Navy

Yard shooting, and the Boston Marathon bombing. The

CHDS fingerprint is seen in the response to these types

of events through critical thinking, cross-disciplinary

knowledge, and multi-agency relationships cultivated by

CHDS.

The CHDS Master’s degree program is the first of its

kind, having been established as the first accredited

homeland security degree program in the U.S. Students

are selected from a pool of highly qualified candidates

representing a diversified group of homeland security

disciplines. Courses are taught by faculty and SMEs who

administer a constantly evolving curriculum in the form

of classroom discussions, projects, and network-based

learning. Students develop theses that are directly applicable

to the problems and challenges of their respective

organizations.

As the definition of homeland security has expanded, so

too has CHDS course offerings. The Executive Leaders

Program (ELP) connects senior local, state, tribal,

territorial, federal, and private sector leaders to create

96


elationships across jurisdictional and disciplinary lines.

An outgrowth of the ELP program called the Pacific

Executive Leaders Program (PELP) was designed to

meet homeland security challenges in the Pacific region.

Lastly, the Fusion Center Leaders Program (FCLP) was

created to enhance practices of fusion center leaders to

collect, analyze and distribute information pertaining to

crime and terrorism related activities.

CHDS has led homeland security education through numerous

additional initiatives. The University and Agency

Partnership Initiative Program (UAPI) freely shares the

Center’s programs and resources with educational institutions

nationwide. This “multiplier effect” has created

a network of over 300 partner institutions and expands

the Center’s academic programs beyond the institution

and across the nation. Additionally, CHDS has conducted

280 Mobile Education Team (MET) seminars, which

are tailored to senior leadership at state and local levels

to address homeland security challenges unique to their

jurisdictions.

While not a large institution, CHDS has a profound

national influence on homeland security education

with minimal operational overhead. Its overall reach

includes 700 Master’s alumni, 450 ELP alumni, 10,500

MET program participants, 12,000 Self Study program

participants, 338 UAPI partners, and 136,000 Homeland

Security Digital Library documents to date.

97

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.chds.us/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

https://www.youtube.com/watch?v=-6TbDti-

FacQ

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.boston.com/news/nation/washington/articles/2005/05/01/in_war_on_terrorism_

us_government_finds_allies_on_campus/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Heather Issvoran,

Director of Strategic Communications

CHDS

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (831) 656-2003

cell: (831) 402-4672

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

hissvora@nps.edu

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

1 University Circle

Building 220, Room 64

Monterey, CA 93943


GSN 2014 Digital Yearbook of Homeland Security Awards Recipients

Government Agency Awards

U.S. Customs and Border Protection

2014 Platinum Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Federal Government Security Program/

Project or Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Securing America’s Borders: The Non-Intrusive

Inspection (NII) Systems Program, Southwestern Ports

of Entry

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

There are many challenges to CBP’s mission of securing

America’s borders, including smuggling of drugs, currency,

weapons, ammunition, illegal goods, and humans.

The Southwestern border is extremely difficult to

protect, 2,000 miles long and one of the world’s busiest

borders, with more than 5 million trucks and 166 million

people crossing each year*. Drug trafficking organizations

pose a grave threat to border security, as Mexico is

the source and/or transit country for heroin and most of

the cocaine, marijuana, and methamphetamine illegally

imported into the U.S. Those same organizations also

attempt to smuggle currency and weapons back into

Mexico.

To address these threats, CBP has implemented a

layered security strategy which involves thousands

of personnel, canine teams, and air/maritime/remote

surveillance, and state-of-the-art detection technology.

One component, the Non-Intrusive Inspection (NII)

Systems Program, utilizes advanced inspection technology

to more effectively screen conveyances/cargo while

improving processing time. As of 2013, 310 large-scale

NII systems were deployed on U.S. borders.** Many NII

systems are deployed along the Southwestern border,

including 26 Z Portal ® cargo and vehicle inspection

systems and 61 Z Backscatter ® Van (ZBV ® ) mobile cargo

and vehicle inspection systems, both manufactured by

American Science and Engineering, Inc. (AS&E).

In order to bolster its detection capabilities without

98


impeding the flow of legal traffic, CBP added Z Portals

to the Southwestern border starting in 2011. The NII

Program Office worked closely with the Interdiction

Technology Office to ensure an efficient, well-managed

project, averaging one deployment per month. Both the

Z Portal and ZBV systems have proven very successful,

expediting operations and using low-energy Z Backscatter

technology to quickly detect organic materials (e.g.

explosives, drugs, currency, etc.). By expanding NII

operations to include more Z Portal systems, CBP can

now inspect cars much more rapidly, enabling scanning

of almost 100% of cars designated for secondary inspection.

“[Z Portal/ZBV technology] has been a tremendously

effective tool for us in identifying and seizing additional

illicit drugs … [The Z Portal/ZBV systems] are more

efficient because they work faster and they have a lower

energy level that allows us to put more vehicles through

them … we have been able to benefit from an improving

continual technology.”***

Notable Z Portal/ZBV detections along the Southwestern

border include: $1.1 million of heroin inside an SUV’s

hidden compartment; more than $900,000 of cocaine

hidden in a truck bed; and more than $500,000 (656

lbs) of marijuana concealed in the floor and bed area of

a pickup truck.

Overall, the NII Systems Program has had a significant

impact on the detection of drugs, currency, and weapons

along the Southwestern border. For example, during

FY 2009-12, CBP seized 71% more currency, 39% more

drugs, and 189% more weapons along the Southwestern

Border than FY 2006-8.**

* U.S. Department of Transportation, Research and Innovative

Technology Administration, Bureau of Transportation Statistics

**CBP testimony to the House Committee on Homeland Security,

Subcommittee on Border and Maritime Security, 2/26/2013

***CBP testimony to the House Committee on Homeland Security,

Subcommittee on Border and Maritime Security, 3/20/2013

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.cbp.gov/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.cbp.gov/border-security/portsentry

http://www.cbp.gov/sites/default/files/

documents/z_portal_2.pdf

Link to Web page or Document with independent

media coverage, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.as-e.com/uploads/media/CBP_Z_

Portal_and_ZBV_Seizures_2014.pdf

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Laura Berman

Vice President, Corporate Communications

AS&E

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

(978) 262-8700

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

lberman@as-e.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

American Science and Engineering, Inc.

829 Middlesex Turnpike

Billerica, MA 01821

99


The News Leader in Physical, IT and Homeland Security

Publisher:

Michael Madsen

(O) 212-344-0759, X1

(C) 732-233-8119

mmadsen@gsnmagazine.com

Executive Editor:

John Wagley

(O) 212-344-0759, X2

(C) 202-425-0196

wagley.jr@gmail.com

Senior Writer:

Lorrie Barclay

(O) 212-344-0759, X5

(C) 508-685-0652

lorriebarclay@gmail.com

Columnist:

John Convy

Convy on Netcentric Security

john@convyassociates.com

Columnist:

John Romanowich

Romanowich on Video Surveillance

jromanowich@sightloxic.com

Guest Expert Contributor:

Denise Rucker Krepp

(C) 202-546-2533

kdrkrepp@hotmail.com

Art Director:

Gerry O’Hara

OHDesign3

(C) 203-249-0626

gerry@ohd3.com

Production/Design Specialist:

Brenden Hitt

(C) 315-723-6203

brenden@ihitt.com

Editorial Director/CEO:

Adrian Courtenay

(O) 212-344-0759, X3

(C) 917-696-5782

acourtenay@gsnmagazine.com

Mailing Address:

Government Security News

P.O. Box 7608

Greenwich, CT 06836

Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address

changes to GSN: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government

decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received

GSN: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and

foreign subscribers are charged $140 International Airmail. Copyright 2015 by GSN: Government Security News. All rights reserved.

Printed in the U.S.A. GSN: Government Security News assumes resonsibility for validity of claims in items reported.

100

More magazines by this user
Similar magazines