The GSN 2015 Digital Yearbook of Awards

openthink

The GSN

2015 Digital Yearbook

OF

Airport/Seaport/

Border Security Awards

AND

Homeland Security Awards


MEET THE SPONSORS

AppGuard uses prevention to keep cyberattacks from

harming businesses, government agencies

When it comes to handling cyberattacks, a small Virginia-based

company offers an innovative solution that

borrows from an old adage: an ounce of prevention is

worth a pound of cure.

Blue Ridge Networks has been in the cybersecurity

business for more than 15 years, offering its solutions

to government agencies and businesses. Its AppGuard

solution enables a client’s workforce to log in – even

from remote locations – and know they will not be at

risk of being infiltrated or inadvertently exposing their

colleagues to a hack.

AppGuard stops such destructive files as malware,

ransomware, weaponized documents and phishing attempts

from entering a user’s system. Those are the files

used by hackers through a user’s trusted applications to

4

launch destructive cyberattacks.

“AppGuard is the only solution

on the market because it is not a

detection capability,” said Mike

Fumai, president and chief operating

officer for Blue Ridge. “We’re

blocking.”

Cyberattacks are not like traditional

robberies where the bad

guys arrive in dramatic fashion and

take their loot in one fell swoop.

Instead, they get small bites – or

Mike Fumai

President and COO

Blue Ridge Networks

bytes, mind you – at a time, usually when routine events

like reports are generated or updates are released. As

the attacks linger for weeks and months because the file

has not been detected, the little things begin to add up

to huge losses for the victims.

In the past year, the public has become more aware

of the damage hackers can wreak. Millions of customers

were affected by the attacks on such companies as

Anthem, Home Depot and Target. In Target’s case, it was

only discovered after customers called their banks and

credit card companies to complain about fraudulent


purchases, Fumai said. And the government was hit hard

too, as the Office for Personnel Management reported

that attacks made the records for millions of federal

workers and contractors vulnerable.

“It’ll take a generation before we find out what the

effects of OPM will be,” said Fumai, who has worked for

more than 25 years in the communications and technology

industries.

And the attacks will only become more sophisticated

in the future, according to industry experts, as the hackers

find ways to infiltrate without leaving a trace or

signature behind.

“Past infections always deposited a small binary

somewhere on disk, but the newest evasion techniques

used by fileless malware—Kovter,

Powelike, and XswKit, for

example—leave no trace on

disk, thus making detection,

which generally relies on

static files on disk, more difficult,”

McAfee Labs wrote in its

threats report last November.

This is where AppGuard

becomes very useful, Fumai

said. There is no need to

try and detect malware that

might not have any signature or binary present because

AppGuard prevents the first stage attack so malware

will never get its foothold in the enterprise. That ability

makes the solution very attractive to Blue Ridge’s

partners and clients.

“AppGuard is American Cyber’s ONLY solution for

zero-day malware prevention, as well as the easiest and

most cost-effective malware protection available,” said

Gary Winkler, president of American Cyber and a former

program executive officer with the U.S. Army. “It simply

5

prevents any malware from executing, without needing

to know what the malware is, and then AppGuard

reports the details of the attempt. AppGuard has absolutely

no impact to system/application performance or

user experience. It should be part of the Army’s Gold

Master configuration for every end-point.”

AOL serves as another partner for Blue Ridge. The

multimedia company offers its subscribers, which were

more than 2 million last year, AOL Tech Fortress. The

service uses AppGuard to block viruses and other suspicious

files from harming a

user’s computer.

AppGuard does not just

prevent attacks, Fumai said.

Its proactive defense keeps

clients from having to spend

millions – or more – of dollars

to assess the impact of a

breech, to make repairs and to cover liabilities from

the attack. That means corporate clients can invest

more in research and development and public

sector agencies can be better stewards of taxpayer

funds.

And Blue Ridge is working on new ways to protect

its clients. Fumai noted the company is working

an “Internet of Things” guard that would secure

various cloud networks, including those run by Amazon

and Microsoft. This would allow any networked device

to be protected from attack.

“IoT Guard will be able to secure whatever clouds

they’re working at the same time with multiple devices,”

Fumai said. “This will not break the IT or compliance

standards already established. We don’t break things.

We’re just an overlay.”


ABOUT THE GSN AWARDS PROGRAMS

The Government Security News Awards Programs, first appearing in 2009, were organized

to honor the distinguished vendors of IT, Physical and Integrated security solutions, and

the dedicated officials in federal, state, county and municipal government whose combined

efforts protect us from all threats.

The 2015 Yearbook covers the results of two GSN awards programs – the GSN 2015

Airport, Seaport, Border Security Awards and the GSN 2015 Homeland Security Awards.

We are also please to honor the vendors and officials of other nations that have chosen to

participant in this year’s programs, often with prize-winning entries.

In our humble opinion, the technological advances from vendors and the ever-more

sophisticated programs and strategies of government agencies are mind-boggling in their

excellence. We hope you’ll find our awards programs to be interesting and informative.

We know you’ll find them to be very reassuring!

Adrian Courtenay, CEO/Editorial Director

Government Security News

6


TABLE OF CONTENTS

4

6

7

8

12

60

122

Message from 2015 Awards Sponsor

About the GSN Awards Programs

Table of Contents

Interview with Chuck Brooks, Distinguished Judge, 2015 GSN Awards Program

Winners in 2015 Airport, Seaport, Border Security Awards Program

Winners in 2015 Homeland Security Awards Program

Government Security News, The News Leader in IT, Physical and Homeland Security

7


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY

and

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS

GSN INTERVIEW

Chuck Brooks, Distinguished Judge

GSN 2015 Homeland Security and

Airport, Seaport, Border Security Awards programs

GSN: What are your general thoughts on the

2015 awards?

CB: For me it was a real pleasure judging this year’s

annual Homeland Security and Airport, Seaport, Border

Security Awards programs. The submissions this year

were frankly quite amazing. The capabilities and technical

merits of the IT and Physical security products/solutions

of all the vendors made it especially difficult to judge. In

my opinion they were all winners because they are leading

technological contributors to the current and future

security of our nation. It is good to know that very talented

people in industry and government are continually

designing and upgrading security solutions to fill gaps as

adversaries are becoming more hostile and sophisticated.

GSN: You spent many years on Capitol Hill and

also at the Department of Homeland Security.

As we head into 2016, what do you envision as

homeland security spending priorities?

CB: Macro spending will increase across the board on

homeland security products and services In accordance

to the new threats we are especially facing from ISIS and

from other terrorist actors, and global instabilities. This

was reflected in the recent passage of the 2016 omnibus

spending Bill recently passed by Congress by Congress.

The bill provides DHS with $40.96 billion, which is an

increase of $1.33 billion over the fiscal year 2015 enacted

levels. It included increased funding levels for Customs

and Border Protection, Immigration and Customs Enforcement

and for DHS Cybersecurity programs in the DHS

8


National Programs and Protection Directorate.

Global spending also parallels the DHS spending raise.

A new market research report, “Global Homeland Security

and Emergency Management Market, 2013–2018”,

published by MarketsandMarkets is expected to reach

$544.02 Billion by 2018. Unfortunately, those numbers

could go even higher if there are more incidents similar to

what happened in Paris, Mali, and San Bernardino, CA.

GSN: What area/issue pending trends do you

see as priorities for the homeland security

community?

CB: Counterterrorism and the counter CBRNE (chemical

, biological, Radiological, Nuclear, and Explosive) mission

will always be fundamental to homeland planning and

spending. Those are the most catastrophic threats. In

addition to CBRNE DHS has assumed more and more of a

leadership role in cybersecurity derived from both Presidential

mandates and congressional legislation.

Cybersecurity is indeed a top priority as government agencies

and mega corporations experience more data breaches

with each passing year. I recently published an article

in The Federal Times on Key homeland security priorities

to watch in 2016 (http://www.federaltimes.com/story/

government/dhs/blog/2015/12/15/key-homeland-securitypriorities-watch-2016/77368604/)

My thoughts in regards

to cybersecurity verbatim:

The 2015 DHS budget directed more than $1.25 billion

to cybersecurity and that trend will continue in 2016.

Cybersecurity and IT have moved to the forefront since

DHS’s inception as we have become a more interconnected

world. New legislation pending in Congress formalizes

the increased DHS role in public/private partnering.

New legislation also would update the 12-year-old Federal

Information Security Management Act (FISMA) and delineate

DHS’s role in guarding government networks and

websites.

A priority for 2016 will be to accelerate rollout of

Einstein III Accelerated (E3A), the latest phase of DHS’s

automated network-security correcting systems. DHS has

established memoranda of agreement with 55 federal

agencies to implement Einstein to provide horizon scanning

and automated monitoring, detection, and remediation

of government networks. DHS is also planning for

new cyber technologies that provide advanced defense of

network framework layers, including authentication, better

encryption, biometrics, and data analytical tools”.

GSN: What future areas of homeland security

interest would you advise companies to explore?

CB: The key word really is “future” and it is already

around the corner with the Internet of Things (IoT).

Recently both the FBI and DHS issued warnings about IoT

and pending threats. The reality is that we have become

immersed in a new digital era comprised of more than 50

billion interfaced devices. Anything connected is vulnerable.

Expect significant investments in smart cities, smart

homes, smart businesses, and smart governments in the

next decade. For the security community this conveys

opportunities in developing and integrating new sensors

for threat detection, surveillance, predictive data analytics,

Continued on next page

9


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY

and

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS

GSN INTERVIEW

Chuck Brooks, Distinguished Judge

GSN 2015 Homeland Security and Airport, Seaport, Border Security Awards programs

biometrics, interoperable communications, and geo-mapping

(to name a few). Also, the implications for forensics,

including cyber-forensics are evident and will be a real

growth industry for law enforcement and industry. It is

interesting to note that DHS’s Science & Directory Directorate

recently announced that it is seeking to help fund

small businesses who may have innovative IoT technologies

to help the homeland security mission.

Crime Mapping

GSN: Can you tell us about your new role at

Sutherland Government Solutions?

CB: I serve as the Vice President for Government Relations

& Marketing for Sutherland Government Solutions

(SGSI). I lead the Federal and State & Local Government

relations activities and I am also responsible for the Marketing

portfolio (Media, PR, Digital Outreach, Thought

Leadership, Strategic Partnering, Branding) for the Federal

and State & Local markets. SGSI is a recognized provider

of business process and technology management services

for the public sector. The company also offers integrated

portfolios of analytics-driven back-office and citizen facing

solutions that support entire government missions. I am

also an Advisor to the Bill and Melinda Gates Technology

Partner network, and serve as Vice Chairman of CompTIA’s

New & Emerging Technology Committee.

For those who are active on social media, I also run

two of the most influential homeland security groups on

LinkedIn –“U.S. Department of Homeland Security” and

“Homeland Security” that have combined membership of

over 50,000 members. Please look them up and join!

Thanks and Happy, Healthy, Prosperous, and Safe 2016

to all of Government Security News readers!

Chuck can be reached at:

Charles.brooks@sutherlandglobal.com

On Twitter: @ChuckDBrooks

Linkedin Profile: http://www.linkedin.com/in/chuckbrooks

10


11


The GSN 2015

Airport/Seaport/

Border Security Awards


Winners in the 2015

Airport/Seaport/Border Security Awards Program

Best Access Control/Identification

Best Biometric Identification Solution

Crossmatch – Winner

Best ePassport Solution

Securiport – Winner

Best Physical/Logical

Priviledged Access Solution

Honeywell Security – Winner

STANLEY Access Technologies – Winner

Best Detection Solutions

Best Cargo/Vehicle Screening

Advanced Detection Technology, LLC – Winner

Best Explosives/Narcotics/Contraband

Detection

SureScan Corporation – Winner

Best Nuclear/Radiation Detection

Rapiscan Systems – Winner

Best Communications Solutions

Best MOB Tracking and/or Wrist Devices

PureTech Systems – Winner

Best Mass Notification System

LRAD Corporation – Winner

Best Acoustic Hailing Service

LRAD Corporation – Winner

Best Surveillance Systems

Best Coastal Surveillance Solution

TCOM, LP – Winner

Best Video Analytics/Intrusion Detection

Honeywell Security – Winner

Best Long-Range/Day-Night Surveillance

CohuHD Costar – Winner

Best Perimeter Protection, Fencing,

Gates, Guard Booths

Best Fencing, Barriers, Bollards, Gates

Betafence USA – Winner

Tilt-A-WAy – Winner

Best Guard Service, Facility Protection Service

Global Elite Group – Winner

Best Integrated Security Programs

Best Physical Security Information

Management System - PSIM

Network Harbor, Inc. – Winner

Honeywell Security – Winner

Best Integrated Harbor Security Program

Emergency Response Technology, LLC – Winner

13


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Crossmatch

2015 Winner

Best Access Control/Identification

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Biometric Identification Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Crossmatch

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Crossmatch is a world leader in biometric identity

management solutions. With deployments in over 80

countries worldwide, Crossmatch biometric capture

devices are used daily to identify individuals and authenticate

claimed identities. Our latest compact, mobile,

handheld solution, the Verifier ® Sentry, is a highly flexible

Android-based device designed to rapidly identify/

authenticate an individual using their fingerprint or

secure credential, such as contact and contactless cards.

The handheld enables government and enterprise

personnel to perform identity and credential checks and

initiate workflows anywhere, anytime. Incorporating a

FAP30 fingerprint sensor, the Verifier Sentry captures

more data points than FAP10 sensors found in many

mobile devices. This is imperative when matching an

unknown subject’s fingerprint to a backend database or

watchlist. A March 2014 report from the National Institute

of Standards and Technology (NIST)* states FAP10

submissions fail to identify their target approximately

twice as often as FAP20 or FAP30 – a situation that could

lead to missed apprehensions, compromised safety, denied

benefits or unauthorized access in commercial or

government use cases. While FAP10 may be sufficient on

personal devices or one-to-one matching of a cooperative

subject, a FAP30 is the best solution for identifying

unknown or uncooperative persons. The Verifier Sentry

is offered with DigitalPersona ® Commander, a mobile

device management tool that provides the secure communications

tunnel to the handheld and remote matching

databases, protecting data integrity and personal

14


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.crossmatch.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.crossmatch.com/verifier-sentry/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

John Hinmon, Vice President, Worldwide Marketing

Crossmatch

privacy. Match requests from multiple Verifier Sentry

devices are aggregated by the secure server-based Commander

application for centralized administration and

submission to one or more matching databases. Administrators

using Commander have the ability to efficiently

manage and configure deployed devices and perform

watchlist management tasks. They can also locate, lock

or even wipe Verifier Sentry devices in the field, as well

as control who logs in and at what times.

Solution Benefits:

• Listed on FBI Approved Products List

• Superior FAP30 PIV certified fingerprint sensor

• Ergonomic one-handed operation

• Wide range of supported credentials, including PIV,

and PIV derivatives such as CAC, TWIC, and FRAC and

RFID cards.

• PIV specified facial image capture

• Wireless (Wi-Fi, Bluetooth, 3G GSM)

• On-device matching for autonomous operation

• Centralized administration capabilities via DigitalPersona

Commander Reference:

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 561-493-7401

cell: 561-346-5862

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

john.hinmon@crossmatch.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

3950 RCA Boulevard, Suite 5001

Palm Beach Gardens, FL 33410

* NIST IR 7950

15


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Securiport

2015 Winner

Best Access Control/Identification

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best ePassport Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Securiport

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

In today’s globalized world, international travel is essential

to business success. Trade and tourism depend

on safe and efficient immigration controls. However,

terrorism, identity theft and human trafficking pose

grave risks to border security. Securiport solves border

security challenges with innovative technology solutions

that keep citizens and travelers safe. At Securiport, we

leverage cutting-edge ultrasound biometric technologies

and advanced data analytics tools to provide authorities

with the knowledge and assurance to ensure order and

efficiency across transnational borders. With solutions

currently in place across dozens of countries around

the world, and a dedicated team of professionals developing

innovative tools to meet emerging challenges,

Securiport is the global leader in intelligent immigration

controls solutions.

Securiport’s innovative eVisa Solutions Provide a

Faster, Smarter, Safer Way To Travel, Benefitting

Tourism and Local Economies

Section 1 – Introduction to Visa Challenges

A visa is an official mark or stamp on a passport that

allows someone to enter or leave a country usually for

a particular reason [1] . Historically, immigration officials

would grant a visa when a visitor arrived in a foreign

country, but today, a traveler wishing to enter another

country must apply for a visa in advance. This causes

numerous challenges for both civilians and government

officials all over the world. The first obvious disadvan-

16


tage of applying for or issuing a visa is the time required

to process the application. Under normal circumstances,

a traveler seeking to apply for a visa would need to

fill out the necessary paperwork and then either mail

or hand deliver the paperwork to the desired nation’s

local embassy or consulate. After this time-consuming

procedure, the embassy will process the documents

and then mail the visa back to the applicant if approved.

As a result, the life cycle of receiving a visa could take

anywhere from two weeks to two months. This can be

very costly and time consuming for immigration officials

and can cause problems if a traveler needs to apply for a

visa last minute. Another obstacle travelers and officials

face is the lack of infrastructure and personnel available.

Many developing nations are simply not equipped with

the proper personnel, technology and infrastructure

needed to issue these documents in a timely and efficient

manner without compromising safety or security.

Long queues build up at immigration desks at airports,

embassies and consulates, further increasing the document

process time. This increased workload for the immigration

staff can hinder their ability to work efficiently

and securely. Governments should look to improve

their immigration processes, starting with the system for

issuing visas. Many of the challenges caused by the visa

application process can be overcome by simply transitioning

to an electronic visa system, which streamlines

the process and ensures accountability for both governments

and travelers. By transitioning to an electronic

visa system, governments will improve and ease the process

of applying for a visa, which can lead to a multitude

of benefits for the country. For example, a country such

as Honduras could benefit greatly from implementing

an electronic visa system. Honduras, located in Central

America, is home to some of the world’s best beaches,

coral reefs and diving locations in addition to the world

famous Mayan city of Copan and Rio Platano Biosphere.

These attractions make Honduras a great location for

travelers who wish to experience the wonders of Central

America. However, the long process for applying for a

visa can be a major deterrent to tourism in the country.

Just recently, the Honduran government has made

tourism a national priority, believing that the tourism

industry will not only benefit the country by stimulating

the economy, but also by strengthening the national

identity, increasing development and providing Hondurans

with a higher standard of living. By implementing

an electronic visa system, like Securiport’s eVisa Management

System, countries, such as Honduras, could

save time and money by operating more efficiently to

improve the way they communicate and engage with

citizens. By addressing key challenges and streamlining

the process it takes to apply and receive a visa, the

number of total visa applications and number of visitors

will inevitably increase, improving revenue generated

from tourism. Government officials, business travelers,

and tourists alike will benefit from a more convenient

and efficient visa application process.

Section 2 – Features and Benefits of the eVisa System

Securiport’s eVisa Management System is a modern,

comprehensive ICAO-compliant system that provides

travelers with a quick, convenient and completely

secure way to apply for a visa. It can be easily integrated

and deployed to preexisting visa procedures and systems

such as national centers and consulates, providing

immediate support to immigration officials. Securiport’s

software engineers and cyber security professionals have

invested a substantial amount of time and resources

into developing an absolutely secure system. When dealing

with such sensitive information, it is imperative that

proper research and precautions regarding security are

taken. Securiport’s advanced proprietary systems and

superior cyber security methods ensure that both travelers

and government officials can use the eVisa Manage-

Continued on next page

17


ment System with full confidence. The system provides

travelers with a secure application portal, which can

be accessed at any time of day from virtually anywhere

in the world via a web browser. This innovative system

provides a multitude of benefits for both travelers and

governments by providing an alternate method of applying

for a visa. Not only does this new, virtual application

method save government officials time and money by

decreasing employee workloads and reducing lines at

consulates and embassies, but it allows travelers to apply

for a visa up to one day before travelling. This timeframe

is a massive improvement over the current, erratic

method that could leave travelers waiting two months

for a visa. There are many different circumstances in

which someone may need to travel without an extended

notice, and this new system will allow travelers to do so

with ease. The eVisa system also provides travelers with

an alternate application method if they are unable to

mail in or hand deliver their application to the appropriate

consulate or embassy. The eVisa Management System

utilizes Securiport’s secure application portal, which

can be accessed from any browser-based system. This

includes, but is not limited to: computers, tablets, smart

phones and kiosks conveniently located at consulates,

embassies and immigration checkpoints. The system

includes real-time background checks and watch-list vetting

against national security and INTERPOL databases

for all applicants and leverages Securiport’s Intelligent

Information Management System (IIMS), which creates

intelligent information reports based on traveler information

and statistical data. The system is linked to a central

visa database through a secure Internet connection

and provides governments and immigration officials

with the proper data and information needed to confirm

a traveler’s identity with confidence at each stage of the

immigration process. The eVisa Management System

also pairs perfectly with Securiport’s Integrated Immigration

Control System (IICS), which empowers border

management and immigration officers by utilizing

advanced biometric identification systems and providing

proprietary intelligent information used to identify

potential security risks and criminal activity. This can be

very beneficial for countries such as Honduras, who are

working towards improving the country’s tourism. By

integrating these advanced security solutions, countries

will be communicating to the world that they are taking

an active role in enhancing traveler safety by investing

into advanced security solutions for immigration ports.

Securiport’s eVisa Management System is more timely,

cost-effective, and efficient than the current application

process. By saving travelers’ time and eliminating many

of the hassles associated with obtaining a visa today,

the system streamlines the visa application process,

and inevitably increases the amount of visitors to countries,

helping international business and boosting local

economies.

Section 3 – Details and Applications of eVisa Technolog

y

Securiport’s eVisa Management System provides travelers

with a web-based application portal that offers a

quick, convenient, and secure way to apply for a visa.

The system can be easily integrated and deployed to

preexisting visa procedures and systems such as national

centers and consulates. The traveler’s sole task is

to fill out the application and submit a payment. Once

an application and payment have been submitted, the

applicant’s information is submitted to the IICS for

background validation and vetted against IIMS Profiles

to detect a Person of Interest. The applicant is compared

against local watch lists, INTERPOL Notices and Stolen

& Lost Travel Documents, as well as all previous traveler

data. Once the applicant’s information has been processed

and crosschecked, they will receive a notification

depending on whether the application was approved or

rejected. If the application is approved, an attachment

18


will be sent with the notification that must be shown on

arrival. On arrival, the Immigration Workstation Application

provides the immigration official with an extremely

easy-to-use interface to process the traveler. The immigration

official scans the barcode of the attachment,

which is then sent to the server for validation. If successfully

validated, the immigration official will continue the

immigration process and begin to capture the traveler’s

biometric information. The biometrics are stored with

the traveler’s visa and immigration record and are validated

when the travelers enter or leave the country. All

of the traveler data and information collected is stored

securely in Securiport’s IICS servers. Travelers who

arrive to a country without a visa can utilize either the

automated eVisa kiosks or the eVisa Application that is

integrated with the Immigration Workstation Application

to submit their information, biometrics and payment. All

the information submitted is sent to the IICS and IIMS

servers for validation and once complete, the approved

visa is printed and the traveler is directed to immigration

processing. eVisa applications can also be configured

to be manually approved or rejected. Once the

background validation has been completed, the application

is ready for manual approval or rejection via the

Visa Review Application. If approved, a notification is

sent to the traveler with an attachment for them to provide

on arrival. If the application is rejected, a notification

is sent to the traveler informing them a visa cannot

be issued and to contact the embassy or consulate for

guidance. If more information is needed, a notification

is sent to the traveler requesting them to update their

application with the specific information needed.

Section 4 – Strategic Benefits to Governments

With an increase in the demand for international travel

in our evolving global marketplace, it is necessary to

have an efficient and effective system that simplifies

the visa application process. Utilizing an eVisa system

such as Securiport’s eVisa Management System, governments

can prevent excessive hours waiting at visa desks,

reduce the workload of staff working at airports, embassies

and consulates, and provide easier facilitation for

tourists and business travelers. By reducing the time and

money it takes to apply for and issue visas, governments

can only expect to see an increase in visa applications as

well as the number of visitors, tourism and foreign trade

revenue. Just recently, the Turkish government launched

an e-Visa application system similar to Securiport’s eVisa

Management System. Just weeks after implementing the

e-Visa system, the Turkish government saw an increase

in visa applications, going from a weekly average of 400

applications to receiving more than 1,500 in just a few

days [2] . The Turkish government hopes to develop and

improve Turkey’s tourism and increase foreign trade

with this eVisa reformation. By utilizing Securiport’s

eVisa Management System that leverages their Integrated

Immigration Control System (IICS) and Intelligent

Information Management System (IIMS), governments

and immigration officials can equip themselves with

the actionable data and information needed to confirm

a traveler’s identity at ports of entry and exit as well

as at each stage of the immigration process. And with

dynamic configurations, government officials can issue

and manage any number of visa types required by their

country.

Section 5 – Summary and Conclusion

Governments can derive great benefit from updating

visa and immigration processes to leverage new technology

that provides enhanced security and improved

efficiency. Currently, the visa application process takes

time, money and a high workload of the staff at airports,

immigration checkpoints, embassies and consulates.

Additionally, the time constraints of the current application

process create multiple challenges and roadblocks

for travelers who may need to apply for a visa very

Continued on next page

19


quickly. Securiport’s eVisa Management System can help

governments, such as Honduras, better serve citizens

and solve these challenges. By transitioning to an eVisa

Management System, governments will be able to provide

travelers with a quick and convenient way to apply

for a visa and initiate their travel to the country while

ensuring absolute security of sensitive information. By

simplifying the visa application process, governments

can expect the volume of visa applications and visitors

will inevitably increase, further increasing the revenue

generated from tourism. In addition, by implementing

these advanced security solutions, governments will

be showcasing to the rest of the world that they are

invested in improving their security and immigration

processes. With the ability to seamlessly integrate with

preexisting visa procedures or systems, as well as Securiport’s

Integrated Immigration Control System (IICS),

the eVisa Management System provides governments

and immigration officials with the necessary traveler

data and information needed to confirm the traveler’s

identity throughout the immigration process. This innovative

system creates safer travels and a more secure

nation that when coupled with Securiport’s IICS and

IIMS; provide a complete immigration control system

that is tailored to provide benefits to both travelers and

governments.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.securiport.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.securiport.com/improving-travelersafety-with-advanced-security-immigrationsolutions-to-create-safer-nations/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Gal Borenstein, CEO

Borenstein Group

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 703-385-8178 x28

cell: 703-597-1610

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

gal@borensteingroup.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

Borenstein Group, Inc.

11240 Waples Mill Road Suite 420

Fairfax, VA 22030

20


Improving Traveler Safety with Advanced Security & Immigration Solutions to Create Safer Nations

21


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Honeywell Security

2015 Winner

Best Access Control/Identification

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Physical/Logical Priviledged Access Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Pro-Watch 4.2

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

In high-security areas like government agencies, airports

and major technology companies, many people

come and go throughout the premises each day. With

so many people in such high-profile areas, safety is of

the utmost importance. Honeywell’s Pro-Watch 4.2 is

a visitor management, access control, IP-video surveillance

and intrusion system that enable security personnel

to quickly and easily protect people and property.

Designed to meet the challenges of today’s demanding

environments, the Pro-Watch security management suite

provides the flexibility, scalability and control required

for comprehensive security management. Pro-Watch is

fully compatible with a wide range of biometric readers

and wireless locks, including options from Allegion (AD-

400 Series), Assa Abloy (Aperio line) and Salto (Sallis

and SVN). Its wireless lockset technology allows security

personnel to install readers in typically hard-to-reach

locations. The wireless readers are also less expensive to

install, allowing users to implement access control in locations

that may have been previously passed-over due

to costs, resulting in a more-secure facility. The openplatform

system makes it possible for security personnel

to leverage existing hardware as the system expands.

This allows users to save time and money as they upgrade

their security systems. Pro-Watch is also capable

of system conversions. A drop-in board replacement

for Mercury-based systems allow for easy transitions

from legacy readers and access equipment over to the

updated platform without replacing existing hardware.

Pro-Watch also lets security personnel access and man-

22


age the system from any computer. The Pro-Watch Web

Client uses existing network infrastructure to provide

remote security management for badging, reporting

and alarm and event monitoring. This flexible security

management allows security personnel to provide

remote security management across buildings, across

campuses and even across the country to governmental

sites like border controls. Pro-Watch is compatible with

Honeywell’s Vindicator ® Intrusion Detection systems

–commonly used at high-profile, critical infrastructure

government sites – and gives users control of intrusion,

access control and video surveillance systems through

one common interface. By equipping buildings systems

with Pro-Watch 4.2, time and money, which were previously

allocated to repairs and software upgrades, can be

eradicated. From airport campuses to government agencies,

Pro-Watch 4.2 gives security managers the advanced

security management platform they need to protect

their premises from any security threat.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.honeywellsecurity.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.honeywellintegrated.com/products/

integrated-security/sms/7757...

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Solveig Hommema, Assistant Account Executive

Weber Shandwick

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 952-346-6050

cell: 612-501-0949

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

shommema@webershandwick.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

8000 Norman Center Drive, Suite 400

Bloomington, MN 55437

23


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Best Access Control/Identification

STANLEY Access Technologies

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Physical/Logical Priviledged Access Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

4900 ASR Security Revolver

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

If you want to beat a criminal, you have to think like

one. That’s exactly what the STANLEY engineers and

product designers did when they conceptualized the

4900 ASR Security Revolver. To bring our vision to

life, we pulled together unparalleled industry-leading

technology that ultimately created the new standard of

secure entryways, allowing our customers a safe environment

and peace of mind. The 4900 ASR provides

anti-tailgating and optional anti-piggybacking detection

through the use of Time-of-Flight (TOF) technology.

This anti-piggybacking detection is achieved through the

self-contained infrared light sources and camera capturing

the reflected light. An internal processor measures

the time of reflected light and creates a depth image

to analyze the objects within the revolving door. This

allows the built-in processor to determine if one or two

persons have entered into the security revolving door.

The processor compares the images with image stored

in memory to detect security violations.

FEATURES AND BENEFITS

• Prevents unauthorized entry, ensures a safe and secure

internal environment for employees and property

• Anti-Piggybacking TOF technology detects if two

people are trying to enter into the secured facility at the

same time using one door quadrant with a single authorization

• Anti-Tailgating - TOF technology detects if an unauthorized

person or persons are trying to enter into the

secured facility using an empty quadrant without a valid

24


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

StanleyAccess.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––:

http://www.stanleyaccess.com/4900-automaticthree-wing

authorization

• TOF technology provides higher resolution and accuracy

than other sensing systems and is not affected by

ambient light or dark shadows and heavy dark objects

(coats, carts, luggage, etc.) which can give false signals

• Automatic operation, providing either one-way or

two-way security options

• STANLEY Rush collapsing mechanism for emergency

egress from the building

• PLC based programmable control integrates with all

access systems

• Collapsing wings release on activation of (fire) alarm

(security) signal

• Factory preset program provides safe, reliable door

operation

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Adria Boyle, Brand Marketing Manager

STANLEY Access Technologies

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (860) 679-6473

cell: (860) 919-5279

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

adria.boyle@sbdinc.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

Adria.Boyle@sbdinc.com

25


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Best Detection Solutions

Advanced Detection Technology, LLC

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Cargo/Vehicle Screening

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

LowCam under-vehicle inspection systems (UVIS)

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Although there are others within our realm of manufacturing,

our LowCam under-vehicle inspection systems

(UVIS) are very unique in their approach to inspecting

the undercarriage of incoming and outgoing vehicles.

Basically, just as an overview, our UVIS technology

replaces the mirrors that are commonly used when circling

a vehicle and looking at the undercarriage. Instead

we provide a camera system (much like CCTV) that a

vehicle simply drives over, then the undercarriage image

is instantly displayed on a monitor in a central control

room or in a safe stand-off location for a thorough, yet

quick, inspection. While other solutions available on the

market offer only a black and white static, single image

(imagine a photocopy), the LowCam UVIS offers not

only the single image viewing, but also full-color, real-

time video so that the inspecting operator can view the

vehicle’s undercarriage using play, pause, zoom, fastforward

and rewind - much like a CCTV camera allows

in other security operations. All vehicle data - including

license plate information and/or driver image - gathered

by the LowCam UVIS is stored in a centralized database

for future review. All facilities can easily pull historical

information to inquire on who is entering or leaving

their facility, and if any security measures or breaches

were detected. Besides capturing license plate and

driver information, the most advanced UVIS are now

equipped with a video-analytical tool known as “Foreign

object Detection”. This software scans quickly the approaching

vehicle’s undercarriage for abnormal colors,

sizes/shapes of objects and variations made to the

26


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://advanced-detection-technology.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://advanced-detection-technology.com/resources/downloads

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Candace Carpenter, Gobal Marketing Director

Advanced Detection Technology

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (704) 696-0708

cell: (828) 308-2580

undercarriage in order to automatically highlighting and

alerting (using on-screen and visual queues) the operator

of the potential danger these detected items could

represent. Often used in conjunction with other vehicle

screening and access control devices, such as bollards,

stoplights and even the larger vehicle X-Ray inspection

systems, our LowCam UVIS have been battle-tested

and proven globally for over 12 years. Our company is

proud to serve airports, seaports and border crossings

around the world!

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

cancarpenter@advanced-detection.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

215-1 Overhill Drive

Mooresville, NC 28117

27


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

SureScan Corporation

2015 Winner

Best Detection Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Explosives/Narcotics/Contraband Detection

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

x1000 Multi-Energy Stationary Gantry CT Explosives

Detection System for Checked Baggage Screening

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

TSA Certified x1000 Multi-Energy Stationary Gantry

CT Explosives Detection System for Checked Baggage

Screening SureScan Corporation Brings NEW Technology

to the Market, Focused on Lower Life Cycle Costs The

SureScan x1000 checked baggage-screening solution,

is engineered and designed with innovative technology

and low maintenance and lifecycle costs. Built from the

ground up for checked baggage screening rather than

an adaptation of medical technology, the x1000 is suited

to the airport environment and designed with a baggage-handling

interface in mind. Unlike a medical environment,

baggage-handling areas in airports are constrained,

dusty environments with operation every day,

365 days a year. The x1000 is designed to install and

function seamlessly in this environment. The x1000 is

TSA certified and currently being utilized in Department

of Homeland Security research projects and undergoing

ECAC Standard 3 approval. Features include: Stationary

Gantry: No moving parts, low maintenance and replacement

costs Large Rectangular Tunnel throughout: Fits

tall and wide baggage, preventing costly bag jams and

system downtime Multi-Energy Detection: For atomic

number analysis detects current and emerging threats

such as home made explosives (HMEs) with a high level

of accuracy and low false alarm rates Efficient Platform:

Easy to set up and self-calibrates Decreased Power Usage:

50 percent lower operating power consumption

and simple air-cooling eliminates pricey air condition

operation and fees Upgradable Processing and Algorithm

Engines: Field-upgradeable options to address

28


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.surescaneds.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

TDS:http://surescaneds.com/pdf/20150401_

SSx1000TDSE.pdf; FOX NEWS REPORThttp://

video.foxnews.com/v/4072808566001/new-technology-set-to-revolutio...

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Susan Cooper, Director of Marketing

SureScan Corporation

future requirements, such as increased belt speeds,

lower false alarm rates, and future threats SureScan

Corporation is an emerging leader and global company

bringing advanced, explosive detection technology and

superior manufacturing to the homeland security marketplace.

SureScan sits firmly as a leading edge developer

of security technology, providing solutions that meet

the most rigorous quality and performance standards

while remaining efficient and cost-effective.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 973-830-6798

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

susan.cooper@surescaneds.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

PO Box 210, 2507 Wayne Street, Endicott, NY 13760

Visit www.surescaneds.com for the full technical data

sheet download and to contact us for an overview of the

x1000 solution.

info@surescaneds.com

+1 (607) 321-0042

www.surescaneds.com

29


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Rapiscan Systems

2015 Winner

Best Detection Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Nuclear/Radiation Detection

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Rapiscan Systems

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Rapiscan Systems, a leading provider of security screening

solutions, is well known for the high quality, reliability

and affordability of its solutions. With products

sold into four market segments, including Baggage and

Parcel Inspection, Cargo and Vehicle Inspection, Hold

Baggage Screening and People Screening, the company

has a solution for the most demanding threat detection

situations its customers could face. An important

part of Rapiscan’s product portfolio is its radiation

detection product line, which addresses the need for

global governments and organizations to monitor and

locate radioactive threat materials that can be used in

atomic weapons and dirty bombs. The product line is

comprised of software and hardware based solutions

for inspecting vehicles, packages and people. Radiation

detection products can be used in a standalone deployment

or integrated with Rapiscan’s X-ray and metalbased

threat detection solutions. The newest addition to

Rapiscan’s radiation detection product line is the Rapiscan

MP100 Backpack Radiation Detection system. A high

performance, easy to use radiation monitor combining

gamma and optional neutron detection is housed in

a lightweight, compact commercial backpack, making

the system perfect for covert inspection situations. The

MP100 is ideal for supporting security operations and

performing radiation surveys in a variety of markets –

including critical infrastructure, customs and border

control, event security, defense and law enforcement

applications. All of the features required for radiation

detection are integrated in the MP100 so it can be used

30


as a standalone device and connected wirelessly to a

Rapiscan oversight system for remote data collection

and display. Using the MP100 is as easy as slipping

the backpack on and walking around. Weighing just

18 pounds, the MP100 is lightweight and easy to use.

Additionally, the onboard battery enables 16 hours of

continuous operation in a wide range of environments.

The Rapiscan RadviewerTM Android app displays the

operator’s current position and direction toward the

radiation source. The design of the MP100’s radiation

detectors provides increased directional sensitivity of

the radiation detection. A radiation alarm is signaled audibly

via a headphone jack on the backpack or visually

via RadviewerTM. In this way, the MP100 enables users

to effectively detect and locate radioactive threats. The

MP100 is manufactured by Rapiscan’s Radiation Detection

Products division, which has supplied thousands of

radiation monitors that are deployed at border crossings,

seaports, airports and facilities around the world.

The MP100 uses Rapiscan’s proven radiation detection

technology adapted for a backpack deployment. The

radiation detection performance meets the requirements

of ANSI N42.53. The MP100 offers customers

efficient, easy to use and reliable man-portable radiation

detection with high performance at an affordable cost of

acquisition and operation.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.rapiscansystems.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.rapiscansystems.com/en/products/

radiation_detection

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Jennifer Edgerly, Senior Account Director,

SpeakerBox Communications

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 703-287-7809

cell: 202-486-0518

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

jedgerly@speakerboxpr.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

7900 Westpark Drive, Suite T410, McLean, VA

31


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

PureTech Systems

2015 Winner

Best Communications Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best MOB Tracking and/or Wrist Devices

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Man Overboard Detection System

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Man Overboard events continue to be a common occurrence

in the cruise industry and other related markets.

The problem is compounded by the fact that when

these events occur the timely availability of important

data is missing. Accurate confirmation of the event

including time of occurrence, location on the ship and

location in the sea is critical, but often unavailable for

hours following an occurrence, if at all. Fortunately,

proactive detection systems such as the Man Overboard

Detection System from PureTech Systems, accurately

detects man overboard events and provides immediate,

actionable data to response personnel. We feel such a

system deserves award consideration for its potential

to save lives within the cruise line and ocean platform

industries.

ACCURATE VIDEO DETECTION

The system utilizes commercially available infrared imagers

combined with PureTech’s geospatial video analytics,

which not only provide instant visual proof of an event,

but also achieves detection rates over 99% in various

ranges of sea states and weather conditions. Detection

coverage encompasses the length of ship, including all

passenger floor levels and is accurate for both cold and

warm water cruise routes.

FIELD PROVEN FOR LOW FALSE ALARMS

Almost as important as detection accuracy, false alarms

from weather conditions and cruise operations can minimize

the effectiveness of detection systems. The Man

Overboard Detection System from PureTech Systems was

32


subjected to hundreds of hours of real world environmental

and operational conditions on actual cruise

ships and the results demonstrated accurate detection

(i.e. approaching 100%) with little to no false alarms.

SITUATIONALLY AWARE USER INTERFACE

Use of geospatial data within the detection algorithms

allows for a user interface that is easy to understand and

simple to use. In situations, such as a man overboard

events, providing a high level of situational awareness

aids first responders in gaining a full understanding

of the event as quickly as possible. This is achieved

through geolocation of the alarm location, instant access

to detection images, looping videos of the event, as well

as audio notification. The system includes a full alarm

database and video playback capability.

HIGHLIGHTS

• Automatic Detection of Man Overboard Events

• 99%+ detection rates over wide variations in sea state

and weather conditions.

• Very Low False Alarm rate

• Instant video validation of event for immediate action

• Reporting of event latitude and longitude (i.e. location

in the sea)

• Fall origin guidance (i.e. location on the ship)

• Alarm and Video Retention and Review

• Situational presentation of incident data to decision

makers

• In Service Installation

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.puretechsystems.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.puretechsystems.com/man-overboard-detection.html

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Eric Olson, VP of Marketing

PureTech Systems,

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 602-424-9842 X112

cell: 480-522-6331

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

Eric.olson@PuretechSystems.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

1950 W Rose Garden Lane #140

Phoenix, AZ 85027

33


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

LRAD Corporation

2015 Winner

Best Communications Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Mass Notification System

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

LRAD 360X

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

During large events or area emergencies, the ability

to broadcast crystal clear voice messages is crucial for

communicating to, and ensuring the safety of, those attending

events and the public. The LRAD 360X delivers

LRAD ® ’s renowned, highly intel¬ligible voice broadcasts

and warning siren with uniform 360° coverage.

Each lightweight, power efficient LRAD 360X emitter

array broadcasts uninterrupted clear voice messages

and warning sirens over a 1.3-kilometer radius. Featuring

LRAD’s optimized driver and waveguide technology,

LRAD 360X ONE VOICE mass notification &

communication systems ensure every voice broadcast

cuts through wind, engine and crowd noise, and is

clearly heard and understood throughout an event or

emergency. Featuring the industry’s highest level of

intelligibility and quality of sound, the LRAD 360X offers

true continuous activation and maintains a smooth

frequency response with an intensity variation of less

than 5 dB over in the range between 300 Hz and 6.5

kHz. The 360X avoids audio fading and offers clear communication

across all frequencies over distance. LRAD

360X systems can be mounted on buildings and/or

stand-alone poles, and are rugged enough to withstand

up to 200 mph winds. The 360X is field upgradeable for

added area coverage and features flexible power options

including AC only, AC/DC for true UPS, generator, and/

or solar. Single or multiple systems can be integrated

for remote activation and operation via TCP/IP, satellite,

GPRS/GSM, and/or redundant analog or digital radio

control interface. LRAD ONE VOICE systems can be

34


activated on site or remotely. LRAD 360X - Highly Intelligible

Mass Notification & Communication Until recently,

voice communication had been an afterthought for most

mass notification systems. While high power speaker

arrays sound sirens to alert of approaching danger,

most are incapable of broadcasting specific information

about the severity of the situation or recommended

actions that could protect and save lives. LRAD 360X

systems broadcast with exceptional intelligibility and

vocal clarity to provide authorities ONE VOICE to communicate

potentially lifesaving information over local

or large areas before, during, and in the aftermath of an

emergency or disaster. LRAD systems are self-contained

and do not rely on external power or communication

infrastructure. LRAD 360X systems and accessories have

been installed in a number of Asian countries replacing

and upgrading their mass notification systems to include

LRAD’s highly intelligible voice capability.

FEATURES

• Fully ruggedized space saving 1RU amplifier modules

• Low power consumption for continuous operation

during extended power outages

• Unparalleled vocal clarity and intelligibility

• Combined P.A. and mass notification in one system

• Safely alerts, communicates and calms the public during

emergency situations

• Audio output easily modulated

• Does not require heavy equipment for installation,

reducing installation costs

• Comes standard with LRAD’s hardened MP3 Controller/Player

for recording, storing and playing back messages,

and push button system control

• All-weather microphone to record and playback messages

on the fly

LRAD Corporation www.LRADX.com

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.lradx.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.lradx.com/lrad_products/lrad-360x/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

E. Brian Harvey, Director Capital Markets and Investor

Relations

LRAD Corporation

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 858-676-0519

cell: 858-753-8974

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

ebharvey@lradx.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

LRAD Corporation

16990 Goldentop Road, Suite A

San Diego, CA 92127

35


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

LRAD Corporation

2015 Winner

Best Communications Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Acoustic Hailing Service

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

LRAD ® 450XL

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The Industry’s Loudest, Most Intelligible AHD for its

Size & Weight LRAD Corporation’s LRAD 450XL is the

communication industry’s loudest, most intelligible

acoustic hailing device (AHD) for its size and weight.

Low profile, lightweight and designed for temporary

or fixed mounting on tripods, vehicles and vessels, the

LRAD 450XL uses an enhanced, patent pending technology

to generate the audio output of a unit almost twice

its size and weight with the same high level of clarity

and intelligibility consistent with the LRAD product

line. The LRAD 450XL is easily transported to provide a

highly effective, long range communication and warning

capability where required, and is rapidly being adopted

for public safety and national defense applications

around the world. Featuring LRAD’s optimized driver

and waveguide technology, the LRAD 450XL ensures

every broadcast cuts through wind, engine and background

noise and is clearly heard and understood even

inside vehicles and buildings. Through the use of live

or pre-recorded multilingual voice messages and alert

tones, LRAD systems establish large safety zones, unequivocally

determine intent, favorably resolve uncertain

situations and save lives on both sides of the Long

Range Acoustic Device ® . The LRAD 450XL provides

highly intelligible communication up to 1,700 meters

and safely communicates beyond standoff distances to

determine intent, create an instant acoustic standoff

perimeter, and provide time for appropriate responses.

The LRAD 450XL also uses variable beam width for extended

coverage, providing clear, long range, directional

36


communication. As part of field and special response

team operations, the LRAD 450XL safely extends the

perimeter in friendly or escalated environments keeping

the public, law enforcement and national defense

personnel out of harm’s way.

The LRAD 450XL is also used to:

• Communicate to large crowds during parades, festivals,

concerts and sports events

• Establish safety zones and humanely enforce perimeters

• Control traffic congestion

• Conduct SWAT operations

• Disperse crowds

• End hostage and barricaded subject situations

• Serve high risk warrants

• Extract inmates safely from cells

• Secure jails, prison yards and facility perimeters

• Communicate to protesters

• Stop threatened suicides

• Evacuate neighborhoods during emergencies and

disasters

• Conduct search & rescue operations from the land

and air

• Communicate potentially lifesaving information to

affected populations throughout disasters

Law enforcement agencies and first responders around

the world, including over 100 U.S. cities, counties and

states, are currently using LRAD systems and support

equipment. LRAD Corporation www.LRADX.com

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.lradx.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.lradx.com/lrad_products/lrad-450xl/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

E. Brian Harvey, Director Capital Markets and Investor

Relations

LRAD Corporation

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 858-676-0519

cell: 858-753-8974

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

ebharvey@lradx.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

LRAD Corporation

16990 Goldentop Road, Suite A

San Diego, CA 92127

37


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

TCOM, LP

2015 Winner

Best Surveillance Systems

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Coastal Surveillance Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

71M Low Altitude Surveillance System

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Maintaining continuous aerial security is a daunting information needed to secure the skies.

task. Threats such as low-flying, extremely fast aircraft

can take advantage of the earth’s curvature and exploit SURVEILANCE FOR COASTS OF THE U.S.

terrain obstructions. This renders ground-based radars AND ITS ALLIES VIA AEROSTATS

unable to provide target information in time to take Now, specifically, given the recent terroristic threats

appropriate action. Slow, low flying missiles with a small from terrorists attacking with small suicide boats large

cross section may also avoid early detection and pose a U.S. ships, pirates taking over commercial fleets, to

significant threat. Manned aerial surveillance can decrease

the risk for short periods of heightened alert, but immigration and drug smuggling via oceans and wa-

protecting the borders of the United States from illegal

the operational costs are much too high for extended terways, to detecting threats, persistent surveillance of

use. To meet this airborne coverage challenge effectively TCOM’s aerostats have become a staple in what Homeland

Security and US Military have been using here and

and inexpensively, TCOM developed the 71M Low

Altitude Surveillance System. With over 1,000,000 hours in the Gulf. Monitoring territorial waters on a round-theclock

basis while providing intelligence in time to take

of operation these systems are the only operational

airborne defense assets to routinely provide the continuous

round-the-clock, low altitude target detection Ground-based and shipboard systems have a limited

appropriate action is a major challenge to many nations.

38


ange against surface targets, while continuous use

of aircraft is prohibitively expensive. Nations need an

effective and affordable system that offers continuous,

wide-area maritime surveillance and timely provision of

target information. TCOM Sea surveillance systems use

persistent surveillance medium-class tethered aerostats,

equipped with an advanced maritime radar, thermal

imaging and optical sensors, and communications payloads

that detect and track maritime targets at distances

of 60 nautical miles and beyond. A single sea surveillance

system can cover thousands of square miles for

weeks at a time at the lowest possible hourly cost for an

airborne asset. The early detection and direct communications

with air and sea assets affords the critical window

of time to evaluate the situation, coordinate forces

and engage, if required. The versatility of the sea surveillance

system makes it ideal for responding to requirements

or threats that change rapidly. The system is fully

transportable and can be easily relocated with no site

preparation. Although fully mature, the system can be

shaped to better meet the needs of the client. Additional

capabilities such as passive surveillance and remote data

linking can be included. View TCOM’s innovative solution

video right here: https://youtu.be/6KkZCycrdkU

About TCOM

With headquarters in Columbia, Maryland and operations

in over 12 countries around the world, TCOM is

the global authority in airborne persistent surveillance

solutions. For over 40 years, TCOM innovations have

defined the industry, and our pioneering achievements

continue to revolutionize the design, manufacture and

deployment of LTA systems. With corporate headquarters

in Columbia, MD and manufacturing and testing

facilities in Elizabeth City, NC, TCOM is the world’s

only company solely devoted to the design, fabrication,

installation and operation of persistent surveillance

aerostat systems. Our complete platform solutions

include numerous classes of aerostats that can each be

equipped with a broad selection of proven payloads that

are customizable for specific customer requirements.

View TCOM’s corporate capability: https://youtu.be/

i_7GjO9iH7g An illustration of the expanding maritime

threat in U.S. allied countries, is in this release: http://

www.tcomlp.com/tcom-president-ron-bendlin-signsmou-with-bintang-kencana-in-presence-of-malaysianprime-minister-dato-sri-mohd-najib-tun-hj-abdul-razakin-providing-aerostat-systems-to-improve-maritime-sec/

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.tcomlp.com/our-company/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.tcomlp.com/sea-surveillance-systems/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Gal Borenstein, CEO

Borenstein Group

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 703-385-8178 x28

cell: 703-597-1610

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

gal@borensteingroup.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

Borenstein Group 11240 Waples Mill Road Suite 420

Fairfax, VA 22030

39


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Honeywell Security

2015 Winner

Best Surveillance Systems

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Video Analytics/Intrusion Detection

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

MAXPRO Cloud

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

National security efforts keep citizens safe and secure,

whether in airports or at sea. With multiple sites, locations

and checkpoints, it’s important to recognize how

complex national security can be; as such, airports,

and seaports need even-more intuitive and streamlined

ways to manage their security systems. MAXPRO Cloud

is an integrated, cloud-based video and access management

system that enables organizations to significantly

streamline multi-site management, providing access

from anywhere, anytime. Designed for multi-site facilities,

it allows owners to easily manage their facilities’

security system all through one user-friendly interface.

In these high-security areas, it’s imperative that security

procedures are strong enough to keep threats at bay but

easy enough to seamlessly manage multiple areas at the

same time. Honeywell’s user experience design team

crafted the MAXPRO Cloud interface to streamline ease

of use. The single sign-on enables control of all facets

of the system after entering one set of credentials. The

smart dashboard allows users to easily manage their

systems, from granting or rescinding access permissions

and unlocking site-specific doors to reviewing access

logs and captured video to evaluate a potential alarm

event. MAXPRO Cloud also integrates with Google Maps

to provide a visual, map-based depiction of physical

sites. This enhances ease of use by simplifying multisite

management. For example, an airport operations and

security manager can access a map of every building on

an airport campus and inspect which airport employees

have credentials for which checkpoints (perhaps an

40


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.honeywellsecurity.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.maxprocloud.com/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Solveig Hommema, Assistant Account Executive

Weber Shandwick

airline security screener is given access to ten of the 15

checkpoints but an aircraft mechanic only needs access

to a single checkpoint). The ability to visually manage

multisite locations removes the need for the manager to

remember which location is assigned to which system

ID and lets the manager quickly view and modify access

permissions to specific sites. The flexibility and scalability

of MAXPRO Cloud makes it applicable to a wide range

of applications, from a maritime port of two buildings to

a major international airport. This customization allows

aviation, maritime and other national security facilities

to use access and video surveillance services proportionate

to the size of their precincts. MAXPRO Cloud

provides proactive system health reports and alerts to

the dealer and user, enabling the dealer to actively address

issues as they arise instead of reactively responding

to failed hard drives, cameras that have lost video

or equipment that has stopped working. This constant

vigilance helps to prevent security breaches before they

have a chance to occur, resulting in improved security.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 952-346-6050

cell: 612-501-0949

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

shommema@webershandwick.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

8000 Norman Center Drive, Suite 400

Bloomington, MN 55437

41


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

CohuHD Costar

2015 Winner

Best Surveillance Systems

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Long-Range/Day-Night Surveillance

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

CohuHD Costar’s 8800HD Series

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

CohuHD is a leader in rugged, outdoor video surveillance

cameras for critical infrastructure environments.

The 8800HD Series combines full HD image resolution

with high-powered performance lens optics for delivering

unprecedented image quality and detail for longrange

surveillance applications.

The 8800HD Series long-range camera system offers an

unprecedented feature set:

• First truly long-range high-definition camera positioner

• Powerful HD optical zoom magnification, up to 137x

• Industry’s narrowest HAFOV with HD resolution, as

low as 0.17° degrees

• Boresighted optics with programmable day/night

focusing

• Greatest detection distances on the market, humansized

objects detected at distances up to 30 miles (based

on Johnson Criteria with optimum conditions)

• First long-range HD camera positioner with built-in

H.264 compression and web server, operating over standard

digital networks

• Precision positioning with speed range of 0.05° to

45°/second, and with built-in brakes for stability

• Highest environmental standards: IP67, ASTM-B117,

TS-2 Shock & Vibe, and MIL-STD-810F for salt/fog, immersion

and sand/dust CohuHD’s 8800HD Series can

deliver up to 6 times the resolution and detail of traditional

standard-definition long-range camera systems.

42


With this exceptional performance, the 8800HD is ideal

for:

• Border patrol

• Airports

• Seaports

• Military

• Perimeter security

• Maritime

• Other critical infrastructure environments

In addition to superior image quality and excellent longrange

zoom optics, the 8800HD system delivers its HD

video across standard digital network infrastructures. It

does this by using H.264 image compression technology,

which requires a fraction of the bandwidth traditional

MPEG4 or MJPEG requires. The 8800HD superior

image quality is generated by a 1/2.7” CMOS 1080p30

progressive scan day/night sensor. Image performance

and color reproduction are superb even under challenging

lighting conditions. In night mode, the camera

enhances low light viewing by automatically switching

the IR filter out of the optical path, delivering a monochrome

image. Long-range surveillance is achieved by

the integrated 60x HD-quality zoom lens optics, with

focal length ranging from 16.7 mm to 1,000mm. The

lens includes a remotely controlled 2x optical extender

which can be inserted in the optical path, increasing the

maximum focal length to 2,000mm. Horizontal Angular

Field Of View as low as 0.17 is achieved at full zoom

with extender inserted. The 8800HD provides a fullfunction

web server, enabling complete administrative

and operator control. Administrative features include

configuring network settings, assigning user passwords,

setting video streaming properties, defining camera

positioning presets and tours, and assigning camera ID

labels. The 8800HD is designed to operate in extreme

weather, with its IP67 sealed and pressurized enclosure

Continued on next page

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.Cohuhd.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

CohuHD Costar’s 8800HD Series:

http://www.cohuhd.com/content/8800hd

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Dana Varga, Marketing Manager

CohuHD Costar

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 858-391-1712

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

dvarga@cohuhd.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

12367 Crosthwaite Circle

Poway, CA 92064

43


protection. This eliminates the effects of water intrusion,

pollutants and corrosives. It is designed to operate

in a broad temperature range, from winter in the Arctic

to summer in the desert, with heaters and fans, and

electrical and mechanical components that are rated

for the full range. CohuHD has proudly manufactured

its products in the USA for more than 50 years. The

8800HD is installed and protecting marquee projects

around the world including the Port of Corpus Christi,

Integrated Fixed Towers (IFTs) at the Jordan Border and

the USS Ponce.

The 8800HD Series long-range camera system offers an

unprecedented feature set:

• First truly ultra long-range high-definition camera

positioner

• Powerful HD zoom magnification of up to 2,000mm

• Industry’s narrowest HAFOV with HD resolution, as

low as 0.17 degrees

• Boresighted optics with programmable day/night

focusing

• Greatest detection distances on the market, humansized

objects detected at distances up to 30 miles (based

on Johnson Criteria with optimum conditions)

• First long-range HD camera positioner with built-in

H.264 compression and web server, operating over standard

digital networks

• Precision positioning with speed range of 0.05 to 45/

second, and with built-in brakes for stability

• Highest environmental standards: IP67, ASTM-B117,

TS-2 Shock & Vibe, and MIL-STD-810F for salt/fog, immersion

and sand/dust

44


45


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Betafence USA

2015 Winner

Best Perimeter Protection, Fencing, Gates, Guard Booths

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Fencing

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Guardian Fence System ®

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The reason Betafence USA should win the Best Fencing,

Barriers, Bollards, Gates award is due to the Guardian

Fence System ® . It is the original modular steel security

fence solution, providing high strength protection.

The patented design allows a variety of configurations,

from medium security to high security fencing and

partitions. We also offer more than 40 available security

mesh panel styles. The Guardian Fence System ® also

offers the greatest range of security solutions, from

perimeter fencing, partitioning, visual screening barriers

and pedestrian and vehicular gates. The Guardian

Fence System ® configurations include: Guardian 5000

(high security) and Guardian 7000 (ultra-high security).

For high security fencing applications, the Guardian

Fence System ® features an exceptional “Smart Fence”

trenchless integration design, providing a steel conduit/

raceway within the fence system for intrusion detection,

surveillance, access control and communication, fiber

optics and cabling, shielding them from view, weathering

and vandalism. The system is also capable of incorporating

restrictive components such as barbed tape

concertina and either cable-based or rail-based vehicular

anti-crash resistance. Fences can be easily upgraded

without removing existing posts; exact spacing of posts

is not a requirement of the Guardian Fence System ® .

This system is also capable of employing a dual layer of

46


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.betafenceusa.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.betafenceusa.com/ProductLine.

aspx?Id_ProductLine=24&Tab=Intro

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Debbie Corkin, Controller

Betafence USA

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 972-878-7000

security mesh panels - either the same type, or two different

types that may be complementary in nature based

on the application. The Guardian system can also use

one type mesh style at the bottom of the barrier, and an

alternate type arranged vertically based on a particular

purpose. By design, the Guardian Fence System ® can

also be installed more quickly, and at less expense, than

other fence solutions providing similar levels of security.

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

dcorkin@betafenceusa.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

3309 SW Interstate 45 Ennis

TX 75119

47


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Tilt-A-Way

2015 Winner

Best Perimeter Protection, Fencing, Gates, Guard Booths

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Perimeter Protection, Fencing, Gates, Guard

Booths

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Tilt-A-Way vertical pivot gates

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Tilt-A-Way vertical pivot gate is a perfect fit in the Airport,

Seaport and Border security industry. The Tilt-A-

Way gate is installed in many of the gated areas of the

Airport, Seaport and Border Patrol facilities. with it’s

quick open and close activation cycle time. Tilt-A-way

keeps any facility a safer place preventing tailgating of

multiple vehicles. Another great feature of a Tilt-A-Way

gate. Being that it pivots from a horizontal position into

itself in the vertical position so it requires a smaller footprint

therefore leaving more real estate for structures

or more parking spaces. Tilt-A-Way also offers a full line

of anti-Terrorist crash gates such as the M-50, M-40 and

M-30 crash tested gates. Tested at the Texas Transportation

institute. The M-50 is tested with a 15,000 pound

truck traveling 50 MPH. At this weight and speed the

gate is engineered to withstand the hit and not let the

vehicle penetrate through the gate.

48


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.tiltaway.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

www.idealmanufacturing.biz

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Ideal Manufacturing

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 406-656-4360

cell: 406-670-3746

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

daveh@idealmfginc.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

2011 Harnish Blvd

Billings, Mt 59101

49


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Best Perimeter Protection, Fencing, Gates, Guard Booths

Global Elite Group

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Guard Service, Facility Protection Service

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Global Elite Group

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Since its inception, Global Elite Group (GEG) has been

committed to providing security services and solutions

to the aviation industry. GEG recognizes potential

threats to aviation security before they occur, providing

guidance with programs to develop secure operational

processes and procedures, both on the ground and in

the air. Ever since the events that occurred on September

11, 2001, threats against the airline industry have

been highly publicized, and concerns continue to be

raised over the safety at our nation’s airports. Assisting

airports and carriers in developing their own unique security

initiatives and processes is accomplished through

a comprehensive security management program developed

by GEG covering internal and external operations.

The customized program tackles not only the security

lapses but provides a thorough review of current operations

and implementation of specifically designed practices.

Each location has unique requirements, therefore,

an assessment would be recommended. Most locations

benefit from having security systems reviewed, updated

if necessary, and adding physical security components.

The combination of this approach will act as a deterrent

and a security solution should the unthinkable happen.

The service offerings from GEG are always evolving

to meet the demand of changing security threats,

these include utilizing guard posts, inspection patrols,

proper placement of fencing and barricades as well as

perimeter security monitoring and lighting. Technology

incorporated into the security plan adds another layer

of protection through access control, video monitor-

50


ing and analytics, integration of security systems with a

dispatch center and alarm monitoring. Aviation readiness

also encompasses the ability to address weather

related emergencies that have the potential to disrupt

service. Contingency planning for weather events, GEG

assists with focusing in on the company’s ability to have

the infrastructure in place to address emergencies of

any kind. An area of concern for most companies in the

aftermath of an emergency is communications. GEG

establishes an off-site area to provide the hub for these

services with satellite and landline communications as

well as a place where all backup computer data would

be stored. A seamless operation from emergency back

to a functioning is the goal of all contingency plans.

GEG’s diverse security and consulting experience has

proven that in order to be successful, there is an inherent

need for taking a customized approach to security

in order to mitigate risks. This formula has since been

adapted to service multiple industries. For instance,

GEG provided security for World Cup delegates during

site visits to Brazil for the World Cup games, as well as

during the games themselves. The security preparations

for the world’s most anticipated rivalry, required

numerous visits to ensure the safety of the players and

visitors who arrived to the games in Brazil. GEG, known

for its protection services around the globe, provided

security services for the World Cup personnel, in charge

of planning the security for the upcoming games in a

country known for its beauty and its crime. The scope

of the service, which included in-depth threat assessment

and risk mitigation plan, was to ensure the safety

and security of all persons traveling to and from Rio,

and various destinations while travelling within the

country. The closely guarded group required the use

of translators, protective services and drivers as some

support services needed for the trip. This trip required

a regional staff that knew the country in every sense.

Continued on next page

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.globaleliteinc.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.prweb.com/releases/2013/3/

prweb10546252.htm

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Victor Anderes, Executive Vice President

Global Elite Group

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (516) 393-3538

cell: (516) 507-8812

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

vanderes@globaleliteinc.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

825 East Gate Blvd Suite 301

Garden City, NY 11530

51


Once this was in place, extensive background investigations

were carried out. When the details for the trip

were addressed the group was able to travel to the most

recognized and scenic landscapes in South America.

Many of the locations visited while famous and beautiful,

were also located near crime-ridden communities

known as Favelas. It was an early indicator as to some

of the possible challenges to security these games could

face. To prepare for a large group, visiting a region of

the world with known security risks, takes a great deal

of arrangements. GEG places a premium on advance site

visits. During the planning phase we reach out to local

and federal authorities, when reliable, in advance of the

trip. There is also a strict schedule to adhere to taking

advantage of daylight hours, optimal travel times and

to ensure there are enough vehicles for the duration

of the trip. All of this attention to detail takes time and

skill. Other considerations because foreign visitors can

become a target is to map out routes away from high

crime areas, thorough inspections of vehicles, multiple

egress routes, pre inspection of facilities and secured

communications are just some of the procedures used

to mitigate the risks associated with high profile security

protection services. Contingency planning is an invalu-

able asset to any assignment and having multi-layered

preparations will ensure the likelihood of a successful

outcome. GEG staff is steeped in experience at every

level of law enforcement and military experience earned

in the most civilized and roughest regions of the world.

Our programs incorporate experience with superior

communications and technology usage.

52


53


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Network Harbor, Inc.

2015 Winner

Best Integrated Security Programs

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Physical Security Information Management

System - PSIM

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

LightHouse

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Network Harbor’s LightHouse platform delivers

unified security management for enterprise organizations,

extending the capabilities of physical security

incident management (PSIM) to include geographical

information system (GIS) and non-physical products in

a truly comprehensive safety and security management

environment. LightHouse is unique in that it integrates

every security system, physical or non-physical, into a

single, seamless oversight system. Its intuitive interface

drives faster recognition of potential threats, as well

as gives first responders the information they need to

make better informed, more appropriate decisions.

LightHouse is designed to support the IT side of inci-

dent management, too. Its click-and-go ability to adopt

the full functionality of any security system’s API within

its own capabilities means that there’s no “dumbing

down” of features or functions – just a seamless, consistent

user interface, anywhere across the enterprise.

It installs easily, and is quickly mastered by administrators

and end users alike. LightHouse supports almost

all major security product manufacturers including

access control, video, audio, mass notification, IDS,

RTLS and more. LightHouse has been designed to add

additional system integration’s to the platform without

disruption or encumbrance of any existing integration

in an expedient, stable and secure process. LightHouse

54


IPM (integrated process management) provides an

additional element of extensibility and power for policy

management and workflow processing that is virtually

unlimited in its capabilities. The end result is an intuitive,

comprehensive automated security management

platform that operates identically, anywhere within the

organization. There’s no need to retrain staff when they

move from one facility to another, or when new components

are connected to the platform, which in turn saves

customers significant amounts of time and money.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.networkharbor.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

https://youtu.be/-ucfAR5psac

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

John Convy, Principal

Convy Associates

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 202-421-3777

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

john@convyassociates.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

8380 Greensboro Drive Suite 514

McLean, VA 22102

55


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Honeywell Security

2015 Winner

Best Integrated Security Programs

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Physical Security Information Management

System - PSIM

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Vindicator Keypad Solution

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Protecting entities such as airports, seaports and government

regulated critical infrastructure sites such as border

controls can be a difficult task. A primary reason for

this is that technology designed for these markets must

meet rigorous regulatory standards, such as the ICD-

705 for SCIF security, or the NERC standards for energy

generation facilities. Honeywell’s Vindicator Keypad

Solution (VKS) meets these regulations in a cost effective,

extremely efficient manner. In addition, the VKS

is the first map-based system that provides assessment

at a glance. Its software charts the location of sensors

and alarms, resulting in a perimeter map of the building

or partition (a previously designated area or grouping).

Operators can see the location of each sensor as

it relates to the overall structure of the protected area,

and can also see whether the sensor is armed based

upon the color shown on the display – a huge operational

efficiency compared to text-based systems. For

example, a standard text-based system could inform the

user that Zone 10 is compromised. However the user

must be very familiar with the physical site and be able

to remember where Zone 10 is and what the implications

of a security event in that area means, in order to

adequately respond. Further, during high-stress events,

a user might confuse zone areas, resulting in a delayed

or inappropriate response to security events. The VKS’s

map-based system, on the other hand, shows the user

exactly which sensors have been activated on the map of

the building, giving a clear, easy-to-understand picture

of the events that are occurring.

56


The VKS brings many unique attributes to facilities,

including:

1. ASSESSMENT AT A GLANCE: The VKS is the only

keypad solution with a map-based interface for immediate

situational assessment. The intuitive, graphic display

gives operators visual confirmation of alarm locations

and states, instead of text-only communication, making

local arm/disarm and alarm response easier, faster and

safer.

2. SPEED & RELIABILIT Y: The solution’s controller

panel with embedded firmware is not dependent on an

outside server or PC, eliminating common issues such

as hard-drive crashes and time-consuming Windows

upgrades. Its embedded processing provides instantaneous

notification of alarm events. The controller can

withstand extreme environmental conditions – from

extreme cold and high winds to high heat and corrosive

environments – ensuring reliability in even the most

rugged situations.

3. COST-EFFECTIVE: The VKS cost is comparable to

traditional text-based LCD keypads and meets ICD 705

regulations for SCIFs without the need for third-party

converters or devices. IP-communication reduces time

needed for installation, keeping deployment costs low.

4. SECURIT Y: The VKS controller panel, the Vindicator

Premise Controller (VPC), processes logic through its

proprietary operating system. Its firmware is embedded

within the physical controller, marking it stronger

against hacking, viruses and worms, and meets AES encryption

standards. The system polls for events every 8

milliseconds, can annunciate five simultaneous events in

two seconds and can manage up to 10,000 alarm points

without latency in reporting alarm events.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.honeywellsecurity.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.honeywellvindicator.com/..

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Solveig Hommema, Assistant Account Executive

Weber Shandwick

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: 952-346-6050

cell: 612-501-0949

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

shommema@webershandwick.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

8000 Norman Center Drive, Suite 400

Bloomington, MN 55437

57


GSN 2015 DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS

Best Integrated Security Programs

Emergency Response Technology, LLC

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Integrated Harbor Security Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Integrated Harbor Security Program for the Port of

Greater Baton Rouge

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

According to the American Association of Port Authorities,

the Lower Mississippi River (LMR), where the Port

of Greater Baton Rouge operates, provides transportation

for over 45% of all energy resources and more than

60% of all U.S. commerce, making it the most critical

and at the same time vulnerable critical infrastructure

in the U.S. Each day that the transportation of maritime

commerce on the LMR is interrupted costs the U.S.

economy over $275 million per day, and international

commerce over $500 million per day. A tanker cut a

barge into 2 pieces in 2008, releasing 419,000 gallons

of diesel and shutting down the LMR for 11 days. This

interruption of transportation of maritime commerce

on the LMR created a loss of over $3 billion to the U.S.

economy and $6 billion to international commerce

(www.cnn.com/2008/US/07/25/mississippi.spill/). But

without an emergency response capability for secondary

emergencies, the collision could have been much

worse. The tanker had just uploaded approximately 3

million gallons of Styrene monomer, a compound that

reacts with itself in “autopolymerization”. If this had

happened, the tanker would have exploded with the

force of from 3 to 5 times that of the truck bomb used

in Oklahoma City in 1995, causing extensive collateral

damage and closing the river much longer. The Emergency

Response Technology (ERT) IHSP is designed

to autonomously detect and report multiple threats

simultaneously using both active and passive advanced

sensors using surveillance software. Chemical releases

from either accidents or intentional acts of terrorism at

58


or near the Port of Greater Baton will affect local public

health and interrupt the transportation of maritime

commerce, not only on the LMR, but also at the Port

Allen lock of the strategic Gulf Intracoastal Waterway

(GIWW) located at the port, as well as overseas transportation

of maritime commerce. The IHSP will provide

CONOPS, situational awareness, and enhance chemical

security and response for the Port of Greater Baton using

integrated orthogonal chemical sensors. “Orthogonal”

means that multiple sensor methodologies will be

deployed to reduce false/positive detection. ERT CEO

George Lane also teaches Homeland Security program

at Tulane University. For portable chemical monitoring

at the port, the IHSP will deploy Differential Mobility

Spectrometry (DMS) sensors in JUNO ® , developed by

Chemring Sensors & Electronic Systems for JCAD-2. As

a tunable ion sensor DMS separates, detects, and measures

individual chemicals in complex mixtures. Portable

chemical detectors will also be deployed in maritime

emergency response vessels operating on the LMR. For

fixed chemical monitoring and scanning of chemical

releases at a distance of up to 5 km, the IHSP will utilize

the RAPID (Remote Air Pollution Infrared Detector)

chemical detector, developed by Bruker Detection for

deployment on the military’s Stryker reconnaissance

vehicle. RAPID uses a Fourier Transform infrared (FTIR)

sensor which identifies the characteristic “fingerprint”

signatures of chemicals. Sophisticated software discriminates

against interferences, avoids false alarms, and can

determine the origin of the release. When deployed, the

ERT IHSP will protect both public health and critical infrastructure

around the port, and mitigate the interruption

of domestic maritime commerce on the LMR and

GIWW, and international maritime commerce overseas.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Fixed sensor in IHSP:

www.bruker-industrial.com/RAPID.html

Portable sensor in IHSP:

www.chemringds.com/products/chemical-detection/juno.aspx

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

George Lane; CEO

Emergency Response Technology

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

cell: 225-281-3141

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

georgelane@hotmail.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

Emergency Response Technology

999 9th Street Suite 206

Baton Rouge, LA 70802

59


The GSN 2015

Homeland Security

Awards


Winners in the 2015

Homeland Security Awards Program

VENDORS OF IT SECURITY

PRODUCTS AND SOLUTIONS

Best Anti-Malware Solution

Blue Ridge Networks – Winner

Best Identity Management

Platform

Gemalto – Winner

Best Compliance/Vulnerability

Solution

Agiliance Inc. – Winner

Best Endpoint Detection and

Response Solution

RSA, The Security Division of EMC – Winner

Best Big Data Analytics Solution

RSA, The Security Division of EMC – Winner

Best Privileged Access

Management Solution

BeyondTrust – Winner

CyberArk – Winner

Best Continuous Monitoring and

Mitigation Solution

CyberArk – Winner

SolarWinds – Winner

Best Security Incident and

Event Management (SIEM) Solution

SolarWinds – Winner

VENDORS OF PHYSICAL SECURITY

PRODUCTS AND SOLUTIONS

Best Biometric Identification

Solution

Securiport, LLC – Winner

Best Integrated System for

HSP D-12/FIPS 201 Compliance

Viscount Systems – Winner

Best Mass Notification Systems

Acoustic Technology, Inc. – Winner

Best Chemical Detection

Product or Solution

908 Devices – Winner

Best Explosive Detection

Product or Solution

Implant Sciences – Winner

Best Intelligent Video

Surveillance Solution

Qognify – Winner

Best Crash Barrier (Gates,

Fences, Bollards, Guard Booths)

B.I.G. Enterprises, Inc. – Winner

CINCH systems, Inc. – Winner

Best Physical Security Information

Management (PSIM) Solution

Qognify – Winner

Best Facility Security/Force

Protection Service

AlliedBarton Security Services – Winner

MOST NOTABLE GOVERNMENT

SECURITY PROGRAMS, PROJECTS,

INITIATIVES

Most Notable Federal Government

Security Program/Project

or Initiative

TSA - TSA Airport and Aviation security – Winner

U.S. Department of State – Winner

Most Notable State Government

Security Program/Project

or Initiative

New York State Division Of Homeland Security

and Emergency Services (DHSES) – Winner

California Department of Motor Vehicles,

Investigations Division – Winner

Most Notable Cybersecurity

Program, Project or Initiative

City of Los Angeles - Centralization of

Cybersecurity Incident Data Analysis – Winner

Most Notable County/Municipal

Program/Project or Initiative

Nanded India, Safe City - Qognify – Winner

SAMMC (San Antonio Military Medical Center)

Advanced Security Program, Suspect Search -

Qognify – Winner

Most Notable Law Enforcement

Interdiction, Arrest, Counter

Terrorism or Crime Prevention

Program – Federal/State or Local

Memphis Police Department – Winner

61


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Blue Ridge Networks

2015 Winner

IT Security Products and Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Anti-Malware Platform

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

AppGuard

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Introduction

Blue Ridge Networks’ AppGuard is a unique Anti-

Malware solution that stops malware breaches at the

earliest stages of attack without requiring detection,

scanning, or updates. Recognized by leading industry

analysts as effective, next generation endpoint protection,

AppGuard delivers a multi-layered defense that

prevents breaches from emerging undetectable threats

and generates earlier Indicators of Attack (IOA) without

a compromise occurring. AppGuard is compatible with

all current Windows versions, is easy to deploy with

scale, is non-disruptive to users and productivity, and

works “on” and “off ” enterprise without on-going management

dependencies.

Technological Innovation

Other endpoint protection products allow malware to

“detonate”, relying on detecting and responding to a

compromise in time to limit breach effects. Without

a known signature or IOC (Indicator of Compromise),

breaches can go undetected by breach

detection, whitelisting, blacklisting (antivirus),

sandboxing or other conventional

techniques for weeks or months,

placing an enterprise at risk.

AppGuard offers an effective

defense against these emerging

undetectable threats that cannot

be addressed by conventional

62


means. Without relying on detection, identification,

signatures, or scanning, AppGuard disrupts breach attempts

before a compromise can occur from zero-day

malware, polymorphic malware, phishing, “malvertising”,

watering-holes, weaponized documents, drive-bydownloads,

ransomware and other forms of undetectable

malware attacks. AppGuard’s patented technology

establishes trust zones protecting applications, operating

system resources, firmware, memory, and other

core processes. Protection policies are automatically

dynamically extended to descendant “child” processes

eliminating the need for complex rules specific to each

application and ensuring effective protection without

management overhead or impact to

user productivity.

When AppGuard stops a malware

attack, it collects Indicators of Attack

(IoA) that can be analyzed and used to

identify new malware before any IOC is

known. This provides valuable earlywarning

data for enhanced Threat Intelligence without

the exposure of a compromise.

Reliable, Versatile, Usable, Scalable, Affordable

AppGuard has demonstrated with Enterprise, Business

63

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.blueridge.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

www.appguardit.com

www.appguardbusiness.com

www.appguardenterprise.com

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Nancy Canty, VP of Product Management

Blue Ridge Networks

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (703) 633-7331

cell: (571) 232-9149

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

nancy@blueridge.com

(SME), and Personal use customers and in continuous

extensive penetration testing, the ability to stop breaches

other approaches cannot stop. It is compatible with

all current Windows versions (Win XP, Vista, 7, 8, 8.1,

Continued on next page


and 10 including DeviceGuard and Virtual Secure Mode)

on desktops, laptops, tablets, servers, and embedded

appliances (ATMs, Point-of-Sale appliances, Healthcare

devices, etc.). “Out-of-the-box”, it protects a wide range

of popular applications (Office, Office365, IE, Adobe,

etc.) and can be configured to protect custom applications,

VDIs, VPNs, VDIs, etc. The Enterprise version

places AppGuard endpoint software agents under the

administration and control of the enterprise to deploy

and manage customized enterprise policies with a

separate management plane to ensure protection and

situational awareness “on” on “off ” the enterprise. AppGuard’s

underlying technologies are also extensible to

Internet-of-Things applications.

Other References

AppGuard has been recommended by respected security

authorities, including Bob Bigman, former CISO, CIA:

http://www.activecyber.net/interview-with-bob-bigmanformer-ciso-of-cia/

Gartner and other leading industry analysts have regularly

cited AppGuard in numerous reports as an emerging

next-generation endpoint protection.

64


65


Gemalto

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

IT Security Products and Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Identity Management Platform

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Coesys Document Verification

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Identity theft profoundly affects the public and private

sectors worldwide. In 2013, according to Javelin Strategy

and Research, one incident of identity fraud occurs

every 3 seconds in the United States. Clearly, there is

a growing need for reliable identity document verification.

However, verifying identity documents is becoming

increasingly more complex. Public and private administrations

face the challenge of detecting suspected fraud

on various types and versions of documents (passports,

identity cards, driver’s licenses, etc.) from an array of issuing

countries. The California Department of Motor Vehicles

made it a priority to address this issue head-on by

implementing an advanced solution through Gemalto,

the world leader in digital security. In July 2015, the California

DMV selected Gemalto as the choice provider of

identify document verification software to its nearly 200

field and investigative offices. The California DMV issues

thousands of ID documents every day and places a high

premium on securing the integrity of an identity. Reliable

verification is vital for the DMV in order to combat

identity fraud and related criminal activities. Gemalto’s

Coesys Document Verification software solution successfully

allows DMV officials to verify the authenticity of

documents such as passports, identity cards and driver

licenses by simply checking the graphical data and security

features against reference templates from an array of

issuing countries. These reference templates are stored

in a database, administrated centrally and automatically

synchronized into all local repositories. With Coesys

Document Verification, each document type and version

66


is recognized. Gemalto’s solution provides unmatched

results identifying counterfeit documents and accepting

genuine ones. Using Gemalto’s sophisticated technology,

the California DMV is able to streamline its review

process, overcome the challenge of authenticating foreign

documents and identify any document abnormalities

or defects. Gemalto’s solution is designed to make

it easy to quickly confirm on-the-spot the authenticity of

documents and the identity of an applicant. Importantly,

Coesys Document Verification enables DMV officials

to verify identity documents with peace of mind. Gemalto

was selected because of the company’s ability to meet

the California DMV’s specific requirements and in the

specified timeframe. Gemalto’s experts understood the

California DMV’s specific business practices and were

able to provide a consistent solution to all of the DMV’s

nearly 200 offices. For DMV representatives, Gemalto’s

Coesys Document Verification is simple to use and

provides instantaneous results identifying counterfeit

documents and accepting genuine ones. Gemalto also

worked with the California DMV to bring an automated

synchronization solution connected to a central document

repository, which reduces the burden of manual

updates on each authentication workstation located

within the DMV field offices. More than just software,

Coesys Document Verification is a fully-customizable

editing platform that enables customers like the California

DMV to pilot each and every verification action

on any identity document. Coesys Document Verification

is part of Gemalto’s Border and Visa Management

suite. Its flexible architecture enables customization to

suit any customer deployment configuration. Gemalto’s

objectives for its Coesys Document Verification software

solution are to: mitigate risk of identity fraud; provide a

solution flexible enough to keep up with the demands

of changing infrastructures, technologies, document

standards and attempts to perpetrate fraud; and provide

its customers with ease of use and peace of mind.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.gemalto.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.gemalto.com/press/Pages/California-selects-Gemalto-for-automated-identitydocument-verification.aspx

http://www.gemalto.com/govt/coesys/doc-verification

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Michelle Leech

Gemalto

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (512) 605-2110

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

ellenmichelle.leech@gemalto.com

67


Agiliance Inc.

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

IT Security Products and Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Compliance/Vulnerability Assessment Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

RiskVision 7.5

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The biggest inhibitor of effective security and vulnerability

management lies in the fact that the number of

threats to organizations has grown exponentially over

the past few years. This is largely due to the increasing

number of IT assets under management, which are

creating a big data challenge. To ensure proper coverage,

government organizations in many cases are relying

on multiple tools to produce the necessary vulnerability

assessment data. This only adds to the volume, velocity,

and complexity of data feeds that must be analyzed,

normalized, and prioritized. Relying on human labor

to comb through mountains of data logs is one of the

main reasons that critical vulnerabilities are not being

addressed in a timely fashion. According to the Verizon

Data Breach Investigations Report, 92% of breaches

were discovered by a third party and not through internal

resources. As a result, government organizations are

seeking technical solutions to automate data aggregation,

normalization, and business impact correlation.

The ultimate objective is to shorten the window attackers

have to exploit a software flaw, thereby reducing the

overall risk of cyber-attacks and insider threats. Agiliance

is assisting civilian, defense, and intelligence agencies in

achieving continuous monitoring and enabling them to

report on their organizations risk and security posture

in near real time. The company’s RiskVision software

gathers data feeds from otherwise silo-based security

and IT tools such as SIEMs, configuration management

databases, vulnerability scanners, threat data feeds and

advisory services, database security management, etc.

68


and then aggregates, normalizes, and correlates this

information based on business criticality. This enables

a near real time snap shot of an organization’s security

posture. In addition, RiskVision automates an organization’s

governance processes, providing insight into the

agency’s compliance posture. The final result is a riskbased

assessment of the organization’s infrastructure

which prioritizes remediation actions based on business

criticality. If needed, RiskVision can also assist with automatic

ticket creation. By using the Agiliance ticketing

system or integrating with leading ticketing and patch

management systems, an organization’s security operations

team can shadow the progress the IT team makes

in mitigating the vulnerabilities. This eliminates the

traditional approach best described as throwing something

over the fence and praying for the best outcome.

For one major government agency, using RiskVision

resulted in a dramatic increase in operational efficiency.

Prior to using Agiliance, it took 60 full-time employees

working 24 x 7 for a month to manually create 180,000

remediation tickets. With RiskVision, the agency was

able to reduce the headcount required to oversee ticket

creation by more than 80% and shrink the processing

time from one month to a couple of days. RiskVision

is considered by many to be the best compliance and

vulnerability management solution on the market for

its ability to combine risk intelligence, using big data

gathered and correlated from security operations tools,

with automated remediation that establishes bi-directional

workflows with IT operations. The end result is

improved operational efficiency through automated

continuous monitoring and ticketing to remediate only

business critical risks.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.agiliance.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

RiskVision Named Best New Risk Management Software

in 2015 Security Products Magazine Awards:

http://www.agiliance.com/news/pr_20150923_

SecurityProduct_Awards.html

Agiliance Dominates at American Business Awards:

http://www.agiliance.com/news/pr_20150915_

American_business_award.html

RiskVision Helps Retailers Minimize Cyber Risk Exposure:

http://www.agiliance.com/news/pr_20150910_

Cyber_Risk_Exposure.html

Agiliance Scores Big at International Stevie Awards:

http://www.agiliance.com/news/pr_20150814_

Stevie_Awards.html

Agiliance Named to Cybersecurity 500:

http://www.agiliance.com/news/pr_20150907_

Cybersecurity_500.html

RiskVision Earns Two IT World Awards from Network

Products Guide:

http://www.agiliance.com/news/pr_20150807_

Nation_Product_Guide_Winner.html

RiskVision Scores Twice at Info Security Products

Guides 2015 Global Excellence Awards:

http://www.agiliance.com/news/pr_20152104_

Info_Security_Products_Guides.html

Cyber Defense Magazine Names RiskVision Most

Innovative Risk Management Solution for Second-

Consecutive Year:

http://www.agiliance.com/news/pr_20152004_

Most_Innovative_Solution.html

69


RiskVision Named Best Monitoring Solution in Govies

2015 Awards:

http://www.agiliance.com/news/pr_20151704_

Best_Monitoring_Solution.html

Agiliance to Showcase Essential Building Blocks for

Cyber Security at RSA Conference 2015:

http://www.agiliance.com/news/pr_20151404_

Essential_Building_Blocks_for_CyberSecurity.

html

RiskVision 7.5 Enables Good Cyber Hygiene to

Achieve Immediate and Effective Defenses Against

Cyber-Attacks:

http://www.agiliance.com/news/pr_20150704_

RiskVision_75.html

Agiliance Becomes a Board and Business Standard for

Managing Cyber Security Operational Risks in 2014:

http://www.agiliance.com/news/pr_20151601_

Agiliance_Cyber_Security_Operational_Risk.

html

Agiliance / ESG White Paper: Beyond GRC: SRM and

the Move to Integrated Risk Management:

http://www.agiliance.com/forms/WhitePaper-

Reg.html?doc=Beyond_GRC

Agiliance White Paper: How to Achieve a Continuous

Monitoring Framework:

http://www.agiliance.com/infocenter/whitepaper.html

Agiliance Data Sheets:

http://www.agiliance.com/infocenter/

Agiliance Case Studies:

http://www.agiliance.com/infocenter/casestudy.

html

Agiliance Recorded Webcasts:

http://www.agiliance.com/news/webcasts.html

Agiliance Product Tours:

http://www.agiliance.com/infocenter/tour.html

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Torsten George, Vice President of

Worldwide Marketing and Products

Agiliance, Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (408) 200-0461

cell: (408) 431-3250

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

tgeorge@agiliance.com

70


71


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

IT Security Products and Solutions

RSA, The Security Division of EMC

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Endpoint Detection and Response Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

RSA ECAT

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

RSA President Amit Yoran said “IT Security has Failed.”

Organizations across a wide range of industries are

breached, new malware, zero-day vulnerabilities are

everywhere. Money, intellectual-property, hacktivism

are only a few of the reasons. They are bombarded with

crimeware, adware, targeted campaigns, and nationstate

attacks. Attackers today can easily bypass traditional

signature-based defenses, create persistency, move

laterally, exfiltrate data while leaving organizations blind

from those types of threats that will put their name on

the first page of today’s news. RSA does not believe in

this status quo! How is RSA ECAT doing things differently?

ECAT is an endpoint threat detection and response

solution focused on malware and other threats’ behavioral

detection, able to provide visibility to how wide-

spread an attack is and instantly determine the scope

and mitigate in real-time. Analysts trust ECAT to identify

both the known and unknown zero-day malware based

on its behavioral-based detection capabilities.

RSA ECAT’s approach provides:

• Behavioral modeling via ECAT’s Instant Indicator of

Compromise (IIOC). ECAT provides an out-of-the-box

list (~300) of IIOCs for both Windows and Mac operating

systems, being able to identify the exact attack

vector used by threats and generic behavior indicative

of malware. Based on IIOCs triggered, a machine and

module risk score are generated enabling analysts for

better detection and prioritization capabilities. ECAT’s

IIOCs expose the attack characteristics by pointing the

72


analysts automatically at the suspicious modules and

attack vectors identified such as: floating code, hidden/

temp/program data folder write to executable, scripts

run (PSexec, whoami, etc.) which equips the analyst

with tools and techniques used to not only identify the

how but the who as well. All IIOCs are executed serverside

as data is processed, reducing no overhead on the

agent and client performance.

• Detection and Visibility through Layered Approach.

While ECAT performs live memory analysis and in-depth

inspection of host behavior, it is also leveraging other

ways of enriching data for analysis by using OPSWAT,

Yara, module reputation models, and multiple threat

intelligence data feeds including RSA Research and

community-based intel via STIX, enabling analysts to

quickly come to a resolution and take response action.

• Detect, Investigate and Response. While threats will

find their way into the organization, being able to trigger

a response action to shorten dwell time is a key.

ECAT is able to block and quarantine suspicious modules

for endpoints within a corporate network as well as

endpoints off network connected to the Internet.

• Machine Learning Risk Score system. The Risk Score

system collects and analyzes vast amounts of data on

the endpoint and network data transferred in/out and

compiles a module and machine risk score based on a

statistical machine-learning, adaptive model. ECAT’s analysts

leverage the risk score as the basis for prioritized

investigation, working on the most risky endpoints such

as: module behavior, machine status, threat intelligence,

business context, etc. Significant contributors to ECATs

Risk Scoring system are RSA’s data-science team and Incident

Responders providing contact feedback and new

findings identified.

• Enterprise Scalability. ECAT protects 50,000 agents

with a single ECAT server.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.emc.com/domains/rsa/index.htm

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

RSA ECAT Home Page:

https://www.emc.com/security/rsa-ecat.htm

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Bryan Grillo, Vice President

CHEN PR

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (781) 466-8282

cell: (617) 947-0547

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

bgrillo@chenpr.com

73


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

IT Security Products and Solutions

RSA, The Security Division of EMC

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Big Data Analytics Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

RSA Security Analytics

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The application of Big Data Analytics/Data Science

techniques to the challenge of IT security is in its early

stages, but what is clear given the seemingly unending

stream of major breaches, is that what the security

industry is doing today isn’t working. A new approach

to IT security is needed. A key challenge is that the

detection of what can be very subtle and targeted attacks

is nearly impossible with the signature, perimeter,

and log/SIEM dependent security systems that are most

prevalent today. The attraction of Big Data Analytics

and its associated Data Science techniques are that they

provide capabilities that are most in need to address

today’s security challenges, namely the ability to ingest

and manipulate a very large and diverse set of data

from across an enterprise, over a long time horizon,

and apply analytic techniques to it which are tuned to

finding subtle signals of an attack amongst the everyday

normal activity of the organization. Attackers have

learned to hide in plain sight and move low-and-slow to

remain undetected. By using Data Science models with

the right data, one can shine a light on this activity. RSA

Security Analytics deserves to win this award because

it uniquely combines the ability to collect, ingest and

make sense out of large amounts of internal telemetry

– logs, events, full network traffic, netflow, endpoint

activity, IT asset, identity, and other business context

and combine it with external threat intelligence to

massively increase the security visibility of the organization.

To this data RSA Security Analytics applies multiple

detective analytic techniques, including those based

74


on Big Data Analytics/Data Science, to surface security

anomalies that are highly suggestive of advanced or

targeted attacks. Our Data Science models use hundreds

of indicators to identify activities such as beaconing and

suspicious domain activity. No other security product

on the market combines the capabilities of broad and

deep, enterprise-wide, data collection, data enrichment,

with the delivery of tested detective oriented, Data Science

based algorithms which can be applied to a given

organization with only modest customization. Some

competitive products natively collect some of this data,

but usually not the most important (network packets

& endpoint activity data) sets, while other products

collect no data at all and only provide an analytic platform,

leaving the data collection as an exercise for the

customer. Other products provide general purpose Big

Data Analytics capabilities, but leave it to the organization

and their own data scientists (which most security

organization don’t have) to apply these general purpose

tools to the security domain. RSA Security Analytics is

a detective and investigative platform that was specifically

designed for the security domain, provides its own

native data collection and management capabilities for

the data most likely to have the subtle signals of an attack,

and marries this with analytic algorithms that were

specifically designed by RSA’s security researchers and

data scientists to aide in the detection of today’s most

advanced and targeted attackers.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.emc.com/domains/rsa/index.htm

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

RSA Security Analytics Home Page:

http://www.emc.com/security/security-analytics/security-analytics.htm

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Chris Conway, Associate Account Executive

CHEN PR, Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (781) 672-3113

cell: (508) 212-4226

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

cconway@chenpr.com

75


BeyondTrust

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

IT Security Products and Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Privileged Access Management Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

PowerBroker for Unix & Linux

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Whether the goal for attackers is to compromise sensitive

government data, steal personally identifiable information

(PII) or disrupt normal operations, the increasing

sophistication of attacks is making it more difficult

to safeguard the federal government’s cyber critical

infrastructure. Adding to the complexity of cybersecurity

is the compliance landscape for government agencies

that changes with almost every administration. There

are always new requirements – and penalties – that

agencies must anticipate, implement, and report on.

Large-scale information breaches, like the recent Office

of Personnel Management attack, often begin with an attacker

exploiting a single external vulnerability on a lowlevel

system or through contractor credentials, and then

capitalizing on privileges to gain access to critical sys-

tems and data. It is also very possible for a government

employee to abuse access privileges from the inside to

steal sensitive information. One has to look no farther

than Edward Snowden as a proof point. BeyondTrust’s

PowerBroker for Unix & Linux for least privilege helps

balance the privilege requirements of users, with those

of security and compliance teams, for routers/switches,

and mainframes in Unix and Linux environments. The

solution enables IT Security teams to confidently deploy

secure and compliant network gear, servers and

desktops, while giving employees the correct amount of

privileged access to applications without affecting a user’s

ability to remain productive. The result is improved

security, through reduced risk and attack surface, along

with improved system uptime and availability. Sudo

76


presents unique challenge faced by government departments

and agencies using Unix or Linux – specifically

the time and effort it takes for their organization to migrate

to a commercially supported solution and whether

or not their existing data and policies can be integrated.

With PowerBroker for Unix & Linux, organizations do

not have to sacrifice existing sudoer files for the sake

of centralization. Instead, organizations can store and

centralize multiple sudoer files in PowerBroker, adding

enhanced policy groupings to more easily define user

roles across the enterprise. The result is a simplified migration

path from sudo. Auditing and controlling activity

inside scripts and third-party applications within Unix

and Linux systems have also been difficult for many

organizations to achieve, especially when it is easy to

“cheat” the system by pointing shortcuts to unapproved

applications. PowerBroker for Unix & Linux overcomes

these challenges by providing enhanced system level

control and audit capabilities over any application – regardless

of how the application is initiated. When users

click on an icon, all activity (including keystroke information)

is recorded. This helps organizations control

actual commands and actions at the system level. These

and other capabilities enable PowerBroker customers to

meet the privileged access control requirements of government

and industry mandates including SOX, HIPAA,

PCI DSS, GLBA, PCI, FDCC, FISMA and more. With more

than 200 U.S. Federal departments and agencies as customers,

BeyondTrust delivers powerful privileged access

management solutions that have been proven in a wide

range of large and complex IT environments.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.beyondtrust.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.beyondtrust.com/Products/Power-

BrokerUnixLinux/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Douglas De Orchis, Client Executive

Voce Communications

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (617) 897-8259

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

ddeorchis@vocecomm.com

77


CyberArk

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

IT Security Products and Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Privileged Access Management Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

CyberArk Privileged Account Security Solution

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The CyberArk Privileged Account Security Solution

focuses on eliminating the most advanced cyber threats

– those that exploit privileged credentials to attack the

heart of the enterprise. The CyberArk solution helps

identify existing privileged credentials across networks,

makes sure those credentials are locked down and secure,

and leverages continuous monitoring of privileged

account credentials to detect anomalous behavior and

stop an attack early in the cycle to reduce damage. In

July 2015, CyberArk achieved Common Criteria Certification

for the CyberArk Privileged Account Security

Solution. This designation is an important independent

evaluation of the security capabilities of IT products

and a key differentiator when working with the federal

government. CyberArk is also the first vendor in the

industry to achieve the certification for a comprehensive

privileged account security solution. CyberArk has been

working with government agencies to use its solution

to address privileged user security priorities set forth in

the federal government’s 30-day Cybersecurity Sprint.

CyberArk designed the Privileged Account Security Solution

for low total cost of ownership, with ease of management

and access to ongoing training. The CyberArk

Privileged Account Security Solution is built on a shared

technology platform, is designed to integrate into any IT

environment, and delivers enterprise-class security, scalability

and high availability on a single integrated solution.

With the modular Privileged Account Security Solution,

organizations can better protect their networks by:

securely storing, rotating and controlling access to SSH

78


keys; isolating, monitoring, recording and controlling

privileged sessions on critical systems; and providing

targeted, immediately-actionable threat alerts through

patent-pending analytic technology. The CyberArk

solution is further differentiated by its patented Digital

Vault technology and Master Policy engine. Launched in

the past year, the CyberArk SSH Key Manager enables

customers to secure and manage SSH keys, just like any

other privileged credential. Also available as part of the

solution is CyberArk Privileged Threat Analytics, which

detects, alerts and responds to cyber attacks by collecting,

monitoring and analyzing privileged account data,

including activity from the CyberArk Vault, and data

feeds from security information and event management

(SIEM) systems to identify and lessen the most serious

of risks. An independent study from Nucleus Research

on customer ROI found that the CyberArk Privileged

Account Security Solution reduced customers’ cyber security

risk profile, as well as delivered complete payback

within six months, providing greater ROI as the Cyber-

Ark platform is used over time. CyberArk was named a

leader in the IDC MarketScape: Worldwide Privileged

Access Management 2014 Vendor Assessment, calling

CyberArk the “privileged access management pure-play

‘big gorilla’ with the most revenue and largest customer

base.” Today, CyberArk has a customer base of more

than 1,900, including 40 percent of the Fortune 100, 19

percent of the Global 2000 and 17 of the world’s top 20

banks, and includes leading enterprises in a diverse set

of industries, such as energy and utilities, financial services,

healthcare, manufacturing, retail, technology and

telecommunications, as well as government agencies.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.cyberark.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Background on the CyberArk Privileged Account Security

Solution:

http://www.cyberark.com/products/privilegedaccount-security-solution/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Liz Campbell, Sr. Manager,

Corporate Communications

CyberArk

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (617) 558-2191

cell: (781) 820-9840

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

liz.campbell@cyberark.com

79


CyberArk

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

IT Security Products and Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Continuous Monitoring and Mitigation Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

CyberArk Privileged Threat Analytics

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The devastating cyberattacks on Sony Pictures, Anthem

and U.S. Office of Personnel Management (OPM) demonstrate

that today’s cyber security battle has shifted

from the perimeter to inside the IT network. Once

inside a targeted network, attackers immediately seek

to steal and exploit privileged accounts – the gateway

to sensitive and valuable information. Attackers exploit

these accounts to navigate the system, conduct reconnaissance

and escalate privileges – all while impersonating

authorized users. In fact, industry research indicates

that privileged credential exploitation is a signature in

almost every advanced attack. That’s why organizations

need to be proactively monitoring and recording all

privileged activity to ensure attackers – whether they’re

outside hackers or malicious insiders – are not able to

gain access to critical networks, move laterally across

the network to the target goal, or exfiltrate data without

detection. CyberArk Privileged Threat Analytics detects,

alerts and responds to cyber attacks by collecting, monitoring

and analyzing privileged account data, including

activity from the CyberArk Vault, and data feeds from

security information and event management (SIEM)

systems to identify and lessen the most serious of risks.

This solution enables incident response teams to identify

an attack in real time, take the necessary steps to

mitigate the attack and reduce damage. Through industry-leading

analytics, including self-learning, behaviorbased

algorithms, CyberArk enables customers to detect

attacks faster by pinpointing malicious privileged account

activity previously hidden in the sheer volume of

80


information collected by big data analytics solutions.

With proactive controls and threat detection, CyberArk

Privileged Threat Analytics is the only analytic solution

able to detect malicious activity and actively respond by

invalidating account access. This enables incident response

teams to quickly contain threats by invalidating

stolen credentials to stop an attacker from continuing

their attack. By reducing an attacker’s window of opportunity

and residual damage through real-time alerts on

in-progress attacks, CyberArk Privileged Threat Analytics

improves organizations’ effectiveness by enabling response

teams to identify anomalous privileged activities

and prioritize only the most critical security incidents.

Privileged Threat Analytics is part of the CyberArk Privileged

Account Security Solution. CyberArk delivers regular

updates to ensure customers can proactively take

advantage of new features including new algorithms that

are added to the analytic engine. The R&D and Cyber-

Ark Lab teams are constantly researching attacks in the

wild and building new detection capabilities and algorithms

to detect the latest attacks. Today, CyberArk has a

customer base of more than 1,900, including 40 percent

of the Fortune 100, 19 percent of the Global 2000 and

17 of the world’s top 20 banks, and includes leading

enterprises in a diverse set of industries, such as energy

and utilities, financial services, healthcare, manufacturing,

retail, technology and telecommunications, as well

as government agencies. CyberArk serves customers in

more than 65 countries and has more than 200 global

partners.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.cyberark.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Main page for Privileged Threat Analytics information,

including data sheets:

http://www.cyberark.com/products/privilegedaccount-security-solution/privileged-threatanalytics/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Liz Campbell, Sr. Manager,

Corporate Communications

CyberArk

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (617) 558-2191

cell: (781) 820-9840

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

liz.campbell@cyberark.com

81


SolarWinds

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

IT Security Products and Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Continuous Monitoring and Mitigation Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

SolarWinds User Device Tracker

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

SolarWinds User Device Tracker (UDT) delivers automated

user and device tracking with powerful switch

port management capabilities empowering federal IT

Pros with strong continuous monitoring capabilities and

visibility into who or what is connected to their network.

Highlights include:

• Automatically discovers, maps and monitors switches,

ports and network devices

• Quickly finds devices and retrieves user name, port

details, connection history and more

• Enables searching on IP address, user name, hostname

or MAC address to track endpoints

• Allows whitelisting and watch lists with automatic

alerts and click-of-a-button port shutdown

• Provides detailed switch port usage data, capacity

analysis and built-in reporting

With the ever-increasing use of personal devices and

applications, SolarWinds UDT provides federal IT Pros

with peace of mind about the security of their network

and the devices on it by continuously monitoring who

and what connects to their network. Additionally, Solar-

Winds UDT can track down lost or rogue devices with a

simple search of a user name, IP address, hostname or

MAC address, ensuring that all devices that can connect

to federal networks stay in the right hands. SolarWinds

UDT also features alerting that signifies unauthorized

network access and provides the ability to quickly shut

82


down switch ports to secure access to sensitive information.

Updates to SolarWinds UDT coincide with the

latest issues being tackled by IT Pros such as BYOD. In

the latest update to scalability and additional support

and optimization for varying devices and vendors was a

priority. And, by working closely with and listening to

its user community, SolarWinds is able to gain real-time

and candid feedback from IT practitioners, so its products

can address the problems and challenges prevalent

in IT security today. SolarWinds UDT provides three

critical capabilities for network and systems managers.

First, it makes it possible to physically locate an enduser

device or user on the network extremely quickly.

Second, it allows for rapid quarantine of users or systems

by remotely shutting down a switch port. Finally,

it supports watch-lists and can alert when certain types

of devices or specific users connect to the network and

even take pre-defined actions to help protect information

and other assets. SolarWinds software is built to

scale and can support an IT environment of any size

and is used by nearly every U.S. federal civilian agency,

DoD branch and intelligence agency. SolarWinds UDT

complements other products, such as SolarWinds Network

Configuration Monitor, SolarWinds Log & Event

Manager, and SolarWinds Server & Application Monitor,

to name a few, providing additional breadth and depth

for continuous monitoring. SolarWinds software can

“collect once and report to many,” which gives IT, information

assurance, and security departments the unique

functionality they each need from a single, cost-effective

set of tools. SolarWinds UDT licensing is based on the

number of switch ports to being monitored. The licensing

model features large jumps in switch port count

allowing for rapid growth of an organization before an

additional licensing level is reached and can scale to an

unlimited number of switch ports.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.solarwinds.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Web page:

http://www.solarwinds.com/user-device-tracker.aspx

Additional information:

https://www.youtube.com/watch?v=s4G_

yPZq7Jc

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Rebecca Orr, Corporate Communication

Solarwinds

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (512) 498-6372

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

rebecca.orr@solarwinds.com

83


SolarWinds

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

IT Security Products and Solutions

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Security Incident & Event Management (SIEM)

Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

SolarWinds Log & Event Manager

Reason this entry deserves to win:

–––––––––––––––––––––––––––––––––––––––– • Threat intelligence feed to help identify malicious

SolarWinds Log & Event Manager (LEM) is a comprehensive

security information and event management • File Integrity Monitoring delivers broader compliance

activity

(SIEM) solution that delivers powerful real-time event support and deeper security intelligence

correlation and analysis for immediate, actionable threat • Fast and powerful forensics via cutting-edge search

intelligence to thwart attacks, contain breaches, and and visual data exploration

maintain continuous compliance in an ever-evolving • Out-of-the-box compliance reporting with predefined,

threat landscape.

customizable templates

SolarWinds LEM Highlights:

• Immediate threat detection via true real-time, inmemory

event correlation

• Proactive defense against cyber-attacks and insider

abuse

• Hands-free threat remediation through built-in, automated

responses

With SolarWinds LEM, organizations get what they need

to stay ahead of security threats, compliance violations,

and operational issues – all in one package. It

gives users the ability to capture and analyze log data in

real-time from multiple sources around specific incidents,

which is instrumental in quickly identifying and

responding to threats, uncovering policy violations, and

84


esolving vital network issues. SolarWinds LEM surpasses

other solutions by providing built-in Active Responses,

event normalization, and a drag-and-drop UI to create

custom dashboards easily. Active Responses enable

users to take automatic actions for hands-free threat

mitigation, including shutting down breached systems,

blocking IP addresses, killing unexpected processes,

and disabling user accounts. Event normalization makes

reporting and identifying security incidents across different

types of log sources simple. Additionally, Solar-

Winds LEM provides advanced search functionality and

easy-to-use data visualization tools to quickly explore

log data, perform event forensics, and identify the rootcause

of a security incident or network problem – fast.

SolarWinds LEM goes well beyond traditional SIEM

solutions with key innovations like in-memory correlation,

automated Active Responses, USB Defender technology,

and a groundbreaking approach to IT search.

SolarWinds LEM’s latest release in September 2015

added threat intelligence feed integration to its already

strong feature set, helping the system stay up-to-date on

known threats. Most importantly, SolarWinds listens to

the IT security community to continually improve and

update solutions based on user feedback and real-world

needs. SolarWinds’ user community, thwack, features

a forum in which IT pros can request and vote on new

features and thus directly influence product updates.

Check out the SolarWinds LEM feature request forum

to see this process in action. SolarWinds LEM alleviates

the complexity associated with compliance reporting

by providing over hundreds of built-in, “audit-proven”

report templates to address both internal policies and

regulatory requirements, including NIST FISMA, DISA

STIG, PCI-DSS, HIPAA, SOX, and more. Additionally, SolarWinds

LEM is an integral part of a continuous monitoring

strategy to maintain security and compliance.

SolarWinds LEM is available on the U.S. General Services

Administration (GSA) Schedule, Department of Defense

ESI, and other contract vehicles. SolarWinds software is

built to scale and can support an IT environment of any

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.solarwinds.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Web page:

http://www.solarwinds.com/siem-security-information-event-management-software.aspx

Compliance Video:

https://thwack.solarwinds.com/docs/DOC-

186983

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Rebecca Orr, Corporate Communication

Solarwinds

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (512) 498-6372

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

rebecca.orr@solarwinds.com

size, small business IT shops and large enterprises alike,

and is used by nearly every U.S. federal civilian agency,

DoD branch and intelligence agency. SolarWinds LEM

employs a node-based license model vs. volume-based,

allowing users to stay within a planned budget as they

deploy and expand their IT infrastructures across multiple

datacenters and geographies. Further, a Workstation

Edition license makes monitoring logs from Windows ®

workstations very cost effective.

85


Securiport, LLC

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

ACCESS CONTROL AND IDENTIFICATION

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Biometric Identification Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Securiport, LLC

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Improving Civil Aviation Security with Securiport’s

Civil Aviation & Immigration Security Services for

Homeland Security & Allies of United States of America

In today’s interconnected world, Civil Aviation plays

a powerful and impactful role in fueling the global

economy. It has the power to bridge cultural gaps and

bring people together from all over the world. But with

great power, also comes great responsibility. It is up

to governments and their countries to take proactive

steps towards strengthening their Civil Aviation Security

capabilities. With the growing popularity and freedom

to travel basically anywhere in the world with Civil Aviation,

many individuals and criminal organizations are

taking advantage of systems in place to conduct illegal

activity such as smuggling narcotics, weapons, and even

humans. In addition, Civil Aviation has increasingly

become the focus of the operational activity of various

terrorist organizations as a subject, rather than an

implement, of their actions [2] . Due to these increased

security risks, it is paramount that airports and security

checkpoints are equipped with the necessary technology,

resources, processes, systems, and training needed

to effectively identify potential security risks and criminal

activity. Securiport’s Integrated Immigration Control

System (IICS) can help countries, such as Honduras,

strengthen their airport security capabilities. By implementing

an intelligent solution that utilizes the most

advanced technologies (such as biometric identification

systems), and is connected with international traveler

databases, security officials are provided a comprehensive

set of traveler data and information that can be used

to confirm a passenger’s identity and uncover certain

security risks. By leveraging these systems, government

86


officials and immigration officers will be able to equip

themselves with the actionable data and necessary

information needed to keep all ports of entry secure,

ultimately creating safer and more secure nations. This

creates a complete Civil Aviation Security solution, one

that elicits safer travels, more secure nations and is

tailored to provide benefits to both travelers and governments.

The Civil Aviation industry has been around

for over 100 years, since Tony Jannus piloted a plane

across Tampa Bay, Florida on January 1st, 1914. Today,

more than 3.3 billion people utilize aviation and take to

the air each year [1] . Whether it’s for business or visiting

family, the Civil Aviation industry has revolutionized

the way people connect, interact and conduct business.

This ability to bring people together from different parts

of the globe, known as aviation connectivity, has been

the catalyst for economic growth, connecting individuals

from all over the globe ultimately fueling the global

economy. IATA’s Director General and CEO, Tony Tyler,

spoke about aviation’s role in the global economy and

stated “aviation is helping fuel the growth of the global

economy. It brings people together – families, friends

and business colleagues. It helps minds to meet and

exchange ideas in forums. It gives people the freedom

to be almost anywhere in just 24 hours. And it has

turned our wonderfully big planet into a wonderfully

small world of enormous and wonderful opportunities.”

The aviation industry is truly the lifeblood of the

global economy; it supports over 58 million jobs and

$2.4 trillion in annual economic activity [1] . It stimulates

tourism, supports and creates jobs for farmers who

sell fresh produce and flowers in world markets, and

facilitates global supply chains to support collaboration

among workers in different countries to build cars,

airplanes and computers. Aviation helps deliver many of

the real world goods that are traded in global markets

and has been the catalyst for global economic and social

development. With the increase in popularity and usage

of aviation, there has been a “transportation revolution”

around the world, which has paved the way for rapid

and free movement of people, commodities and ser-

87

vices on a global scale [2] . This is known as globalization

and provides many positives for our world, but regretfully

has a negative side as well. Beyond any doubt, the

emergence of terrorism as a global threat is the biggest

challenge facing the Civil Aviation and security industries.

Terrorism has evolved into a major geopolitical

factor, capable of causing systematic crises at a global

scale. And by virtue of its functional significance and

vulnerability, Civil Aviation is increasingly becoming

the focus of the operational activity of different terrorist

groups [2] . High taxes and a lack of resources and a

proper infrastructure can hinder the performance and

efficiency of Civil Aviation Security from identifying

potential suspects and uncovering criminal activity. In

addition to the threat of terrorism, aviation has been

used as a hotbed for a plethora of other criminal activity,

such as drug smuggling and passengers traveling

under false names and documents. This makes it critical

to take practical and necessary steps toward improving

the security capabilities at international points of entry

such as airports.

Solution: Securiport’s Civil Aviation and Immigration

Security Services (CAISS)

With the increase in globalization and aviation connectivity,

criminal activity and the threat of attacks on

aircrafts by terrorists remain persistent and growing

concerns for our world. Countries around the globe

have a number of safeguards in place to prevent attacks

against commercial aircrafts such as security checkpoints

at airports where passengers and their carry-on items

are screened for dangerous objects, such as weapons

and explosives. Historically, however, screeners who

operate checkpoints in the U.S. have had difficulty in

detecting potentially dangerous situations, missing as

many as 20% during tests [3] . With the large number

of passengers traveling through airports every day, it

is critical that immigration and security checkpoints are

equipped with the proper resources and infrastructure

needed to identify potential security risks and criminal ac-

Continued on next page


tivity. Countries should look to implement intelligent Civil

Aviation solutions that utilize the latest technology, such

as Securiport’s Civil Aviation and Immigration Security

Services (CAISS). Securiport, a global leader in the design

and implementation of passenger biometric recognition,

immigration control systems, and intelligent information

management and reporting software systems, is committed

to the Science of Safer Nations by empowering governments

to enhance their Civil Aviation Security and combat

criminal activity. Securiport’s Integrated Immigration

Control System (IICS) is a comprehensive security solution

that empowers border management and immigration

officials. The IICS utilizes advanced biometric identification

systems and provides proprietary intelligent information

used to identify potential security risks and criminal

activity, further strengthening the effectiveness of their

security capabilities. When coupled with Securiport’s Intelligent

Information Management System, a methodology

for cross-referencing passenger information across international

traveler databases, such as INTERPOL’s I-24/7, the

CAISS provides governments, airport security, and immigration

officials with a comprehensive set of traveler data

and information that can be used to confirm a passenger’s

identity and uncover certain security risks. The CAISS also

includes Watch-list Management, which crosschecks passenger

information against multiple government databases

and performs real-time identification checks. Implementing

a solution such a Securiport’s CAISS, governments

and airport security officials can drastically improve the

performance and effectiveness of airport security checkpoints

and better prevent terrorists and criminals from illegally

entering or leaving their country’s borders. Beyond

increasing the performance and effectiveness of airport

security checkpoints, countries and airliners can work

together to strengthen Civil Aviation Security by improving

the passenger experience. Earlier this year, Securiport was

named a Strategic Partner to the International Air Transport

Association (IATA) and has been involved in discussions

within program areas of expertise such as Security

and Passenger Experience. As a contributing member of

the Passenger Experience area of expertise, Securiport has

focused on improving the passenger experience across 14

steps, including security and immigration processes. Many

key stakeholders within the Civil Aviation industry are very

optimistic about mobile technology helping the industry

to meet passengers’ expectations and to provide a more

seamless experience going through security and immigration

checkpoints. Having a better-defined process in place

that incorporates modern technology and intelligent systems

creates a more streamlined airport experience, and

therefore will improve the capabilities and effectiveness of

airport security checkpoints.

Benefits to Governments

Through implementing Securiport’s Civil Aviation and Immigration

Security Services and other various security solutions,

countries such as Honduras could benefit greatly.

In recent months, the Government of the Republic of

Honduras has been working to prevent and reduce human

and narcotic traffickers as well as other criminals from

illegally crossing its borders. Honduras and the U.S. held a

High Level Security Dialogue to discuss ways the U.S. and

Honduras can continue to work together to strengthen

both countries’ borders. Honduras highlighted its notable

successes over the past year, including the extradition of

major drug traffickers to the United States and an impressive

drop in the homicide rate. Honduras also outlined its

strategy for countering threats like transnational organized

crime and trafficking in persons and drugs [4] . By strengthening

airport security capabilities and improving traveler

safety, governments such as the Honduran government,

can substantially decrease the amount of resources needed

to monitor and deter criminals from illegally entering

or leaving the country. To help accomplish this, Securiport

provides a substantial investment in the technology, training,

and processes for countries in regards to immigration

and security. This ensures the security officials are

equipped with the necessary knowledge and resources

to improve their security capabilities with little to no

investment from the country itself. With the assistance of

88


Securiport, implementing advanced solutions such as the

Integrated Immigration Control System and Intelligent

Information Management and Profiling, Honduras can

substantially improve their border security and dismantle

human smuggling networks and other criminal activity.

Just last year, Securiport’s Intelligent Information Management

Data Analytics enabled international authorities to

interdict a Senegal-based human trafficking ring, resulting

in numerous criminal arrests. In addition, Securiport’s

IICS assisted in the identification and arrest of an individual

traveling with a stolen passport, who belonged to a vast

network of counterfeiters. By leveraging these systems,

countries such as Honduras will be able to equip themselves

with the actionable data and necessary information

needed to keep all of ports of entry secure. This creates

safer and more secure nations.

Business Outcomes:

1) http://www.securiport.com/securiports-intelligent-information-management-data-analytics-enable-internationalauthorities-interdict-senegal-based-human-trafficking-ringresulting-numerous-criminal-arrests-preservati/

2) http://www.securiport.com/securiports-integratedimmigration-control-system-assist-in-the-identification-andarrest-of-a-passenger-traveling-to-senegal-with-a-stolenpassport/

3) http://www.securiport.com/solutions/intelligent-information-management-and-profiling/

4) http://www.securiport.com/technology/biometric-identification-systems/

References:

http://www.iata.org/pressroom/speeches/Pages/2014-10-14-01.aspx

http://www.comw.org/tct/fulltext/0503arasly.pdf

http://www.gao.gov/assets/160/156968.pdf

http://www.state.gov/r/pa/prs/ps/2015/01/235867.htm

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.securiport.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

1) http://www.securiport.com/securiport-and-inmarsat-partner-to-deliver-new-border-securityservice/

2) http://www.securiport.com/securiports-intelligent-information-management-data-analyticsenable-international-authorities-interdict-senegal-based-human-trafficking-ring-resultingnumerous-criminal-arrests-preservati/

3) http://www.securiport.com/securiports-integrated-immigration-control-system-assist-inthe-identification-and-arrest-of-a-passengertraveling-to-senegal-with-a-stolen-passport/

4) http://www.securiport.com/solutions/intelligent-information-management-and-profiling/

5) http://www.securiport.com/technology/biometric-identification-systems/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Borenstein Group

Nominating contact’s office telephone and

email:

––––––––––––––––––––––––––––––––––––––––

Gal Borenstein, (PR Point of Contact)

(703) 385-8178 x28 gal@borensteingroup.com

Megan Gallagher, Client Director of Comm.

(202) 339-6288 mgallagher@securiport.com

89


Viscount Systems

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

ACCESS CONTROL AND IDENTIFICATION

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Integrated System for HSP D-12/FIPS 201

Compliance

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Freedom Access Control

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Freedom is an IT-centric access control system that

eliminates the need for traditional access control panels.

Fully compliant with FIPS-201 and HSPD-12, Freedom

leverages the power of the IT infrastructure to control

access points through encryption bridges that transform

card readers into IP addressable devices. Data

is encrypted to eliminate the opportunity for cyber

threats, ensuring a high level of security is maintained.

Network complexity and upfront costs are immediately

reduced due to a reduction in hardware and infrastructure

investments, allowing users to meet strict budget

requirements, and experience immediate and long-term

return-on-investment. Freedom’s unique architecture

leverages existing IT infrastructure to meet the FICAM

(Federal Identity Credential and Access Management)

requirements by integrating the PIV and PIV-I (personal

identity verification - interoperability) credential

certificate validation and authentication functionality

directly into the access control software. Physical access

points are controlled using IP encryption bridges to

connect door hardware and transform card readers into

IP addressable devices. Credentials are presented at the

reader and cryptographically challenged by the Freedom

PACS Validation software. These credentials are then authenticated

and validated before an authorization check

is performed to grant or deny access to the cardholder.

Freedom Access Control allows companies to build integrated

access control and video management systems

under one centrally managed or distributed network.

Freedom expands as the security needs and physical

90


footprint of the organization change, enabling it to build

large physical security networks without requiring any

additional investment in communication infrastructure.

Organizations of any size can integrate physical security

devices such as card readers, ID management, visitor

entry, alarm points, and video applications. Video management

systems can be easily added to Freedom for a

single, unified system. Another unique advantage inherent

on the Freedom software platform is an open API

for third-party technology partners or the enterprise’s

IT department for specialized or custom integrations.

Viscount Systems has been awarded contracts to provide

access control for government agencies such as USCIS

because of the unique technical capabilities of its Freedom

access control solution as well as its compliance

with FIPS-201 and HSPD-12. As part of the FICAM testing

process, Freedom underwent a series of stringent

compliance tests to ensure the system is not prone to

any type of unauthorized network access. The result is

a lower cost per door with overall lower annual maintenance

costs than the traditional panel alternatives.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.viscount.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Freedom unifies physical and logical access control initiatives

across enterprises:

http://www.viscount.com/access-control/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

CompassPR

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

delphine@compasspulicrelations.com

91


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

COMMUNICATION PRODUCTS

Acoustic Technology, Inc.

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Mass Notification Systems

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

MassAlert ®

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Acoustic Technology, Inc. (ATI Systems) has successfully

developed, designed, manufactured and installed

highly integrated and advanced mass notification systems

for the campus, community, industrial and military

markets since 1981. With a staff well experienced in

acoustic modeling and GIS, ATI is the worldwide leader

in providing Mass Notification Systems that deliver

superior sound coverage and intelligibility for outdoor

and indoor areas, ensuring the safety of the populace.

ATI provides complete end-to-end solutions that include

hardware and software for audible and visual warning

via multiple layers. The solutions consist of a simplecompact

design, flexible user-friendly software, and

communication methods including RF, P25, IP, Fiber,

DSL, Cellular, or Satellite. MassAlert ® is ATI’s easy-to-use

and configurable GUI software. The software controls

and monitors the system from either an on-site control

station or from a remote locations. MassAlert can

trigger any type of alert to an outdoor and/or indoor

coverage area, and to computers or handheld devices

via SMS, email, telephone, or computer popups. This

multi-layered warning system provides a redundant

means of notification to ensure that as many people as

possible are being warned of the threat/danger. ATI has

installed Mass Notification Systems at thousands of DoD

installations worldwide, providing the ability to rapidly

communicate both outside and inside of buildings on a

base or facility. ATI’s systems are designed to meet the

Unified Facilities Criteria (UFC) 4-021-01 for the Design,

Operation and Maintenance of Mass Notification

92


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.atisystem.com/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.atisystem.com/products/mas.htm

http://www.atisystem.com/products/wp.htm

http://www.atisystem.com/markets/militarymass-notification-systems.htm

http://www.atisystem.com/markets/communitywarning-systems.htm

Systems. ATI’s products are designed with the ability

to easily integrate with other systems or equipment via

Common Alerting Protocol (CAP), IPAWS, dry contact,

RS232, or analog. ATI products can also interface with

any type of digital or analog radio, modem, or media

converter. With decades of experience in system consulting,

acoustic design, manufacturing and integration,

ATI is the leader in providing reliable mass notification

solutions that utilizes every channel of communication

available to ensure that end users receive critical lifesaving

information and direction.

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Tarek Bassiouni

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (617) 567-4969

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

tarek@atisystem.com

93


908 Devices

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

DETECTION PRODUCTS

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Chemical Detection Product or Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

M908

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Today’s First Responders require many different tools to

get answers. With more than six billion chemicals in the

world, First Responders are encountering and uncovering

more unknowns than ever before. As a result,

First Responders require an expansion of the tools and

capabilities used directly in the hotzone. 908 Devices

has expanded First Responder capabilities with their

flagship product, M908TM – the first and only handheld

mass spectrometer for downrange threat detection and

identification. M908 utilizes high-pressure mass spectrometry

(HPMS) to provide first responders, CST

teams and the military with the capabilities to detect

and identify a wide range of priority threats at the point

of need. HPMS enables M908 to operate in the field with

unprecedented levels of selectivity and sensitivity. As a

result, the device alerts the user in seconds to the presence

of priority chemical warfare agents, toxic industry

chemicals, and precursor materials with incredibly low

false alarm rates even when interferents are present.

Weighing in at 4.4lbs, M908 is battery powered for continuous

operation in the field and has been ruggedized

to MIL-SPEC standards. In addition, unlike conventional

mass spectrometry devices, the device requires little to

no training to operate effectively. Regardless of their

level of experience, first responders across multiple disciplines

can operate the device with confidence. M908

was specifically purpose-built to fill technology gaps

and meet the evolving needs of today’s response mission.

When used in conjunction with presently fielded

Raman, FTIR and IMS devices, M908 adds the “gold

94


standard” of mass spectrometry to the survey mission.

M908 can be used as an emergency alert and initial survey

tool for priority threat detection in vapor, solid and

liquid form, from trace to bulk quantities, and render

the scene safe from priority threats. This allows users

more time when using Raman/FTIR tools (bulk solid

and liquid detectors) to further interrogate samples for

identification. Global departments of defense, civilian

and military organizations, along with state, local,

federal and foreign government agencies are currently

using M908. To date, M908 has supported missions from

drug interdiction to explosive threat detection within

the past year. 908 Devices’ M908 and HPMS technology

has been proven a success in the field by the Massachusetts

State Hazmat Response Division, who purchased

eight devices this year. The company has also been

awarded contracts with the U.S. Army’s Next Generation

Chemical Detector (NGCD) and Defense Threat Reduction

Agency (DTRA) programs to create custom successors

to M908 utilizing HPMS technology. In September

2014, the team was awarded $2.6M in funding from the

U.S government’s Technical Support Working Group

(TSWG) to achieve even higher levels of selectivity and

sensitivity with HPMS for field identification and detection

of trace explosives.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.908devices.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

More about M908:

http://908devices.com/products/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Rebecca Gatesman, Account Executive

PAN Communications

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (617) 502-4365

cell: (716) 218-8531

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

rgatesman@pancomm.com

95


Implant Sciences

2015 Winner

GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

DETECTION PRODUCTS

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Explosive Detection Product or Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

QS-B220

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Best Explosives Detection Solution: Implant Sciences

QS-B220 Explosives Trace Detector One way to judge

a product is to observe who steps up to buy it. At the

completion of a series of rigorous and highly competitive

tests, the Department of Homeland Security’s Transportation

Security Administration (TSA) and ten European

nations have committed tens of millions of dollars to

one particular explosive trace detection (ETD) product,

Implant Sciences’ QS-B220. The TSA, considered the

leading ETD evaluation agency in the world, qualified

the QS-B220 for passenger and baggage screening in August

of 2014, calling it “the new gold standard in trace

detection.” In October, 2014, the QS-B220 became the

first system to pass the European Union’s stringent laboratory

testing protocol. These certifications, based on

the unique capabilities of the Implant Sciences technology

platform, quickly led to a number of large contracts.

The TSA issued an exclusive ID/IQ (basically an open

purchase order) to Implant Sciences for $162 million,

followed by an initial order for 1170 units. These units

are being deployed at airports throughout the U. S. The

Netherlands, France, Germany, Belgium, Norway, Austria,

the Czech Republic, Romania, Cyprus and Poland

are ECAC countries that have selected the QS-B220 to

date. Nations across the globe have become particularly

concerned about ISIS and other radical groups, who kill

and maim indiscriminately. One of their favorite techniques

is to find holes in a country’s aviation systems,

and exploit them. The downing of a Russian airline

with 224 passengers aboard is the most recent example,

96


though not the only one. The hundreds of thousands of

refugees from Syria and Iraq pose another threat – most

refugees want a better life; some are allied with ISIS

and Al Qaeda. No one at this point can tell the difference.

Yet another threat is “homegrown” terrorists,

individuals raised in the West but loyal to radical groups.

Militants have carried out many attacks, including the

marathon bombing in Boston. Some 3700 soldiers

from Western countries, including at least 180 from the

U.S., have served in Iraq and Syria, and the threat is,

they will bring their ideology and terror tactics back to

their home countries. The TSA and EU selected Implant

Sciences’ technology to help counter the threats. The

QS-B220 provides fast, accurate real-time detection of

trace amounts of a wide variety of military, commercial

and homemade explosives, as well as drugs, featuring

lower total cost of operation. The system is easy to use,

with intuitive controls that eliminate or reduce training

requirements. A patented automatic internal calibration

system eliminates the need for manual calibration

using costly disposable materials, and its small footprint

is well suited to crowded security checkpoints. Unlike

some competing systems, its low false alarm rate keeps

airport operations on track. Implant Sciences’ QS-B220

has won Government Security News’ Homeland Security

Award for “Best Explosives Detection Solution” in 2013

and 2014, a judgment clearly confirmed by the TSA and

European authorities who have selected the company’s

system as the best way to protect people and property

from the threat of terrorism.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.implantsciences.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

Implant Sciences’ QS-B220 has won Government Security

News’ Homeland Security Award for “Best Explosives Detection

Solution” in 2013 and 2014, a judgment clearly confirmed by

the TSA and European authorities who have selected the company’s

system as the best way to protect people and property

from the threat of terrorism. Additional relevant information is

available at:

http://www.implantsciences.com/technology/

overview

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Bob Liscouski, Presdident

Implant Sciences Corporation

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (978) 752-1700

cell: (703) 407-9437

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

rliscouski@implantsciences.com

http://www.implantsciences.com/technology/overview/

http://www.implantsciences.com/products/desktopexplosives-drugs-trace-detector/

http://www.implantsciences.com/technology/patents/

97


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

VIDEO SURVEILLANCE/CCTV

Qognify (Formerly NICE Security)

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Intelligent Video Surveillance Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Object Origin by Qognify

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

In mere seconds, Object Origin can analyze hours of

surveillance video in order to detect the first time an object

appears within a recorded scene. A patented video

analytics solution, this unique capability is critical for

high-traffic environments where unattended bags, suspicious

objects, or unauthorized vehicles can cause costly

disruptions or worse. And when combined with Suspect

Search, a video analytics solution that can identifsy and

tracks an individual’s movement in recorded video, law

enforcement and security personnel are able to respond

much faster, potentially criminal and dangerous situations

by finding the object owner’s current location

within seconds.

Why it’s the best Intelligent Video Surveillance solution

When it comes to safety and security, the sooner good

decisions can be made, the more likely risk and damage

can be mitigated. When a suspicious object is involved,

there’s no time to manually scan hours of video, and no

room for second-guessing. Object Origin saves precious

time by quickly providing insight into how a suspicious

object got there. With just one click on the object of

interest, Object Origin starts searching to reveal when,

how, and who placed the object at the scene. This allows

security personnel and law enforcement to make

informed decisions that can save time, resources, cost,

and in some instances lives. While Object Origin can

be used on its own, when it’s part of a comprehensive

security solution in conjunction with NICE Suspect

Search, the individual who left the object can also be

quickly located. The operator simply uses uploads the

video image of the object’s owner the target suspect and

98


Suspect Search goes to work right away to display the

suspect’s path and last known location on premise.

A Range of Applications and Attributes

Object Origin mitigates risk and prevents criminal activity

by determining if a suspicious object was intentionally

placed or simply forgotten. Moreover, it is a valuable

forensics tool allowing investigators to quickly find the

origin of an object (a piece of luggage or a . parked car

for example). And when combined with Suspect Search,

it accelerates suspect apprehension.

Incredible Time Saver

On average, Object Origin can review one hour of video

in less than 10 seconds. In a critical situation this is invaluable.

As a business benefit, it can save organizations

substantial costs, such as the case with airports, where

every minute of delay or terminal closure can be tens

of thousands of dollars. It is very efficient during, also

in the case of post event investigations, saving hours

of manpower otherwise needed to manually reviewing

video footage.

Fast, Accurate and Versatile

Object Origin can be used in a real-time mode as an

incident is unfolding as well as after-the-fact for forensic

investigations. It can provide accurate results for almost

any-sized object, from small purse to car, truck or cargo

container and even if the object is partially occluded. It

can be put into use for searching the origin of a variety

of objects, from small as a purse or bag up to a car,

truck or container.

Extremely intuitive and Easy-to-use

Simply open the search window on any video channel,

select the object by placing a rectangle around it, and

click search. Results are returned in seconds, showing

the relevant video footage from the movement of first

appearance in the scene.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.qognify.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

www.qognify.com/video-analytics/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Hagar Lev, Marketing Director

Qognify

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: +49 (0) 69 97 17 738

cell: +49 (0) 171 1637-667

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

hagar.lev@qognify.com

Part of a Comprehensive Security Solution

Once Object Origin has found the initial appearance

of the object and who placed it there, the video image

can be input into Suspect Search to locate the person

of interest and reveal that person’s last known location

or current whereabouts. Response personnel can be immediately

dispatched.

99


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

OTHER PRODUCTS

B.I.G. Enterprises, Inc.

2015 Winner – Guard Booths

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Crash Barrier (Gates, Fences, Bollards, Guard

Booths)

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Xtreme Facility Protector (guard booth)

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

At 120 square feet, The Xtreme Facility Protector is

built to MIL-A-12560H, UFC 3-340-01, and UFC 3-340-

02 specifications. This buard booth is the top defender

made today. The booth delivers the highest level of

ballistic and blast-resistance available in the industry,

allowing security personnel to remain effective in the

midst of the most extreme emergency situation. In addition,

when properly installed, the unit is capable of

withstanding a direct hit from an F5 tornado. While this

level of protection may seem extreme for some applications,

it serves as an example of B.I.G.’s commitment

to building guard booths that can meet any challenge.

Sensitive installations of all descriptions, including data

storage centers, nuclear installations, and military complexes

can benefit from The Xtreme Facility Protector’s

defensive capabilities.

100


Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.bigbooth.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.bigbooth.com/case-studies/october-2015

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Sharon Bailey Beckett, President

Brand Orbit

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (626) 791-7954

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

sharonb@brandorbit.com

101


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

OTHER PRODUCTS

CINCH systems, Inc.

2015 Winner – Crash Barriers/Gates/Fences

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Crash Barrier (Gates, Fences, Bollards, Guard

Booths)

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Rampart Vehicle Barrier System Control

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Shortly after the attacks on 9/11/2001, the world of security

changed and expanded like never before. One of the

new frontiers of security involved the ability to control

and/or prevent vehicle access to high profile buildings,

parking areas and even roads surrounding the building

during a threat. Retractable bollards and wedge barriers

were installed at countless government and military

facilities world-wide to control and prevent entry of

vehicles used for forced access and possible destruction.

Fifteen years have gone by since retractable bollards and

wedge barriers were installed during the early 2000’s.

It has become common that many of the barriers systems

installed during this time had become inoperable

and remained in a normally “open” or down position.

Without the ability to have the barriers function when

needed, the facilities were now exposed to a possible

breach. This problem affected a wide-range of facilities

that included several important buildings in the Washington

DC area and even a professional baseball park in

the Midwest. In each of these cases, after inspection it

was found that the bollards and barriers were in working

condition but the controls that sends the proper

signals for up or down, were not working properly.

Enter the Solution The Rampart Vehicle Barrier System

(VBS) Control from CINCH systems has proven to be an

ideal solution to get a VBS System back in action, doing

the job it was designed to do—control vehicle access or

seal-off an area. The Rampart is the industry’s first AES

Encrypted End-To-End, VBS processor based control

system. The Rampart provides encrypted communi-

102


cation between all devices connected to the system,

engineered specifically for high security and vehicle

barrier applications. The system is capable of controlling

operation of one barrier, a sally port or multiple sally

ports or up to 20 barriers for immediate vehicle lockdown.

Rampart’s on-board 233 million event history

provides quick detailed information on the operation

of the system and critical ‘black box’ information in the

event of an incident at any barrier or gate.

The Rampart system is capable of controlling and

monitoring:

• Up to 20 VBS controls for bollards, wedge barriers

gate arms, traffic lights and rolling gates.

• 252 definable user access codes.

• On-board storage for up to 233 million events for

archival documentation using a removable SD memory

card.

• Connections through, Copper, Fiber Optics or TCP/IP.

• Field upgradeable software, via USB CINCH stick.

• Modular and expandable.

As a testament to the Rampart VBS Control System —

the following is a comment received from a military

facility that was testing installation, operation and reliability

of the Rampart system:

“After the installation was complete, my crew

mentioned this was the first time ANY barrier installation

they have done or know of, that passed

certification on the first attempt.”

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.cinchsystems.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.cinchsystems.com/products/index.

html

https://www.youtube.com/

watch?v=lMMmgVxM6Po

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Steve Craig

CINCH systems, Inc.

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (763) 497-1059

cell: (651)207-2407

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

steve.craig@cinchsystems.com

103


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

OTHER PRODUCTS

Qognify (Formerly NICE Security)

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Physical Security Information Management

(PSIM) Solution

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Situator by Qognify

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Qognify (formerly NICE Security) continues to innovate

the way PSIM technology is being utilized and increasing

the impact it brings organizations. With Situator being

used by some of the world’s largest, most high profile

and security-conscious organizations, Qognify has

gained the insight to extract value far beyond the initial

promise PSIM offered. Situator is helping organizations’

save time, cost, resources, reputation, and in some

cases lives. Why it’s the best PSIM solution Measurable

Value According to one of the world’s largest oil and gas

companies, using Situator and NiceVision, saved them

$1.2 million in 2014 and expect even greater savings in

2015. The company, which spent $8 million annually

in guard costs prior to implementing these solutions,

now uses Situator to remotely monitor sites. By selec-

tively moving work that was previously conducted by

on-site security guards to the Global Security Operations

Center (GSOC), the company has been able to cut costs

by 15 percent. Situator’s ability to effectively manage

major incidents was demonstrated at LAX when a recent

SkyWest flight made an emergency landing without its

left landing gear. Situator and GIS were used to successfully

manage the incident from start to finish, including

guiding all first responders – police, fire, operations,

and maintenance – and coordinating the smooth transfer

of passengers from plane to safety. The Netherland’s

national rail infrastructure operator, ProRail has been

able reduce incident response time by over 60 percent

with Situator, cutting the average intake time down from

fourteen minutes to four. This is a real game changer for

104


the national train system, impacting passenger satisfaction

and its’ bottom line. Operators not only reach

better decisions faster, incidents are managed more

consistently, and ProRail now has full audit capabilities

to prove it is complying with rail regulations. Successful

Global Deployments and Expansions in a Range

of Sectors An excellent indicator of the value Situator

delivers is the rate at which organizations expand the

solution. One the world’s largest mass transit organizations

initially deployed Situator in several test locations.

In a relatively short period of time, they’ve now decided

to expand coverage to their entire environment, helping

protect the over 11 million passengers that travel

with them every day. The U.S. government is also using

Situator to help secure one of the world’s largest datacenters,

as is the Department of Transportation for one

of the nation’s largest cities. Market Leadership Industry

Recognition IHS has ranked Situator the global leader

in PSIM solutions (Situator) and named the company

the leading PSIM vendor worldwide. In addition, Frost

& Sullivan has defined Situator as one of the few Tier

1 PSIM solutions available. New, extended capabilities

Suspect Search, the award-winning video analytics

technology that reduces search time for individuals in

recorded video from hours or days to minutes, can now

be seamlessly integrated with Situator. Whether it’s an

active shooter situation or when searching for a missing

child, every second counts. The integration of Situator

and Suspect Search makes them both even more powerful.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.qognify.com

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

www.qognify.com/situation-management-psim/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Hagar Lev, Marketing Director

Qognify

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: +49 (0) 69 97 17 738

cell: +49 (0) 171 1637-667

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

hagar.lev@qognify.com

105


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Physical Security Products and Solutions

SERVICES

AlliedBarton Security Services

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Best Facility Security/Force Protection Service

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

AlliedBarton RTD-Denver Security Bike Patrol

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

With more than 150 bus routes, six light rail lines,

and many specialty services, Regional Transportation

District-Denver is a primary form of transportation for

many. In February 2013, AlliedBarton Security Services,

the industry’s premier provider of highly trained security

personnel, transitioned the account, taking on more

than 3800 weekly hours of security services, including

armed security officers, fare verification, special event

support, exterior patrols, rider assistance and more.

AlliedBarton security officers are posted throughout the

system’s various locations in Denver and the surrounding

counties, 24 hours a day, 365 days a year. Keeping

passengers and employees safe, securing critical

infrastructure and providing customer service is of the

utmost importance to transit agencies like RTD. Because

they serve large numbers of people in publicly accessible

facilities, public transit agencies have unique security

challenges. In addition, security has become a viable

solution to a traditional transit facility challenge: graffiti.

When RTD was faced with the problem of graffiti along

parts of the system, AlliedBarton’s local management

suggested developing a bike patrol program to deter

this crime. RTD Transit Police Chief Tarbert agreed to

pilot the program, and within the month, AlliedBarton

worked with Denver Transit to purchase bikes and train

security officers on the specifics of bike patrol through

their partnership with the local police department. The

first few weeks of the pilot proved to be a success, as

graffiti crimes dropped 30%, saving the transit system

thousands of dollars on graffiti removal. The value of

106


the program was quickly seen by RTD, transit riders and

the general public. In addition to addressing the graffiti

issue, the bike patrol creates a larger security presence

overall. In August 2014, bike officers heard a cry for

help along the rail line. They responded to a woman in

distress who had slid down an embankment. They were

able to provide first aid and call for EMS. Had the bike

patrol not been in place, she likely she would not have

been heard or found. With the reopening of the Denver

Union Station in the summer of 2014, AlliedBarton’s

bike patrol services needed to expand. This highlytravelled

area is the main hub for entertainment venues,

professional sports events and many other tourist destinations

and activities. The highly-visible bike patrols

are a constant security presence, effective crowd control

and pedestrian traffic management resource, and a fast

response when foot or vehicle patrols cannot respond.

The addition of AlliedBarton’s bike patrol security officers

are an effective brand enhancement for RTD and

have become a staple in the downtown Denver area

and along the transit system. Now at over 4787 hours of

security services a week, bike patrols offer RTD a rapid

deployment force, able to move quickly and respond to

emergencies. The visible presence of well-trained, uniformed

AlliedBarton security officers provides a sense of

security and safety to transit passengers and employees

alike at RTD. The collaborative partnership between

AlliedBarton and RTD has created a proactive culture

where security services evolve to meet changing needs.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.alliedbarton.com/Industries-Served/

Transportation

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.alliedbarton.com/Industries-Served/

Transportation

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Charles Bohnenberger, VP Government Services

AlliedBarton Security Services

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (484) 351-1340

cell: (484) 213-6420

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

Charles.bohnenberger@alliedbarton.com

katie.killmeyer@alliedbarton.com

107


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Most Notable Federal Government Security Program/Project or Initiative

TSA - TSA Airport and Aviation security

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Airport/Aviation Security Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

TSA Airport and Aviation security

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

TSA ETD Fulfillment Program Nations across the globe

have become particularly concerned about “homegrown”

terrorists, individuals raised in the West but

loyal to ISIS, Al Qaida and other radical groups. Some

3700 soldiers from Western countries, including at least

180 from the U.S., have served in Iraq and Syria, and

the threat is, they will bring their ideology and terrorist

tactics back to their home countries. A country’s aviation

system is a particularly inviting target, as bringing

down an airliner or bombing an airport can inflict mass

casualties, sow wide spread fear and gain broad publicity.

The agency charged with ensuring that the U. S.

aviation system is safe from extremists is the Transportation

Security Administration (TSA), a unit of the federal

Department of Homeland Security. The TSA is often

maligned, but the agency has a reputation as a global

leader in evaluating and implementing aviation security

technology. So just as terror groups are awake to opportunity,

the TSA remains vigilant, constantly improving

its systems, including systems used to screen for explosives.

The TSA determined that existing explosive trace

detection (ETD) systems were approaching the end of

their useful life, and two years ago began planning to

replace them with more modern and efficient detectors.

The agency’s world-renowned TSA Lab took the

lead in helping identify the best ETD solution. The Lab,

located on a 12acre campus at Atlantic City International

Airport, and its staff of leading physicists, chemists and

engineers perform research and evaluate a variety of

technologies on an ongoing basis, including validating

108


solutions to detect and mitigate the threat of improvised

explosive devices. The testing process is objective and

rigorous. Primary factors considered by the TSA Lab

when evaluating explosive trace detection systems were

the ability to quickly and accurately detect a wide variety

of chemicals; a low incidence of false alarms, which play

havoc with airport operations; and ease of use. A new

but critical factor also in the mix was a product’s high

threshold of networking security effectiveness, a recent

requirement for all DHS systems. The TSA Lab sent its

report to TSA management, which considered other

important factors, including training requirements and

total cost of ownership. Three companies were qualified

by the agency and asked to bid on the ETD replacement

program. The process – thorough and impartial – led

to the selection of Implant Sciences Corporation’s QS-

B220 explosives detection product. The agency awarded

Implant Systems, headquartered in Wilmington, Massachusetts,

an ID/IQ (basically an open purchase order)

amounting to $162 million, and followed up with an initial

order for 1170 systems. Installation of the new systems

is scheduled to begin before year end. The TSA is

dedicated to keeping the flying public safe. Its ability to

measure risks and identify deterrents is a point of pride

to the agency, which is perceived by security agencies in

Europe and around the globe as the leader in assessing

technologies that keep people and property safe from

those who would do harm. As organizations emerge that

use terror to murder and intimidate, as terrorists leave

the battlefield and return home, the Transportation

Security Administration remains a critical, vigilant line

of defense for America’s airports and the millions who

fly. The agency’s ETD program involving the planning,

evaluation and deployment of hundreds of advanced

explosive trace detectors at airports throughout the

country is a testament to the agency’s foresight and effectiveness,

and the reason it deserves the GSN Government

Excellence award.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

https://www.tsa.gov

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Scott Arnold

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (207) 651-4949

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

scttrnld26@gmail.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

160 Brackett Hill Rd

Alfred, ME 04002

109


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Most Notable Federal Government Security Program/Project or Initiative

U.S. Department of State

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Continuous Clearance Evaluation Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Continuous Clearance Evaluation Program

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The U.S. government currently has about five million

people holding security clearances – confidential, secret

or top secret – all providing consent to certain ongoing

checks in order to maintain that status. Under the

current system, clearances at the confidential, secret

and top secret level are reviewed at 15, 10 and five years

respectively. However, major life changes may occur

within the span of five to 15 years, ranging from common

occurrences like financial or marriage changes

to more severe transgressions, such as arrests, drug

or criminal activity. Any of these factors could affect a

clearance holder’s personal stability and would merit

a review of the access privileges granted to that user.

However, the only check currently in place relies on the

individual self-reporting changes against the 13 Federal

Adjudicative Standards, such as personal conduct, foreign

influence, criminal conduct, drug involvement, etc.

This is an unreliable safeguard, as it places the reporting

requirement on the individual who has a vested interest

in maintaining clearance status. In fact, only a minority

of clearance holders actually self-report, and in some

cases, criminal activity went unreported. As the government

continues its efforts to mitigate insider threats,

agencies have been moving to establish more effective

controls. To this effect, agencies have primarily focused

on their physical and network security environment, but

these measures are unable to account for a full picture

of risk informed by life events. In a pioneering effort to

change that, the State Department has implemented a

comprehensive risk-based oversight system that utilizes

110


advanced analytics in conjunction with vast amounts of

available public records and data. By applying information

from sources such as public records, to the 13 Federal

Adjudicative Standards, the State Department can

more effectively identify if an individual has a propensity

to “do bad” (or better yet, identify an individual who

does NOT have such a propensity). This process – similar

to what is successfully used by the insurance industry

to determine if individuals qualify for insurance and at

what rate – enables the Department to make better decisions

on who they might want to engage more closely.

The State Department’s structured, phased approach

includes continuous evaluation and re-investigation. By

using public records and data analytics to establish if a

clearance holder has violated the rights provided under

that clearance, the State Department can consistently

evaluate and assess that individual using constantly

updated data stores and establishing re-evaluations for

deeper examination when necessary. The implementation

of an analytics-fueled continuous evaluation approach

has provided the Department with a complete

picture of employees with security clearances: their situation

today; their recent and past history; their potential

susceptibility to outside influence; and their propensity

to commit fraud, as well as deviant or other unsuitable

behavior. It is a breakthrough solution to a governmentwide

issue that can be easily replicated by other agencies.

The State Department’s innovation and initiative

deserves to be recognized.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.state.gov

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://lexisnexisspecialservices.com/what-wedo/continuous-evaluation/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Steve Nguyen, Vice President

Federal Programs and LexisNexis Special Services Inc.

(LNSSI)

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

cell: (571) 277-8770

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

Steve.Nguyen@Lnssi.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

1150 18th Street, N.W., Suite 250

Washington, DC 20036

111


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Most Notable State Government Program, Project or Initiative

New York State Division Of Homeland Security

and Emergency Services (DHSES)

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable State Government Security Program/

Project or Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

County Emergency Preparedness Assessment (CEPA)

Initiative

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

The County Emergency Preparedness Assessment

(CEPA) is a statewide initiative to better understand how

the State and local governments are prepared to deal

with various threats and hazards facing New York. As

the number one target of terrorism in the Country, and

a State with numerous natural disasters (4th most in

the nation), CEPA is a critical component of our overall

homeland security strategy. The CEPA process was

developed in collaboration with State and local subject

matter experts and involves facilitated workshops with

each of New York’s 58 counties (including NYC) to capture

risk, capability and resource information using an

intuitive, standardized and repeatable process. Through

the CEPA process, DHSES is able to better understand

local capabilities and resource gaps across the entire

homeland security spectrum (e.g., counter-terrorism,

critical infrastructure, communications, cyber-security,

emergency management, public health, etc.), and CEPA

has identified a series of common gaps and trends than

can now be better addressed. This information from

CEPA is helping both the State and our local partners

make more informed resource decisions and increasing

our efficiency and effectiveness by focusing our

collective efforts to where they are most needed. CEPA

has also helped us identify and promote best practices

across the State, and the highly collaborative nature

of the process has served to strengthen relationships

with our partners. To date, more than 1,300 public

112


and private sector stakeholders have participated in

the CEPA process, and New York’s innovative approach

to the CEPA initiative recently led to a Public Service

Excellence Award from the State Academy for Public

Administration. The CEPA process has helped New York

address the longstanding problem of how measure and

quantify preparedness. We now have a baseline preparedness

assessment and the ability to monitor and

track our progress over time. The federal government,

academics, think-tank and others have long struggled

with how to assess preparedness, but rather than wait

for someone else to develop a solution to this challenge,

New York took decisive action and created a solution

that could serve as national model, and we are actively

sharing information about CEPA with others so that they

may learn from our experiences. The growing threat

of extreme weather coupled with the complex terrorism

threat environment warrants new and innovative

approaches to increase preparedness, and the CEPA

initiative is an embodiment of that ideology. As such,

we would greatly appreciate consideration for the 2015

GSN Homeland Security Award.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://www.dhses.ny.gov/

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

CEPA Overview from DHSES website:

http://www.dhses.ny.gov/planning/

Article about CEPA:

https://www.chds.us/c/item/2543

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Terry Hastings, DHSES Senior Policy Advisor

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (518) 242-5163

cell: (518) 764-0009

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

terry.hastings@dhses.ny.gov

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

NYS DHSES 1220 Washington Ave, Building 7a (7th fl)

Albany, NY 12242

113


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Most Notable State Government Program, Project or Initiative

California Department of Motor Vehicles,

Investigations Division

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable State Government Security Program/

Project or Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

California DMV Identity Management Program

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

In late 2013, the California state legislature passed a law

that went into effect on January 1st of this year. The law

allows applicants who are unable to provide satisfactory

proof that their presence in the U.S. is authorized under

federal law to receive an original driver’s license without

the fear of criminal repercussion. As a result of this legislation,

the number of Californians who have applied

for a driver’s license has exploded, with half a million

applications filed by April of 2015, double the number

of applications that the Department of Motor Vehicles

(DMV) originally anticipated. A great majority, 91% of

these applicants, are still providing the necessary identity

and residency documents, and 203,000 immigrants

had received their licenses by April 2015. While this

indicates substantial progress towards achieving Califor-

nia’s goal of accurately accounting for all residents with

driver’s licenses, it also can result in individuals trying

to beat the system by committing fraud or other crimes

to obtain driver’s licenses. In order to help crack down

on any undocumented immigrants who may wish to

remain undocumented for the furthering of criminal activities,

the California DMV’s Investigations Division has

implemented identity proofing solutions designed to

assist in verifying an individual’s identity. Identity proofing

integrates data and analytics for identity verification,

knowledge-based authentication and investigative information

into a sophisticated algorithm that generates a

true identity picture. Identity proofing makes intelligent

information connections beyond the obvious and draws

insights from public records data, while taking steps to

114


observe the highest levels of privacy and compliance.

The first step in the process is identity discovery as

presented by the applicant. The second step is identity

verification. The process is accomplished by running it

through a series of algorithms to determine if the information

in-hand belongs to an actual person. The information

is checked against vast amounts of open source

data sets and confirmed by thousands of public records.

The final step is to authenticate that the applicant is in

fact the owner of the identity. This is done through a

quiz engine that tailors questions to the verified individual’s

public records and area demographics based

upon a multitude of data domains that are selected by

the agency. This process offers identity authentication

input options beyond just name, address and Social

Security Number, all of which can be easily falsified.

The ability to properly identify individuals applying for

driver’s licenses has a major impact on homeland security

and public safety. By resolving identities in advance

of issuing licenses, the California DMV Investigations

Division is helping to prevent criminal activities before

they occur.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

https://www.dmv.ca.gov/portal/dmv/dmv/offices/investigationsoffice

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

http://www.lexisnexis.com/risk/government/

gov-identity-management.aspx

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Dale Ferranto, Law Enforcement Liaison

Western USA, LexisNexis Risk Solutions

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (949) 276-6601

cell: (949) 542-0442

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

dale.ferranto@lexisnexis.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

1000 Alderman Dr.

Alpharetta, GA 30005

115


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Most Notable Cybersecurity Program, Project or Initiative

City of Los Angeles - Centralization of Cybersecurity

Incident Data Analysis

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Cybersecurity Program, Project or

Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

City of Los Angeles Centralizes Cybersecurity Incident

Data Analysis with Customized Solution

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

With more than 4 million residents, the City of Los Angeles

is the second largest city in the Unites States. The

City of LA’s Information Technology Agency (ITA) manages

the IT systems and network traffic for more than

37 departments, including those that support the city’s

financials, taxes and public internet for citizens. ITA is

dedicated to using the most secure, cost effective, highly

efficient and interoperable enterprise-wide technology

to serve the City of LA. In recent years, the cybersecurity

threat landscape has dramatically evolved, with an everincreasing

number of advanced persistent threats and

targeted breaches. State and city governments today are

tasked with safeguarding citizen data and confidential

information, making them a target for malicious threat

actors. Until recently, if an inconsistency or potential security

breach was found, the protocol in place required

pulling security logs from each individual department,

reviewing and analyzing the disparate reports and then

correlating the data manually with multiple security

tools. This was a time consuming process that not only

left room for error, but did not allow ITA to proactively

tackle enough of the cyber threats attempting to infiltrate

the city’s networks. Led by Timothy Lee, the city’s

chief information security officer (CISO), ITA sought

to implement an advanced security information and

event management (SIEM) solution, to help consolidate,

maintain and analyze security data across the city’s multiple

departments. Given the limited resources Lee and

116


his team faced—from staffing to budget—ITA deployed a

unique, cloud-based SIEM solution to enhance cybersecurity

capabilities. In addition, Lee led the city’s Cyber

Intrusion Command Center (CICC), a city-wide cybersecurity

working group that leads cybersecurity preparation

and response to security incidents, implemented

the city’s first Integrated Security Operations Center

(ISOC). This ISOC collects and correlates log data and

security events from different security appliances across

the city’s departments into a single database and a useable

dashboard and actionable threat intelligence to

enable a high-level security posture city-wide. Instead of

going to each of the 40 plus departments, Lee and his

team can now monitor everything from clickstreams and

transactions, to security events and network activity, and

analyze all the correlated data from a centralized, customized

dashboard, 24x7 anytime, anywhere; turning

machine-generated data into valuable intelligence that,

in turn, drives good decisions. The SIEM solution takes

the City of LA to another level of cybersecurity intelligence.

With the data in one place, the City of LA and its

FBI counterpart, FBI Cyberhood Watch, can quickly and

efficiently gather information about threats, and identify

strategies to prevent future intrusions. The solution

has undoubtedly enhanced the city’s ability to manage

and protect the city’s critical infrastructure and digital

assets serving Angelenos. Lee states, “I can confidently

say we have avoided a number of security breach situations

because we implemented these proactive tools.

We have blocked intrusion attempts, have been able to

swiftly correlate data and share threat information to the

stakeholders, and have been able to expedite the time it

takes to close these security incident tickets.”

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

http://ita.lacity.org/index.htm

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Caralyn Duke, Account Executive

Qorvis MSLGROUP

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: (202) 683-3203

cell: (202) 658-9201

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

caralyn.duke@mslgroup.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

1201 Connecticut Ave, NW Suite 500

Washington, DC 20036

117


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Most Notable County/Municipal Program, Project or Initiative

Nanded India, Safe City -

Qognify (Formerly NICE Security)

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable County/Municipal Program, Project or

Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Nanded India, Safe City

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Nanded is the second largest city in the Marathwada

District of Maharashtra, India with over half a million

citizens. The city holds historical and religious significance,

making it a destination city. Several times a year,

religious tourism spikes, bringing an influx of tens of

thousands of visitors and the risk associated with a

swelling population. Maintaining safety and security

is a priority for the municipality, not just during peak

visitation, but every day. Serving as a model for future

deployments around the Maharashtra state and India in

general, the Safe City project was named C-Cube after

the command, control and communication center that

monitors the entire city, 24/7. The Safe City solution is

comprised of several different integrated components

that work together to provide law enforcement with

situational awareness and management. NICE Situa-

tor Express is the PSIM backbone of the solution, with

NiceVision video surveillance including NVRs, decoders

and Crowd Monitoring video analytics supporting it. In

addition, Panic Buttons have been deployed throughout

the city and pre-configured advanced Standard Operating

Procedures (SOP) in the local language, Marathi,

have been developed and implemented to address

the various security and disaster situations that could

potentially occur. Nanded officials outlined very specific

challenges that they wanted to address effectively, yet

affordably, with the Safe City solution.

They include:

NICE Crowd Monitoring analytics or Panic Button

activation alert C-Cube of crowd formations – This

allows operators at C-Cube to control the situation with

118


the help of Situator with embedded pre-defined SOPs in

the local language.

Citywide Public Address (PA)System — Nanded is

using NiceVision as their PA system in the event of an

emergency – eliminating their need for additional

equipment. Using Nice Vision’s audio out capability, an

operator can simply click on any camera and the camera’s

loudspeaker makes the announcement.

Affordable State-of-the-Art Control Room — with a

4x2 LCD video wall and powered by a NICE decoder

and Video Matrix license, providing a true video wall

feel to C-Cube.

Procession and VIP Route Monitoring — NICE Situator

with predefine SOPS help law enforcement monitor

and manage routine operations. For example, during

VIP Route Monitoring the SOP dictates that the corresponding

cameras along the route are displayed on the

video wall enabling real-time monitoring.

Disaster Management — with predefined, escalating

SOPs, operators have the ability effectively and consistently

manage emergency situations including structure

collapses, flooding, railway accidents, earthquakes and

others.

“Nanded’s historical and religious significance made

safety and security a high priority. The C-Cube was designed

to facilitate better communications between law

enforcement officials and the public, and to centralize

safety and security management. With NICE’s support,

we were able to bring our vision to fruition and even

create a public address system that allows us to communicate

quickly with our citizens. We’re experiencing

improvement in security, operations, and communications,

and in the way incidents are handled,” attested,

Mr. Sushil Khodwekar, Municipal Commissioner of

Nanded City.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

nwcmc.gov.in

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

www.qognify.com/situation-management-psim/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Hagar Lev, Marketing Director

Qognify

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: +49 (0) 69 97 17 738

cell: +49 (0) 171 1637-667

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

hagar.lev@qognify.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

461 From Rd

Paramus, NJ 07652

United States

(C/O Steve Maron, @ NICE Systems Inc.)

119


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Most Notable County/Municipal Program, Project or Initiative

SAMMC (San Antonio Military Medical Center)

Advanced Security Program, Suspect Search –

Qognify (Formerly NICE Security) 2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable County/Municipal Program, Project or

Initiative

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

SAMMC (San Antonio Military Medical Center) Advanced

Security Program, Suspect Search

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

In the early morning hours, a “code pink” alarm has

been triggered. A newborn baby was moved from its

bed. The RFID bracelet on her wrist triggered an alarm

once she was past a predefined security access point.

Automatically, video from relevant nearby cameras is

streamed to the control room, revealing a fast walking

figure, dressed in street clothing. The person is clearly

visible when seen on the video camera closest to where

the infant’s RFID bracelet triggered the alarm. That image

is imported into the system, and within seconds, an

album of pre-indexed persons appeared on the screen.

From here, visual verification of the suspected person

is swift, and his trail across the cameras is shown on the

screen. The abductor was clever, selecting a course that

would not be easily traceable otherwise. He knows the

hospital well. But the system is smarter, and security

personnel are dispatched. They track him down to the

parking lot, before leaving hospital grounds. The infant

is safe again. The above is not a true story, but based

on many incidents that have occurred, nationwide, with

hospital related crime on the rise*. But what if the right

system is deployed – one that enables the happy ending

described above? That potential happy ending is why

this entry deserves to win. The San Antonio Military

Medical Center (SAMMC), is the largest U.S. Department

of Defense Military Medical facility and Level I Trauma

and Burn Research Center. It is an expansive medical

center; with over 2.1 million square feet. Its ER process-

120


es more than 5,700 emergency room visits a month and

serves hundreds of thousands of U.S. service members

and their families. SAMMC’s was an early adopter of

Suspect Search video analytics solution, enabling personnel

to track and locate missing patients or suspicious

persons during time-critical scenarios. Qognify Suspect

Search provides real-time forensics of surveillance video

to locate a person of interest in situations when time is

of the essence. Using a video image, uploaded photo, or

user-generated composite (an “avatar”, based on verbal

description of suspect, its clothing, etc)- Suspect Search

can scan hours of video in minutes and automatically

filter out 95 percent of irrelevant images. Its mapping

capabilities provide geo-spatial awareness by retracing

a suspect’s movements across cameras and pinpointing

his current or last known locations on your premises.

All images, related video, and locations associated with

the search are digitally stamped and can be saved or

shared among law enforcement agencies for use in

investigations and prosecution. The adoption of Suspect

Search builds on and integrates with SAMMC’s existing

NiceVision video surveillance solution, which has been

used to investigate incidents related to patient safety

and well-being. Now, the combined solution helps

SAMMC teams locate and track persons of interest in

a matter of seconds and amidst hours of footage. The

combined security program enables SAMMC benefits

such as accelerated response times; contained impact

of potential criminal or harmful activity; reduction in

shutdown times and the associated negative impact on

patient care.

* Violent crimes at hospitals on the rise: Over 200 infant

abductions documented from hospitals and other locations

When Hospital Safeguards Against Drug Theft Aren’t Enough

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.bamc.amedd.army.mil/sammc.asp

Link to additional information on product,

service or program, with brief description:

––––––––––––––––––––––––––––––––––––––––

www.qognify.com/suspect-search-next-generation-video-analytics/

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Hagar Lev, Marketing Director

Qognify

Nominating contact’s office telephone and cell

phone:

––––––––––––––––––––––––––––––––––––––––

office: +49 (0) 69 97 17 738

cell: +49 (0) 171 1637-667

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

hagar.lev@qognify.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

461 From Rd

Paramus, NJ 07652

United States

(C/O Steve Maron, @ NICE Systems Inc.)

121


GSN 2015 DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS

Most Notable Law Enforcement Interdiction, Arrest, Counter Terrorism

or Crime Prevention Program – Federal/State or Local

Memphis Police Department

2015 Winner

Awards Category:

––––––––––––––––––––––––––––––––––––––––

Most Notable Law Enforcement Interdiction, Arrest,

Counter Terrorism or Crime Prevention Program

Name of Nominated Product, Service,

or Program:

––––––––––––––––––––––––––––––––––––––––

Memphis Police Department

Reason this entry deserves to win:

––––––––––––––––––––––––––––––––––––––––

Memphis, a city with a rich history of creative and trailblazing

American icons, has captured the city’s creative

spirit in crime prevention as well. The Memphis Police

Department is using a combination of traditional and

unconventional video surveillance to protect the city’s

citizens and critical infrastructure. MPD has established

a network of about 600 surveillance cameras throughout

the city. Many of these cameras have smart features

such as line crossing and intrusion detection to make

surveillance more effective. These features can send

alerts to the police when someone enters or leaves a

designated area. Live footage flows back to the MPD

Real Time Crime Center (RTCC). The RTCC is a sophisticated

way for the city to fight crime. It features a large

video wall that can pull up live streams from surveil-

lance cameras throughout the city, as well as unique

software that provides instant information on recent

criminal activity in a radius around a crime, existing

crime patterns in the surrounding area, and a history

of people with arrest records who may frequent the

neighborhood. MPD has also invested in mobile trailers

that are each equipped with two cameras. These trailers,

powered by generators or solar energy, monitor parking

lots, malls, and special events. Officers in the RTCC

can monitor events live and respond as needed. Another

fascinating element of this crime prevention program

is a gunshot detection feature that works in tandem

with the PTZ (pan, tilt, zoom) cameras. A circuit board

is programmed to listen for gunshots and essentially

filters out all other noise. Microphones atop the enclo-

122


sure pick up any possible gunshot sounds, and if those

sounds are heard, the detector triangulates the location

of the shot. It then guides the camera to pan, tilt, and

zoom in the direction of the gunshot within seconds.

Many cameras are placed on utility poles in unique, patented

enclosures that house the cameras and all of their

related equipment: a DVR or NVR, an encoder, a power

supply, and a router. A flashing blue light — a nod to

a police car’s light bar on the roof — is placed on the

enclosure as a finishing touch. These units are peppered

throughout the city, from Beale Street to the ports and

many areas in between. To further protect police force

and sensitive operations, a local wifi system is employed

that enables officers to pull up to an enclosure, connect

to the network, and discreetly pull data without even

exiting the car. Not only is the department receiving a

lot of positive feedback on its crime prevention efforts,

but the cameras have become an instrumental tool in

catching criminals — MPD has several cases prosecuted

each week thanks to incidents being captured on video.

Plus, the police are able to dispatch calls from the RTCC

and view live video before the officer even arrives on the

scene. From gunshot detection to the video evidence

used in prosecutions, it’s clear that MPD’s crime prevention

program has made a measurable impact on public

safety.

Link to Web Page of Nominated Organization:

––––––––––––––––––––––––––––––––––––––––

www.memphispolice.org

Name and organization of nominating

contact for this entry, including name, title,

organization:

––––––––––––––––––––––––––––––––––––––––

Anna Boudinot, Content Manager

Hikvision USA

Nominating contact’s email address:

––––––––––––––––––––––––––––––––––––––––

anna.boudinot@hikvision.com

Address of nominating contact’s organization:

––––––––––––––––––––––––––––––––––––––––

908 Canada Court

City of Industry, CA 91748

123


The News Leader in Physical, IT and Homeland Security

CEO/Editorial Director:

Adrian Courtenay

(O) 212-344-0759, X3

(C) 917-696-5782

acourtenay@gsnmagazine.com

Publisher:

Michael Madsen

(O) 212-344-0759, X1

(C) 732-233-8119

mmadsen@gsnmagazine.com

Senior Writer:

Steve Bittenbender

(C) 502-552-1450

sbittenbender@gsnmagazine.com

Senior Writer:

Karen Ferrick-Roman

(C) 412-671-1456

karenferrickroman@gmail.com

Columnist:

John Convy

Convy on Netcentric Security

john@convyassociates.com

Columnist:

Shawn Campbell

shawncampbell@safenetat.com

Guest Expert Contributor:

Denise Rucker Krepp

(C) 202-546-2533

kdrkrepp@hotmail.com

Art Director:

Gerry O’Hara

OHDesign3

(C) 203-249-0626

gerry@ohd3.com

Production Director:

Tammy Waitt

(O) 732-233-0245

twaitt@gsnmagazine.com

Mailing Address:

Government Security News

P.O. Box 7608

Greenwich, CT 06836

Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing offices. POSTMASTER: Send address

changes to GSN: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government

decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received

GSN: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and

foreign subscribers are charged $140 International Airmail. Copyright 2016 by GSN: Government Security News. All rights reserved.

Printed in the U.S.A. GSN: Government Security News assumes responsibility for validity of claims in items reported.

126

More magazines by this user
Similar magazines