21.01.2016 Views

The GSN 2015 Digital Yearbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>The</strong> <strong>GSN</strong><br />

<strong>2015</strong> <strong>Digital</strong> <strong>Yearbook</strong><br />

OF<br />

Airport/Seaport/<br />

Border Security Awards<br />

AND<br />

Homeland Security Awards


MEET THE SPONSORS<br />

AppGuard uses prevention to keep cyberattacks from<br />

harming businesses, government agencies<br />

When it comes to handling cyberattacks, a small Virginia-based<br />

company offers an innovative solution that<br />

borrows from an old adage: an ounce of prevention is<br />

worth a pound of cure.<br />

Blue Ridge Networks has been in the cybersecurity<br />

business for more than 15 years, offering its solutions<br />

to government agencies and businesses. Its AppGuard<br />

solution enables a client’s workforce to log in – even<br />

from remote locations – and know they will not be at<br />

risk of being infiltrated or inadvertently exposing their<br />

colleagues to a hack.<br />

AppGuard stops such destructive files as malware,<br />

ransomware, weaponized documents and phishing attempts<br />

from entering a user’s system. Those are the files<br />

used by hackers through a user’s trusted applications to<br />

4<br />

launch destructive cyberattacks.<br />

“AppGuard is the only solution<br />

on the market because it is not a<br />

detection capability,” said Mike<br />

Fumai, president and chief operating<br />

officer for Blue Ridge. “We’re<br />

blocking.”<br />

Cyberattacks are not like traditional<br />

robberies where the bad<br />

guys arrive in dramatic fashion and<br />

take their loot in one fell swoop.<br />

Instead, they get small bites – or<br />

Mike Fumai<br />

President and COO<br />

Blue Ridge Networks<br />

bytes, mind you – at a time, usually when routine events<br />

like reports are generated or updates are released. As<br />

the attacks linger for weeks and months because the file<br />

has not been detected, the little things begin to add up<br />

to huge losses for the victims.<br />

In the past year, the public has become more aware<br />

of the damage hackers can wreak. Millions of customers<br />

were affected by the attacks on such companies as<br />

Anthem, Home Depot and Target. In Target’s case, it was<br />

only discovered after customers called their banks and<br />

credit card companies to complain about fraudulent


purchases, Fumai said. And the government was hit hard<br />

too, as the Office for Personnel Management reported<br />

that attacks made the records for millions of federal<br />

workers and contractors vulnerable.<br />

“It’ll take a generation before we find out what the<br />

effects of OPM will be,” said Fumai, who has worked for<br />

more than 25 years in the communications and technology<br />

industries.<br />

And the attacks will only become more sophisticated<br />

in the future, according to industry experts, as the hackers<br />

find ways to infiltrate without leaving a trace or<br />

signature behind.<br />

“Past infections always deposited a small binary<br />

somewhere on disk, but the newest evasion techniques<br />

used by fileless malware—Kovter,<br />

Powelike, and XswKit, for<br />

example—leave no trace on<br />

disk, thus making detection,<br />

which generally relies on<br />

static files on disk, more difficult,”<br />

McAfee Labs wrote in its<br />

threats report last November.<br />

This is where AppGuard<br />

becomes very useful, Fumai<br />

said. <strong>The</strong>re is no need to<br />

try and detect malware that<br />

might not have any signature or binary present because<br />

AppGuard prevents the first stage attack so malware<br />

will never get its foothold in the enterprise. That ability<br />

makes the solution very attractive to Blue Ridge’s<br />

partners and clients.<br />

“AppGuard is American Cyber’s ONLY solution for<br />

zero-day malware prevention, as well as the easiest and<br />

most cost-effective malware protection available,” said<br />

Gary Winkler, president of American Cyber and a former<br />

program executive officer with the U.S. Army. “It simply<br />

5<br />

prevents any malware from executing, without needing<br />

to know what the malware is, and then AppGuard<br />

reports the details of the attempt. AppGuard has absolutely<br />

no impact to system/application performance or<br />

user experience. It should be part of the Army’s Gold<br />

Master configuration for every end-point.”<br />

AOL serves as another partner for Blue Ridge. <strong>The</strong><br />

multimedia company offers its subscribers, which were<br />

more than 2 million last year, AOL Tech Fortress. <strong>The</strong><br />

service uses AppGuard to block viruses and other suspicious<br />

files from harming a<br />

user’s computer.<br />

AppGuard does not just<br />

prevent attacks, Fumai said.<br />

Its proactive defense keeps<br />

clients from having to spend<br />

millions – or more – of dollars<br />

to assess the impact of a<br />

breech, to make repairs and to cover liabilities from<br />

the attack. That means corporate clients can invest<br />

more in research and development and public<br />

sector agencies can be better stewards of taxpayer<br />

funds.<br />

And Blue Ridge is working on new ways to protect<br />

its clients. Fumai noted the company is working<br />

an “Internet of Things” guard that would secure<br />

various cloud networks, including those run by Amazon<br />

and Microsoft. This would allow any networked device<br />

to be protected from attack.<br />

“IoT Guard will be able to secure whatever clouds<br />

they’re working at the same time with multiple devices,”<br />

Fumai said. “This will not break the IT or compliance<br />

standards already established. We don’t break things.<br />

We’re just an overlay.”


ABOUT THE <strong>GSN</strong> AWARDS PROGRAMS<br />

<strong>The</strong> Government Security News Awards Programs, first appearing in 2009, were organized<br />

to honor the distinguished vendors of IT, Physical and Integrated security solutions, and<br />

the dedicated officials in federal, state, county and municipal government whose combined<br />

efforts protect us from all threats.<br />

<strong>The</strong> <strong>2015</strong> <strong>Yearbook</strong> covers the results of two <strong>GSN</strong> awards programs – the <strong>GSN</strong> <strong>2015</strong><br />

Airport, Seaport, Border Security Awards and the <strong>GSN</strong> <strong>2015</strong> Homeland Security Awards.<br />

We are also please to honor the vendors and officials of other nations that have chosen to<br />

participant in this year’s programs, often with prize-winning entries.<br />

In our humble opinion, the technological advances from vendors and the ever-more<br />

sophisticated programs and strategies of government agencies are mind-boggling in their<br />

excellence. We hope you’ll find our awards programs to be interesting and informative.<br />

We know you’ll find them to be very reassuring!<br />

Adrian Courtenay, CEO/Editorial Director<br />

Government Security News<br />

6


TABLE OF CONTENTS<br />

4<br />

6<br />

7<br />

8<br />

12<br />

60<br />

122<br />

Message from <strong>2015</strong> Awards Sponsor<br />

About the <strong>GSN</strong> Awards Programs<br />

Table of Contents<br />

Interview with Chuck Brooks, Distinguished Judge, <strong>2015</strong> <strong>GSN</strong> Awards Program<br />

Winners in <strong>2015</strong> Airport, Seaport, Border Security Awards Program<br />

Winners in <strong>2015</strong> Homeland Security Awards Program<br />

Government Security News, <strong>The</strong> News Leader in IT, Physical and Homeland Security<br />

7


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY<br />

and<br />

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />

<strong>GSN</strong> INTERVIEW<br />

Chuck Brooks, Distinguished Judge<br />

<strong>GSN</strong> <strong>2015</strong> Homeland Security and<br />

Airport, Seaport, Border Security Awards programs<br />

<strong>GSN</strong>: What are your general thoughts on the<br />

<strong>2015</strong> awards?<br />

CB: For me it was a real pleasure judging this year’s<br />

annual Homeland Security and Airport, Seaport, Border<br />

Security Awards programs. <strong>The</strong> submissions this year<br />

were frankly quite amazing. <strong>The</strong> capabilities and technical<br />

merits of the IT and Physical security products/solutions<br />

of all the vendors made it especially difficult to judge. In<br />

my opinion they were all winners because they are leading<br />

technological contributors to the current and future<br />

security of our nation. It is good to know that very talented<br />

people in industry and government are continually<br />

designing and upgrading security solutions to fill gaps as<br />

adversaries are becoming more hostile and sophisticated.<br />

<strong>GSN</strong>: You spent many years on Capitol Hill and<br />

also at the Department of Homeland Security.<br />

As we head into 2016, what do you envision as<br />

homeland security spending priorities?<br />

CB: Macro spending will increase across the board on<br />

homeland security products and services In accordance<br />

to the new threats we are especially facing from ISIS and<br />

from other terrorist actors, and global instabilities. This<br />

was reflected in the recent passage of the 2016 omnibus<br />

spending Bill recently passed by Congress by Congress.<br />

<strong>The</strong> bill provides DHS with $40.96 billion, which is an<br />

increase of $1.33 billion over the fiscal year <strong>2015</strong> enacted<br />

levels. It included increased funding levels for Customs<br />

and Border Protection, Immigration and Customs Enforcement<br />

and for DHS Cybersecurity programs in the DHS<br />

8


National Programs and Protection Directorate.<br />

Global spending also parallels the DHS spending raise.<br />

A new market research report, “Global Homeland Security<br />

and Emergency Management Market, 2013–2018”,<br />

published by MarketsandMarkets is expected to reach<br />

$544.02 Billion by 2018. Unfortunately, those numbers<br />

could go even higher if there are more incidents similar to<br />

what happened in Paris, Mali, and San Bernardino, CA.<br />

<strong>GSN</strong>: What area/issue pending trends do you<br />

see as priorities for the homeland security<br />

community?<br />

CB: Counterterrorism and the counter CBRNE (chemical<br />

, biological, Radiological, Nuclear, and Explosive) mission<br />

will always be fundamental to homeland planning and<br />

spending. Those are the most catastrophic threats. In<br />

addition to CBRNE DHS has assumed more and more of a<br />

leadership role in cybersecurity derived from both Presidential<br />

mandates and congressional legislation.<br />

Cybersecurity is indeed a top priority as government agencies<br />

and mega corporations experience more data breaches<br />

with each passing year. I recently published an article<br />

in <strong>The</strong> Federal Times on Key homeland security priorities<br />

to watch in 2016 (http://www.federaltimes.com/story/<br />

government/dhs/blog/<strong>2015</strong>/12/15/key-homeland-securitypriorities-watch-2016/77368604/)<br />

My thoughts in regards<br />

to cybersecurity verbatim:<br />

“<strong>The</strong> <strong>2015</strong> DHS budget directed more than $1.25 billion<br />

to cybersecurity and that trend will continue in 2016.<br />

Cybersecurity and IT have moved to the forefront since<br />

DHS’s inception as we have become a more interconnected<br />

world. New legislation pending in Congress formalizes<br />

the increased DHS role in public/private partnering.<br />

New legislation also would update the 12-year-old Federal<br />

Information Security Management Act (FISMA) and delineate<br />

DHS’s role in guarding government networks and<br />

websites.<br />

A priority for 2016 will be to accelerate rollout of<br />

Einstein III Accelerated (E3A), the latest phase of DHS’s<br />

automated network-security correcting systems. DHS has<br />

established memoranda of agreement with 55 federal<br />

agencies to implement Einstein to provide horizon scanning<br />

and automated monitoring, detection, and remediation<br />

of government networks. DHS is also planning for<br />

new cyber technologies that provide advanced defense of<br />

network framework layers, including authentication, better<br />

encryption, biometrics, and data analytical tools”.<br />

<strong>GSN</strong>: What future areas of homeland security<br />

interest would you advise companies to explore?<br />

CB: <strong>The</strong> key word really is “future” and it is already<br />

around the corner with the Internet of Things (IoT).<br />

Recently both the FBI and DHS issued warnings about IoT<br />

and pending threats. <strong>The</strong> reality is that we have become<br />

immersed in a new digital era comprised of more than 50<br />

billion interfaced devices. Anything connected is vulnerable.<br />

Expect significant investments in smart cities, smart<br />

homes, smart businesses, and smart governments in the<br />

next decade. For the security community this conveys<br />

opportunities in developing and integrating new sensors<br />

for threat detection, surveillance, predictive data analytics,<br />

Continued on next page<br />

9


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY<br />

and<br />

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />

<strong>GSN</strong> INTERVIEW<br />

Chuck Brooks, Distinguished Judge<br />

<strong>GSN</strong> <strong>2015</strong> Homeland Security and Airport, Seaport, Border Security Awards programs<br />

biometrics, interoperable communications, and geo-mapping<br />

(to name a few). Also, the implications for forensics,<br />

including cyber-forensics are evident and will be a real<br />

growth industry for law enforcement and industry. It is<br />

interesting to note that DHS’s Science & Directory Directorate<br />

recently announced that it is seeking to help fund<br />

small businesses who may have innovative IoT technologies<br />

to help the homeland security mission.<br />

Crime Mapping<br />

<strong>GSN</strong>: Can you tell us about your new role at<br />

Sutherland Government Solutions?<br />

CB: I serve as the Vice President for Government Relations<br />

& Marketing for Sutherland Government Solutions<br />

(SGSI). I lead the Federal and State & Local Government<br />

relations activities and I am also responsible for the Marketing<br />

portfolio (Media, PR, <strong>Digital</strong> Outreach, Thought<br />

Leadership, Strategic Partnering, Branding) for the Federal<br />

and State & Local markets. SGSI is a recognized provider<br />

of business process and technology management services<br />

for the public sector. <strong>The</strong> company also offers integrated<br />

portfolios of analytics-driven back-office and citizen facing<br />

solutions that support entire government missions. I am<br />

also an Advisor to the Bill and Melinda Gates Technology<br />

Partner network, and serve as Vice Chairman of CompTIA’s<br />

New & Emerging Technology Committee.<br />

For those who are active on social media, I also run<br />

two of the most influential homeland security groups on<br />

LinkedIn –“U.S. Department of Homeland Security” and<br />

“Homeland Security” that have combined membership of<br />

over 50,000 members. Please look them up and join!<br />

Thanks and Happy, Healthy, Prosperous, and Safe 2016<br />

to all of Government Security News readers!<br />

Chuck can be reached at:<br />

Charles.brooks@sutherlandglobal.com<br />

On Twitter: @ChuckDBrooks<br />

Linkedin Profile: http://www.linkedin.com/in/chuckbrooks<br />

10


11


<strong>The</strong> <strong>GSN</strong> <strong>2015</strong><br />

Airport/Seaport/<br />

Border Security Awards


Winners in the <strong>2015</strong><br />

Airport/Seaport/Border Security Awards Program<br />

Best Access Control/Identification<br />

Best Biometric Identification Solution<br />

Crossmatch – Winner<br />

Best ePassport Solution<br />

Securiport – Winner<br />

Best Physical/Logical<br />

Priviledged Access Solution<br />

Honeywell Security – Winner<br />

STANLEY Access Technologies – Winner<br />

Best Detection Solutions<br />

Best Cargo/Vehicle Screening<br />

Advanced Detection Technology, LLC – Winner<br />

Best Explosives/Narcotics/Contraband<br />

Detection<br />

SureScan Corporation – Winner<br />

Best Nuclear/Radiation Detection<br />

Rapiscan Systems – Winner<br />

Best Communications Solutions<br />

Best MOB Tracking and/or Wrist Devices<br />

PureTech Systems – Winner<br />

Best Mass Notification System<br />

LRAD Corporation – Winner<br />

Best Acoustic Hailing Service<br />

LRAD Corporation – Winner<br />

Best Surveillance Systems<br />

Best Coastal Surveillance Solution<br />

TCOM, LP – Winner<br />

Best Video Analytics/Intrusion Detection<br />

Honeywell Security – Winner<br />

Best Long-Range/Day-Night Surveillance<br />

CohuHD Costar – Winner<br />

Best Perimeter Protection, Fencing,<br />

Gates, Guard Booths<br />

Best Fencing, Barriers, Bollards, Gates<br />

Betafence USA – Winner<br />

Tilt-A-WAy – Winner<br />

Best Guard Service, Facility Protection Service<br />

Global Elite Group – Winner<br />

Best Integrated Security Programs<br />

Best Physical Security Information<br />

Management System - PSIM<br />

Network Harbor, Inc. – Winner<br />

Honeywell Security – Winner<br />

Best Integrated Harbor Security Program<br />

Emergency Response Technology, LLC – Winner<br />

13


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Crossmatch<br />

<strong>2015</strong> Winner<br />

Best Access Control/Identification<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Biometric Identification Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Crossmatch<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Crossmatch is a world leader in biometric identity<br />

management solutions. With deployments in over 80<br />

countries worldwide, Crossmatch biometric capture<br />

devices are used daily to identify individuals and authenticate<br />

claimed identities. Our latest compact, mobile,<br />

handheld solution, the Verifier ® Sentry, is a highly flexible<br />

Android-based device designed to rapidly identify/<br />

authenticate an individual using their fingerprint or<br />

secure credential, such as contact and contactless cards.<br />

<strong>The</strong> handheld enables government and enterprise<br />

personnel to perform identity and credential checks and<br />

initiate workflows anywhere, anytime. Incorporating a<br />

FAP30 fingerprint sensor, the Verifier Sentry captures<br />

more data points than FAP10 sensors found in many<br />

mobile devices. This is imperative when matching an<br />

unknown subject’s fingerprint to a backend database or<br />

watchlist. A March 2014 report from the National Institute<br />

of Standards and Technology (NIST)* states FAP10<br />

submissions fail to identify their target approximately<br />

twice as often as FAP20 or FAP30 – a situation that could<br />

lead to missed apprehensions, compromised safety, denied<br />

benefits or unauthorized access in commercial or<br />

government use cases. While FAP10 may be sufficient on<br />

personal devices or one-to-one matching of a cooperative<br />

subject, a FAP30 is the best solution for identifying<br />

unknown or uncooperative persons. <strong>The</strong> Verifier Sentry<br />

is offered with <strong>Digital</strong>Persona ® Commander, a mobile<br />

device management tool that provides the secure communications<br />

tunnel to the handheld and remote matching<br />

databases, protecting data integrity and personal<br />

14


Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.crossmatch.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.crossmatch.com/verifier-sentry/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

John Hinmon, Vice President, Worldwide Marketing<br />

Crossmatch<br />

privacy. Match requests from multiple Verifier Sentry<br />

devices are aggregated by the secure server-based Commander<br />

application for centralized administration and<br />

submission to one or more matching databases. Administrators<br />

using Commander have the ability to efficiently<br />

manage and configure deployed devices and perform<br />

watchlist management tasks. <strong>The</strong>y can also locate, lock<br />

or even wipe Verifier Sentry devices in the field, as well<br />

as control who logs in and at what times.<br />

Solution Benefits:<br />

• Listed on FBI Approved Products List<br />

• Superior FAP30 PIV certified fingerprint sensor<br />

• Ergonomic one-handed operation<br />

• Wide range of supported credentials, including PIV,<br />

and PIV derivatives such as CAC, TWIC, and FRAC and<br />

RFID cards.<br />

• PIV specified facial image capture<br />

• Wireless (Wi-Fi, Bluetooth, 3G GSM)<br />

• On-device matching for autonomous operation<br />

• Centralized administration capabilities via <strong>Digital</strong>Persona<br />

Commander Reference:<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 561-493-7401<br />

cell: 561-346-5862<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

john.hinmon@crossmatch.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

3950 RCA Boulevard, Suite 5001<br />

Palm Beach Gardens, FL 33410<br />

* NIST IR 7950<br />

15


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Securiport<br />

<strong>2015</strong> Winner<br />

Best Access Control/Identification<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best ePassport Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Securiport<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Securiport’s innovative eVisa Solutions Provide a Faster,<br />

Smarter, Safer Way To Travel, Benefitting Tourism and<br />

Local Economies In today’s globalized world, international<br />

travel is essential to business success. Trade<br />

and tourism depend on safe and efficient immigration<br />

controls. However, terrorism, identity theft and human<br />

trafficking pose grave risks to border security. Securiport<br />

solves border security challenges with innovative<br />

technology solutions that keep citizens and travelers<br />

safe. At Securiport, we leverage cutting-edge ultrasound<br />

biometric technologies and advanced data analytics<br />

tools to provide authorities with the knowledge and<br />

assurance to ensure order and efficiency across transnational<br />

borders. With solutions currently in place across<br />

dozens of countries around the world, and a dedicated<br />

team of professionals developing innovative tools to<br />

meet emerging challenges, Securiport is the global<br />

leader in intelligent immigration controls solutions.<br />

Securiport’s innovative eVisa Solutions Provide a<br />

Faster, Smarter, Safer Way To Travel, Benefitting<br />

Tourism and Local Economies<br />

Section 1 – Introduction to Visa Challenges A visa is an<br />

official mark or stamp on a passport that allows someone<br />

to enter or leave a country usually for a particular<br />

reason [1] . Historically, immigration officials would<br />

grant a visa when a visitor arrived in a foreign country,<br />

but today, a traveler wishing to enter another country<br />

must apply for a visa in advance. This causes numerous<br />

16


challenges for both civilians and government officials<br />

all over the world. <strong>The</strong> first obvious disadvantage of<br />

applying for or issuing a visa is the time required to<br />

process the application. Under normal circumstances,<br />

a traveler seeking to apply for a visa would need to<br />

fill out the necessary paperwork and then either mail<br />

or hand deliver the paperwork to the desired nation’s<br />

local embassy or consulate. After this time-consuming<br />

procedure, the embassy will process the documents<br />

and then mail the visa back to the applicant if approved.<br />

As a result, the life cycle of receiving a visa could take<br />

anywhere from two weeks to two months. This can be<br />

very costly and time consuming for immigration officials<br />

and can cause problems if a traveler needs to apply for a<br />

visa last minute. Another obstacle travelers and officials<br />

face is the lack of infrastructure and personnel available.<br />

Many developing nations are simply not equipped with<br />

the proper personnel, technology and infrastructure<br />

needed to issue these documents in a timely and efficient<br />

manner without compromising safety or security.<br />

Long queues build up at immigration desks at airports,<br />

embassies and consulates, further increasing the document<br />

process time. This increased workload for the immigration<br />

staff can hinder their ability to work efficiently<br />

and securely. Governments should look to improve<br />

their immigration processes, starting with the system for<br />

issuing visas. Many of the challenges caused by the visa<br />

application process can be overcome by simply transitioning<br />

to an electronic visa system, which streamlines<br />

the process and ensures accountability for both governments<br />

and travelers. By transitioning to an electronic<br />

visa system, governments will improve and ease the process<br />

of applying for a visa, which can lead to a multitude<br />

of benefits for the country. For example, a country such<br />

as Honduras could benefit greatly from implementing<br />

an electronic visa system. Honduras, located in Central<br />

America, is home to some of the world’s best beaches,<br />

coral reefs and diving locations in addition to the world<br />

famous Mayan city of Copan and Rio Platano Biosphere.<br />

<strong>The</strong>se attractions make Honduras a great location for<br />

travelers who wish to experience the wonders of Central<br />

America. However, the long process for applying for a<br />

visa can be a major deterrent to tourism in the country.<br />

Just recently, the Honduran government has made<br />

tourism a national priority, believing that the tourism<br />

industry will not only benefit the country by stimulating<br />

the economy, but also by strengthening the national<br />

identity, increasing development and providing Hondurans<br />

with a higher standard of living. By implementing<br />

an electronic visa system, like Securiport’s eVisa Management<br />

System, countries, such as Honduras, could<br />

save time and money by operating more efficiently to<br />

improve the way they communicate and engage with<br />

citizens. By addressing key challenges and streamlining<br />

the process it takes to apply and receive a visa, the<br />

number of total visa applications and number of visitors<br />

will inevitably increase, improving revenue generated<br />

from tourism. Government officials, business travelers,<br />

and tourists alike will benefit from a more convenient<br />

and efficient visa application process.<br />

Section 2 – Features and Benefits of the eVisa System<br />

Securiport’s eVisa Management System is a modern,<br />

comprehensive ICAO-compliant system that provides<br />

travelers with a quick, convenient and completely<br />

secure way to apply for a visa. It can be easily integrated<br />

and deployed to preexisting visa procedures and systems<br />

such as national centers and consulates, providing<br />

immediate support to immigration officials. Securiport’s<br />

software engineers and cyber security professionals have<br />

invested a substantial amount of time and resources<br />

into developing an absolutely secure system. When dealing<br />

with such sensitive information, it is imperative that<br />

proper research and precautions regarding security are<br />

taken. Securiport’s advanced proprietary systems and<br />

Continued on next page<br />

17


superior cyber security methods ensure that both travelers<br />

and government officials can use the eVisa Management<br />

System with full confidence. <strong>The</strong> system provides<br />

travelers with a secure application portal, which can<br />

be accessed at any time of day from virtually anywhere<br />

in the world via a web browser. This innovative system<br />

provides a multitude of benefits for both travelers and<br />

governments by providing an alternate method of applying<br />

for a visa. Not only does this new, virtual application<br />

method save government officials time and money by<br />

decreasing employee workloads and reducing lines at<br />

consulates and embassies, but it allows travelers to apply<br />

for a visa up to one day before travelling. This timeframe<br />

is a massive improvement over the current, erratic<br />

method that could leave travelers waiting two months<br />

for a visa. <strong>The</strong>re are many different circumstances in<br />

which someone may need to travel without an extended<br />

notice, and this new system will allow travelers to do so<br />

with ease. <strong>The</strong> eVisa system also provides travelers with<br />

an alternate application method if they are unable to<br />

mail in or hand deliver their application to the appropriate<br />

consulate or embassy. <strong>The</strong> eVisa Management System<br />

utilizes Securiport’s secure application portal, which<br />

can be accessed from any browser-based system. This<br />

includes, but is not limited to: computers, tablets, smart<br />

phones and kiosks conveniently located at consulates,<br />

embassies and immigration checkpoints. <strong>The</strong> system<br />

includes real-time background checks and watch-list vetting<br />

against national security and INTERPOL databases<br />

for all applicants and leverages Securiport’s Intelligent<br />

Information Management System (IIMS), which creates<br />

intelligent information reports based on traveler information<br />

and statistical data. <strong>The</strong> system is linked to a central<br />

visa database through a secure Internet connection<br />

and provides governments and immigration officials<br />

with the proper data and information needed to confirm<br />

a traveler’s identity with confidence at each stage of the<br />

immigration process. <strong>The</strong> eVisa Management System<br />

also pairs perfectly with Securiport’s Integrated Immigration<br />

Control System (IICS), which empowers border<br />

management and immigration officers by utilizing<br />

advanced biometric identification systems and providing<br />

proprietary intelligent information used to identify<br />

potential security risks and criminal activity. This can be<br />

very beneficial for countries such as Honduras, who are<br />

working towards improving the country’s tourism. By<br />

integrating these advanced security solutions, countries<br />

will be communicating to the world that they are taking<br />

an active role in enhancing traveler safety by investing<br />

into advanced security solutions for immigration ports.<br />

Securiport’s eVisa Management System is more timely,<br />

cost-effective, and efficient than the current application<br />

process. By saving travelers’ time and eliminating many<br />

of the hassles associated with obtaining a visa today,<br />

the system streamlines the visa application process,<br />

and inevitably increases the amount of visitors to countries,<br />

helping international business and boosting local<br />

economies.<br />

Section 3 – Details and Applications of eVisa Technology<br />

Securiport’s eVisa Management System provides<br />

travelers with a web-based application portal that offers<br />

a quick, convenient, and secure way to apply for a visa.<br />

<strong>The</strong> system can be easily integrated and deployed to<br />

preexisting visa procedures and systems such as national<br />

centers and consulates. <strong>The</strong> traveler’s sole task is<br />

to fill out the application and submit a payment. Once<br />

an application and payment have been submitted, the<br />

applicant’s information is submitted to the IICS for<br />

background validation and vetted against IIMS Profiles<br />

to detect a Person of Interest. <strong>The</strong> applicant is compared<br />

against local watch lists, INTERPOL Notices and Stolen<br />

& Lost Travel Documents, as well as all previous traveler<br />

data. Once the applicant’s information has been processed<br />

and crosschecked, they will receive a notification<br />

depending on whether the application was approved or<br />

18


ejected. If the application is approved, an attachment<br />

will be sent with the notification that must be shown on<br />

arrival. On arrival, the Immigration Workstation Application<br />

provides the immigration official with an extremely<br />

easy-to-use interface to process the traveler. <strong>The</strong> immigration<br />

official scans the barcode of the attachment,<br />

which is then sent to the server for validation. If successfully<br />

validated, the immigration official will continue the<br />

immigration process and begin to capture the traveler’s<br />

biometric information. <strong>The</strong> biometrics are stored with<br />

the traveler’s visa and immigration record and are validated<br />

when the travelers enter or leave the country. All<br />

of the traveler data and information collected is stored<br />

securely in Securiport’s IICS servers. Travelers who<br />

arrive to a country without a visa can utilize either the<br />

automated eVisa kiosks or the eVisa Application that is<br />

integrated with the Immigration Workstation Application<br />

to submit their information, biometrics and payment. All<br />

the information submitted is sent to the IICS and IIMS<br />

servers for validation and once complete, the approved<br />

visa is printed and the traveler is directed to immigration<br />

processing. eVisa applications can also be configured<br />

to be manually approved or rejected. Once the<br />

background validation has been completed, the application<br />

is ready for manual approval or rejection via the<br />

Visa Review Application. If approved, a notification is<br />

sent to the traveler with an attachment for them to provide<br />

on arrival. If the application is rejected, a notification<br />

is sent to the traveler informing them a visa cannot<br />

be issued and to contact the embassy or consulate for<br />

guidance. If more information is needed, a notification<br />

is sent to the traveler requesting them to update their<br />

application with the specific information needed.<br />

Section 4 – Strategic Benefits to Governments With an<br />

increase in the demand for international travel in our<br />

evolving global marketplace, it is necessary to have an<br />

efficient and effective system that simplifies the visa<br />

application process. Utilizing an eVisa system such as Securiport’s<br />

eVisa Management System, governments can<br />

prevent excessive hours waiting at visa desks, reduce<br />

the workload of staff working at airports, embassies and<br />

consulates, and provide easier facilitation for tourists<br />

and business travelers. By reducing the time and money<br />

it takes to apply for and issue visas, governments can<br />

only expect to see an increase in visa applications as<br />

well as the number of visitors, tourism and foreign trade<br />

revenue. Just recently, the Turkish government launched<br />

an e-Visa application system similar to Securiport’s eVisa<br />

Management System. Just weeks after implementing the<br />

e-Visa system, the Turkish government saw an increase<br />

in visa applications, going from a weekly average of 400<br />

applications to receiving more than 1,500 in just a few<br />

days [2] . <strong>The</strong> Turkish government hopes to develop and<br />

improve Turkey’s tourism and increase foreign trade<br />

with this eVisa reformation. By utilizing Securiport’s<br />

eVisa Management System that leverages their Integrated<br />

Immigration Control System (IICS) and Intelligent<br />

Information Management System (IIMS), governments<br />

and immigration officials can equip themselves with<br />

the actionable data and information needed to confirm<br />

a traveler’s identity at ports of entry and exit as well<br />

as at each stage of the immigration process. And with<br />

dynamic configurations, government officials can issue<br />

and manage any number of visa types required by their<br />

country.<br />

Section 5 – Summary and Conclusion Governments can<br />

derive great benefit from updating visa and immigration<br />

processes to leverage new technology that provides<br />

enhanced security and improved efficiency. Currently,<br />

the visa application process takes time, money and<br />

a high workload of the staff at airports, immigration<br />

checkpoints, embassies and consulates. Additionally, the<br />

time constraints of the current application process create<br />

multiple challenges and roadblocks for travelers who<br />

Continued on next page<br />

19


may need to apply for a visa very quickly. Securiport’s<br />

eVisa Management System can help governments, such<br />

as Honduras, better serve citizens and solve these challenges.<br />

By transitioning to an eVisa Management System,<br />

governments will be able to provide travelers with a<br />

quick and convenient way to apply for a visa and initiate<br />

their travel to the country while ensuring absolute security<br />

of sensitive information. By simplifying the visa application<br />

process, governments can expect the volume<br />

of visa applications and visitors will inevitably increase,<br />

further increasing the revenue generated from tourism.<br />

In addition, by implementing these advanced security<br />

solutions, governments will be showcasing to the rest<br />

of the world that they are invested in improving their<br />

security and immigration processes. With the ability to<br />

seamlessly integrate with preexisting visa procedures or<br />

systems, as well as Securiport’s Integrated Immigration<br />

Control System (IICS), the eVisa Management System<br />

provides governments and immigration officials with<br />

the necessary traveler data and information needed to<br />

confirm the traveler’s identity throughout the immigration<br />

process. This innovative system creates safer travels<br />

and a more secure nation that when coupled with<br />

Securiport’s IICS and IIMS; provide a complete immigration<br />

control system that is tailored to provide benefits to<br />

both travelers and governments.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.securiport.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.securiport.com/improving-travelersafety-with-advanced-security-immigrationsolutions-to-create-safer-nations/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Gal Borenstein, CEO<br />

Borenstein Group<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 703-385-8178 x28<br />

cell: 703-597-1610<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

gal@borensteingroup.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Borenstein Group, Inc.<br />

11240 Waples Mill Road Suite 420<br />

Fairfax, VA 22030<br />

20


Improving Traveler Safety with Advanced Security & Immigration Solutions to Create Safer Nations<br />

21


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Honeywell Security<br />

<strong>2015</strong> Winner<br />

Best Access Control/Identification<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical/Logical Priviledged Access Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Pro-Watch 4.2<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In high-security areas like government agencies, airports<br />

and major technology companies, many people<br />

come and go throughout the premises each day. With<br />

so many people in such high-profile areas, safety is of<br />

the utmost importance. Honeywell’s Pro-Watch 4.2 is<br />

a visitor management, access control, IP-video surveillance<br />

and intrusion system that enable security personnel<br />

to quickly and easily protect people and property.<br />

Designed to meet the challenges of today’s demanding<br />

environments, the Pro-Watch security management suite<br />

provides the flexibility, scalability and control required<br />

for comprehensive security management. Pro-Watch is<br />

fully compatible with a wide range of biometric readers<br />

and wireless locks, including options from Allegion (AD-<br />

400 Series), Assa Abloy (Aperio line) and Salto (Sallis<br />

and SVN). Its wireless lockset technology allows security<br />

personnel to install readers in typically hard-to-reach<br />

locations. <strong>The</strong> wireless readers are also less expensive to<br />

install, allowing users to implement access control in locations<br />

that may have been previously passed-over due<br />

to costs, resulting in a more-secure facility. <strong>The</strong> openplatform<br />

system makes it possible for security personnel<br />

to leverage existing hardware as the system expands.<br />

This allows users to save time and money as they upgrade<br />

their security systems. Pro-Watch is also capable<br />

of system conversions. A drop-in board replacement<br />

for Mercury-based systems allow for easy transitions<br />

from legacy readers and access equipment over to the<br />

updated platform without replacing existing hardware.<br />

Pro-Watch also lets security personnel access and man-<br />

22


age the system from any computer. <strong>The</strong> Pro-Watch Web<br />

Client uses existing network infrastructure to provide<br />

remote security management for badging, reporting<br />

and alarm and event monitoring. This flexible security<br />

management allows security personnel to provide<br />

remote security management across buildings, across<br />

campuses and even across the country to governmental<br />

sites like border controls. Pro-Watch is compatible with<br />

Honeywell’s Vindicator ® Intrusion Detection systems<br />

–commonly used at high-profile, critical infrastructure<br />

government sites – and gives users control of intrusion,<br />

access control and video surveillance systems through<br />

one common interface. By equipping buildings systems<br />

with Pro-Watch 4.2, time and money, which were previously<br />

allocated to repairs and software upgrades, can be<br />

eradicated. From airport campuses to government agencies,<br />

Pro-Watch 4.2 gives security managers the advanced<br />

security management platform they need to protect<br />

their premises from any security threat.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellsecurity.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellintegrated.com/products/<br />

integrated-security/sms/7757...<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Solveig Hommema, Assistant Account Executive<br />

Weber Shandwick<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 952-346-6050<br />

cell: 612-501-0949<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

shommema@webershandwick.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8000 Norman Center Drive, Suite 400<br />

Bloomington, MN 55437<br />

23


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Best Access Control/Identification<br />

STANLEY Access Technologies<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical/Logical Priviledged Access Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

4900 ASR Security Revolver<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

If you want to beat a criminal, you have to think like<br />

one. That’s exactly what the STANLEY engineers and<br />

product designers did when they conceptualized the<br />

4900 ASR Security Revolver. To bring our vision to<br />

life, we pulled together unparalleled industry-leading<br />

technology that ultimately created the new standard of<br />

secure entryways, allowing our customers a safe environment<br />

and peace of mind. <strong>The</strong> 4900 ASR provides<br />

anti-tailgating and optional anti-piggybacking detection<br />

through the use of Time-of-Flight (TOF) technology.<br />

This anti-piggybacking detection is achieved through the<br />

self-contained infrared light sources and camera capturing<br />

the reflected light. An internal processor measures<br />

the time of reflected light and creates a depth image<br />

to analyze the objects within the revolving door. This<br />

allows the built-in processor to determine if one or two<br />

persons have entered into the security revolving door.<br />

<strong>The</strong> processor compares the images with image stored<br />

in memory to detect security violations.<br />

FEATURES AND BENEFITS<br />

• Prevents unauthorized entry, ensures a safe and secure<br />

internal environment for employees and property<br />

• Anti-Piggybacking TOF technology detects if two<br />

people are trying to enter into the secured facility at the<br />

same time using one door quadrant with a single authorization<br />

• Anti-Tailgating - TOF technology detects if an unauthorized<br />

person or persons are trying to enter into the<br />

secured facility using an empty quadrant without a valid<br />

24


Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

StanleyAccess.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––:<br />

http://www.stanleyaccess.com/4900-automaticthree-wing<br />

authorization<br />

• TOF technology provides higher resolution and accuracy<br />

than other sensing systems and is not affected by<br />

ambient light or dark shadows and heavy dark objects<br />

(coats, carts, luggage, etc.) which can give false signals<br />

• Automatic operation, providing either one-way or<br />

two-way security options<br />

• STANLEY Rush collapsing mechanism for emergency<br />

egress from the building<br />

• PLC based programmable control integrates with all<br />

access systems<br />

• Collapsing wings release on activation of (fire) alarm<br />

(security) signal<br />

• Factory preset program provides safe, reliable door<br />

operation<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Adria Boyle, Brand Marketing Manager<br />

STANLEY Access Technologies<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (860) 679-6473<br />

cell: (860) 919-5279<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

adria.boyle@sbdinc.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Adria.Boyle@sbdinc.com<br />

25


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Best Detection Solutions<br />

Advanced Detection Technology, LLC<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Cargo/Vehicle Screening<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LowCam under-vehicle inspection systems (UVIS)<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Although there are others within our realm of manufacturing,<br />

our LowCam under-vehicle inspection systems<br />

(UVIS) are very unique in their approach to inspecting<br />

the undercarriage of incoming and outgoing vehicles.<br />

Basically, just as an overview, our UVIS technology<br />

replaces the mirrors that are commonly used when circling<br />

a vehicle and looking at the undercarriage. Instead<br />

we provide a camera system (much like CCTV) that a<br />

vehicle simply drives over, then the undercarriage image<br />

is instantly displayed on a monitor in a central control<br />

room or in a safe stand-off location for a thorough, yet<br />

quick, inspection. While other solutions available on the<br />

market offer only a black and white static, single image<br />

(imagine a photocopy), the LowCam UVIS offers not<br />

only the single image viewing, but also full-color, real-<br />

time video so that the inspecting operator can view the<br />

vehicle’s undercarriage using play, pause, zoom, fastforward<br />

and rewind - much like a CCTV camera allows<br />

in other security operations. All vehicle data - including<br />

license plate information and/or driver image - gathered<br />

by the LowCam UVIS is stored in a centralized database<br />

for future review. All facilities can easily pull historical<br />

information to inquire on who is entering or leaving<br />

their facility, and if any security measures or breaches<br />

were detected. Besides capturing license plate and<br />

driver information, the most advanced UVIS are now<br />

equipped with a video-analytical tool known as “Foreign<br />

object Detection”. This software scans quickly the approaching<br />

vehicle’s undercarriage for abnormal colors,<br />

sizes/shapes of objects and variations made to the<br />

26


Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://advanced-detection-technology.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://advanced-detection-technology.com/resources/downloads<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Candace Carpenter, Gobal Marketing Director<br />

Advanced Detection Technology<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (704) 696-0708<br />

cell: (828) 308-2580<br />

undercarriage in order to automatically highlighting and<br />

alerting (using on-screen and visual queues) the operator<br />

of the potential danger these detected items could<br />

represent. Often used in conjunction with other vehicle<br />

screening and access control devices, such as bollards,<br />

stoplights and even the larger vehicle X-Ray inspection<br />

systems, our LowCam UVIS have been battle-tested<br />

and proven globally for over 12 years. Our company is<br />

proud to serve airports, seaports and border crossings<br />

around the world!<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cancarpenter@advanced-detection.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

215-1 Overhill Drive<br />

Mooresville, NC 28117<br />

27


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

SureScan Corporation<br />

<strong>2015</strong> Winner<br />

Best Detection Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Explosives/Narcotics/Contraband Detection<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

x1000 Multi-Energy Stationary Gantry CT Explosives<br />

Detection System for Checked Baggage Screening<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

TSA Certified x1000 Multi-Energy Stationary Gantry<br />

CT Explosives Detection System for Checked Baggage<br />

Screening SureScan Corporation Brings NEW Technology<br />

to the Market, Focused on Lower Life Cycle Costs <strong>The</strong><br />

SureScan x1000 checked baggage-screening solution,<br />

is engineered and designed with innovative technology<br />

and low maintenance and lifecycle costs. Built from the<br />

ground up for checked baggage screening rather than<br />

an adaptation of medical technology, the x1000 is suited<br />

to the airport environment and designed with a baggage-handling<br />

interface in mind. Unlike a medical environment,<br />

baggage-handling areas in airports are constrained,<br />

dusty environments with operation every day,<br />

365 days a year. <strong>The</strong> x1000 is designed to install and<br />

function seamlessly in this environment. <strong>The</strong> x1000 is<br />

TSA certified and currently being utilized in Department<br />

of Homeland Security research projects and undergoing<br />

ECAC Standard 3 approval. Features include: Stationary<br />

Gantry: No moving parts, low maintenance and replacement<br />

costs Large Rectangular Tunnel throughout: Fits<br />

tall and wide baggage, preventing costly bag jams and<br />

system downtime Multi-Energy Detection: For atomic<br />

number analysis detects current and emerging threats<br />

such as home made explosives (HMEs) with a high level<br />

of accuracy and low false alarm rates Efficient Platform:<br />

Easy to set up and self-calibrates Decreased Power Usage:<br />

50 percent lower operating power consumption<br />

and simple air-cooling eliminates pricey air condition<br />

operation and fees Upgradable Processing and Algorithm<br />

Engines: Field-upgradeable options to address<br />

28


Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.surescaneds.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

TDS:http://surescaneds.com/pdf/<strong>2015</strong>0401_<br />

SSx1000TDSE.pdf; FOX NEWS REPORThttp://<br />

video.foxnews.com/v/4072808566001/new-technology-set-to-revolutio...<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Susan Cooper, Director of Marketing<br />

SureScan Corporation<br />

future requirements, such as increased belt speeds,<br />

lower false alarm rates, and future threats SureScan<br />

Corporation is an emerging leader and global company<br />

bringing advanced, explosive detection technology and<br />

superior manufacturing to the homeland security marketplace.<br />

SureScan sits firmly as a leading edge developer<br />

of security technology, providing solutions that meet<br />

the most rigorous quality and performance standards<br />

while remaining efficient and cost-effective.<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 973-830-6798<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

susan.cooper@surescaneds.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

PO Box 210, 2507 Wayne Street, Endicott, NY 13760<br />

Visit www.surescaneds.com for the full technical data<br />

sheet download and to contact us for an overview of the<br />

x1000 solution.<br />

info@surescaneds.com<br />

+1 (607) 321-0042<br />

www.surescaneds.com<br />

29


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Rapiscan Systems<br />

<strong>2015</strong> Winner<br />

Best Detection Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Nuclear/Radiation Detection<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rapiscan Systems<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rapiscan Systems, a leading provider of security screening<br />

solutions, is well known for the high quality, reliability<br />

and affordability of its solutions. With products<br />

sold into four market segments, including Baggage and<br />

Parcel Inspection, Cargo and Vehicle Inspection, Hold<br />

Baggage Screening and People Screening, the company<br />

has a solution for the most demanding threat detection<br />

situations its customers could face. An important<br />

part of Rapiscan’s product portfolio is its radiation<br />

detection product line, which addresses the need for<br />

global governments and organizations to monitor and<br />

locate radioactive threat materials that can be used in<br />

atomic weapons and dirty bombs. <strong>The</strong> product line is<br />

comprised of software and hardware based solutions<br />

for inspecting vehicles, packages and people. Radiation<br />

detection products can be used in a standalone deployment<br />

or integrated with Rapiscan’s X-ray and metalbased<br />

threat detection solutions. <strong>The</strong> newest addition to<br />

Rapiscan’s radiation detection product line is the Rapiscan<br />

MP100 Backpack Radiation Detection system. A high<br />

performance, easy to use radiation monitor combining<br />

gamma and optional neutron detection is housed in<br />

a lightweight, compact commercial backpack, making<br />

the system perfect for covert inspection situations. <strong>The</strong><br />

MP100 is ideal for supporting security operations and<br />

performing radiation surveys in a variety of markets –<br />

including critical infrastructure, customs and border<br />

control, event security, defense and law enforcement<br />

applications. All of the features required for radiation<br />

detection are integrated in the MP100 so it can be used<br />

30


as a standalone device and connected wirelessly to a<br />

Rapiscan oversight system for remote data collection<br />

and display. Using the MP100 is as easy as slipping<br />

the backpack on and walking around. Weighing just<br />

18 pounds, the MP100 is lightweight and easy to use.<br />

Additionally, the onboard battery enables 16 hours of<br />

continuous operation in a wide range of environments.<br />

<strong>The</strong> Rapiscan RadviewerTM Android app displays the<br />

operator’s current position and direction toward the<br />

radiation source. <strong>The</strong> design of the MP100’s radiation<br />

detectors provides increased directional sensitivity of<br />

the radiation detection. A radiation alarm is signaled audibly<br />

via a headphone jack on the backpack or visually<br />

via RadviewerTM. In this way, the MP100 enables users<br />

to effectively detect and locate radioactive threats. <strong>The</strong><br />

MP100 is manufactured by Rapiscan’s Radiation Detection<br />

Products division, which has supplied thousands of<br />

radiation monitors that are deployed at border crossings,<br />

seaports, airports and facilities around the world.<br />

<strong>The</strong> MP100 uses Rapiscan’s proven radiation detection<br />

technology adapted for a backpack deployment. <strong>The</strong><br />

radiation detection performance meets the requirements<br />

of ANSI N42.53. <strong>The</strong> MP100 offers customers<br />

efficient, easy to use and reliable man-portable radiation<br />

detection with high performance at an affordable cost of<br />

acquisition and operation.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.rapiscansystems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.rapiscansystems.com/en/products/<br />

radiation_detection<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Jennifer Edgerly, Senior Account Director,<br />

SpeakerBox Communications<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 703-287-7809<br />

cell: 202-486-0518<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

jedgerly@speakerboxpr.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

7900 Westpark Drive, Suite T410, McLean, VA<br />

31


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

PureTech Systems<br />

<strong>2015</strong> Winner<br />

Best Communications Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best MOB Tracking and/or Wrist Devices<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Man Overboard Detection System<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Man Overboard events continue to be a common occurrence<br />

in the cruise industry and other related markets.<br />

<strong>The</strong> problem is compounded by the fact that when<br />

these events occur the timely availability of important<br />

data is missing. Accurate confirmation of the event<br />

including time of occurrence, location on the ship and<br />

location in the sea is critical, but often unavailable for<br />

hours following an occurrence, if at all. Fortunately,<br />

proactive detection systems such as the Man Overboard<br />

Detection System from PureTech Systems, accurately<br />

detects man overboard events and provides immediate,<br />

actionable data to response personnel. We feel such a<br />

system deserves award consideration for its potential<br />

to save lives within the cruise line and ocean platform<br />

industries.<br />

ACCURATE VIDEO DETECTION<br />

<strong>The</strong> system utilizes commercially available infrared imagers<br />

combined with PureTech’s geospatial video analytics,<br />

which not only provide instant visual proof of an event,<br />

but also achieves detection rates over 99% in various<br />

ranges of sea states and weather conditions. Detection<br />

coverage encompasses the length of ship, including all<br />

passenger floor levels and is accurate for both cold and<br />

warm water cruise routes.<br />

FIELD PROVEN FOR LOW FALSE ALARMS<br />

Almost as important as detection accuracy, false alarms<br />

from weather conditions and cruise operations can minimize<br />

the effectiveness of detection systems. <strong>The</strong> Man<br />

Overboard Detection System from PureTech Systems was<br />

32


subjected to hundreds of hours of real world environmental<br />

and operational conditions on actual cruise<br />

ships and the results demonstrated accurate detection<br />

(i.e. approaching 100%) with little to no false alarms.<br />

SITUATIONALLY AWARE USER INTERFACE<br />

Use of geospatial data within the detection algorithms<br />

allows for a user interface that is easy to understand and<br />

simple to use. In situations, such as a man overboard<br />

events, providing a high level of situational awareness<br />

aids first responders in gaining a full understanding<br />

of the event as quickly as possible. This is achieved<br />

through geolocation of the alarm location, instant access<br />

to detection images, looping videos of the event, as well<br />

as audio notification. <strong>The</strong> system includes a full alarm<br />

database and video playback capability.<br />

HIGHLIGHTS<br />

• Automatic Detection of Man Overboard Events<br />

• 99%+ detection rates over wide variations in sea state<br />

and weather conditions.<br />

• Very Low False Alarm rate<br />

• Instant video validation of event for immediate action<br />

• Reporting of event latitude and longitude (i.e. location<br />

in the sea)<br />

• Fall origin guidance (i.e. location on the ship)<br />

• Alarm and Video Retention and Review<br />

• Situational presentation of incident data to decision<br />

makers<br />

• In Service Installation<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.puretechsystems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.puretechsystems.com/man-overboard-detection.html<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Eric Olson, VP of Marketing<br />

PureTech Systems,<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 602-424-9842 X112<br />

cell: 480-522-6331<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Eric.olson@PuretechSystems.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1950 W Rose Garden Lane #140<br />

Phoenix, AZ 85027<br />

33


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

LRAD Corporation<br />

<strong>2015</strong> Winner<br />

Best Communications Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Mass Notification System<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LRAD 360X<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

During large events or area emergencies, the ability<br />

to broadcast crystal clear voice messages is crucial for<br />

communicating to, and ensuring the safety of, those attending<br />

events and the public. <strong>The</strong> LRAD 360X delivers<br />

LRAD ® ’s renowned, highly intel¬ligible voice broadcasts<br />

and warning siren with uniform 360° coverage.<br />

Each lightweight, power efficient LRAD 360X emitter<br />

array broadcasts uninterrupted clear voice messages<br />

and warning sirens over a 1.3-kilometer radius. Featuring<br />

LRAD’s optimized driver and waveguide technology,<br />

LRAD 360X ONE VOICE mass notification &<br />

communication systems ensure every voice broadcast<br />

cuts through wind, engine and crowd noise, and is<br />

clearly heard and understood throughout an event or<br />

emergency. Featuring the industry’s highest level of<br />

intelligibility and quality of sound, the LRAD 360X offers<br />

true continuous activation and maintains a smooth<br />

frequency response with an intensity variation of less<br />

than 5 dB over in the range between 300 Hz and 6.5<br />

kHz. <strong>The</strong> 360X avoids audio fading and offers clear communication<br />

across all frequencies over distance. LRAD<br />

360X systems can be mounted on buildings and/or<br />

stand-alone poles, and are rugged enough to withstand<br />

up to 200 mph winds. <strong>The</strong> 360X is field upgradeable for<br />

added area coverage and features flexible power options<br />

including AC only, AC/DC for true UPS, generator, and/<br />

or solar. Single or multiple systems can be integrated<br />

for remote activation and operation via TCP/IP, satellite,<br />

GPRS/GSM, and/or redundant analog or digital radio<br />

control interface. LRAD ONE VOICE systems can be<br />

34


activated on site or remotely. LRAD 360X - Highly Intelligible<br />

Mass Notification & Communication Until recently,<br />

voice communication had been an afterthought for most<br />

mass notification systems. While high power speaker<br />

arrays sound sirens to alert of approaching danger,<br />

most are incapable of broadcasting specific information<br />

about the severity of the situation or recommended<br />

actions that could protect and save lives. LRAD 360X<br />

systems broadcast with exceptional intelligibility and<br />

vocal clarity to provide authorities ONE VOICE to communicate<br />

potentially lifesaving information over local<br />

or large areas before, during, and in the aftermath of an<br />

emergency or disaster. LRAD systems are self-contained<br />

and do not rely on external power or communication<br />

infrastructure. LRAD 360X systems and accessories have<br />

been installed in a number of Asian countries replacing<br />

and upgrading their mass notification systems to include<br />

LRAD’s highly intelligible voice capability.<br />

FEATURES<br />

• Fully ruggedized space saving 1RU amplifier modules<br />

• Low power consumption for continuous operation<br />

during extended power outages<br />

• Unparalleled vocal clarity and intelligibility<br />

• Combined P.A. and mass notification in one system<br />

• Safely alerts, communicates and calms the public during<br />

emergency situations<br />

• Audio output easily modulated<br />

• Does not require heavy equipment for installation,<br />

reducing installation costs<br />

• Comes standard with LRAD’s hardened MP3 Controller/Player<br />

for recording, storing and playing back messages,<br />

and push button system control<br />

• All-weather microphone to record and playback messages<br />

on the fly<br />

LRAD Corporation www.LRADX.com<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lradx.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lradx.com/lrad_products/lrad-360x/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

E. Brian Harvey, Director Capital Markets and Investor<br />

Relations<br />

LRAD Corporation<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 858-676-0519<br />

cell: 858-753-8974<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ebharvey@lradx.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LRAD Corporation<br />

16990 Goldentop Road, Suite A<br />

San Diego, CA 92127<br />

35


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

LRAD Corporation<br />

<strong>2015</strong> Winner<br />

Best Communications Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Acoustic Hailing Service<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LRAD ® 450XL<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> Industry’s Loudest, Most Intelligible AHD for its<br />

Size & Weight LRAD Corporation’s LRAD 450XL is the<br />

communication industry’s loudest, most intelligible<br />

acoustic hailing device (AHD) for its size and weight.<br />

Low profile, lightweight and designed for temporary<br />

or fixed mounting on tripods, vehicles and vessels, the<br />

LRAD 450XL uses an enhanced, patent pending technology<br />

to generate the audio output of a unit almost twice<br />

its size and weight with the same high level of clarity<br />

and intelligibility consistent with the LRAD product<br />

line. <strong>The</strong> LRAD 450XL is easily transported to provide a<br />

highly effective, long range communication and warning<br />

capability where required, and is rapidly being adopted<br />

for public safety and national defense applications<br />

around the world. Featuring LRAD’s optimized driver<br />

and waveguide technology, the LRAD 450XL ensures<br />

every broadcast cuts through wind, engine and background<br />

noise and is clearly heard and understood even<br />

inside vehicles and buildings. Through the use of live<br />

or pre-recorded multilingual voice messages and alert<br />

tones, LRAD systems establish large safety zones, unequivocally<br />

determine intent, favorably resolve uncertain<br />

situations and save lives on both sides of the Long<br />

Range Acoustic Device ® . <strong>The</strong> LRAD 450XL provides<br />

highly intelligible communication up to 1,700 meters<br />

and safely communicates beyond standoff distances to<br />

determine intent, create an instant acoustic standoff<br />

perimeter, and provide time for appropriate responses.<br />

<strong>The</strong> LRAD 450XL also uses variable beam width for extended<br />

coverage, providing clear, long range, directional<br />

36


communication. As part of field and special response<br />

team operations, the LRAD 450XL safely extends the<br />

perimeter in friendly or escalated environments keeping<br />

the public, law enforcement and national defense<br />

personnel out of harm’s way.<br />

<strong>The</strong> LRAD 450XL is also used to:<br />

• Communicate to large crowds during parades, festivals,<br />

concerts and sports events<br />

• Establish safety zones and humanely enforce perimeters<br />

• Control traffic congestion<br />

• Conduct SWAT operations<br />

• Disperse crowds<br />

• End hostage and barricaded subject situations<br />

• Serve high risk warrants<br />

• Extract inmates safely from cells<br />

• Secure jails, prison yards and facility perimeters<br />

• Communicate to protesters<br />

• Stop threatened suicides<br />

• Evacuate neighborhoods during emergencies and<br />

disasters<br />

• Conduct search & rescue operations from the land<br />

and air<br />

• Communicate potentially lifesaving information to<br />

affected populations throughout disasters<br />

Law enforcement agencies and first responders around<br />

the world, including over 100 U.S. cities, counties and<br />

states, are currently using LRAD systems and support<br />

equipment. LRAD Corporation www.LRADX.com<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lradx.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lradx.com/lrad_products/lrad-450xl/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

E. Brian Harvey, Director Capital Markets and Investor<br />

Relations<br />

LRAD Corporation<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 858-676-0519<br />

cell: 858-753-8974<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ebharvey@lradx.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LRAD Corporation<br />

16990 Goldentop Road, Suite A<br />

San Diego, CA 92127<br />

37


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

TCOM, LP<br />

<strong>2015</strong> Winner<br />

Best Surveillance Systems<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Coastal Surveillance Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

71M Low Altitude Surveillance System<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Maintaining continuous aerial security is a daunting information needed to secure the skies.<br />

task. Threats such as low-flying, extremely fast aircraft<br />

can take advantage of the earth’s curvature and exploit SURVEILANCE FOR COASTS OF THE U.S.<br />

terrain obstructions. This renders ground-based radars AND ITS ALLIES VIA AEROSTATS<br />

unable to provide target information in time to take Now, specifically, given the recent terroristic threats<br />

appropriate action. Slow, low flying missiles with a small from terrorists attacking with small suicide boats large<br />

cross section may also avoid early detection and pose a U.S. ships, pirates taking over commercial fleets, to<br />

significant threat. Manned aerial surveillance can decrease<br />

the risk for short periods of heightened alert, but immigration and drug smuggling via oceans and wa-<br />

protecting the borders of the United States from illegal<br />

the operational costs are much too high for extended terways, to detecting threats, persistent surveillance of<br />

use. To meet this airborne coverage challenge effectively TCOM’s aerostats have become a staple in what Homeland<br />

Security and US Military have been using here and<br />

and inexpensively, TCOM developed the 71M Low<br />

Altitude Surveillance System. With over 1,000,000 hours in the Gulf. Monitoring territorial waters on a round-theclock<br />

basis while providing intelligence in time to take<br />

of operation these systems are the only operational<br />

airborne defense assets to routinely provide the continuous<br />

round-the-clock, low altitude target detection Ground-based and shipboard systems have a limited<br />

appropriate action is a major challenge to many nations.<br />

38


ange against surface targets, while continuous use<br />

of aircraft is prohibitively expensive. Nations need an<br />

effective and affordable system that offers continuous,<br />

wide-area maritime surveillance and timely provision of<br />

target information. TCOM Sea surveillance systems use<br />

persistent surveillance medium-class tethered aerostats,<br />

equipped with an advanced maritime radar, thermal<br />

imaging and optical sensors, and communications payloads<br />

that detect and track maritime targets at distances<br />

of 60 nautical miles and beyond. A single sea surveillance<br />

system can cover thousands of square miles for<br />

weeks at a time at the lowest possible hourly cost for an<br />

airborne asset. <strong>The</strong> early detection and direct communications<br />

with air and sea assets affords the critical window<br />

of time to evaluate the situation, coordinate forces<br />

and engage, if required. <strong>The</strong> versatility of the sea surveillance<br />

system makes it ideal for responding to requirements<br />

or threats that change rapidly. <strong>The</strong> system is fully<br />

transportable and can be easily relocated with no site<br />

preparation. Although fully mature, the system can be<br />

shaped to better meet the needs of the client. Additional<br />

capabilities such as passive surveillance and remote data<br />

linking can be included. View TCOM’s innovative solution<br />

video right here: https://youtu.be/6KkZCycrdkU<br />

About TCOM<br />

With headquarters in Columbia, Maryland and operations<br />

in over 12 countries around the world, TCOM is<br />

the global authority in airborne persistent surveillance<br />

solutions. For over 40 years, TCOM innovations have<br />

defined the industry, and our pioneering achievements<br />

continue to revolutionize the design, manufacture and<br />

deployment of LTA systems. With corporate headquarters<br />

in Columbia, MD and manufacturing and testing<br />

facilities in Elizabeth City, NC, TCOM is the world’s<br />

only company solely devoted to the design, fabrication,<br />

installation and operation of persistent surveillance<br />

aerostat systems. Our complete platform solutions<br />

include numerous classes of aerostats that can each be<br />

equipped with a broad selection of proven payloads that<br />

are customizable for specific customer requirements.<br />

View TCOM’s corporate capability: https://youtu.be/<br />

i_7GjO9iH7g An illustration of the expanding maritime<br />

threat in U.S. allied countries, is in this release: http://<br />

www.tcomlp.com/tcom-president-ron-bendlin-signsmou-with-bintang-kencana-in-presence-of-malaysianprime-minister-dato-sri-mohd-najib-tun-hj-abdul-razakin-providing-aerostat-systems-to-improve-maritime-sec/<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.tcomlp.com/our-company/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.tcomlp.com/sea-surveillance-systems/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Gal Borenstein, CEO<br />

Borenstein Group<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 703-385-8178 x28<br />

cell: 703-597-1610<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

gal@borensteingroup.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Borenstein Group 11240 Waples Mill Road Suite 420<br />

Fairfax, VA 22030<br />

39


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Honeywell Security<br />

<strong>2015</strong> Winner<br />

Best Surveillance Systems<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Video Analytics/Intrusion Detection<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

MAXPRO Cloud<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

National security efforts keep citizens safe and secure,<br />

whether in airports or at sea. With multiple sites, locations<br />

and checkpoints, it’s important to recognize how<br />

complex national security can be; as such, airports,<br />

and seaports need even-more intuitive and streamlined<br />

ways to manage their security systems. MAXPRO Cloud<br />

is an integrated, cloud-based video and access management<br />

system that enables organizations to significantly<br />

streamline multi-site management, providing access<br />

from anywhere, anytime. Designed for multi-site facilities,<br />

it allows owners to easily manage their facilities’<br />

security system all through one user-friendly interface.<br />

In these high-security areas, it’s imperative that security<br />

procedures are strong enough to keep threats at bay but<br />

easy enough to seamlessly manage multiple areas at the<br />

same time. Honeywell’s user experience design team<br />

crafted the MAXPRO Cloud interface to streamline ease<br />

of use. <strong>The</strong> single sign-on enables control of all facets<br />

of the system after entering one set of credentials. <strong>The</strong><br />

smart dashboard allows users to easily manage their<br />

systems, from granting or rescinding access permissions<br />

and unlocking site-specific doors to reviewing access<br />

logs and captured video to evaluate a potential alarm<br />

event. MAXPRO Cloud also integrates with Google Maps<br />

to provide a visual, map-based depiction of physical<br />

sites. This enhances ease of use by simplifying multisite<br />

management. For example, an airport operations and<br />

security manager can access a map of every building on<br />

an airport campus and inspect which airport employees<br />

have credentials for which checkpoints (perhaps an<br />

40


Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellsecurity.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.maxprocloud.com/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Solveig Hommema, Assistant Account Executive<br />

Weber Shandwick<br />

airline security screener is given access to ten of the 15<br />

checkpoints but an aircraft mechanic only needs access<br />

to a single checkpoint). <strong>The</strong> ability to visually manage<br />

multisite locations removes the need for the manager to<br />

remember which location is assigned to which system<br />

ID and lets the manager quickly view and modify access<br />

permissions to specific sites. <strong>The</strong> flexibility and scalability<br />

of MAXPRO Cloud makes it applicable to a wide range<br />

of applications, from a maritime port of two buildings to<br />

a major international airport. This customization allows<br />

aviation, maritime and other national security facilities<br />

to use access and video surveillance services proportionate<br />

to the size of their precincts. MAXPRO Cloud<br />

provides proactive system health reports and alerts to<br />

the dealer and user, enabling the dealer to actively address<br />

issues as they arise instead of reactively responding<br />

to failed hard drives, cameras that have lost video<br />

or equipment that has stopped working. This constant<br />

vigilance helps to prevent security breaches before they<br />

have a chance to occur, resulting in improved security.<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 952-346-6050<br />

cell: 612-501-0949<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

shommema@webershandwick.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8000 Norman Center Drive, Suite 400<br />

Bloomington, MN 55437<br />

41


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

CohuHD Costar<br />

<strong>2015</strong> Winner<br />

Best Surveillance Systems<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Long-Range/Day-Night Surveillance<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CohuHD Costar’s 8800HD Series<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CohuHD is a leader in rugged, outdoor video surveillance<br />

cameras for critical infrastructure environments.<br />

<strong>The</strong> 8800HD Series combines full HD image resolution<br />

with high-powered performance lens optics for delivering<br />

unprecedented image quality and detail for longrange<br />

surveillance applications.<br />

<strong>The</strong> 8800HD Series long-range camera system offers an<br />

unprecedented feature set:<br />

• First truly long-range high-definition camera positioner<br />

• Powerful HD optical zoom magnification, up to 137x<br />

• Industry’s narrowest HAFOV with HD resolution, as<br />

low as 0.17° degrees<br />

• Boresighted optics with programmable day/night<br />

focusing<br />

• Greatest detection distances on the market, humansized<br />

objects detected at distances up to 30 miles (based<br />

on Johnson Criteria with optimum conditions)<br />

• First long-range HD camera positioner with built-in<br />

H.264 compression and web server, operating over standard<br />

digital networks<br />

• Precision positioning with speed range of 0.05° to<br />

45°/second, and with built-in brakes for stability<br />

• Highest environmental standards: IP67, ASTM-B117,<br />

TS-2 Shock & Vibe, and MIL-STD-810F for salt/fog, immersion<br />

and sand/dust CohuHD’s 8800HD Series can<br />

deliver up to 6 times the resolution and detail of traditional<br />

standard-definition long-range camera systems.<br />

42


With this exceptional performance, the 8800HD is ideal<br />

for:<br />

• Border patrol<br />

• Airports<br />

• Seaports<br />

• Military<br />

• Perimeter security<br />

• Maritime<br />

• Other critical infrastructure environments<br />

In addition to superior image quality and excellent longrange<br />

zoom optics, the 8800HD system delivers its HD<br />

video across standard digital network infrastructures. It<br />

does this by using H.264 image compression technology,<br />

which requires a fraction of the bandwidth traditional<br />

MPEG4 or MJPEG requires. <strong>The</strong> 8800HD superior<br />

image quality is generated by a 1/2.7” CMOS 1080p30<br />

progressive scan day/night sensor. Image performance<br />

and color reproduction are superb even under challenging<br />

lighting conditions. In night mode, the camera<br />

enhances low light viewing by automatically switching<br />

the IR filter out of the optical path, delivering a monochrome<br />

image. Long-range surveillance is achieved by<br />

the integrated 60x HD-quality zoom lens optics, with<br />

focal length ranging from 16.7 mm to 1,000mm. <strong>The</strong><br />

lens includes a remotely controlled 2x optical extender<br />

which can be inserted in the optical path, increasing the<br />

maximum focal length to 2,000mm. Horizontal Angular<br />

Field Of View as low as 0.17 is achieved at full zoom<br />

with extender inserted. <strong>The</strong> 8800HD provides a fullfunction<br />

web server, enabling complete administrative<br />

and operator control. Administrative features include<br />

configuring network settings, assigning user passwords,<br />

setting video streaming properties, defining camera<br />

positioning presets and tours, and assigning camera ID<br />

labels. <strong>The</strong> 8800HD is designed to operate in extreme<br />

weather, with its IP67 sealed and pressurized enclosure<br />

Continued on next page<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.Cohuhd.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CohuHD Costar’s 8800HD Series:<br />

http://www.cohuhd.com/content/8800hd<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dana Varga, Marketing Manager<br />

CohuHD Costar<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 858-391-1712<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

dvarga@cohuhd.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

12367 Crosthwaite Circle<br />

Poway, CA 92064<br />

43


protection. This eliminates the effects of water intrusion,<br />

pollutants and corrosives. It is designed to operate<br />

in a broad temperature range, from winter in the Arctic<br />

to summer in the desert, with heaters and fans, and<br />

electrical and mechanical components that are rated<br />

for the full range. CohuHD has proudly manufactured<br />

its products in the USA for more than 50 years. <strong>The</strong><br />

8800HD is installed and protecting marquee projects<br />

around the world including the Port of Corpus Christi,<br />

Integrated Fixed Towers (IFTs) at the Jordan Border and<br />

the USS Ponce.<br />

<strong>The</strong> 8800HD Series long-range camera system offers an<br />

unprecedented feature set:<br />

• First truly ultra long-range high-definition camera<br />

positioner<br />

• Powerful HD zoom magnification of up to 2,000mm<br />

• Industry’s narrowest HAFOV with HD resolution, as<br />

low as 0.17 degrees<br />

• Boresighted optics with programmable day/night<br />

focusing<br />

• Greatest detection distances on the market, humansized<br />

objects detected at distances up to 30 miles (based<br />

on Johnson Criteria with optimum conditions)<br />

• First long-range HD camera positioner with built-in<br />

H.264 compression and web server, operating over standard<br />

digital networks<br />

• Precision positioning with speed range of 0.05 to 45/<br />

second, and with built-in brakes for stability<br />

• Highest environmental standards: IP67, ASTM-B117,<br />

TS-2 Shock & Vibe, and MIL-STD-810F for salt/fog, immersion<br />

and sand/dust<br />

44


45


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Betafence USA<br />

<strong>2015</strong> Winner<br />

Best Perimeter Protection, Fencing, Gates, Guard Booths<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Fencing<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Guardian Fence System ®<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> reason Betafence USA should win the Best Fencing,<br />

Barriers, Bollards, Gates award is due to the Guardian<br />

Fence System ® . It is the original modular steel security<br />

fence solution, providing high strength protection.<br />

<strong>The</strong> patented design allows a variety of configurations,<br />

from medium security to high security fencing and<br />

partitions. We also offer more than 40 available security<br />

mesh panel styles. <strong>The</strong> Guardian Fence System ® also<br />

offers the greatest range of security solutions, from<br />

perimeter fencing, partitioning, visual screening barriers<br />

and pedestrian and vehicular gates. <strong>The</strong> Guardian<br />

Fence System ® configurations include: Guardian 5000<br />

(high security) and Guardian 7000 (ultra-high security).<br />

For high security fencing applications, the Guardian<br />

Fence System ® features an exceptional “Smart Fence”<br />

trenchless integration design, providing a steel conduit/<br />

raceway within the fence system for intrusion detection,<br />

surveillance, access control and communication, fiber<br />

optics and cabling, shielding them from view, weathering<br />

and vandalism. <strong>The</strong> system is also capable of incorporating<br />

restrictive components such as barbed tape<br />

concertina and either cable-based or rail-based vehicular<br />

anti-crash resistance. Fences can be easily upgraded<br />

without removing existing posts; exact spacing of posts<br />

is not a requirement of the Guardian Fence System ® .<br />

This system is also capable of employing a dual layer of<br />

46


Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.betafenceusa.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.betafenceusa.com/ProductLine.<br />

aspx?Id_ProductLine=24&Tab=Intro<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Debbie Corkin, Controller<br />

Betafence USA<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 972-878-7000<br />

security mesh panels - either the same type, or two different<br />

types that may be complementary in nature based<br />

on the application. <strong>The</strong> Guardian system can also use<br />

one type mesh style at the bottom of the barrier, and an<br />

alternate type arranged vertically based on a particular<br />

purpose. By design, the Guardian Fence System ® can<br />

also be installed more quickly, and at less expense, than<br />

other fence solutions providing similar levels of security.<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

dcorkin@betafenceusa.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

3309 SW Interstate 45 Ennis<br />

TX 75119<br />

47


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Tilt-A-Way<br />

<strong>2015</strong> Winner<br />

Best Perimeter Protection, Fencing, Gates, Guard Booths<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Perimeter Protection, Fencing, Gates, Guard<br />

Booths<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Tilt-A-Way vertical pivot gates<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Tilt-A-Way vertical pivot gate is a perfect fit in the Airport,<br />

Seaport and Border security industry. <strong>The</strong> Tilt-A-<br />

Way gate is installed in many of the gated areas of the<br />

Airport, Seaport and Border Patrol facilities. with it’s<br />

quick open and close activation cycle time. Tilt-A-way<br />

keeps any facility a safer place preventing tailgating of<br />

multiple vehicles. Another great feature of a Tilt-A-Way<br />

gate. Being that it pivots from a horizontal position into<br />

itself in the vertical position so it requires a smaller footprint<br />

therefore leaving more real estate for structures<br />

or more parking spaces. Tilt-A-Way also offers a full line<br />

of anti-Terrorist crash gates such as the M-50, M-40 and<br />

M-30 crash tested gates. Tested at the Texas Transportation<br />

institute. <strong>The</strong> M-50 is tested with a 15,000 pound<br />

truck traveling 50 MPH. At this weight and speed the<br />

gate is engineered to withstand the hit and not let the<br />

vehicle penetrate through the gate.<br />

48


Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.tiltaway.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.idealmanufacturing.biz<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Ideal Manufacturing<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 406-656-4360<br />

cell: 406-670-3746<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

daveh@idealmfginc.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

2011 Harnish Blvd<br />

Billings, Mt 59101<br />

49


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Best Perimeter Protection, Fencing, Gates, Guard Booths<br />

Global Elite Group<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Guard Service, Facility Protection Service<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Global Elite Group<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Since its inception, Global Elite Group (GEG) has been<br />

committed to providing security services and solutions<br />

to the aviation industry. GEG recognizes potential<br />

threats to aviation security before they occur, providing<br />

guidance with programs to develop secure operational<br />

processes and procedures, both on the ground and in<br />

the air. Ever since the events that occurred on September<br />

11, 2001, threats against the airline industry have<br />

been highly publicized, and concerns continue to be<br />

raised over the safety at our nation’s airports. Assisting<br />

airports and carriers in developing their own unique security<br />

initiatives and processes is accomplished through<br />

a comprehensive security management program developed<br />

by GEG covering internal and external operations.<br />

<strong>The</strong> customized program tackles not only the security<br />

lapses but provides a thorough review of current operations<br />

and implementation of specifically designed practices.<br />

Each location has unique requirements, therefore,<br />

an assessment would be recommended. Most locations<br />

benefit from having security systems reviewed, updated<br />

if necessary, and adding physical security components.<br />

<strong>The</strong> combination of this approach will act as a deterrent<br />

and a security solution should the unthinkable happen.<br />

<strong>The</strong> service offerings from GEG are always evolving<br />

to meet the demand of changing security threats,<br />

these include utilizing guard posts, inspection patrols,<br />

proper placement of fencing and barricades as well as<br />

perimeter security monitoring and lighting. Technology<br />

incorporated into the security plan adds another layer<br />

of protection through access control, video monitor-<br />

50


ing and analytics, integration of security systems with a<br />

dispatch center and alarm monitoring. Aviation readiness<br />

also encompasses the ability to address weather<br />

related emergencies that have the potential to disrupt<br />

service. Contingency planning for weather events, GEG<br />

assists with focusing in on the company’s ability to have<br />

the infrastructure in place to address emergencies of<br />

any kind. An area of concern for most companies in the<br />

aftermath of an emergency is communications. GEG<br />

establishes an off-site area to provide the hub for these<br />

services with satellite and landline communications as<br />

well as a place where all backup computer data would<br />

be stored. A seamless operation from emergency back<br />

to a functioning is the goal of all contingency plans.<br />

GEG’s diverse security and consulting experience has<br />

proven that in order to be successful, there is an inherent<br />

need for taking a customized approach to security<br />

in order to mitigate risks. This formula has since been<br />

adapted to service multiple industries. For instance,<br />

GEG provided security for World Cup delegates during<br />

site visits to Brazil for the World Cup games, as well as<br />

during the games themselves. <strong>The</strong> security preparations<br />

for the world’s most anticipated rivalry, required<br />

numerous visits to ensure the safety of the players and<br />

visitors who arrived to the games in Brazil. GEG, known<br />

for its protection services around the globe, provided<br />

security services for the World Cup personnel, in charge<br />

of planning the security for the upcoming games in a<br />

country known for its beauty and its crime. <strong>The</strong> scope<br />

of the service, which included in-depth threat assessment<br />

and risk mitigation plan, was to ensure the safety<br />

and security of all persons traveling to and from Rio,<br />

and various destinations while travelling within the<br />

country. <strong>The</strong> closely guarded group required the use<br />

of translators, protective services and drivers as some<br />

support services needed for the trip. This trip required<br />

a regional staff that knew the country in every sense.<br />

Continued on next page<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.globaleliteinc.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.prweb.com/releases/2013/3/<br />

prweb10546252.htm<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Victor Anderes, Executive Vice President<br />

Global Elite Group<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (516) 393-3538<br />

cell: (516) 507-8812<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

vanderes@globaleliteinc.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

825 East Gate Blvd Suite 301<br />

Garden City, NY 11530<br />

51


Once this was in place, extensive background investigations<br />

were carried out. When the details for the trip<br />

were addressed the group was able to travel to the most<br />

recognized and scenic landscapes in South America.<br />

Many of the locations visited while famous and beautiful,<br />

were also located near crime-ridden communities<br />

known as Favelas. It was an early indicator as to some<br />

of the possible challenges to security these games could<br />

face. To prepare for a large group, visiting a region of<br />

the world with known security risks, takes a great deal<br />

of arrangements. GEG places a premium on advance site<br />

visits. During the planning phase we reach out to local<br />

and federal authorities, when reliable, in advance of the<br />

trip. <strong>The</strong>re is also a strict schedule to adhere to taking<br />

advantage of daylight hours, optimal travel times and<br />

to ensure there are enough vehicles for the duration<br />

of the trip. All of this attention to detail takes time and<br />

skill. Other considerations because foreign visitors can<br />

become a target is to map out routes away from high<br />

crime areas, thorough inspections of vehicles, multiple<br />

egress routes, pre inspection of facilities and secured<br />

communications are just some of the procedures used<br />

to mitigate the risks associated with high profile security<br />

protection services. Contingency planning is an invalu-<br />

able asset to any assignment and having multi-layered<br />

preparations will ensure the likelihood of a successful<br />

outcome. GEG staff is steeped in experience at every<br />

level of law enforcement and military experience earned<br />

in the most civilized and roughest regions of the world.<br />

Our programs incorporate experience with superior<br />

communications and technology usage.<br />

52


53


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Network Harbor, Inc.<br />

<strong>2015</strong> Winner<br />

Best Integrated Security Programs<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical Security Information Management<br />

System - PSIM<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LightHouse<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Network Harbor’s LightHouse platform delivers<br />

unified security management for enterprise organizations,<br />

extending the capabilities of physical security<br />

incident management (PSIM) to include geographical<br />

information system (GIS) and non-physical products in<br />

a truly comprehensive safety and security management<br />

environment. LightHouse is unique in that it integrates<br />

every security system, physical or non-physical, into a<br />

single, seamless oversight system. Its intuitive interface<br />

drives faster recognition of potential threats, as well<br />

as gives first responders the information they need to<br />

make better informed, more appropriate decisions.<br />

LightHouse is designed to support the IT side of inci-<br />

dent management, too. Its click-and-go ability to adopt<br />

the full functionality of any security system’s API within<br />

its own capabilities means that there’s no “dumbing<br />

down” of features or functions – just a seamless, consistent<br />

user interface, anywhere across the enterprise.<br />

It installs easily, and is quickly mastered by administrators<br />

and end users alike. LightHouse supports almost<br />

all major security product manufacturers including<br />

access control, video, audio, mass notification, IDS,<br />

RTLS and more. LightHouse has been designed to add<br />

additional system integration’s to the platform without<br />

disruption or encumbrance of any existing integration<br />

in an expedient, stable and secure process. LightHouse<br />

54


IPM (integrated process management) provides an<br />

additional element of extensibility and power for policy<br />

management and workflow processing that is virtually<br />

unlimited in its capabilities. <strong>The</strong> end result is an intuitive,<br />

comprehensive automated security management<br />

platform that operates identically, anywhere within the<br />

organization. <strong>The</strong>re’s no need to retrain staff when they<br />

move from one facility to another, or when new components<br />

are connected to the platform, which in turn saves<br />

customers significant amounts of time and money.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.networkharbor.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://youtu.be/-ucfAR5psac<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

John Convy, Principal<br />

Convy Associates<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 202-421-3777<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

john@convyassociates.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8380 Greensboro Drive Suite 514<br />

McLean, VA 22102<br />

55


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Honeywell Security<br />

<strong>2015</strong> Winner<br />

Best Integrated Security Programs<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical Security Information Management<br />

System - PSIM<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Vindicator Keypad Solution<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Protecting entities such as airports, seaports and government<br />

regulated critical infrastructure sites such as border<br />

controls can be a difficult task. A primary reason for<br />

this is that technology designed for these markets must<br />

meet rigorous regulatory standards, such as the ICD-<br />

705 for SCIF security, or the NERC standards for energy<br />

generation facilities. Honeywell’s Vindicator Keypad<br />

Solution (VKS) meets these regulations in a cost effective,<br />

extremely efficient manner. In addition, the VKS<br />

is the first map-based system that provides assessment<br />

at a glance. Its software charts the location of sensors<br />

and alarms, resulting in a perimeter map of the building<br />

or partition (a previously designated area or grouping).<br />

Operators can see the location of each sensor as<br />

it relates to the overall structure of the protected area,<br />

and can also see whether the sensor is armed based<br />

upon the color shown on the display – a huge operational<br />

efficiency compared to text-based systems. For<br />

example, a standard text-based system could inform the<br />

user that Zone 10 is compromised. However the user<br />

must be very familiar with the physical site and be able<br />

to remember where Zone 10 is and what the implications<br />

of a security event in that area means, in order to<br />

adequately respond. Further, during high-stress events,<br />

a user might confuse zone areas, resulting in a delayed<br />

or inappropriate response to security events. <strong>The</strong> VKS’s<br />

map-based system, on the other hand, shows the user<br />

exactly which sensors have been activated on the map of<br />

the building, giving a clear, easy-to-understand picture<br />

of the events that are occurring.<br />

56


<strong>The</strong> VKS brings many unique attributes to facilities,<br />

including:<br />

1. ASSESSMENT AT A GLANCE: <strong>The</strong> VKS is the only<br />

keypad solution with a map-based interface for immediate<br />

situational assessment. <strong>The</strong> intuitive, graphic display<br />

gives operators visual confirmation of alarm locations<br />

and states, instead of text-only communication, making<br />

local arm/disarm and alarm response easier, faster and<br />

safer.<br />

2. SPEED & RELIABILIT Y: <strong>The</strong> solution’s controller<br />

panel with embedded firmware is not dependent on an<br />

outside server or PC, eliminating common issues such<br />

as hard-drive crashes and time-consuming Windows<br />

upgrades. Its embedded processing provides instantaneous<br />

notification of alarm events. <strong>The</strong> controller can<br />

withstand extreme environmental conditions – from<br />

extreme cold and high winds to high heat and corrosive<br />

environments – ensuring reliability in even the most<br />

rugged situations.<br />

3. COST-EFFECTIVE: <strong>The</strong> VKS cost is comparable to<br />

traditional text-based LCD keypads and meets ICD 705<br />

regulations for SCIFs without the need for third-party<br />

converters or devices. IP-communication reduces time<br />

needed for installation, keeping deployment costs low.<br />

4. SECURIT Y: <strong>The</strong> VKS controller panel, the Vindicator<br />

Premise Controller (VPC), processes logic through its<br />

proprietary operating system. Its firmware is embedded<br />

within the physical controller, marking it stronger<br />

against hacking, viruses and worms, and meets AES encryption<br />

standards. <strong>The</strong> system polls for events every 8<br />

milliseconds, can annunciate five simultaneous events in<br />

two seconds and can manage up to 10,000 alarm points<br />

without latency in reporting alarm events.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellsecurity.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellvindicator.com/..<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Solveig Hommema, Assistant Account Executive<br />

Weber Shandwick<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: 952-346-6050<br />

cell: 612-501-0949<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

shommema@webershandwick.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8000 Norman Center Drive, Suite 400<br />

Bloomington, MN 55437<br />

57


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Best Integrated Security Programs<br />

Emergency Response Technology, LLC<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Integrated Harbor Security Program<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Integrated Harbor Security Program for the Port of<br />

Greater Baton Rouge<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

According to the American Association of Port Authorities,<br />

the Lower Mississippi River (LMR), where the Port<br />

of Greater Baton Rouge operates, provides transportation<br />

for over 45% of all energy resources and more than<br />

60% of all U.S. commerce, making it the most critical<br />

and at the same time vulnerable critical infrastructure<br />

in the U.S. Each day that the transportation of maritime<br />

commerce on the LMR is interrupted costs the U.S.<br />

economy over $275 million per day, and international<br />

commerce over $500 million per day. A tanker cut a<br />

barge into 2 pieces in 2008, releasing 419,000 gallons<br />

of diesel and shutting down the LMR for 11 days. This<br />

interruption of transportation of maritime commerce<br />

on the LMR created a loss of over $3 billion to the U.S.<br />

economy and $6 billion to international commerce<br />

(www.cnn.com/2008/US/07/25/mississippi.spill/). But<br />

without an emergency response capability for secondary<br />

emergencies, the collision could have been much<br />

worse. <strong>The</strong> tanker had just uploaded approximately 3<br />

million gallons of Styrene monomer, a compound that<br />

reacts with itself in “autopolymerization”. If this had<br />

happened, the tanker would have exploded with the<br />

force of from 3 to 5 times that of the truck bomb used<br />

in Oklahoma City in 1995, causing extensive collateral<br />

damage and closing the river much longer. <strong>The</strong> Emergency<br />

Response Technology (ERT) IHSP is designed<br />

to autonomously detect and report multiple threats<br />

simultaneously using both active and passive advanced<br />

sensors using surveillance software. Chemical releases<br />

from either accidents or intentional acts of terrorism at<br />

58


or near the Port of Greater Baton will affect local public<br />

health and interrupt the transportation of maritime<br />

commerce, not only on the LMR, but also at the Port<br />

Allen lock of the strategic Gulf Intracoastal Waterway<br />

(GIWW) located at the port, as well as overseas transportation<br />

of maritime commerce. <strong>The</strong> IHSP will provide<br />

CONOPS, situational awareness, and enhance chemical<br />

security and response for the Port of Greater Baton using<br />

integrated orthogonal chemical sensors. “Orthogonal”<br />

means that multiple sensor methodologies will be<br />

deployed to reduce false/positive detection. ERT CEO<br />

George Lane also teaches Homeland Security program<br />

at Tulane University. For portable chemical monitoring<br />

at the port, the IHSP will deploy Differential Mobility<br />

Spectrometry (DMS) sensors in JUNO ® , developed by<br />

Chemring Sensors & Electronic Systems for JCAD-2. As<br />

a tunable ion sensor DMS separates, detects, and measures<br />

individual chemicals in complex mixtures. Portable<br />

chemical detectors will also be deployed in maritime<br />

emergency response vessels operating on the LMR. For<br />

fixed chemical monitoring and scanning of chemical<br />

releases at a distance of up to 5 km, the IHSP will utilize<br />

the RAPID (Remote Air Pollution Infrared Detector)<br />

chemical detector, developed by Bruker Detection for<br />

deployment on the military’s Stryker reconnaissance<br />

vehicle. RAPID uses a Fourier Transform infrared (FTIR)<br />

sensor which identifies the characteristic “fingerprint”<br />

signatures of chemicals. Sophisticated software discriminates<br />

against interferences, avoids false alarms, and can<br />

determine the origin of the release. When deployed, the<br />

ERT IHSP will protect both public health and critical infrastructure<br />

around the port, and mitigate the interruption<br />

of domestic maritime commerce on the LMR and<br />

GIWW, and international maritime commerce overseas.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Fixed sensor in IHSP:<br />

www.bruker-industrial.com/RAPID.html<br />

Portable sensor in IHSP:<br />

www.chemringds.com/products/chemical-detection/juno.aspx<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

George Lane; CEO<br />

Emergency Response Technology<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cell: 225-281-3141<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

georgelane@hotmail.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Emergency Response Technology<br />

999 9th Street Suite 206<br />

Baton Rouge, LA 70802<br />

59


<strong>The</strong> <strong>GSN</strong> <strong>2015</strong><br />

Homeland Security<br />

Awards


Winners in the <strong>2015</strong><br />

Homeland Security Awards Program<br />

VENDORS OF IT SECURITY<br />

PRODUCTS AND SOLUTIONS<br />

Best Anti-Malware Solution<br />

Blue Ridge Networks – Winner<br />

Best Identity Management<br />

Platform<br />

Gemalto – Winner<br />

Best Compliance/Vulnerability<br />

Solution<br />

Agiliance Inc. – Winner<br />

Best Endpoint Detection and<br />

Response Solution<br />

RSA, <strong>The</strong> Security Division of EMC – Winner<br />

Best Big Data Analytics Solution<br />

RSA, <strong>The</strong> Security Division of EMC – Winner<br />

Best Privileged Access<br />

Management Solution<br />

BeyondTrust – Winner<br />

CyberArk – Winner<br />

Best Continuous Monitoring and<br />

Mitigation Solution<br />

CyberArk – Winner<br />

SolarWinds – Winner<br />

Best Security Incident and<br />

Event Management (SIEM) Solution<br />

SolarWinds – Winner<br />

VENDORS OF PHYSICAL SECURITY<br />

PRODUCTS AND SOLUTIONS<br />

Best Biometric Identification<br />

Solution<br />

Securiport, LLC – Winner<br />

Best Integrated System for<br />

HSP D-12/FIPS 201 Compliance<br />

Viscount Systems – Winner<br />

Best Mass Notification Systems<br />

Acoustic Technology, Inc. – Winner<br />

Best Chemical Detection<br />

Product or Solution<br />

908 Devices – Winner<br />

Best Explosive Detection<br />

Product or Solution<br />

Implant Sciences – Winner<br />

Best Intelligent Video<br />

Surveillance Solution<br />

Qognify – Winner<br />

Best Crash Barrier (Gates,<br />

Fences, Bollards, Guard Booths)<br />

B.I.G. Enterprises, Inc. – Winner<br />

CINCH systems, Inc. – Winner<br />

Best Physical Security Information<br />

Management (PSIM) Solution<br />

Qognify – Winner<br />

Best Facility Security/Force<br />

Protection Service<br />

AlliedBarton Security Services – Winner<br />

MOST NOTABLE GOVERNMENT<br />

SECURITY PROGRAMS, PROJECTS,<br />

INITIATIVES<br />

Most Notable Federal Government<br />

Security Program/Project<br />

or Initiative<br />

TSA - TSA Airport and Aviation security – Winner<br />

U.S. Department of State – Winner<br />

Most Notable State Government<br />

Security Program/Project<br />

or Initiative<br />

New York State Division Of Homeland Security<br />

and Emergency Services (DHSES) – Winner<br />

California Department of Motor Vehicles,<br />

Investigations Division – Winner<br />

Most Notable Cybersecurity<br />

Program, Project or Initiative<br />

City of Los Angeles - Centralization of<br />

Cybersecurity Incident Data Analysis – Winner<br />

Most Notable County/Municipal<br />

Program/Project or Initiative<br />

Nanded India, Safe City - Qognify – Winner<br />

SAMMC (San Antonio Military Medical Center)<br />

Advanced Security Program, Suspect Search -<br />

Qognify – Winner<br />

Most Notable Law Enforcement<br />

Interdiction, Arrest, Counter<br />

Terrorism or Crime Prevention<br />

Program – Federal/State or Local<br />

Memphis Police Department – Winner<br />

61


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Blue Ridge Networks<br />

<strong>2015</strong> Winner<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Anti-Malware Platform<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

AppGuard<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Introduction<br />

Blue Ridge Networks’ AppGuard is a unique Anti-<br />

Malware solution that stops malware breaches at the<br />

earliest stages of attack without requiring detection,<br />

scanning, or updates. Recognized by leading industry<br />

analysts as effective, next generation endpoint protection,<br />

AppGuard delivers a multi-layered defense that<br />

prevents breaches from emerging undetectable threats<br />

and generates earlier Indicators of Attack (IOA) without<br />

a compromise occurring. AppGuard is compatible with<br />

all current Windows versions, is easy to deploy with<br />

scale, is non-disruptive to users and productivity, and<br />

works “on” and “off ” enterprise without on-going management<br />

dependencies.<br />

Technological Innovation<br />

Other endpoint protection products allow malware to<br />

“detonate”, relying on detecting and responding to a<br />

compromise in time to limit breach effects. Without<br />

a known signature or IOC (Indicator of Compromise),<br />

breaches can go undetected by breach<br />

detection, whitelisting, blacklisting (antivirus),<br />

sandboxing or other conventional<br />

techniques for weeks or months,<br />

placing an enterprise at risk.<br />

AppGuard offers an effective<br />

defense against these emerging<br />

undetectable threats that cannot<br />

be addressed by conventional<br />

62


means. Without relying on detection, identification,<br />

signatures, or scanning, AppGuard disrupts breach attempts<br />

before a compromise can occur from zero-day<br />

malware, polymorphic malware, phishing, “malvertising”,<br />

watering-holes, weaponized documents, drive-bydownloads,<br />

ransomware and other forms of undetectable<br />

malware attacks. AppGuard’s patented technology<br />

establishes trust zones protecting applications, operating<br />

system resources, firmware, memory, and other<br />

core processes. Protection policies are automatically<br />

dynamically extended to descendant “child” processes<br />

eliminating the need for complex rules specific to each<br />

application and ensuring effective protection without<br />

management overhead or impact to<br />

user productivity.<br />

When AppGuard stops a malware<br />

attack, it collects Indicators of Attack<br />

(IoA) that can be analyzed and used to<br />

identify new malware before any IOC is<br />

known. This provides valuable earlywarning<br />

data for enhanced Threat Intelligence without<br />

the exposure of a compromise.<br />

Reliable, Versatile, Usable, Scalable, Affordable<br />

AppGuard has demonstrated with Enterprise, Business<br />

63<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.blueridge.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.appguardit.com<br />

www.appguardbusiness.com<br />

www.appguardenterprise.com<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Nancy Canty, VP of Product Management<br />

Blue Ridge Networks<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (703) 633-7331<br />

cell: (571) 232-9149<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

nancy@blueridge.com<br />

(SME), and Personal use customers and in continuous<br />

extensive penetration testing, the ability to stop breaches<br />

other approaches cannot stop. It is compatible with<br />

all current Windows versions (Win XP, Vista, 7, 8, 8.1,<br />

Continued on next page


and 10 including DeviceGuard and Virtual Secure Mode)<br />

on desktops, laptops, tablets, servers, and embedded<br />

appliances (ATMs, Point-of-Sale appliances, Healthcare<br />

devices, etc.). “Out-of-the-box”, it protects a wide range<br />

of popular applications (Office, Office365, IE, Adobe,<br />

etc.) and can be configured to protect custom applications,<br />

VDIs, VPNs, VDIs, etc. <strong>The</strong> Enterprise version<br />

places AppGuard endpoint software agents under the<br />

administration and control of the enterprise to deploy<br />

and manage customized enterprise policies with a<br />

separate management plane to ensure protection and<br />

situational awareness “on” on “off ” the enterprise. AppGuard’s<br />

underlying technologies are also extensible to<br />

Internet-of-Things applications.<br />

Other References<br />

AppGuard has been recommended by respected security<br />

authorities, including Bob Bigman, former CISO, CIA:<br />

http://www.activecyber.net/interview-with-bob-bigmanformer-ciso-of-cia/<br />

Gartner and other leading industry analysts have regularly<br />

cited AppGuard in numerous reports as an emerging<br />

next-generation endpoint protection.<br />

64


65


Gemalto<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Identity Management Platform<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Coesys Document Verification<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Identity theft profoundly affects the public and private<br />

sectors worldwide. In 2013, according to Javelin Strategy<br />

and Research, one incident of identity fraud occurs<br />

every 3 seconds in the United States. Clearly, there is<br />

a growing need for reliable identity document verification.<br />

However, verifying identity documents is becoming<br />

increasingly more complex. Public and private administrations<br />

face the challenge of detecting suspected fraud<br />

on various types and versions of documents (passports,<br />

identity cards, driver’s licenses, etc.) from an array of issuing<br />

countries. <strong>The</strong> California Department of Motor Vehicles<br />

made it a priority to address this issue head-on by<br />

implementing an advanced solution through Gemalto,<br />

the world leader in digital security. In July <strong>2015</strong>, the California<br />

DMV selected Gemalto as the choice provider of<br />

identify document verification software to its nearly 200<br />

field and investigative offices. <strong>The</strong> California DMV issues<br />

thousands of ID documents every day and places a high<br />

premium on securing the integrity of an identity. Reliable<br />

verification is vital for the DMV in order to combat<br />

identity fraud and related criminal activities. Gemalto’s<br />

Coesys Document Verification software solution successfully<br />

allows DMV officials to verify the authenticity of<br />

documents such as passports, identity cards and driver<br />

licenses by simply checking the graphical data and security<br />

features against reference templates from an array of<br />

issuing countries. <strong>The</strong>se reference templates are stored<br />

in a database, administrated centrally and automatically<br />

synchronized into all local repositories. With Coesys<br />

Document Verification, each document type and version<br />

66


is recognized. Gemalto’s solution provides unmatched<br />

results identifying counterfeit documents and accepting<br />

genuine ones. Using Gemalto’s sophisticated technology,<br />

the California DMV is able to streamline its review<br />

process, overcome the challenge of authenticating foreign<br />

documents and identify any document abnormalities<br />

or defects. Gemalto’s solution is designed to make<br />

it easy to quickly confirm on-the-spot the authenticity of<br />

documents and the identity of an applicant. Importantly,<br />

Coesys Document Verification enables DMV officials<br />

to verify identity documents with peace of mind. Gemalto<br />

was selected because of the company’s ability to meet<br />

the California DMV’s specific requirements and in the<br />

specified timeframe. Gemalto’s experts understood the<br />

California DMV’s specific business practices and were<br />

able to provide a consistent solution to all of the DMV’s<br />

nearly 200 offices. For DMV representatives, Gemalto’s<br />

Coesys Document Verification is simple to use and<br />

provides instantaneous results identifying counterfeit<br />

documents and accepting genuine ones. Gemalto also<br />

worked with the California DMV to bring an automated<br />

synchronization solution connected to a central document<br />

repository, which reduces the burden of manual<br />

updates on each authentication workstation located<br />

within the DMV field offices. More than just software,<br />

Coesys Document Verification is a fully-customizable<br />

editing platform that enables customers like the California<br />

DMV to pilot each and every verification action<br />

on any identity document. Coesys Document Verification<br />

is part of Gemalto’s Border and Visa Management<br />

suite. Its flexible architecture enables customization to<br />

suit any customer deployment configuration. Gemalto’s<br />

objectives for its Coesys Document Verification software<br />

solution are to: mitigate risk of identity fraud; provide a<br />

solution flexible enough to keep up with the demands<br />

of changing infrastructures, technologies, document<br />

standards and attempts to perpetrate fraud; and provide<br />

its customers with ease of use and peace of mind.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.gemalto.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.gemalto.com/press/Pages/California-selects-Gemalto-for-automated-identitydocument-verification.aspx<br />

http://www.gemalto.com/govt/coesys/doc-verification<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Michelle Leech<br />

Gemalto<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (512) 605-2110<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ellenmichelle.leech@gemalto.com<br />

67


Agiliance Inc.<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Compliance/Vulnerability Assessment Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RiskVision 7.5<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> biggest inhibitor of effective security and vulnerability<br />

management lies in the fact that the number of<br />

threats to organizations has grown exponentially over<br />

the past few years. This is largely due to the increasing<br />

number of IT assets under management, which are<br />

creating a big data challenge. To ensure proper coverage,<br />

government organizations in many cases are relying<br />

on multiple tools to produce the necessary vulnerability<br />

assessment data. This only adds to the volume, velocity,<br />

and complexity of data feeds that must be analyzed,<br />

normalized, and prioritized. Relying on human labor<br />

to comb through mountains of data logs is one of the<br />

main reasons that critical vulnerabilities are not being<br />

addressed in a timely fashion. According to the Verizon<br />

Data Breach Investigations Report, 92% of breaches<br />

were discovered by a third party and not through internal<br />

resources. As a result, government organizations are<br />

seeking technical solutions to automate data aggregation,<br />

normalization, and business impact correlation.<br />

<strong>The</strong> ultimate objective is to shorten the window attackers<br />

have to exploit a software flaw, thereby reducing the<br />

overall risk of cyber-attacks and insider threats. Agiliance<br />

is assisting civilian, defense, and intelligence agencies in<br />

achieving continuous monitoring and enabling them to<br />

report on their organizations risk and security posture<br />

in near real time. <strong>The</strong> company’s RiskVision software<br />

gathers data feeds from otherwise silo-based security<br />

and IT tools such as SIEMs, configuration management<br />

databases, vulnerability scanners, threat data feeds and<br />

advisory services, database security management, etc.<br />

68


and then aggregates, normalizes, and correlates this<br />

information based on business criticality. This enables<br />

a near real time snap shot of an organization’s security<br />

posture. In addition, RiskVision automates an organization’s<br />

governance processes, providing insight into the<br />

agency’s compliance posture. <strong>The</strong> final result is a riskbased<br />

assessment of the organization’s infrastructure<br />

which prioritizes remediation actions based on business<br />

criticality. If needed, RiskVision can also assist with automatic<br />

ticket creation. By using the Agiliance ticketing<br />

system or integrating with leading ticketing and patch<br />

management systems, an organization’s security operations<br />

team can shadow the progress the IT team makes<br />

in mitigating the vulnerabilities. This eliminates the<br />

traditional approach best described as throwing something<br />

over the fence and praying for the best outcome.<br />

For one major government agency, using RiskVision<br />

resulted in a dramatic increase in operational efficiency.<br />

Prior to using Agiliance, it took 60 full-time employees<br />

working 24 x 7 for a month to manually create 180,000<br />

remediation tickets. With RiskVision, the agency was<br />

able to reduce the headcount required to oversee ticket<br />

creation by more than 80% and shrink the processing<br />

time from one month to a couple of days. RiskVision<br />

is considered by many to be the best compliance and<br />

vulnerability management solution on the market for<br />

its ability to combine risk intelligence, using big data<br />

gathered and correlated from security operations tools,<br />

with automated remediation that establishes bi-directional<br />

workflows with IT operations. <strong>The</strong> end result is<br />

improved operational efficiency through automated<br />

continuous monitoring and ticketing to remediate only<br />

business critical risks.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.agiliance.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RiskVision Named Best New Risk Management Software<br />

in <strong>2015</strong> Security Products Magazine Awards:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0923_<br />

SecurityProduct_Awards.html<br />

Agiliance Dominates at American Business Awards:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0915_<br />

American_business_award.html<br />

RiskVision Helps Retailers Minimize Cyber Risk Exposure:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0910_<br />

Cyber_Risk_Exposure.html<br />

Agiliance Scores Big at International Stevie Awards:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0814_<br />

Stevie_Awards.html<br />

Agiliance Named to Cybersecurity 500:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0907_<br />

Cybersecurity_500.html<br />

RiskVision Earns Two IT World Awards from Network<br />

Products Guide:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0807_<br />

Nation_Product_Guide_Winner.html<br />

RiskVision Scores Twice at Info Security Products<br />

Guides <strong>2015</strong> Global Excellence Awards:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>2104_<br />

Info_Security_Products_Guides.html<br />

Cyber Defense Magazine Names RiskVision Most<br />

Innovative Risk Management Solution for Second-<br />

Consecutive Year:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>2004_<br />

Most_Innovative_Solution.html<br />

69


RiskVision Named Best Monitoring Solution in Govies<br />

<strong>2015</strong> Awards:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>1704_<br />

Best_Monitoring_Solution.html<br />

Agiliance to Showcase Essential Building Blocks for<br />

Cyber Security at RSA Conference <strong>2015</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>1404_<br />

Essential_Building_Blocks_for_CyberSecurity.<br />

html<br />

RiskVision 7.5 Enables Good Cyber Hygiene to<br />

Achieve Immediate and Effective Defenses Against<br />

Cyber-Attacks:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0704_<br />

RiskVision_75.html<br />

Agiliance Becomes a Board and Business Standard for<br />

Managing Cyber Security Operational Risks in 2014:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>1601_<br />

Agiliance_Cyber_Security_Operational_Risk.<br />

html<br />

Agiliance / ESG White Paper: Beyond GRC: SRM and<br />

the Move to Integrated Risk Management:<br />

http://www.agiliance.com/forms/WhitePaper-<br />

Reg.html?doc=Beyond_GRC<br />

Agiliance White Paper: How to Achieve a Continuous<br />

Monitoring Framework:<br />

http://www.agiliance.com/infocenter/whitepaper.html<br />

Agiliance Data Sheets:<br />

http://www.agiliance.com/infocenter/<br />

Agiliance Case Studies:<br />

http://www.agiliance.com/infocenter/casestudy.<br />

html<br />

Agiliance Recorded Webcasts:<br />

http://www.agiliance.com/news/webcasts.html<br />

Agiliance Product Tours:<br />

http://www.agiliance.com/infocenter/tour.html<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Torsten George, Vice President of<br />

Worldwide Marketing and Products<br />

Agiliance, Inc.<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (408) 200-0461<br />

cell: (408) 431-3250<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

tgeorge@agiliance.com<br />

70


71


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

RSA, <strong>The</strong> Security Division of EMC<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Endpoint Detection and Response Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA ECAT<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA President Amit Yoran said “IT Security has Failed.”<br />

Organizations across a wide range of industries are<br />

breached, new malware, zero-day vulnerabilities are<br />

everywhere. Money, intellectual-property, hacktivism<br />

are only a few of the reasons. <strong>The</strong>y are bombarded with<br />

crimeware, adware, targeted campaigns, and nationstate<br />

attacks. Attackers today can easily bypass traditional<br />

signature-based defenses, create persistency, move<br />

laterally, exfiltrate data while leaving organizations blind<br />

from those types of threats that will put their name on<br />

the first page of today’s news. RSA does not believe in<br />

this status quo! How is RSA ECAT doing things differently?<br />

ECAT is an endpoint threat detection and response<br />

solution focused on malware and other threats’ behavioral<br />

detection, able to provide visibility to how wide-<br />

spread an attack is and instantly determine the scope<br />

and mitigate in real-time. Analysts trust ECAT to identify<br />

both the known and unknown zero-day malware based<br />

on its behavioral-based detection capabilities.<br />

RSA ECAT’s approach provides:<br />

• Behavioral modeling via ECAT’s Instant Indicator of<br />

Compromise (IIOC). ECAT provides an out-of-the-box<br />

list (~300) of IIOCs for both Windows and Mac operating<br />

systems, being able to identify the exact attack<br />

vector used by threats and generic behavior indicative<br />

of malware. Based on IIOCs triggered, a machine and<br />

module risk score are generated enabling analysts for<br />

better detection and prioritization capabilities. ECAT’s<br />

IIOCs expose the attack characteristics by pointing the<br />

72


analysts automatically at the suspicious modules and<br />

attack vectors identified such as: floating code, hidden/<br />

temp/program data folder write to executable, scripts<br />

run (PSexec, whoami, etc.) which equips the analyst<br />

with tools and techniques used to not only identify the<br />

how but the who as well. All IIOCs are executed serverside<br />

as data is processed, reducing no overhead on the<br />

agent and client performance.<br />

• Detection and Visibility through Layered Approach.<br />

While ECAT performs live memory analysis and in-depth<br />

inspection of host behavior, it is also leveraging other<br />

ways of enriching data for analysis by using OPSWAT,<br />

Yara, module reputation models, and multiple threat<br />

intelligence data feeds including RSA Research and<br />

community-based intel via STIX, enabling analysts to<br />

quickly come to a resolution and take response action.<br />

• Detect, Investigate and Response. While threats will<br />

find their way into the organization, being able to trigger<br />

a response action to shorten dwell time is a key.<br />

ECAT is able to block and quarantine suspicious modules<br />

for endpoints within a corporate network as well as<br />

endpoints off network connected to the Internet.<br />

• Machine Learning Risk Score system. <strong>The</strong> Risk Score<br />

system collects and analyzes vast amounts of data on<br />

the endpoint and network data transferred in/out and<br />

compiles a module and machine risk score based on a<br />

statistical machine-learning, adaptive model. ECAT’s analysts<br />

leverage the risk score as the basis for prioritized<br />

investigation, working on the most risky endpoints such<br />

as: module behavior, machine status, threat intelligence,<br />

business context, etc. Significant contributors to ECATs<br />

Risk Scoring system are RSA’s data-science team and Incident<br />

Responders providing contact feedback and new<br />

findings identified.<br />

• Enterprise Scalability. ECAT protects 50,000 agents<br />

with a single ECAT server.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA ECAT Home Page:<br />

https://www.emc.com/security/rsa-ecat.htm<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Bryan Grillo, Vice President<br />

CHEN PR<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (781) 466-8282<br />

cell: (617) 947-0547<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

bgrillo@chenpr.com<br />

73


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

RSA, <strong>The</strong> Security Division of EMC<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Big Data Analytics Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Security Analytics<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> application of Big Data Analytics/Data Science<br />

techniques to the challenge of IT security is in its early<br />

stages, but what is clear given the seemingly unending<br />

stream of major breaches, is that what the security<br />

industry is doing today isn’t working. A new approach<br />

to IT security is needed. A key challenge is that the<br />

detection of what can be very subtle and targeted attacks<br />

is nearly impossible with the signature, perimeter,<br />

and log/SIEM dependent security systems that are most<br />

prevalent today. <strong>The</strong> attraction of Big Data Analytics<br />

and its associated Data Science techniques are that they<br />

provide capabilities that are most in need to address<br />

today’s security challenges, namely the ability to ingest<br />

and manipulate a very large and diverse set of data<br />

from across an enterprise, over a long time horizon,<br />

and apply analytic techniques to it which are tuned to<br />

finding subtle signals of an attack amongst the everyday<br />

normal activity of the organization. Attackers have<br />

learned to hide in plain sight and move low-and-slow to<br />

remain undetected. By using Data Science models with<br />

the right data, one can shine a light on this activity. RSA<br />

Security Analytics deserves to win this award because<br />

it uniquely combines the ability to collect, ingest and<br />

make sense out of large amounts of internal telemetry<br />

– logs, events, full network traffic, netflow, endpoint<br />

activity, IT asset, identity, and other business context<br />

and combine it with external threat intelligence to<br />

massively increase the security visibility of the organization.<br />

To this data RSA Security Analytics applies multiple<br />

detective analytic techniques, including those based<br />

74


on Big Data Analytics/Data Science, to surface security<br />

anomalies that are highly suggestive of advanced or<br />

targeted attacks. Our Data Science models use hundreds<br />

of indicators to identify activities such as beaconing and<br />

suspicious domain activity. No other security product<br />

on the market combines the capabilities of broad and<br />

deep, enterprise-wide, data collection, data enrichment,<br />

with the delivery of tested detective oriented, Data Science<br />

based algorithms which can be applied to a given<br />

organization with only modest customization. Some<br />

competitive products natively collect some of this data,<br />

but usually not the most important (network packets<br />

& endpoint activity data) sets, while other products<br />

collect no data at all and only provide an analytic platform,<br />

leaving the data collection as an exercise for the<br />

customer. Other products provide general purpose Big<br />

Data Analytics capabilities, but leave it to the organization<br />

and their own data scientists (which most security<br />

organization don’t have) to apply these general purpose<br />

tools to the security domain. RSA Security Analytics is<br />

a detective and investigative platform that was specifically<br />

designed for the security domain, provides its own<br />

native data collection and management capabilities for<br />

the data most likely to have the subtle signals of an attack,<br />

and marries this with analytic algorithms that were<br />

specifically designed by RSA’s security researchers and<br />

data scientists to aide in the detection of today’s most<br />

advanced and targeted attackers.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Security Analytics Home Page:<br />

http://www.emc.com/security/security-analytics/security-analytics.htm<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Chris Conway, Associate Account Executive<br />

CHEN PR, Inc.<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (781) 672-3113<br />

cell: (508) 212-4226<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cconway@chenpr.com<br />

75


BeyondTrust<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Privileged Access Management Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

PowerBroker for Unix & Linux<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Whether the goal for attackers is to compromise sensitive<br />

government data, steal personally identifiable information<br />

(PII) or disrupt normal operations, the increasing<br />

sophistication of attacks is making it more difficult<br />

to safeguard the federal government’s cyber critical<br />

infrastructure. Adding to the complexity of cybersecurity<br />

is the compliance landscape for government agencies<br />

that changes with almost every administration. <strong>The</strong>re<br />

are always new requirements – and penalties – that<br />

agencies must anticipate, implement, and report on.<br />

Large-scale information breaches, like the recent Office<br />

of Personnel Management attack, often begin with an attacker<br />

exploiting a single external vulnerability on a lowlevel<br />

system or through contractor credentials, and then<br />

capitalizing on privileges to gain access to critical sys-<br />

tems and data. It is also very possible for a government<br />

employee to abuse access privileges from the inside to<br />

steal sensitive information. One has to look no farther<br />

than Edward Snowden as a proof point. BeyondTrust’s<br />

PowerBroker for Unix & Linux for least privilege helps<br />

balance the privilege requirements of users, with those<br />

of security and compliance teams, for routers/switches,<br />

and mainframes in Unix and Linux environments. <strong>The</strong><br />

solution enables IT Security teams to confidently deploy<br />

secure and compliant network gear, servers and<br />

desktops, while giving employees the correct amount of<br />

privileged access to applications without affecting a user’s<br />

ability to remain productive. <strong>The</strong> result is improved<br />

security, through reduced risk and attack surface, along<br />

with improved system uptime and availability. Sudo<br />

76


presents unique challenge faced by government departments<br />

and agencies using Unix or Linux – specifically<br />

the time and effort it takes for their organization to migrate<br />

to a commercially supported solution and whether<br />

or not their existing data and policies can be integrated.<br />

With PowerBroker for Unix & Linux, organizations do<br />

not have to sacrifice existing sudoer files for the sake<br />

of centralization. Instead, organizations can store and<br />

centralize multiple sudoer files in PowerBroker, adding<br />

enhanced policy groupings to more easily define user<br />

roles across the enterprise. <strong>The</strong> result is a simplified migration<br />

path from sudo. Auditing and controlling activity<br />

inside scripts and third-party applications within Unix<br />

and Linux systems have also been difficult for many<br />

organizations to achieve, especially when it is easy to<br />

“cheat” the system by pointing shortcuts to unapproved<br />

applications. PowerBroker for Unix & Linux overcomes<br />

these challenges by providing enhanced system level<br />

control and audit capabilities over any application – regardless<br />

of how the application is initiated. When users<br />

click on an icon, all activity (including keystroke information)<br />

is recorded. This helps organizations control<br />

actual commands and actions at the system level. <strong>The</strong>se<br />

and other capabilities enable PowerBroker customers to<br />

meet the privileged access control requirements of government<br />

and industry mandates including SOX, HIPAA,<br />

PCI DSS, GLBA, PCI, FDCC, FISMA and more. With more<br />

than 200 U.S. Federal departments and agencies as customers,<br />

BeyondTrust delivers powerful privileged access<br />

management solutions that have been proven in a wide<br />

range of large and complex IT environments.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.beyondtrust.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.beyondtrust.com/Products/Power-<br />

BrokerUnixLinux/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Douglas De Orchis, Client Executive<br />

Voce Communications<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (617) 897-8259<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ddeorchis@vocecomm.com<br />

77


CyberArk<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Privileged Access Management Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CyberArk Privileged Account Security Solution<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> CyberArk Privileged Account Security Solution<br />

focuses on eliminating the most advanced cyber threats<br />

– those that exploit privileged credentials to attack the<br />

heart of the enterprise. <strong>The</strong> CyberArk solution helps<br />

identify existing privileged credentials across networks,<br />

makes sure those credentials are locked down and secure,<br />

and leverages continuous monitoring of privileged<br />

account credentials to detect anomalous behavior and<br />

stop an attack early in the cycle to reduce damage. In<br />

July <strong>2015</strong>, CyberArk achieved Common Criteria Certification<br />

for the CyberArk Privileged Account Security<br />

Solution. This designation is an important independent<br />

evaluation of the security capabilities of IT products<br />

and a key differentiator when working with the federal<br />

government. CyberArk is also the first vendor in the<br />

industry to achieve the certification for a comprehensive<br />

privileged account security solution. CyberArk has been<br />

working with government agencies to use its solution<br />

to address privileged user security priorities set forth in<br />

the federal government’s 30-day Cybersecurity Sprint.<br />

CyberArk designed the Privileged Account Security Solution<br />

for low total cost of ownership, with ease of management<br />

and access to ongoing training. <strong>The</strong> CyberArk<br />

Privileged Account Security Solution is built on a shared<br />

technology platform, is designed to integrate into any IT<br />

environment, and delivers enterprise-class security, scalability<br />

and high availability on a single integrated solution.<br />

With the modular Privileged Account Security Solution,<br />

organizations can better protect their networks by:<br />

securely storing, rotating and controlling access to SSH<br />

78


keys; isolating, monitoring, recording and controlling<br />

privileged sessions on critical systems; and providing<br />

targeted, immediately-actionable threat alerts through<br />

patent-pending analytic technology. <strong>The</strong> CyberArk<br />

solution is further differentiated by its patented <strong>Digital</strong><br />

Vault technology and Master Policy engine. Launched in<br />

the past year, the CyberArk SSH Key Manager enables<br />

customers to secure and manage SSH keys, just like any<br />

other privileged credential. Also available as part of the<br />

solution is CyberArk Privileged Threat Analytics, which<br />

detects, alerts and responds to cyber attacks by collecting,<br />

monitoring and analyzing privileged account data,<br />

including activity from the CyberArk Vault, and data<br />

feeds from security information and event management<br />

(SIEM) systems to identify and lessen the most serious<br />

of risks. An independent study from Nucleus Research<br />

on customer ROI found that the CyberArk Privileged<br />

Account Security Solution reduced customers’ cyber security<br />

risk profile, as well as delivered complete payback<br />

within six months, providing greater ROI as the Cyber-<br />

Ark platform is used over time. CyberArk was named a<br />

leader in the IDC MarketScape: Worldwide Privileged<br />

Access Management 2014 Vendor Assessment, calling<br />

CyberArk the “privileged access management pure-play<br />

‘big gorilla’ with the most revenue and largest customer<br />

base.” Today, CyberArk has a customer base of more<br />

than 1,900, including 40 percent of the Fortune 100, 19<br />

percent of the Global 2000 and 17 of the world’s top 20<br />

banks, and includes leading enterprises in a diverse set<br />

of industries, such as energy and utilities, financial services,<br />

healthcare, manufacturing, retail, technology and<br />

telecommunications, as well as government agencies.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.cyberark.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Background on the CyberArk Privileged Account Security<br />

Solution:<br />

http://www.cyberark.com/products/privilegedaccount-security-solution/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Liz Campbell, Sr. Manager,<br />

Corporate Communications<br />

CyberArk<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (617) 558-2191<br />

cell: (781) 820-9840<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

liz.campbell@cyberark.com<br />

79


CyberArk<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring and Mitigation Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CyberArk Privileged Threat Analytics<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> devastating cyberattacks on Sony Pictures, Anthem<br />

and U.S. Office of Personnel Management (OPM) demonstrate<br />

that today’s cyber security battle has shifted<br />

from the perimeter to inside the IT network. Once<br />

inside a targeted network, attackers immediately seek<br />

to steal and exploit privileged accounts – the gateway<br />

to sensitive and valuable information. Attackers exploit<br />

these accounts to navigate the system, conduct reconnaissance<br />

and escalate privileges – all while impersonating<br />

authorized users. In fact, industry research indicates<br />

that privileged credential exploitation is a signature in<br />

almost every advanced attack. That’s why organizations<br />

need to be proactively monitoring and recording all<br />

privileged activity to ensure attackers – whether they’re<br />

outside hackers or malicious insiders – are not able to<br />

gain access to critical networks, move laterally across<br />

the network to the target goal, or exfiltrate data without<br />

detection. CyberArk Privileged Threat Analytics detects,<br />

alerts and responds to cyber attacks by collecting, monitoring<br />

and analyzing privileged account data, including<br />

activity from the CyberArk Vault, and data feeds from<br />

security information and event management (SIEM)<br />

systems to identify and lessen the most serious of risks.<br />

This solution enables incident response teams to identify<br />

an attack in real time, take the necessary steps to<br />

mitigate the attack and reduce damage. Through industry-leading<br />

analytics, including self-learning, behaviorbased<br />

algorithms, CyberArk enables customers to detect<br />

attacks faster by pinpointing malicious privileged account<br />

activity previously hidden in the sheer volume of<br />

80


information collected by big data analytics solutions.<br />

With proactive controls and threat detection, CyberArk<br />

Privileged Threat Analytics is the only analytic solution<br />

able to detect malicious activity and actively respond by<br />

invalidating account access. This enables incident response<br />

teams to quickly contain threats by invalidating<br />

stolen credentials to stop an attacker from continuing<br />

their attack. By reducing an attacker’s window of opportunity<br />

and residual damage through real-time alerts on<br />

in-progress attacks, CyberArk Privileged Threat Analytics<br />

improves organizations’ effectiveness by enabling response<br />

teams to identify anomalous privileged activities<br />

and prioritize only the most critical security incidents.<br />

Privileged Threat Analytics is part of the CyberArk Privileged<br />

Account Security Solution. CyberArk delivers regular<br />

updates to ensure customers can proactively take<br />

advantage of new features including new algorithms that<br />

are added to the analytic engine. <strong>The</strong> R&D and Cyber-<br />

Ark Lab teams are constantly researching attacks in the<br />

wild and building new detection capabilities and algorithms<br />

to detect the latest attacks. Today, CyberArk has a<br />

customer base of more than 1,900, including 40 percent<br />

of the Fortune 100, 19 percent of the Global 2000 and<br />

17 of the world’s top 20 banks, and includes leading<br />

enterprises in a diverse set of industries, such as energy<br />

and utilities, financial services, healthcare, manufacturing,<br />

retail, technology and telecommunications, as well<br />

as government agencies. CyberArk serves customers in<br />

more than 65 countries and has more than 200 global<br />

partners.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.cyberark.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Main page for Privileged Threat Analytics information,<br />

including data sheets:<br />

http://www.cyberark.com/products/privilegedaccount-security-solution/privileged-threatanalytics/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Liz Campbell, Sr. Manager,<br />

Corporate Communications<br />

CyberArk<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (617) 558-2191<br />

cell: (781) 820-9840<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

liz.campbell@cyberark.com<br />

81


SolarWinds<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring and Mitigation Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds User Device Tracker<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds User Device Tracker (UDT) delivers automated<br />

user and device tracking with powerful switch<br />

port management capabilities empowering federal IT<br />

Pros with strong continuous monitoring capabilities and<br />

visibility into who or what is connected to their network.<br />

Highlights include:<br />

• Automatically discovers, maps and monitors switches,<br />

ports and network devices<br />

• Quickly finds devices and retrieves user name, port<br />

details, connection history and more<br />

• Enables searching on IP address, user name, hostname<br />

or MAC address to track endpoints<br />

• Allows whitelisting and watch lists with automatic<br />

alerts and click-of-a-button port shutdown<br />

• Provides detailed switch port usage data, capacity<br />

analysis and built-in reporting<br />

With the ever-increasing use of personal devices and<br />

applications, SolarWinds UDT provides federal IT Pros<br />

with peace of mind about the security of their network<br />

and the devices on it by continuously monitoring who<br />

and what connects to their network. Additionally, Solar-<br />

Winds UDT can track down lost or rogue devices with a<br />

simple search of a user name, IP address, hostname or<br />

MAC address, ensuring that all devices that can connect<br />

to federal networks stay in the right hands. SolarWinds<br />

UDT also features alerting that signifies unauthorized<br />

network access and provides the ability to quickly shut<br />

82


down switch ports to secure access to sensitive information.<br />

Updates to SolarWinds UDT coincide with the<br />

latest issues being tackled by IT Pros such as BYOD. In<br />

the latest update to scalability and additional support<br />

and optimization for varying devices and vendors was a<br />

priority. And, by working closely with and listening to<br />

its user community, SolarWinds is able to gain real-time<br />

and candid feedback from IT practitioners, so its products<br />

can address the problems and challenges prevalent<br />

in IT security today. SolarWinds UDT provides three<br />

critical capabilities for network and systems managers.<br />

First, it makes it possible to physically locate an enduser<br />

device or user on the network extremely quickly.<br />

Second, it allows for rapid quarantine of users or systems<br />

by remotely shutting down a switch port. Finally,<br />

it supports watch-lists and can alert when certain types<br />

of devices or specific users connect to the network and<br />

even take pre-defined actions to help protect information<br />

and other assets. SolarWinds software is built to<br />

scale and can support an IT environment of any size<br />

and is used by nearly every U.S. federal civilian agency,<br />

DoD branch and intelligence agency. SolarWinds UDT<br />

complements other products, such as SolarWinds Network<br />

Configuration Monitor, SolarWinds Log & Event<br />

Manager, and SolarWinds Server & Application Monitor,<br />

to name a few, providing additional breadth and depth<br />

for continuous monitoring. SolarWinds software can<br />

“collect once and report to many,” which gives IT, information<br />

assurance, and security departments the unique<br />

functionality they each need from a single, cost-effective<br />

set of tools. SolarWinds UDT licensing is based on the<br />

number of switch ports to being monitored. <strong>The</strong> licensing<br />

model features large jumps in switch port count<br />

allowing for rapid growth of an organization before an<br />

additional licensing level is reached and can scale to an<br />

unlimited number of switch ports.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.solarwinds.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Web page:<br />

http://www.solarwinds.com/user-device-tracker.aspx<br />

Additional information:<br />

https://www.youtube.com/watch?v=s4G_<br />

yPZq7Jc<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rebecca Orr, Corporate Communication<br />

Solarwinds<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (512) 498-6372<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rebecca.orr@solarwinds.com<br />

83


SolarWinds<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Security Incident & Event Management (SIEM)<br />

Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds Log & Event Manager<br />

Reason this entry deserves to win:<br />

–––––––––––––––––––––––––––––––––––––––– • Threat intelligence feed to help identify malicious<br />

SolarWinds Log & Event Manager (LEM) is a comprehensive<br />

security information and event management • File Integrity Monitoring delivers broader compliance<br />

activity<br />

(SIEM) solution that delivers powerful real-time event support and deeper security intelligence<br />

correlation and analysis for immediate, actionable threat • Fast and powerful forensics via cutting-edge search<br />

intelligence to thwart attacks, contain breaches, and and visual data exploration<br />

maintain continuous compliance in an ever-evolving • Out-of-the-box compliance reporting with predefined,<br />

threat landscape.<br />

customizable templates<br />

SolarWinds LEM Highlights:<br />

• Immediate threat detection via true real-time, inmemory<br />

event correlation<br />

• Proactive defense against cyber-attacks and insider<br />

abuse<br />

• Hands-free threat remediation through built-in, automated<br />

responses<br />

With SolarWinds LEM, organizations get what they need<br />

to stay ahead of security threats, compliance violations,<br />

and operational issues – all in one package. It<br />

gives users the ability to capture and analyze log data in<br />

real-time from multiple sources around specific incidents,<br />

which is instrumental in quickly identifying and<br />

responding to threats, uncovering policy violations, and<br />

84


esolving vital network issues. SolarWinds LEM surpasses<br />

other solutions by providing built-in Active Responses,<br />

event normalization, and a drag-and-drop UI to create<br />

custom dashboards easily. Active Responses enable<br />

users to take automatic actions for hands-free threat<br />

mitigation, including shutting down breached systems,<br />

blocking IP addresses, killing unexpected processes,<br />

and disabling user accounts. Event normalization makes<br />

reporting and identifying security incidents across different<br />

types of log sources simple. Additionally, Solar-<br />

Winds LEM provides advanced search functionality and<br />

easy-to-use data visualization tools to quickly explore<br />

log data, perform event forensics, and identify the rootcause<br />

of a security incident or network problem – fast.<br />

SolarWinds LEM goes well beyond traditional SIEM<br />

solutions with key innovations like in-memory correlation,<br />

automated Active Responses, USB Defender technology,<br />

and a groundbreaking approach to IT search.<br />

SolarWinds LEM’s latest release in September <strong>2015</strong><br />

added threat intelligence feed integration to its already<br />

strong feature set, helping the system stay up-to-date on<br />

known threats. Most importantly, SolarWinds listens to<br />

the IT security community to continually improve and<br />

update solutions based on user feedback and real-world<br />

needs. SolarWinds’ user community, thwack, features<br />

a forum in which IT pros can request and vote on new<br />

features and thus directly influence product updates.<br />

Check out the SolarWinds LEM feature request forum<br />

to see this process in action. SolarWinds LEM alleviates<br />

the complexity associated with compliance reporting<br />

by providing over hundreds of built-in, “audit-proven”<br />

report templates to address both internal policies and<br />

regulatory requirements, including NIST FISMA, DISA<br />

STIG, PCI-DSS, HIPAA, SOX, and more. Additionally, SolarWinds<br />

LEM is an integral part of a continuous monitoring<br />

strategy to maintain security and compliance.<br />

SolarWinds LEM is available on the U.S. General Services<br />

Administration (GSA) Schedule, Department of Defense<br />

ESI, and other contract vehicles. SolarWinds software is<br />

built to scale and can support an IT environment of any<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.solarwinds.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Web page:<br />

http://www.solarwinds.com/siem-security-information-event-management-software.aspx<br />

Compliance Video:<br />

https://thwack.solarwinds.com/docs/DOC-<br />

186983<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rebecca Orr, Corporate Communication<br />

Solarwinds<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (512) 498-6372<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rebecca.orr@solarwinds.com<br />

size, small business IT shops and large enterprises alike,<br />

and is used by nearly every U.S. federal civilian agency,<br />

DoD branch and intelligence agency. SolarWinds LEM<br />

employs a node-based license model vs. volume-based,<br />

allowing users to stay within a planned budget as they<br />

deploy and expand their IT infrastructures across multiple<br />

datacenters and geographies. Further, a Workstation<br />

Edition license makes monitoring logs from Windows ®<br />

workstations very cost effective.<br />

85


Securiport, LLC<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

ACCESS CONTROL AND IDENTIFICATION<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Biometric Identification Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Securiport, LLC<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Improving Civil Aviation Security with Securiport’s Civil<br />

Aviation & Immigration Security Services for Homeland<br />

Security & Allies of United States of America In today’s<br />

interconnected world, Civil Aviation plays a powerful<br />

and impactful role in fueling the global economy. It has<br />

the power to bridge cultural gaps and bring people<br />

together from all over the world. But with great power,<br />

also comes great responsibility. It is up to governments<br />

and their countries to take proactive steps towards<br />

strengthening their Civil Aviation Security capabilities.<br />

With the growing popularity and freedom to travel<br />

basically anywhere in the world with Civil Aviation,<br />

many individuals and criminal organizations are taking<br />

advantage of systems in place to conduct illegal activity<br />

such as smuggling narcotics, weapons, and even humans.<br />

In addition, Civil Aviation has increasingly be-<br />

come the focus of the operational activity of various<br />

terrorist organizations as a subject, rather than an<br />

implement, of their actions [2] . Due to these increased<br />

security risks, it is paramount that airports and security<br />

checkpoints are equipped with the necessary technology,<br />

resources, processes, systems, and training needed<br />

to effectively identify potential security risks and criminal<br />

activity. Securiport’s Integrated Immigration Control<br />

System (IICS) can help countries, such as Honduras,<br />

strengthen their airport security capabilities. By implementing<br />

an intelligent solution that utilizes the most<br />

advanced technologies (such as biometric identification<br />

systems), and is connected with international traveler<br />

databases, security officials are provided a comprehensive<br />

set of traveler data and information that can be used<br />

to confirm a passenger’s identity and uncover certain<br />

86


security risks. By leveraging these systems, government of aviation, there has been a “transportation revolution”<br />

officials and immigration officers will be able to equip around the world, which has paved the way for rapid<br />

themselves with the actionable data and necessary and free movement of people, commodities and services<br />

information needed to keep all ports of entry secure, on a global scale [2] . This is known as globalization and<br />

ultimately creating safer and more secure nations. This provides many positives for our world, but regretfully<br />

creates a complete Civil Aviation Security solution, one has a negative side as well. Beyond any doubt, the<br />

that elicits safer travels, more secure nations and is emergence of terrorism as a global threat is the biggest<br />

tailored to provide benefits to both travelers and governments.<br />

<strong>The</strong> Civil Aviation industry has been around tries. Terrorism has evolved into a major geopolitical<br />

challenge facing the Civil Aviation and security indus-<br />

for over 100 years, since Tony Jannus piloted a plane factor, capable of causing systematic crises at a global<br />

across Tampa Bay, Florida on January 1st, 1914. Today, scale. And by virtue of its functional significance and<br />

more than 3.3 billion people utilize aviation and take to vulnerability, Civil Aviation is increasingly becoming the<br />

the air each year [1] . Whether it’s for business or visiting focus of the operational activity of different terrorist<br />

family, the Civil Aviation industry has revolutionized the groups [2] . High taxes and a lack of resources and a<br />

way people connect, interact and conduct business. This proper infrastructure can hinder the performance and<br />

ability to bring people together from different parts of efficiency of Civil Aviation Security from identifying<br />

the globe, known as aviation connectivity, has been the potential suspects and uncovering criminal activity. In<br />

catalyst for economic growth, connecting individuals addition to the threat of terrorism, aviation has been<br />

from all over the globe ultimately fueling the global used as a hotbed for a plethora of other criminal activity,<br />

economy. IATA’s Director General and CEO, Tony Tyler, such as drug smuggling and passengers traveling under<br />

spoke about aviation’s role in the global economy and false names and documents. This makes it critical to<br />

stated “aviation is helping fuel the growth of the global take practical and necessary steps toward improving the<br />

economy. It brings people together – families, friends security capabilities at international points of entry such<br />

and business colleagues. It helps minds to meet and as airports. Solution: Securiport’s Civil Aviation and<br />

exchange ideas in forums. It gives people the freedom Immigration Security Services (CAISS) With the increase<br />

to be almost anywhere in just 24 hours. And it has in globalization and aviation connectivity, criminal<br />

turned our wonderfully big planet into a wonderfully activity and the threat of attacks on aircrafts by terrorists<br />

small world of enormous and wonderful opportunities.” remain persistent and growing concerns for our world.<br />

<strong>The</strong> aviation industry is truly the lifeblood of the global Countries around the globe have a number of safeguards<br />

in place to prevent attacks against commercial<br />

economy; it supports over 58 million jobs and $2.4<br />

trillion in annual economic activity [1] . It stimulates aircrafts such as security checkpoints at airports where<br />

tourism, supports and creates jobs for farmers who sell passengers and their carry-on items are screened for<br />

fresh produce and flowers in world markets, and facilitates<br />

global supply chains to support collaboration Historically, however, screeners who operate check-<br />

dangerous objects, such as weapons and explosives.<br />

among workers in different countries to build cars, points in the U.S. have had difficulty in detecting potentially<br />

dangerous situations, missing as many as 20%<br />

airplanes and computers. Aviation helps deliver many of<br />

the real world goods that are traded in global markets during tests [3] . With the large number of passengers<br />

and has been the catalyst for global economic and social traveling through airports every day, it is critical that<br />

development. With the increase in popularity and usage<br />

Continued on next page<br />

87


immigration and security checkpoints are equipped with<br />

the proper resources and infrastructure needed to identify<br />

potential security risks and criminal activity. Countries<br />

should look to implement intelligent Civil Aviation solutions<br />

that utilize the latest technology, such as Securiport’s<br />

Civil Aviation and Immigration Security Services (CAISS).<br />

Securiport, a global leader in the design and implementation<br />

of passenger biometric recognition, immigration<br />

control systems, and intelligent information management<br />

and reporting software systems, is committed to the<br />

Science of Safer Nations by empowering governments to<br />

enhance their Civil Aviation Security and combat criminal<br />

activity. Securiport’s Integrated Immigration Control<br />

System (IICS) is a comprehensive security solution that<br />

empowers border management and immigration officials.<br />

<strong>The</strong> IICS utilizes advanced biometric identification systems<br />

and provides proprietary intelligent information used to<br />

identify potential security risks and criminal activity,<br />

further strengthening the effectiveness of their security<br />

capabilities. When coupled with Securiport’s Intelligent<br />

Information Management System, a methodology for<br />

cross-referencing passenger information across international<br />

traveler databases, such as INTERPOL’s I-24/7, the<br />

CAISS provides governments, airport security, and immigration<br />

officials with a comprehensive set of traveler data<br />

and information that can be used to confirm a passenger’s<br />

identity and uncover certain security risks. <strong>The</strong> CAISS also<br />

includes Watch-list Management, which crosschecks<br />

passenger information against multiple government<br />

databases and performs real-time identification checks.<br />

Implementing a solution such a Securiport’s CAISS,<br />

governments and airport security officials can drastically<br />

improve the performance and effectiveness of airport<br />

security checkpoints and better prevent terrorists and<br />

criminals from illegally entering or leaving their country’s<br />

borders. Beyond increasing the performance and effectiveness<br />

of airport security checkpoints, countries and airliners<br />

can work together to strengthen Civil Aviation Security<br />

by improving the passenger experience. Earlier this year,<br />

Securiport was named a Strategic Partner to the Interna-<br />

tional Air Transport Association (IATA) and has been<br />

involved in discussions within program areas of expertise<br />

such as Security and Passenger Experience. As a contributing<br />

member of the Passenger Experience area of expertise,<br />

Securiport has focused on improving the passenger<br />

experience across 14 steps, including security and immigration<br />

processes. Many key stakeholders within the Civil<br />

Aviation industry are very optimistic about mobile technology<br />

helping the industry to meet passengers’ expectations<br />

and to provide a more seamless experience going through<br />

security and immigration checkpoints. Having a betterdefined<br />

process in place that incorporates modern technology<br />

and intelligent systems creates a more streamlined<br />

airport experience, and therefore will improve the capabilities<br />

and effectiveness of airport security checkpoints.<br />

Benefits to Governments Through implementing Securiport’s<br />

Civil Aviation and Immigration Security Services and<br />

other various security solutions, countries such as Honduras<br />

could benefit greatly. In recent months, the Government<br />

of the Republic of Honduras has been working to<br />

prevent and reduce human and narcotic traffickers as well<br />

as other criminals from illegally crossing its borders.<br />

Honduras and the U.S. held a High Level Security Dialogue<br />

to discuss ways the U.S. and Honduras can continue<br />

to work together to strengthen both countries’ borders.<br />

Honduras highlighted its notable successes over the past<br />

year, including the extradition of major drug traffickers to<br />

the United States and an impressive drop in the homicide<br />

rate. Honduras also outlined its strategy for countering<br />

threats like transnational organized crime and trafficking<br />

in persons and drugs [4] . By strengthening airport security<br />

capabilities and improving traveler safety, governments<br />

such as the Honduran government, can substantially<br />

decrease the amount of resources needed to monitor and<br />

deter criminals from illegally entering or leaving the<br />

country. To help accomplish this, Securiport provides a<br />

substantial investment in the technology, training, and<br />

processes for countries in regards to immigration and<br />

security. This ensures the security officials are equipped<br />

with the necessary knowledge and resources to improve<br />

88


their security capabilities with little to no investment from<br />

the country itself. With the assistance of Securiport,<br />

implementing advanced solutions such as the Integrated<br />

Immigration Control System and Intelligent Information<br />

Management and Profiling, Honduras can substantially<br />

improve their border security and dismantle human<br />

smuggling networks and other criminal activity. Just last<br />

year, Securiport’s Intelligent Information Management<br />

Data Analytics enabled international authorities to interdict<br />

a Senegal-based human trafficking ring, resulting in<br />

numerous criminal arrests. In addition, Securiport’s IICS<br />

assisted in the identification and arrest of an individual<br />

traveling with a stolen passport, who belonged to a vast<br />

network of counterfeiters. By leveraging these systems,<br />

countries such as Honduras will be able to equip themselves<br />

with the actionable data and necessary information<br />

needed to keep all of ports of entry secure. This creates<br />

safer and more secure nations.<br />

Business Outcomes:<br />

1) http://www.securiport.com/securiports-intelligent-information-management-data-analytics-enable-internationalauthorities-interdict-senegal-based-human-trafficking-ringresulting-numerous-criminal-arrests-preservati/<br />

2) http://www.securiport.com/securiports-integratedimmigration-control-system-assist-in-the-identification-andarrest-of-a-passenger-traveling-to-senegal-with-a-stolenpassport/<br />

3) http://www.securiport.com/solutions/intelligent-information-management-and-profiling/<br />

4) http://www.securiport.com/technology/biometric-identification-systems/<br />

References:<br />

http://www.iata.org/pressroom/speeches/Pages/2014-10-14-01.aspx<br />

http://www.comw.org/tct/fulltext/0503arasly.pdf<br />

http://www.gao.gov/assets/160/156968.pdf<br />

http://www.state.gov/r/pa/prs/ps/<strong>2015</strong>/01/235867.htm<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.securiport.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1) http://www.securiport.com/securiport-and-inmarsat-partner-to-deliver-new-border-securityservice/<br />

2) http://www.securiport.com/securiports-intelligent-information-management-data-analyticsenable-international-authorities-interdict-senegal-based-human-trafficking-ring-resultingnumerous-criminal-arrests-preservati/<br />

3) http://www.securiport.com/securiports-integrated-immigration-control-system-assist-inthe-identification-and-arrest-of-a-passengertraveling-to-senegal-with-a-stolen-passport/<br />

4) http://www.securiport.com/solutions/intelligent-information-management-and-profiling/<br />

5) http://www.securiport.com/technology/biometric-identification-systems/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Borenstein Group<br />

Nominating contact’s office telephone and<br />

email:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Gal Borenstein, (PR Point of Contact)<br />

(703) 385-8178 x28 gal@borensteingroup.com<br />

Megan Gallagher, Client Director of Comm.<br />

(202) 339-6288 mgallagher@securiport.com<br />

89


Viscount Systems<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

ACCESS CONTROL AND IDENTIFICATION<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Integrated System for HSP D-12/FIPS 201<br />

Compliance<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Freedom Access Control<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Freedom is an IT-centric access control system that<br />

eliminates the need for traditional access control panels.<br />

Fully compliant with FIPS-201 and HSPD-12, Freedom<br />

leverages the power of the IT infrastructure to control<br />

access points through encryption bridges that transform<br />

card readers into IP addressable devices. Data<br />

is encrypted to eliminate the opportunity for cyber<br />

threats, ensuring a high level of security is maintained.<br />

Network complexity and upfront costs are immediately<br />

reduced due to a reduction in hardware and infrastructure<br />

investments, allowing users to meet strict budget<br />

requirements, and experience immediate and long-term<br />

return-on-investment. Freedom’s unique architecture<br />

leverages existing IT infrastructure to meet the FICAM<br />

(Federal Identity Credential and Access Management)<br />

requirements by integrating the PIV and PIV-I (personal<br />

identity verification - interoperability) credential<br />

certificate validation and authentication functionality<br />

directly into the access control software. Physical access<br />

points are controlled using IP encryption bridges to<br />

connect door hardware and transform card readers into<br />

IP addressable devices. Credentials are presented at the<br />

reader and cryptographically challenged by the Freedom<br />

PACS Validation software. <strong>The</strong>se credentials are then authenticated<br />

and validated before an authorization check<br />

is performed to grant or deny access to the cardholder.<br />

Freedom Access Control allows companies to build integrated<br />

access control and video management systems<br />

under one centrally managed or distributed network.<br />

Freedom expands as the security needs and physical<br />

90


footprint of the organization change, enabling it to build<br />

large physical security networks without requiring any<br />

additional investment in communication infrastructure.<br />

Organizations of any size can integrate physical security<br />

devices such as card readers, ID management, visitor<br />

entry, alarm points, and video applications. Video management<br />

systems can be easily added to Freedom for a<br />

single, unified system. Another unique advantage inherent<br />

on the Freedom software platform is an open API<br />

for third-party technology partners or the enterprise’s<br />

IT department for specialized or custom integrations.<br />

Viscount Systems has been awarded contracts to provide<br />

access control for government agencies such as USCIS<br />

because of the unique technical capabilities of its Freedom<br />

access control solution as well as its compliance<br />

with FIPS-201 and HSPD-12. As part of the FICAM testing<br />

process, Freedom underwent a series of stringent<br />

compliance tests to ensure the system is not prone to<br />

any type of unauthorized network access. <strong>The</strong> result is<br />

a lower cost per door with overall lower annual maintenance<br />

costs than the traditional panel alternatives.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.viscount.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Freedom unifies physical and logical access control initiatives<br />

across enterprises:<br />

http://www.viscount.com/access-control/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CompassPR<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

delphine@compasspulicrelations.com<br />

91


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

COMMUNICATION PRODUCTS<br />

Acoustic Technology, Inc.<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Mass Notification Systems<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

MassAlert ®<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Acoustic Technology, Inc. (ATI Systems) has successfully<br />

developed, designed, manufactured and installed<br />

highly integrated and advanced mass notification systems<br />

for the campus, community, industrial and military<br />

markets since 1981. With a staff well experienced in<br />

acoustic modeling and GIS, ATI is the worldwide leader<br />

in providing Mass Notification Systems that deliver<br />

superior sound coverage and intelligibility for outdoor<br />

and indoor areas, ensuring the safety of the populace.<br />

ATI provides complete end-to-end solutions that include<br />

hardware and software for audible and visual warning<br />

via multiple layers. <strong>The</strong> solutions consist of a simplecompact<br />

design, flexible user-friendly software, and<br />

communication methods including RF, P25, IP, Fiber,<br />

DSL, Cellular, or Satellite. MassAlert ® is ATI’s easy-to-use<br />

and configurable GUI software. <strong>The</strong> software controls<br />

and monitors the system from either an on-site control<br />

station or from a remote locations. MassAlert can<br />

trigger any type of alert to an outdoor and/or indoor<br />

coverage area, and to computers or handheld devices<br />

via SMS, email, telephone, or computer popups. This<br />

multi-layered warning system provides a redundant<br />

means of notification to ensure that as many people as<br />

possible are being warned of the threat/danger. ATI has<br />

installed Mass Notification Systems at thousands of DoD<br />

installations worldwide, providing the ability to rapidly<br />

communicate both outside and inside of buildings on a<br />

base or facility. ATI’s systems are designed to meet the<br />

Unified Facilities Criteria (UFC) 4-021-01 for the Design,<br />

Operation and Maintenance of Mass Notification<br />

92


Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.atisystem.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.atisystem.com/products/mas.htm<br />

http://www.atisystem.com/products/wp.htm<br />

http://www.atisystem.com/markets/militarymass-notification-systems.htm<br />

http://www.atisystem.com/markets/communitywarning-systems.htm<br />

Systems. ATI’s products are designed with the ability<br />

to easily integrate with other systems or equipment via<br />

Common Alerting Protocol (CAP), IPAWS, dry contact,<br />

RS232, or analog. ATI products can also interface with<br />

any type of digital or analog radio, modem, or media<br />

converter. With decades of experience in system consulting,<br />

acoustic design, manufacturing and integration,<br />

ATI is the leader in providing reliable mass notification<br />

solutions that utilizes every channel of communication<br />

available to ensure that end users receive critical lifesaving<br />

information and direction.<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Tarek Bassiouni<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (617) 567-4969<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

tarek@atisystem.com<br />

93


908 Devices<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

DETECTION PRODUCTS<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Chemical Detection Product or Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

M908<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Today’s First Responders require many different tools to<br />

get answers. With more than six billion chemicals in the<br />

world, First Responders are encountering and uncovering<br />

more unknowns than ever before. As a result,<br />

First Responders require an expansion of the tools and<br />

capabilities used directly in the hotzone. 908 Devices<br />

has expanded First Responder capabilities with their<br />

flagship product, M908TM – the first and only handheld<br />

mass spectrometer for downrange threat detection and<br />

identification. M908 utilizes high-pressure mass spectrometry<br />

(HPMS) to provide first responders, CST<br />

teams and the military with the capabilities to detect<br />

and identify a wide range of priority threats at the point<br />

of need. HPMS enables M908 to operate in the field with<br />

unprecedented levels of selectivity and sensitivity. As a<br />

result, the device alerts the user in seconds to the presence<br />

of priority chemical warfare agents, toxic industry<br />

chemicals, and precursor materials with incredibly low<br />

false alarm rates even when interferents are present.<br />

Weighing in at 4.4lbs, M908 is battery powered for continuous<br />

operation in the field and has been ruggedized<br />

to MIL-SPEC standards. In addition, unlike conventional<br />

mass spectrometry devices, the device requires little to<br />

no training to operate effectively. Regardless of their<br />

level of experience, first responders across multiple disciplines<br />

can operate the device with confidence. M908<br />

was specifically purpose-built to fill technology gaps<br />

and meet the evolving needs of today’s response mission.<br />

When used in conjunction with presently fielded<br />

Raman, FTIR and IMS devices, M908 adds the “gold<br />

94


standard” of mass spectrometry to the survey mission.<br />

M908 can be used as an emergency alert and initial survey<br />

tool for priority threat detection in vapor, solid and<br />

liquid form, from trace to bulk quantities, and render<br />

the scene safe from priority threats. This allows users<br />

more time when using Raman/FTIR tools (bulk solid<br />

and liquid detectors) to further interrogate samples for<br />

identification. Global departments of defense, civilian<br />

and military organizations, along with state, local,<br />

federal and foreign government agencies are currently<br />

using M908. To date, M908 has supported missions from<br />

drug interdiction to explosive threat detection within<br />

the past year. 908 Devices’ M908 and HPMS technology<br />

has been proven a success in the field by the Massachusetts<br />

State Hazmat Response Division, who purchased<br />

eight devices this year. <strong>The</strong> company has also been<br />

awarded contracts with the U.S. Army’s Next Generation<br />

Chemical Detector (NGCD) and Defense Threat Reduction<br />

Agency (DTRA) programs to create custom successors<br />

to M908 utilizing HPMS technology. In September<br />

2014, the team was awarded $2.6M in funding from the<br />

U.S government’s Technical Support Working Group<br />

(TSWG) to achieve even higher levels of selectivity and<br />

sensitivity with HPMS for field identification and detection<br />

of trace explosives.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.908devices.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

More about M908:<br />

http://908devices.com/products/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rebecca Gatesman, Account Executive<br />

PAN Communications<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (617) 502-4365<br />

cell: (716) 218-8531<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rgatesman@pancomm.com<br />

95


Implant Sciences<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

DETECTION PRODUCTS<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Explosive Detection Product or Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

QS-B220<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Explosives Detection Solution: Implant Sciences<br />

QS-B220 Explosives Trace Detector One way to judge<br />

a product is to observe who steps up to buy it. At the<br />

completion of a series of rigorous and highly competitive<br />

tests, the Department of Homeland Security’s Transportation<br />

Security Administration (TSA) and ten European<br />

nations have committed tens of millions of dollars to<br />

one particular explosive trace detection (ETD) product,<br />

Implant Sciences’ QS-B220. <strong>The</strong> TSA, considered the<br />

leading ETD evaluation agency in the world, qualified<br />

the QS-B220 for passenger and baggage screening in August<br />

of 2014, calling it “the new gold standard in trace<br />

detection.” In October, 2014, the QS-B220 became the<br />

first system to pass the European Union’s stringent laboratory<br />

testing protocol. <strong>The</strong>se certifications, based on<br />

the unique capabilities of the Implant Sciences technology<br />

platform, quickly led to a number of large contracts.<br />

<strong>The</strong> TSA issued an exclusive ID/IQ (basically an open<br />

purchase order) to Implant Sciences for $162 million,<br />

followed by an initial order for 1170 units. <strong>The</strong>se units<br />

are being deployed at airports throughout the U. S. <strong>The</strong><br />

Netherlands, France, Germany, Belgium, Norway, Austria,<br />

the Czech Republic, Romania, Cyprus and Poland<br />

are ECAC countries that have selected the QS-B220 to<br />

date. Nations across the globe have become particularly<br />

concerned about ISIS and other radical groups, who kill<br />

and maim indiscriminately. One of their favorite techniques<br />

is to find holes in a country’s aviation systems,<br />

and exploit them. <strong>The</strong> downing of a Russian airline<br />

with 224 passengers aboard is the most recent example,<br />

96


though not the only one. <strong>The</strong> hundreds of thousands of<br />

refugees from Syria and Iraq pose another threat – most<br />

refugees want a better life; some are allied with ISIS<br />

and Al Qaeda. No one at this point can tell the difference.<br />

Yet another threat is “homegrown” terrorists,<br />

individuals raised in the West but loyal to radical groups.<br />

Militants have carried out many attacks, including the<br />

marathon bombing in Boston. Some 3700 soldiers<br />

from Western countries, including at least 180 from the<br />

U.S., have served in Iraq and Syria, and the threat is,<br />

they will bring their ideology and terror tactics back to<br />

their home countries. <strong>The</strong> TSA and EU selected Implant<br />

Sciences’ technology to help counter the threats. <strong>The</strong><br />

QS-B220 provides fast, accurate real-time detection of<br />

trace amounts of a wide variety of military, commercial<br />

and homemade explosives, as well as drugs, featuring<br />

lower total cost of operation. <strong>The</strong> system is easy to use,<br />

with intuitive controls that eliminate or reduce training<br />

requirements. A patented automatic internal calibration<br />

system eliminates the need for manual calibration<br />

using costly disposable materials, and its small footprint<br />

is well suited to crowded security checkpoints. Unlike<br />

some competing systems, its low false alarm rate keeps<br />

airport operations on track. Implant Sciences’ QS-B220<br />

has won Government Security News’ Homeland Security<br />

Award for “Best Explosives Detection Solution” in 2013<br />

and 2014, a judgment clearly confirmed by the TSA and<br />

European authorities who have selected the company’s<br />

system as the best way to protect people and property<br />

from the threat of terrorism.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.implantsciences.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Implant Sciences’ QS-B220 has won Government Security<br />

News’ Homeland Security Award for “Best Explosives Detection<br />

Solution” in 2013 and 2014, a judgment clearly confirmed by<br />

the TSA and European authorities who have selected the company’s<br />

system as the best way to protect people and property<br />

from the threat of terrorism. Additional relevant information is<br />

available at:<br />

http://www.implantsciences.com/technology/<br />

overview<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Bob Liscouski, Presdident<br />

Implant Sciences Corporation<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (978) 752-1700<br />

cell: (703) 407-9437<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rliscouski@implantsciences.com<br />

http://www.implantsciences.com/technology/overview/<br />

http://www.implantsciences.com/products/desktopexplosives-drugs-trace-detector/<br />

http://www.implantsciences.com/technology/patents/<br />

97


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

VIDEO SURVEILLANCE/CCTV<br />

Qognify (Formerly NICE Security)<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Intelligent Video Surveillance Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Object Origin by Qognify<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In mere seconds, Object Origin can analyze hours of<br />

surveillance video in order to detect the first time an object<br />

appears within a recorded scene. A patented video<br />

analytics solution, this unique capability is critical for<br />

high-traffic environments where unattended bags, suspicious<br />

objects, or unauthorized vehicles can cause costly<br />

disruptions or worse. And when combined with Suspect<br />

Search, a video analytics solution that can identifsy and<br />

tracks an individual’s movement in recorded video, law<br />

enforcement and security personnel are able to respond<br />

much faster, potentially criminal and dangerous situations<br />

by finding the object owner’s current location<br />

within seconds.<br />

Why it’s the best Intelligent Video Surveillance solution<br />

When it comes to safety and security, the sooner good<br />

decisions can be made, the more likely risk and damage<br />

can be mitigated. When a suspicious object is involved,<br />

there’s no time to manually scan hours of video, and no<br />

room for second-guessing. Object Origin saves precious<br />

time by quickly providing insight into how a suspicious<br />

object got there. With just one click on the object of<br />

interest, Object Origin starts searching to reveal when,<br />

how, and who placed the object at the scene. This allows<br />

security personnel and law enforcement to make<br />

informed decisions that can save time, resources, cost,<br />

and in some instances lives. While Object Origin can<br />

be used on its own, when it’s part of a comprehensive<br />

security solution in conjunction with NICE Suspect<br />

Search, the individual who left the object can also be<br />

quickly located. <strong>The</strong> operator simply uses uploads the<br />

video image of the object’s owner the target suspect and<br />

98


Suspect Search goes to work right away to display the<br />

suspect’s path and last known location on premise.<br />

A Range of Applications and Attributes<br />

Object Origin mitigates risk and prevents criminal activity<br />

by determining if a suspicious object was intentionally<br />

placed or simply forgotten. Moreover, it is a valuable<br />

forensics tool allowing investigators to quickly find the<br />

origin of an object (a piece of luggage or a . parked car<br />

for example). And when combined with Suspect Search,<br />

it accelerates suspect apprehension.<br />

Incredible Time Saver<br />

On average, Object Origin can review one hour of video<br />

in less than 10 seconds. In a critical situation this is invaluable.<br />

As a business benefit, it can save organizations<br />

substantial costs, such as the case with airports, where<br />

every minute of delay or terminal closure can be tens<br />

of thousands of dollars. It is very efficient during, also<br />

in the case of post event investigations, saving hours<br />

of manpower otherwise needed to manually reviewing<br />

video footage.<br />

Fast, Accurate and Versatile<br />

Object Origin can be used in a real-time mode as an<br />

incident is unfolding as well as after-the-fact for forensic<br />

investigations. It can provide accurate results for almost<br />

any-sized object, from small purse to car, truck or cargo<br />

container and even if the object is partially occluded. It<br />

can be put into use for searching the origin of a variety<br />

of objects, from small as a purse or bag up to a car,<br />

truck or container.<br />

Extremely intuitive and Easy-to-use<br />

Simply open the search window on any video channel,<br />

select the object by placing a rectangle around it, and<br />

click search. Results are returned in seconds, showing<br />

the relevant video footage from the movement of first<br />

appearance in the scene.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com/video-analytics/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hagar Lev, Marketing Director<br />

Qognify<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: +49 (0) 69 97 17 738<br />

cell: +49 (0) 171 1637-667<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hagar.lev@qognify.com<br />

Part of a Comprehensive Security Solution<br />

Once Object Origin has found the initial appearance<br />

of the object and who placed it there, the video image<br />

can be input into Suspect Search to locate the person<br />

of interest and reveal that person’s last known location<br />

or current whereabouts. Response personnel can be immediately<br />

dispatched.<br />

99


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

OTHER PRODUCTS<br />

B.I.G. Enterprises, Inc.<br />

<strong>2015</strong> Winner – Guard Booths<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Crash Barrier (Gates, Fences, Bollards, Guard<br />

Booths)<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Xtreme Facility Protector (guard booth)<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

At 120 square feet, <strong>The</strong> Xtreme Facility Protector is<br />

built to MIL-A-12560H, UFC 3-340-01, and UFC 3-340-<br />

02 specifications. This buard booth is the top defender<br />

made today. <strong>The</strong> booth delivers the highest level of<br />

ballistic and blast-resistance available in the industry,<br />

allowing security personnel to remain effective in the<br />

midst of the most extreme emergency situation. In addition,<br />

when properly installed, the unit is capable of<br />

withstanding a direct hit from an F5 tornado. While this<br />

level of protection may seem extreme for some applications,<br />

it serves as an example of B.I.G.’s commitment<br />

to building guard booths that can meet any challenge.<br />

Sensitive installations of all descriptions, including data<br />

storage centers, nuclear installations, and military complexes<br />

can benefit from <strong>The</strong> Xtreme Facility Protector’s<br />

defensive capabilities.<br />

100


Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.bigbooth.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.bigbooth.com/case-studies/october-<strong>2015</strong><br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Sharon Bailey Beckett, President<br />

Brand Orbit<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (626) 791-7954<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

sharonb@brandorbit.com<br />

101


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

OTHER PRODUCTS<br />

CINCH systems, Inc.<br />

<strong>2015</strong> Winner – Crash Barriers/Gates/Fences<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Crash Barrier (Gates, Fences, Bollards, Guard<br />

Booths)<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rampart Vehicle Barrier System Control<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Shortly after the attacks on 9/11/2001, the world of security<br />

changed and expanded like never before. One of the<br />

new frontiers of security involved the ability to control<br />

and/or prevent vehicle access to high profile buildings,<br />

parking areas and even roads surrounding the building<br />

during a threat. Retractable bollards and wedge barriers<br />

were installed at countless government and military<br />

facilities world-wide to control and prevent entry of<br />

vehicles used for forced access and possible destruction.<br />

Fifteen years have gone by since retractable bollards and<br />

wedge barriers were installed during the early 2000’s.<br />

It has become common that many of the barriers systems<br />

installed during this time had become inoperable<br />

and remained in a normally “open” or down position.<br />

Without the ability to have the barriers function when<br />

needed, the facilities were now exposed to a possible<br />

breach. This problem affected a wide-range of facilities<br />

that included several important buildings in the Washington<br />

DC area and even a professional baseball park in<br />

the Midwest. In each of these cases, after inspection it<br />

was found that the bollards and barriers were in working<br />

condition but the controls that sends the proper<br />

signals for up or down, were not working properly.<br />

Enter the Solution <strong>The</strong> Rampart Vehicle Barrier System<br />

(VBS) Control from CINCH systems has proven to be an<br />

ideal solution to get a VBS System back in action, doing<br />

the job it was designed to do—control vehicle access or<br />

seal-off an area. <strong>The</strong> Rampart is the industry’s first AES<br />

Encrypted End-To-End, VBS processor based control<br />

system. <strong>The</strong> Rampart provides encrypted communi-<br />

102


cation between all devices connected to the system,<br />

engineered specifically for high security and vehicle<br />

barrier applications. <strong>The</strong> system is capable of controlling<br />

operation of one barrier, a sally port or multiple sally<br />

ports or up to 20 barriers for immediate vehicle lockdown.<br />

Rampart’s on-board 233 million event history<br />

provides quick detailed information on the operation<br />

of the system and critical ‘black box’ information in the<br />

event of an incident at any barrier or gate.<br />

<strong>The</strong> Rampart system is capable of controlling and<br />

monitoring:<br />

• Up to 20 VBS controls for bollards, wedge barriers<br />

gate arms, traffic lights and rolling gates.<br />

• 252 definable user access codes.<br />

• On-board storage for up to 233 million events for<br />

archival documentation using a removable SD memory<br />

card.<br />

• Connections through, Copper, Fiber Optics or TCP/IP.<br />

• Field upgradeable software, via USB CINCH stick.<br />

• Modular and expandable.<br />

As a testament to the Rampart VBS Control System —<br />

the following is a comment received from a military<br />

facility that was testing installation, operation and reliability<br />

of the Rampart system:<br />

“After the installation was complete, my crew<br />

mentioned this was the first time ANY barrier installation<br />

they have done or know of, that passed<br />

certification on the first attempt.”<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.cinchsystems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.cinchsystems.com/products/index.<br />

html<br />

https://www.youtube.com/<br />

watch?v=lMMmgVxM6Po<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Steve Craig<br />

CINCH systems, Inc.<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (763) 497-1059<br />

cell: (651)207-2407<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

steve.craig@cinchsystems.com<br />

103


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

OTHER PRODUCTS<br />

Qognify (Formerly NICE Security)<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical Security Information Management<br />

(PSIM) Solution<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Situator by Qognify<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Qognify (formerly NICE Security) continues to innovate<br />

the way PSIM technology is being utilized and increasing<br />

the impact it brings organizations. With Situator being<br />

used by some of the world’s largest, most high profile<br />

and security-conscious organizations, Qognify has<br />

gained the insight to extract value far beyond the initial<br />

promise PSIM offered. Situator is helping organizations’<br />

save time, cost, resources, reputation, and in some<br />

cases lives. Why it’s the best PSIM solution Measurable<br />

Value According to one of the world’s largest oil and gas<br />

companies, using Situator and NiceVision, saved them<br />

$1.2 million in 2014 and expect even greater savings in<br />

<strong>2015</strong>. <strong>The</strong> company, which spent $8 million annually<br />

in guard costs prior to implementing these solutions,<br />

now uses Situator to remotely monitor sites. By selec-<br />

tively moving work that was previously conducted by<br />

on-site security guards to the Global Security Operations<br />

Center (GSOC), the company has been able to cut costs<br />

by 15 percent. Situator’s ability to effectively manage<br />

major incidents was demonstrated at LAX when a recent<br />

SkyWest flight made an emergency landing without its<br />

left landing gear. Situator and GIS were used to successfully<br />

manage the incident from start to finish, including<br />

guiding all first responders – police, fire, operations,<br />

and maintenance – and coordinating the smooth transfer<br />

of passengers from plane to safety. <strong>The</strong> Netherland’s<br />

national rail infrastructure operator, ProRail has been<br />

able reduce incident response time by over 60 percent<br />

with Situator, cutting the average intake time down from<br />

fourteen minutes to four. This is a real game changer for<br />

104


the national train system, impacting passenger satisfaction<br />

and its’ bottom line. Operators not only reach<br />

better decisions faster, incidents are managed more<br />

consistently, and ProRail now has full audit capabilities<br />

to prove it is complying with rail regulations. Successful<br />

Global Deployments and Expansions in a Range<br />

of Sectors An excellent indicator of the value Situator<br />

delivers is the rate at which organizations expand the<br />

solution. One the world’s largest mass transit organizations<br />

initially deployed Situator in several test locations.<br />

In a relatively short period of time, they’ve now decided<br />

to expand coverage to their entire environment, helping<br />

protect the over 11 million passengers that travel<br />

with them every day. <strong>The</strong> U.S. government is also using<br />

Situator to help secure one of the world’s largest datacenters,<br />

as is the Department of Transportation for one<br />

of the nation’s largest cities. Market Leadership Industry<br />

Recognition IHS has ranked Situator the global leader<br />

in PSIM solutions (Situator) and named the company<br />

the leading PSIM vendor worldwide. In addition, Frost<br />

& Sullivan has defined Situator as one of the few Tier<br />

1 PSIM solutions available. New, extended capabilities<br />

Suspect Search, the award-winning video analytics<br />

technology that reduces search time for individuals in<br />

recorded video from hours or days to minutes, can now<br />

be seamlessly integrated with Situator. Whether it’s an<br />

active shooter situation or when searching for a missing<br />

child, every second counts. <strong>The</strong> integration of Situator<br />

and Suspect Search makes them both even more powerful.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com/situation-management-psim/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hagar Lev, Marketing Director<br />

Qognify<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: +49 (0) 69 97 17 738<br />

cell: +49 (0) 171 1637-667<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hagar.lev@qognify.com<br />

105


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

SERVICES<br />

AlliedBarton Security Services<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Facility Security/Force Protection Service<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

AlliedBarton RTD-Denver Security Bike Patrol<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

With more than 150 bus routes, six light rail lines,<br />

and many specialty services, Regional Transportation<br />

District-Denver is a primary form of transportation for<br />

many. In February 2013, AlliedBarton Security Services,<br />

the industry’s premier provider of highly trained security<br />

personnel, transitioned the account, taking on more<br />

than 3800 weekly hours of security services, including<br />

armed security officers, fare verification, special event<br />

support, exterior patrols, rider assistance and more.<br />

AlliedBarton security officers are posted throughout the<br />

system’s various locations in Denver and the surrounding<br />

counties, 24 hours a day, 365 days a year. Keeping<br />

passengers and employees safe, securing critical<br />

infrastructure and providing customer service is of the<br />

utmost importance to transit agencies like RTD. Because<br />

they serve large numbers of people in publicly accessible<br />

facilities, public transit agencies have unique security<br />

challenges. In addition, security has become a viable<br />

solution to a traditional transit facility challenge: graffiti.<br />

When RTD was faced with the problem of graffiti along<br />

parts of the system, AlliedBarton’s local management<br />

suggested developing a bike patrol program to deter<br />

this crime. RTD Transit Police Chief Tarbert agreed to<br />

pilot the program, and within the month, AlliedBarton<br />

worked with Denver Transit to purchase bikes and train<br />

security officers on the specifics of bike patrol through<br />

their partnership with the local police department. <strong>The</strong><br />

first few weeks of the pilot proved to be a success, as<br />

graffiti crimes dropped 30%, saving the transit system<br />

thousands of dollars on graffiti removal. <strong>The</strong> value of<br />

106


the program was quickly seen by RTD, transit riders and<br />

the general public. In addition to addressing the graffiti<br />

issue, the bike patrol creates a larger security presence<br />

overall. In August 2014, bike officers heard a cry for<br />

help along the rail line. <strong>The</strong>y responded to a woman in<br />

distress who had slid down an embankment. <strong>The</strong>y were<br />

able to provide first aid and call for EMS. Had the bike<br />

patrol not been in place, she likely she would not have<br />

been heard or found. With the reopening of the Denver<br />

Union Station in the summer of 2014, AlliedBarton’s<br />

bike patrol services needed to expand. This highlytravelled<br />

area is the main hub for entertainment venues,<br />

professional sports events and many other tourist destinations<br />

and activities. <strong>The</strong> highly-visible bike patrols<br />

are a constant security presence, effective crowd control<br />

and pedestrian traffic management resource, and a fast<br />

response when foot or vehicle patrols cannot respond.<br />

<strong>The</strong> addition of AlliedBarton’s bike patrol security officers<br />

are an effective brand enhancement for RTD and<br />

have become a staple in the downtown Denver area<br />

and along the transit system. Now at over 4787 hours of<br />

security services a week, bike patrols offer RTD a rapid<br />

deployment force, able to move quickly and respond to<br />

emergencies. <strong>The</strong> visible presence of well-trained, uniformed<br />

AlliedBarton security officers provides a sense of<br />

security and safety to transit passengers and employees<br />

alike at RTD. <strong>The</strong> collaborative partnership between<br />

AlliedBarton and RTD has created a proactive culture<br />

where security services evolve to meet changing needs.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.alliedbarton.com/Industries-Served/<br />

Transportation<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.alliedbarton.com/Industries-Served/<br />

Transportation<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Charles Bohnenberger, VP Government Services<br />

AlliedBarton Security Services<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (484) 351-1340<br />

cell: (484) 213-6420<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Charles.bohnenberger@alliedbarton.com<br />

katie.killmeyer@alliedbarton.com<br />

107


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable Federal Government Security Program/Project or Initiative<br />

TSA - TSA Airport and Aviation security<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Airport/Aviation Security Program<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

TSA Airport and Aviation security<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

TSA ETD Fulfillment Program Nations across the globe<br />

have become particularly concerned about “homegrown”<br />

terrorists, individuals raised in the West but<br />

loyal to ISIS, Al Qaida and other radical groups. Some<br />

3700 soldiers from Western countries, including at least<br />

180 from the U.S., have served in Iraq and Syria, and<br />

the threat is, they will bring their ideology and terrorist<br />

tactics back to their home countries. A country’s aviation<br />

system is a particularly inviting target, as bringing<br />

down an airliner or bombing an airport can inflict mass<br />

casualties, sow wide spread fear and gain broad publicity.<br />

<strong>The</strong> agency charged with ensuring that the U. S.<br />

aviation system is safe from extremists is the Transportation<br />

Security Administration (TSA), a unit of the federal<br />

Department of Homeland Security. <strong>The</strong> TSA is often<br />

maligned, but the agency has a reputation as a global<br />

leader in evaluating and implementing aviation security<br />

technology. So just as terror groups are awake to opportunity,<br />

the TSA remains vigilant, constantly improving<br />

its systems, including systems used to screen for explosives.<br />

<strong>The</strong> TSA determined that existing explosive trace<br />

detection (ETD) systems were approaching the end of<br />

their useful life, and two years ago began planning to<br />

replace them with more modern and efficient detectors.<br />

<strong>The</strong> agency’s world-renowned TSA Lab took the<br />

lead in helping identify the best ETD solution. <strong>The</strong> Lab,<br />

located on a 12acre campus at Atlantic City International<br />

Airport, and its staff of leading physicists, chemists and<br />

engineers perform research and evaluate a variety of<br />

technologies on an ongoing basis, including validating<br />

108


solutions to detect and mitigate the threat of improvised<br />

explosive devices. <strong>The</strong> testing process is objective and<br />

rigorous. Primary factors considered by the TSA Lab<br />

when evaluating explosive trace detection systems were<br />

the ability to quickly and accurately detect a wide variety<br />

of chemicals; a low incidence of false alarms, which play<br />

havoc with airport operations; and ease of use. A new<br />

but critical factor also in the mix was a product’s high<br />

threshold of networking security effectiveness, a recent<br />

requirement for all DHS systems. <strong>The</strong> TSA Lab sent its<br />

report to TSA management, which considered other<br />

important factors, including training requirements and<br />

total cost of ownership. Three companies were qualified<br />

by the agency and asked to bid on the ETD replacement<br />

program. <strong>The</strong> process – thorough and impartial – led<br />

to the selection of Implant Sciences Corporation’s QS-<br />

B220 explosives detection product. <strong>The</strong> agency awarded<br />

Implant Systems, headquartered in Wilmington, Massachusetts,<br />

an ID/IQ (basically an open purchase order)<br />

amounting to $162 million, and followed up with an initial<br />

order for 1170 systems. Installation of the new systems<br />

is scheduled to begin before year end. <strong>The</strong> TSA is<br />

dedicated to keeping the flying public safe. Its ability to<br />

measure risks and identify deterrents is a point of pride<br />

to the agency, which is perceived by security agencies in<br />

Europe and around the globe as the leader in assessing<br />

technologies that keep people and property safe from<br />

those who would do harm. As organizations emerge that<br />

use terror to murder and intimidate, as terrorists leave<br />

the battlefield and return home, the Transportation<br />

Security Administration remains a critical, vigilant line<br />

of defense for America’s airports and the millions who<br />

fly. <strong>The</strong> agency’s ETD program involving the planning,<br />

evaluation and deployment of hundreds of advanced<br />

explosive trace detectors at airports throughout the<br />

country is a testament to the agency’s foresight and effectiveness,<br />

and the reason it deserves the <strong>GSN</strong> Government<br />

Excellence award.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.tsa.gov<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Scott Arnold<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (207) 651-4949<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

scttrnld26@gmail.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

160 Brackett Hill Rd<br />

Alfred, ME 04002<br />

109


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable Federal Government Security Program/Project or Initiative<br />

U.S. Department of State<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Continuous Clearance Evaluation Program<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Continuous Clearance Evaluation Program<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> U.S. government currently has about five million<br />

people holding security clearances – confidential, secret<br />

or top secret – all providing consent to certain ongoing<br />

checks in order to maintain that status. Under the<br />

current system, clearances at the confidential, secret<br />

and top secret level are reviewed at 15, 10 and five years<br />

respectively. However, major life changes may occur<br />

within the span of five to 15 years, ranging from common<br />

occurrences like financial or marriage changes<br />

to more severe transgressions, such as arrests, drug<br />

or criminal activity. Any of these factors could affect a<br />

clearance holder’s personal stability and would merit<br />

a review of the access privileges granted to that user.<br />

However, the only check currently in place relies on the<br />

individual self-reporting changes against the 13 Federal<br />

Adjudicative Standards, such as personal conduct, foreign<br />

influence, criminal conduct, drug involvement, etc.<br />

This is an unreliable safeguard, as it places the reporting<br />

requirement on the individual who has a vested interest<br />

in maintaining clearance status. In fact, only a minority<br />

of clearance holders actually self-report, and in some<br />

cases, criminal activity went unreported. As the government<br />

continues its efforts to mitigate insider threats,<br />

agencies have been moving to establish more effective<br />

controls. To this effect, agencies have primarily focused<br />

on their physical and network security environment, but<br />

these measures are unable to account for a full picture<br />

of risk informed by life events. In a pioneering effort to<br />

change that, the State Department has implemented a<br />

comprehensive risk-based oversight system that utilizes<br />

110


advanced analytics in conjunction with vast amounts of<br />

available public records and data. By applying information<br />

from sources such as public records, to the 13 Federal<br />

Adjudicative Standards, the State Department can<br />

more effectively identify if an individual has a propensity<br />

to “do bad” (or better yet, identify an individual who<br />

does NOT have such a propensity). This process – similar<br />

to what is successfully used by the insurance industry<br />

to determine if individuals qualify for insurance and at<br />

what rate – enables the Department to make better decisions<br />

on who they might want to engage more closely.<br />

<strong>The</strong> State Department’s structured, phased approach<br />

includes continuous evaluation and re-investigation. By<br />

using public records and data analytics to establish if a<br />

clearance holder has violated the rights provided under<br />

that clearance, the State Department can consistently<br />

evaluate and assess that individual using constantly<br />

updated data stores and establishing re-evaluations for<br />

deeper examination when necessary. <strong>The</strong> implementation<br />

of an analytics-fueled continuous evaluation approach<br />

has provided the Department with a complete<br />

picture of employees with security clearances: their situation<br />

today; their recent and past history; their potential<br />

susceptibility to outside influence; and their propensity<br />

to commit fraud, as well as deviant or other unsuitable<br />

behavior. It is a breakthrough solution to a governmentwide<br />

issue that can be easily replicated by other agencies.<br />

<strong>The</strong> State Department’s innovation and initiative<br />

deserves to be recognized.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.state.gov<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://lexisnexisspecialservices.com/what-wedo/continuous-evaluation/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Steve Nguyen, Vice President<br />

Federal Programs and LexisNexis Special Services Inc.<br />

(LNSSI)<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cell: (571) 277-8770<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Steve.Nguyen@Lnssi.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1150 18th Street, N.W., Suite 250<br />

Washington, DC 20036<br />

111


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable State Government Program, Project or Initiative<br />

New York State Division Of Homeland Security<br />

and Emergency Services (DHSES)<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable State Government Security Program/<br />

Project or Initiative<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

County Emergency Preparedness Assessment (CEPA)<br />

Initiative<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> County Emergency Preparedness Assessment<br />

(CEPA) is a statewide initiative to better understand how<br />

the State and local governments are prepared to deal<br />

with various threats and hazards facing New York. As<br />

the number one target of terrorism in the Country, and<br />

a State with numerous natural disasters (4th most in<br />

the nation), CEPA is a critical component of our overall<br />

homeland security strategy. <strong>The</strong> CEPA process was<br />

developed in collaboration with State and local subject<br />

matter experts and involves facilitated workshops with<br />

each of New York’s 58 counties (including NYC) to capture<br />

risk, capability and resource information using an<br />

intuitive, standardized and repeatable process. Through<br />

the CEPA process, DHSES is able to better understand<br />

local capabilities and resource gaps across the entire<br />

homeland security spectrum (e.g., counter-terrorism,<br />

critical infrastructure, communications, cyber-security,<br />

emergency management, public health, etc.), and CEPA<br />

has identified a series of common gaps and trends than<br />

can now be better addressed. This information from<br />

CEPA is helping both the State and our local partners<br />

make more informed resource decisions and increasing<br />

our efficiency and effectiveness by focusing our<br />

collective efforts to where they are most needed. CEPA<br />

has also helped us identify and promote best practices<br />

across the State, and the highly collaborative nature<br />

of the process has served to strengthen relationships<br />

with our partners. To date, more than 1,300 public<br />

112


and private sector stakeholders have participated in<br />

the CEPA process, and New York’s innovative approach<br />

to the CEPA initiative recently led to a Public Service<br />

Excellence Award from the State Academy for Public<br />

Administration. <strong>The</strong> CEPA process has helped New York<br />

address the longstanding problem of how measure and<br />

quantify preparedness. We now have a baseline preparedness<br />

assessment and the ability to monitor and<br />

track our progress over time. <strong>The</strong> federal government,<br />

academics, think-tank and others have long struggled<br />

with how to assess preparedness, but rather than wait<br />

for someone else to develop a solution to this challenge,<br />

New York took decisive action and created a solution<br />

that could serve as national model, and we are actively<br />

sharing information about CEPA with others so that they<br />

may learn from our experiences. <strong>The</strong> growing threat<br />

of extreme weather coupled with the complex terrorism<br />

threat environment warrants new and innovative<br />

approaches to increase preparedness, and the CEPA<br />

initiative is an embodiment of that ideology. As such,<br />

we would greatly appreciate consideration for the <strong>2015</strong><br />

<strong>GSN</strong> Homeland Security Award.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.dhses.ny.gov/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CEPA Overview from DHSES website:<br />

http://www.dhses.ny.gov/planning/<br />

Article about CEPA:<br />

https://www.chds.us/c/item/2543<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Terry Hastings, DHSES Senior Policy Advisor<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (518) 242-5163<br />

cell: (518) 764-0009<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

terry.hastings@dhses.ny.gov<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NYS DHSES 1220 Washington Ave, Building 7a (7th fl)<br />

Albany, NY 12242<br />

113


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable State Government Program, Project or Initiative<br />

California Department of Motor Vehicles,<br />

Investigations Division<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable State Government Security Program/<br />

Project or Initiative<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

California DMV Identity Management Program<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In late 2013, the California state legislature passed a law<br />

that went into effect on January 1st of this year. <strong>The</strong> law<br />

allows applicants who are unable to provide satisfactory<br />

proof that their presence in the U.S. is authorized under<br />

federal law to receive an original driver’s license without<br />

the fear of criminal repercussion. As a result of this legislation,<br />

the number of Californians who have applied<br />

for a driver’s license has exploded, with half a million<br />

applications filed by April of <strong>2015</strong>, double the number<br />

of applications that the Department of Motor Vehicles<br />

(DMV) originally anticipated. A great majority, 91% of<br />

these applicants, are still providing the necessary identity<br />

and residency documents, and 203,000 immigrants<br />

had received their licenses by April <strong>2015</strong>. While this<br />

indicates substantial progress towards achieving Califor-<br />

nia’s goal of accurately accounting for all residents with<br />

driver’s licenses, it also can result in individuals trying<br />

to beat the system by committing fraud or other crimes<br />

to obtain driver’s licenses. In order to help crack down<br />

on any undocumented immigrants who may wish to<br />

remain undocumented for the furthering of criminal activities,<br />

the California DMV’s Investigations Division has<br />

implemented identity proofing solutions designed to<br />

assist in verifying an individual’s identity. Identity proofing<br />

integrates data and analytics for identity verification,<br />

knowledge-based authentication and investigative information<br />

into a sophisticated algorithm that generates a<br />

true identity picture. Identity proofing makes intelligent<br />

information connections beyond the obvious and draws<br />

insights from public records data, while taking steps to<br />

114


observe the highest levels of privacy and compliance.<br />

<strong>The</strong> first step in the process is identity discovery as<br />

presented by the applicant. <strong>The</strong> second step is identity<br />

verification. <strong>The</strong> process is accomplished by running it<br />

through a series of algorithms to determine if the information<br />

in-hand belongs to an actual person. <strong>The</strong> information<br />

is checked against vast amounts of open source<br />

data sets and confirmed by thousands of public records.<br />

<strong>The</strong> final step is to authenticate that the applicant is in<br />

fact the owner of the identity. This is done through a<br />

quiz engine that tailors questions to the verified individual’s<br />

public records and area demographics based<br />

upon a multitude of data domains that are selected by<br />

the agency. This process offers identity authentication<br />

input options beyond just name, address and Social<br />

Security Number, all of which can be easily falsified.<br />

<strong>The</strong> ability to properly identify individuals applying for<br />

driver’s licenses has a major impact on homeland security<br />

and public safety. By resolving identities in advance<br />

of issuing licenses, the California DMV Investigations<br />

Division is helping to prevent criminal activities before<br />

they occur.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.dmv.ca.gov/portal/dmv/dmv/offices/investigationsoffice<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lexisnexis.com/risk/government/<br />

gov-identity-management.aspx<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dale Ferranto, Law Enforcement Liaison<br />

Western USA, LexisNexis Risk Solutions<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (949) 276-6601<br />

cell: (949) 542-0442<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

dale.ferranto@lexisnexis.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1000 Alderman Dr.<br />

Alpharetta, GA 30005<br />

115


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable Cybersecurity Program, Project or Initiative<br />

City of Los Angeles - Centralization of Cybersecurity<br />

Incident Data Analysis<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Cybersecurity Program, Project or<br />

Initiative<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

City of Los Angeles Centralizes Cybersecurity Incident<br />

Data Analysis with Customized Solution<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

With more than 4 million residents, the City of Los Angeles<br />

is the second largest city in the Unites States. <strong>The</strong><br />

City of LA’s Information Technology Agency (ITA) manages<br />

the IT systems and network traffic for more than<br />

37 departments, including those that support the city’s<br />

financials, taxes and public internet for citizens. ITA is<br />

dedicated to using the most secure, cost effective, highly<br />

efficient and interoperable enterprise-wide technology<br />

to serve the City of LA. In recent years, the cybersecurity<br />

threat landscape has dramatically evolved, with an everincreasing<br />

number of advanced persistent threats and<br />

targeted breaches. State and city governments today are<br />

tasked with safeguarding citizen data and confidential<br />

information, making them a target for malicious threat<br />

actors. Until recently, if an inconsistency or potential security<br />

breach was found, the protocol in place required<br />

pulling security logs from each individual department,<br />

reviewing and analyzing the disparate reports and then<br />

correlating the data manually with multiple security<br />

tools. This was a time consuming process that not only<br />

left room for error, but did not allow ITA to proactively<br />

tackle enough of the cyber threats attempting to infiltrate<br />

the city’s networks. Led by Timothy Lee, the city’s<br />

chief information security officer (CISO), ITA sought<br />

to implement an advanced security information and<br />

event management (SIEM) solution, to help consolidate,<br />

maintain and analyze security data across the city’s multiple<br />

departments. Given the limited resources Lee and<br />

116


his team faced—from staffing to budget—ITA deployed a<br />

unique, cloud-based SIEM solution to enhance cybersecurity<br />

capabilities. In addition, Lee led the city’s Cyber<br />

Intrusion Command Center (CICC), a city-wide cybersecurity<br />

working group that leads cybersecurity preparation<br />

and response to security incidents, implemented<br />

the city’s first Integrated Security Operations Center<br />

(ISOC). This ISOC collects and correlates log data and<br />

security events from different security appliances across<br />

the city’s departments into a single database and a useable<br />

dashboard and actionable threat intelligence to<br />

enable a high-level security posture city-wide. Instead of<br />

going to each of the 40 plus departments, Lee and his<br />

team can now monitor everything from clickstreams and<br />

transactions, to security events and network activity, and<br />

analyze all the correlated data from a centralized, customized<br />

dashboard, 24x7 anytime, anywhere; turning<br />

machine-generated data into valuable intelligence that,<br />

in turn, drives good decisions. <strong>The</strong> SIEM solution takes<br />

the City of LA to another level of cybersecurity intelligence.<br />

With the data in one place, the City of LA and its<br />

FBI counterpart, FBI Cyberhood Watch, can quickly and<br />

efficiently gather information about threats, and identify<br />

strategies to prevent future intrusions. <strong>The</strong> solution<br />

has undoubtedly enhanced the city’s ability to manage<br />

and protect the city’s critical infrastructure and digital<br />

assets serving Angelenos. Lee states, “I can confidently<br />

say we have avoided a number of security breach situations<br />

because we implemented these proactive tools.<br />

We have blocked intrusion attempts, have been able to<br />

swiftly correlate data and share threat information to the<br />

stakeholders, and have been able to expedite the time it<br />

takes to close these security incident tickets.”<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://ita.lacity.org/index.htm<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Caralyn Duke, Account Executive<br />

Qorvis MSLGROUP<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: (202) 683-3203<br />

cell: (202) 658-9201<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

caralyn.duke@mslgroup.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1201 Connecticut Ave, NW Suite 500<br />

Washington, DC 20036<br />

117


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable County/Municipal Program, Project or Initiative<br />

Nanded India, Safe City -<br />

Qognify (Formerly NICE Security)<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable County/Municipal Program, Project or<br />

Initiative<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Nanded India, Safe City<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Nanded is the second largest city in the Marathwada<br />

District of Maharashtra, India with over half a million<br />

citizens. <strong>The</strong> city holds historical and religious significance,<br />

making it a destination city. Several times a year,<br />

religious tourism spikes, bringing an influx of tens of<br />

thousands of visitors and the risk associated with a<br />

swelling population. Maintaining safety and security<br />

is a priority for the municipality, not just during peak<br />

visitation, but every day. Serving as a model for future<br />

deployments around the Maharashtra state and India in<br />

general, the Safe City project was named C-Cube after<br />

the command, control and communication center that<br />

monitors the entire city, 24/7. <strong>The</strong> Safe City solution is<br />

comprised of several different integrated components<br />

that work together to provide law enforcement with<br />

situational awareness and management. NICE Situa-<br />

tor Express is the PSIM backbone of the solution, with<br />

NiceVision video surveillance including NVRs, decoders<br />

and Crowd Monitoring video analytics supporting it. In<br />

addition, Panic Buttons have been deployed throughout<br />

the city and pre-configured advanced Standard Operating<br />

Procedures (SOP) in the local language, Marathi,<br />

have been developed and implemented to address<br />

the various security and disaster situations that could<br />

potentially occur. Nanded officials outlined very specific<br />

challenges that they wanted to address effectively, yet<br />

affordably, with the Safe City solution.<br />

<strong>The</strong>y include:<br />

NICE Crowd Monitoring analytics or Panic Button<br />

activation alert C-Cube of crowd formations – This<br />

allows operators at C-Cube to control the situation with<br />

118


the help of Situator with embedded pre-defined SOPs in<br />

the local language.<br />

Citywide Public Address (PA)System — Nanded is<br />

using NiceVision as their PA system in the event of an<br />

emergency – eliminating their need for additional<br />

equipment. Using Nice Vision’s audio out capability, an<br />

operator can simply click on any camera and the camera’s<br />

loudspeaker makes the announcement.<br />

Affordable State-of-the-Art Control Room — with a<br />

4x2 LCD video wall and powered by a NICE decoder<br />

and Video Matrix license, providing a true video wall<br />

feel to C-Cube.<br />

Procession and VIP Route Monitoring — NICE Situator<br />

with predefine SOPS help law enforcement monitor<br />

and manage routine operations. For example, during<br />

VIP Route Monitoring the SOP dictates that the corresponding<br />

cameras along the route are displayed on the<br />

video wall enabling real-time monitoring.<br />

Disaster Management — with predefined, escalating<br />

SOPs, operators have the ability effectively and consistently<br />

manage emergency situations including structure<br />

collapses, flooding, railway accidents, earthquakes and<br />

others.<br />

“Nanded’s historical and religious significance made<br />

safety and security a high priority. <strong>The</strong> C-Cube was designed<br />

to facilitate better communications between law<br />

enforcement officials and the public, and to centralize<br />

safety and security management. With NICE’s support,<br />

we were able to bring our vision to fruition and even<br />

create a public address system that allows us to communicate<br />

quickly with our citizens. We’re experiencing<br />

improvement in security, operations, and communications,<br />

and in the way incidents are handled,” attested,<br />

Mr. Sushil Khodwekar, Municipal Commissioner of<br />

Nanded City.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

nwcmc.gov.in<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com/situation-management-psim/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hagar Lev, Marketing Director<br />

Qognify<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: +49 (0) 69 97 17 738<br />

cell: +49 (0) 171 1637-667<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hagar.lev@qognify.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Rd<br />

Paramus, NJ 07652<br />

United States<br />

(C/O Steve Maron, @ NICE Systems Inc.)<br />

119


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable County/Municipal Program, Project or Initiative<br />

SAMMC (San Antonio Military Medical Center)<br />

Advanced Security Program, Suspect Search –<br />

Qognify (Formerly NICE Security) <strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable County/Municipal Program, Project or<br />

Initiative<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SAMMC (San Antonio Military Medical Center) Advanced<br />

Security Program, Suspect Search<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In the early morning hours, a “code pink” alarm has<br />

been triggered. A newborn baby was moved from its<br />

bed. <strong>The</strong> RFID bracelet on her wrist triggered an alarm<br />

once she was past a predefined security access point.<br />

Automatically, video from relevant nearby cameras is<br />

streamed to the control room, revealing a fast walking<br />

figure, dressed in street clothing. <strong>The</strong> person is clearly<br />

visible when seen on the video camera closest to where<br />

the infant’s RFID bracelet triggered the alarm. That image<br />

is imported into the system, and within seconds, an<br />

album of pre-indexed persons appeared on the screen.<br />

From here, visual verification of the suspected person<br />

is swift, and his trail across the cameras is shown on the<br />

screen. <strong>The</strong> abductor was clever, selecting a course that<br />

would not be easily traceable otherwise. He knows the<br />

hospital well. But the system is smarter, and security<br />

personnel are dispatched. <strong>The</strong>y track him down to the<br />

parking lot, before leaving hospital grounds. <strong>The</strong> infant<br />

is safe again. <strong>The</strong> above is not a true story, but based<br />

on many incidents that have occurred, nationwide, with<br />

hospital related crime on the rise*. But what if the right<br />

system is deployed – one that enables the happy ending<br />

described above? That potential happy ending is why<br />

this entry deserves to win. <strong>The</strong> San Antonio Military<br />

Medical Center (SAMMC), is the largest U.S. Department<br />

of Defense Military Medical facility and Level I Trauma<br />

and Burn Research Center. It is an expansive medical<br />

center; with over 2.1 million square feet. Its ER process-<br />

120


es more than 5,700 emergency room visits a month and<br />

serves hundreds of thousands of U.S. service members<br />

and their families. SAMMC’s was an early adopter of<br />

Suspect Search video analytics solution, enabling personnel<br />

to track and locate missing patients or suspicious<br />

persons during time-critical scenarios. Qognify Suspect<br />

Search provides real-time forensics of surveillance video<br />

to locate a person of interest in situations when time is<br />

of the essence. Using a video image, uploaded photo, or<br />

user-generated composite (an “avatar”, based on verbal<br />

description of suspect, its clothing, etc)- Suspect Search<br />

can scan hours of video in minutes and automatically<br />

filter out 95 percent of irrelevant images. Its mapping<br />

capabilities provide geo-spatial awareness by retracing<br />

a suspect’s movements across cameras and pinpointing<br />

his current or last known locations on your premises.<br />

All images, related video, and locations associated with<br />

the search are digitally stamped and can be saved or<br />

shared among law enforcement agencies for use in<br />

investigations and prosecution. <strong>The</strong> adoption of Suspect<br />

Search builds on and integrates with SAMMC’s existing<br />

NiceVision video surveillance solution, which has been<br />

used to investigate incidents related to patient safety<br />

and well-being. Now, the combined solution helps<br />

SAMMC teams locate and track persons of interest in<br />

a matter of seconds and amidst hours of footage. <strong>The</strong><br />

combined security program enables SAMMC benefits<br />

such as accelerated response times; contained impact<br />

of potential criminal or harmful activity; reduction in<br />

shutdown times and the associated negative impact on<br />

patient care.<br />

* Violent crimes at hospitals on the rise: Over 200 infant<br />

abductions documented from hospitals and other locations<br />

When Hospital Safeguards Against Drug <strong>The</strong>ft Aren’t Enough<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.bamc.amedd.army.mil/sammc.asp<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com/suspect-search-next-generation-video-analytics/<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hagar Lev, Marketing Director<br />

Qognify<br />

Nominating contact’s office telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

office: +49 (0) 69 97 17 738<br />

cell: +49 (0) 171 1637-667<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hagar.lev@qognify.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Rd<br />

Paramus, NJ 07652<br />

United States<br />

(C/O Steve Maron, @ NICE Systems Inc.)<br />

121


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable Law Enforcement Interdiction, Arrest, Counter Terrorism<br />

or Crime Prevention Program – Federal/State or Local<br />

Memphis Police Department<br />

<strong>2015</strong> Winner<br />

Awards Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Law Enforcement Interdiction, Arrest,<br />

Counter Terrorism or Crime Prevention Program<br />

Name of Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Memphis Police Department<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Memphis, a city with a rich history of creative and trailblazing<br />

American icons, has captured the city’s creative<br />

spirit in crime prevention as well. <strong>The</strong> Memphis Police<br />

Department is using a combination of traditional and<br />

unconventional video surveillance to protect the city’s<br />

citizens and critical infrastructure. MPD has established<br />

a network of about 600 surveillance cameras throughout<br />

the city. Many of these cameras have smart features<br />

such as line crossing and intrusion detection to make<br />

surveillance more effective. <strong>The</strong>se features can send<br />

alerts to the police when someone enters or leaves a<br />

designated area. Live footage flows back to the MPD<br />

Real Time Crime Center (RTCC). <strong>The</strong> RTCC is a sophisticated<br />

way for the city to fight crime. It features a large<br />

video wall that can pull up live streams from surveil-<br />

lance cameras throughout the city, as well as unique<br />

software that provides instant information on recent<br />

criminal activity in a radius around a crime, existing<br />

crime patterns in the surrounding area, and a history<br />

of people with arrest records who may frequent the<br />

neighborhood. MPD has also invested in mobile trailers<br />

that are each equipped with two cameras. <strong>The</strong>se trailers,<br />

powered by generators or solar energy, monitor parking<br />

lots, malls, and special events. Officers in the RTCC<br />

can monitor events live and respond as needed. Another<br />

fascinating element of this crime prevention program<br />

is a gunshot detection feature that works in tandem<br />

with the PTZ (pan, tilt, zoom) cameras. A circuit board<br />

is programmed to listen for gunshots and essentially<br />

filters out all other noise. Microphones atop the enclo-<br />

122


sure pick up any possible gunshot sounds, and if those<br />

sounds are heard, the detector triangulates the location<br />

of the shot. It then guides the camera to pan, tilt, and<br />

zoom in the direction of the gunshot within seconds.<br />

Many cameras are placed on utility poles in unique, patented<br />

enclosures that house the cameras and all of their<br />

related equipment: a DVR or NVR, an encoder, a power<br />

supply, and a router. A flashing blue light — a nod to<br />

a police car’s light bar on the roof — is placed on the<br />

enclosure as a finishing touch. <strong>The</strong>se units are peppered<br />

throughout the city, from Beale Street to the ports and<br />

many areas in between. To further protect police force<br />

and sensitive operations, a local wifi system is employed<br />

that enables officers to pull up to an enclosure, connect<br />

to the network, and discreetly pull data without even<br />

exiting the car. Not only is the department receiving a<br />

lot of positive feedback on its crime prevention efforts,<br />

but the cameras have become an instrumental tool in<br />

catching criminals — MPD has several cases prosecuted<br />

each week thanks to incidents being captured on video.<br />

Plus, the police are able to dispatch calls from the RTCC<br />

and view live video before the officer even arrives on the<br />

scene. From gunshot detection to the video evidence<br />

used in prosecutions, it’s clear that MPD’s crime prevention<br />

program has made a measurable impact on public<br />

safety.<br />

Link to Web Page of Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.memphispolice.org<br />

Name and organization of nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Anna Boudinot, Content Manager<br />

Hikvision USA<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

anna.boudinot@hikvision.com<br />

Address of nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

908 Canada Court<br />

City of Industry, CA 91748<br />

123


<strong>The</strong> News Leader in Physical, IT and Homeland Security<br />

CEO/Editorial Director:<br />

Adrian Courtenay<br />

(O) 212-344-0759, X3<br />

(C) 917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Publisher:<br />

Michael Madsen<br />

(O) 212-344-0759, X1<br />

(C) 732-233-8119<br />

mmadsen@gsnmagazine.com<br />

Senior Writer:<br />

Steve Bittenbender<br />

(C) 502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer:<br />

Karen Ferrick-Roman<br />

(C) 412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist:<br />

John Convy<br />

Convy on Netcentric Security<br />

john@convyassociates.com<br />

Columnist:<br />

Shawn Campbell<br />

shawncampbell@safenetat.com<br />

Guest Expert Contributor:<br />

Denise Rucker Krepp<br />

(C) 202-546-2533<br />

kdrkrepp@hotmail.com<br />

Art Director:<br />

Gerry O’Hara<br />

OHDesign3<br />

(C) 203-249-0626<br />

gerry@ohd3.com<br />

Production Director:<br />

Tammy Waitt<br />

(O) 732-233-0245<br />

twaitt@gsnmagazine.com<br />

Mailing Address:<br />

Government Security News<br />

P.O. Box 7608<br />

Greenwich, CT 06836<br />

Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address<br />

changes to <strong>GSN</strong>: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />

decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />

<strong>GSN</strong>: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />

foreign subscribers are charged $140 International Airmail. Copyright 2016 by <strong>GSN</strong>: Government Security News. All rights reserved.<br />

Printed in the U.S.A. <strong>GSN</strong>: Government Security News assumes responsibility for validity of claims in items reported.<br />

126

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!