22.01.2016 Views

The GSN 2015 Digital Yearbook of Awards

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>The</strong> <strong>GSN</strong><br />

<strong>2015</strong> <strong>Digital</strong> <strong>Yearbook</strong><br />

OF<br />

Airport/Seaport/<br />

Border Security <strong>Awards</strong><br />

AND<br />

Homeland Security <strong>Awards</strong>


MEET THE SPONSORS<br />

AppGuard uses prevention to keep cyberattacks from<br />

harming businesses, government agencies<br />

When it comes to handling cyberattacks, a small Virginia-based<br />

company <strong>of</strong>fers an innovative solution that<br />

borrows from an old adage: an ounce <strong>of</strong> prevention is<br />

worth a pound <strong>of</strong> cure.<br />

Blue Ridge Networks has been in the cybersecurity<br />

business for more than 15 years, <strong>of</strong>fering its solutions<br />

to government agencies and businesses. Its AppGuard<br />

solution enables a client’s workforce to log in – even<br />

from remote locations – and know they will not be at<br />

risk <strong>of</strong> being infiltrated or inadvertently exposing their<br />

colleagues to a hack.<br />

AppGuard stops such destructive files as malware,<br />

ransomware, weaponized documents and phishing attempts<br />

from entering a user’s system. Those are the files<br />

used by hackers through a user’s trusted applications to<br />

4<br />

launch destructive cyberattacks.<br />

“AppGuard is the only solution<br />

on the market because it is not a<br />

detection capability,” said Mike<br />

Fumai, president and chief operating<br />

<strong>of</strong>ficer for Blue Ridge. “We’re<br />

blocking.”<br />

Cyberattacks are not like traditional<br />

robberies where the bad<br />

guys arrive in dramatic fashion and<br />

take their loot in one fell swoop.<br />

Instead, they get small bites – or<br />

Mike Fumai<br />

President and COO<br />

Blue Ridge Networks<br />

bytes, mind you – at a time, usually when routine events<br />

like reports are generated or updates are released. As<br />

the attacks linger for weeks and months because the file<br />

has not been detected, the little things begin to add up<br />

to huge losses for the victims.<br />

In the past year, the public has become more aware<br />

<strong>of</strong> the damage hackers can wreak. Millions <strong>of</strong> customers<br />

were affected by the attacks on such companies as<br />

Anthem, Home Depot and Target. In Target’s case, it was<br />

only discovered after customers called their banks and<br />

credit card companies to complain about fraudulent


purchases, Fumai said. And the government was hit hard<br />

too, as the Office for Personnel Management reported<br />

that attacks made the records for millions <strong>of</strong> federal<br />

workers and contractors vulnerable.<br />

“It’ll take a generation before we find out what the<br />

effects <strong>of</strong> OPM will be,” said Fumai, who has worked for<br />

more than 25 years in the communications and technology<br />

industries.<br />

And the attacks will only become more sophisticated<br />

in the future, according to industry experts, as the hackers<br />

find ways to infiltrate without leaving a trace or<br />

signature behind.<br />

“Past infections always deposited a small binary<br />

somewhere on disk, but the newest evasion techniques<br />

used by fileless malware—Kovter,<br />

Powelike, and XswKit, for<br />

example—leave no trace on<br />

disk, thus making detection,<br />

which generally relies on<br />

static files on disk, more difficult,”<br />

McAfee Labs wrote in its<br />

threats report last November.<br />

This is where AppGuard<br />

becomes very useful, Fumai<br />

said. <strong>The</strong>re is no need to<br />

try and detect malware that<br />

might not have any signature or binary present because<br />

AppGuard prevents the first stage attack so malware<br />

will never get its foothold in the enterprise. That ability<br />

makes the solution very attractive to Blue Ridge’s<br />

partners and clients.<br />

“AppGuard is American Cyber’s ONLY solution for<br />

zero-day malware prevention, as well as the easiest and<br />

most cost-effective malware protection available,” said<br />

Gary Winkler, president <strong>of</strong> American Cyber and a former<br />

program executive <strong>of</strong>ficer with the U.S. Army. “It simply<br />

5<br />

prevents any malware from executing, without needing<br />

to know what the malware is, and then AppGuard<br />

reports the details <strong>of</strong> the attempt. AppGuard has absolutely<br />

no impact to system/application performance or<br />

user experience. It should be part <strong>of</strong> the Army’s Gold<br />

Master configuration for every end-point.”<br />

AOL serves as another partner for Blue Ridge. <strong>The</strong><br />

multimedia company <strong>of</strong>fers its subscribers, which were<br />

more than 2 million last year, AOL Tech Fortress. <strong>The</strong><br />

service uses AppGuard to block viruses and other suspicious<br />

files from harming a<br />

user’s computer.<br />

AppGuard does not just<br />

prevent attacks, Fumai said.<br />

Its proactive defense keeps<br />

clients from having to spend<br />

millions – or more – <strong>of</strong> dollars<br />

to assess the impact <strong>of</strong> a<br />

breech, to make repairs and to cover liabilities from<br />

the attack. That means corporate clients can invest<br />

more in research and development and public<br />

sector agencies can be better stewards <strong>of</strong> taxpayer<br />

funds.<br />

And Blue Ridge is working on new ways to protect<br />

its clients. Fumai noted the company is working<br />

an “Internet <strong>of</strong> Things” guard that would secure<br />

various cloud networks, including those run by Amazon<br />

and Micros<strong>of</strong>t. This would allow any networked device<br />

to be protected from attack.<br />

“IoT Guard will be able to secure whatever clouds<br />

they’re working at the same time with multiple devices,”<br />

Fumai said. “This will not break the IT or compliance<br />

standards already established. We don’t break things.<br />

We’re just an overlay.”


ABOUT THE <strong>GSN</strong> AWARDS PROGRAMS<br />

<strong>The</strong> Government Security News <strong>Awards</strong> Programs, first appearing in 2009, were organized<br />

to honor the distinguished vendors <strong>of</strong> IT, Physical and Integrated security solutions, and<br />

the dedicated <strong>of</strong>ficials in federal, state, county and municipal government whose combined<br />

efforts protect us from all threats.<br />

<strong>The</strong> <strong>2015</strong> <strong>Yearbook</strong> covers the results <strong>of</strong> two <strong>GSN</strong> awards programs – the <strong>GSN</strong> <strong>2015</strong><br />

Airport, Seaport, Border Security <strong>Awards</strong> and the <strong>GSN</strong> <strong>2015</strong> Homeland Security <strong>Awards</strong>.<br />

We are also please to honor the vendors and <strong>of</strong>ficials <strong>of</strong> other nations that have chosen to<br />

participant in this year’s programs, <strong>of</strong>ten with prize-winning entries.<br />

In our humble opinion, the technological advances from vendors and the ever-more<br />

sophisticated programs and strategies <strong>of</strong> government agencies are mind-boggling in their<br />

excellence. We hope you’ll find our awards programs to be interesting and informative.<br />

We know you’ll find them to be very reassuring!<br />

Adrian Courtenay, CEO/Editorial Director<br />

Government Security News<br />

6


TABLE OF CONTENTS<br />

4<br />

6<br />

7<br />

8<br />

12<br />

60<br />

122<br />

Message from <strong>2015</strong> <strong>Awards</strong> Sponsor<br />

About the <strong>GSN</strong> <strong>Awards</strong> Programs<br />

Table <strong>of</strong> Contents<br />

Interview with Chuck Brooks, Distinguished Judge, <strong>2015</strong> <strong>GSN</strong> <strong>Awards</strong> Program<br />

Winners in <strong>2015</strong> Airport, Seaport, Border Security <strong>Awards</strong> Program<br />

Winners in <strong>2015</strong> Homeland Security <strong>Awards</strong> Program<br />

Government Security News, <strong>The</strong> News Leader in IT, Physical and Homeland Security<br />

7


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY<br />

and<br />

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />

<strong>GSN</strong> INTERVIEW<br />

Chuck Brooks, Distinguished Judge<br />

<strong>GSN</strong> <strong>2015</strong> Homeland Security and<br />

Airport, Seaport, Border Security <strong>Awards</strong> programs<br />

<strong>GSN</strong>: What are your general thoughts on the<br />

<strong>2015</strong> awards?<br />

CB: For me it was a real pleasure judging this year’s<br />

annual Homeland Security and Airport, Seaport, Border<br />

Security <strong>Awards</strong> programs. <strong>The</strong> submissions this year<br />

were frankly quite amazing. <strong>The</strong> capabilities and technical<br />

merits <strong>of</strong> the IT and Physical security products/solutions<br />

<strong>of</strong> all the vendors made it especially difficult to judge. In<br />

my opinion they were all winners because they are leading<br />

technological contributors to the current and future<br />

security <strong>of</strong> our nation. It is good to know that very talented<br />

people in industry and government are continually<br />

designing and upgrading security solutions to fill gaps as<br />

adversaries are becoming more hostile and sophisticated.<br />

<strong>GSN</strong>: You spent many years on Capitol Hill and<br />

also at the Department <strong>of</strong> Homeland Security.<br />

As we head into 2016, what do you envision as<br />

homeland security spending priorities?<br />

CB: Macro spending will increase across the board on<br />

homeland security products and services In accordance<br />

to the new threats we are especially facing from ISIS and<br />

from other terrorist actors, and global instabilities. This<br />

was reflected in the recent passage <strong>of</strong> the 2016 omnibus<br />

spending Bill recently passed by Congress by Congress.<br />

<strong>The</strong> bill provides DHS with $40.96 billion, which is an<br />

increase <strong>of</strong> $1.33 billion over the fiscal year <strong>2015</strong> enacted<br />

levels. It included increased funding levels for Customs<br />

and Border Protection, Immigration and Customs Enforcement<br />

and for DHS Cybersecurity programs in the DHS<br />

8


National Programs and Protection Directorate.<br />

Global spending also parallels the DHS spending raise.<br />

A new market research report, “Global Homeland Security<br />

and Emergency Management Market, 2013–2018”,<br />

published by MarketsandMarkets is expected to reach<br />

$544.02 Billion by 2018. Unfortunately, those numbers<br />

could go even higher if there are more incidents similar to<br />

what happened in Paris, Mali, and San Bernardino, CA.<br />

<strong>GSN</strong>: What area/issue pending trends do you<br />

see as priorities for the homeland security<br />

community?<br />

CB: Counterterrorism and the counter CBRNE (chemical<br />

, biological, Radiological, Nuclear, and Explosive) mission<br />

will always be fundamental to homeland planning and<br />

spending. Those are the most catastrophic threats. In<br />

addition to CBRNE DHS has assumed more and more <strong>of</strong> a<br />

leadership role in cybersecurity derived from both Presidential<br />

mandates and congressional legislation.<br />

Cybersecurity is indeed a top priority as government agencies<br />

and mega corporations experience more data breaches<br />

with each passing year. I recently published an article<br />

in <strong>The</strong> Federal Times on Key homeland security priorities<br />

to watch in 2016 (http://www.federaltimes.com/story/<br />

government/dhs/blog/<strong>2015</strong>/12/15/key-homeland-securitypriorities-watch-2016/77368604/)<br />

My thoughts in regards<br />

to cybersecurity verbatim:<br />

“<strong>The</strong> <strong>2015</strong> DHS budget directed more than $1.25 billion<br />

to cybersecurity and that trend will continue in 2016.<br />

Cybersecurity and IT have moved to the forefront since<br />

DHS’s inception as we have become a more interconnected<br />

world. New legislation pending in Congress formalizes<br />

the increased DHS role in public/private partnering.<br />

New legislation also would update the 12-year-old Federal<br />

Information Security Management Act (FISMA) and delineate<br />

DHS’s role in guarding government networks and<br />

websites.<br />

A priority for 2016 will be to accelerate rollout <strong>of</strong><br />

Einstein III Accelerated (E3A), the latest phase <strong>of</strong> DHS’s<br />

automated network-security correcting systems. DHS has<br />

established memoranda <strong>of</strong> agreement with 55 federal<br />

agencies to implement Einstein to provide horizon scanning<br />

and automated monitoring, detection, and remediation<br />

<strong>of</strong> government networks. DHS is also planning for<br />

new cyber technologies that provide advanced defense <strong>of</strong><br />

network framework layers, including authentication, better<br />

encryption, biometrics, and data analytical tools”.<br />

<strong>GSN</strong>: What future areas <strong>of</strong> homeland security<br />

interest would you advise companies to explore?<br />

CB: <strong>The</strong> key word really is “future” and it is already<br />

around the corner with the Internet <strong>of</strong> Things (IoT).<br />

Recently both the FBI and DHS issued warnings about IoT<br />

and pending threats. <strong>The</strong> reality is that we have become<br />

immersed in a new digital era comprised <strong>of</strong> more than 50<br />

billion interfaced devices. Anything connected is vulnerable.<br />

Expect significant investments in smart cities, smart<br />

homes, smart businesses, and smart governments in the<br />

next decade. For the security community this conveys<br />

opportunities in developing and integrating new sensors<br />

for threat detection, surveillance, predictive data analytics,<br />

Continued on next page<br />

9


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY<br />

and<br />

AIRPORT, SEAPORT, BORDER SECURITY AWARDS PROGRAMS<br />

<strong>GSN</strong> INTERVIEW<br />

Chuck Brooks, Distinguished Judge<br />

<strong>GSN</strong> <strong>2015</strong> Homeland Security and Airport, Seaport, Border Security <strong>Awards</strong> programs<br />

biometrics, interoperable communications, and geo-mapping<br />

(to name a few). Also, the implications for forensics,<br />

including cyber-forensics are evident and will be a real<br />

growth industry for law enforcement and industry. It is<br />

interesting to note that DHS’s Science & Directory Directorate<br />

recently announced that it is seeking to help fund<br />

small businesses who may have innovative IoT technologies<br />

to help the homeland security mission.<br />

Crime Mapping<br />

<strong>GSN</strong>: Can you tell us about your new role at<br />

Sutherland Government Solutions?<br />

CB: I serve as the Vice President for Government Relations<br />

& Marketing for Sutherland Government Solutions<br />

(SGSI). I lead the Federal and State & Local Government<br />

relations activities and I am also responsible for the Marketing<br />

portfolio (Media, PR, <strong>Digital</strong> Outreach, Thought<br />

Leadership, Strategic Partnering, Branding) for the Federal<br />

and State & Local markets. SGSI is a recognized provider<br />

<strong>of</strong> business process and technology management services<br />

for the public sector. <strong>The</strong> company also <strong>of</strong>fers integrated<br />

portfolios <strong>of</strong> analytics-driven back-<strong>of</strong>fice and citizen facing<br />

solutions that support entire government missions. I am<br />

also an Advisor to the Bill and Melinda Gates Technology<br />

Partner network, and serve as Vice Chairman <strong>of</strong> CompTIA’s<br />

New & Emerging Technology Committee.<br />

For those who are active on social media, I also run<br />

two <strong>of</strong> the most influential homeland security groups on<br />

LinkedIn –“U.S. Department <strong>of</strong> Homeland Security” and<br />

“Homeland Security” that have combined membership <strong>of</strong><br />

over 50,000 members. Please look them up and join!<br />

Thanks and Happy, Healthy, Prosperous, and Safe 2016<br />

to all <strong>of</strong> Government Security News readers!<br />

Chuck can be reached at:<br />

Charles.brooks@sutherlandglobal.com<br />

On Twitter: @ChuckDBrooks<br />

Linkedin Pr<strong>of</strong>ile: http://www.linkedin.com/in/chuckbrooks<br />

10


11


<strong>The</strong> <strong>GSN</strong> <strong>2015</strong><br />

Airport/Seaport/<br />

Border Security <strong>Awards</strong>


Winners in the <strong>2015</strong><br />

Airport/Seaport/Border Security <strong>Awards</strong> Program<br />

Best Access Control/Identification<br />

Best Biometric Identification Solution<br />

Crossmatch – Winner<br />

Best ePassport Solution<br />

Securiport – Winner<br />

Best Physical/Logical<br />

Priviledged Access Solution<br />

Honeywell Security – Winner<br />

STANLEY Access Technologies – Winner<br />

Best Detection Solutions<br />

Best Cargo/Vehicle Screening<br />

Advanced Detection Technology, LLC – Winner<br />

Best Explosives/Narcotics/Contraband<br />

Detection<br />

SureScan Corporation – Winner<br />

Best Nuclear/Radiation Detection<br />

Rapiscan Systems – Winner<br />

Best Communications Solutions<br />

Best MOB Tracking and/or Wrist Devices<br />

PureTech Systems – Winner<br />

Best Mass Notification System<br />

LRAD Corporation – Winner<br />

Best Acoustic Hailing Service<br />

LRAD Corporation – Winner<br />

Best Surveillance Systems<br />

Best Coastal Surveillance Solution<br />

TCOM, LP – Winner<br />

Best Video Analytics/Intrusion Detection<br />

Honeywell Security – Winner<br />

Best Long-Range/Day-Night Surveillance<br />

CohuHD Costar – Winner<br />

Best Perimeter Protection, Fencing,<br />

Gates, Guard Booths<br />

Best Fencing, Barriers, Bollards, Gates<br />

Betafence USA – Winner<br />

Tilt-A-WAy – Winner<br />

Best Guard Service, Facility Protection Service<br />

Global Elite Group – Winner<br />

Best Integrated Security Programs<br />

Best Physical Security Information<br />

Management System - PSIM<br />

Network Harbor, Inc. – Winner<br />

Honeywell Security – Winner<br />

Best Integrated Harbor Security Program<br />

Emergency Response Technology, LLC – Winner<br />

13


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Crossmatch<br />

<strong>2015</strong> Winner<br />

Best Access Control/Identification<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Biometric Identification Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Crossmatch<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Crossmatch is a world leader in biometric identity<br />

management solutions. With deployments in over 80<br />

countries worldwide, Crossmatch biometric capture<br />

devices are used daily to identify individuals and authenticate<br />

claimed identities. Our latest compact, mobile,<br />

handheld solution, the Verifier ® Sentry, is a highly flexible<br />

Android-based device designed to rapidly identify/<br />

authenticate an individual using their fingerprint or<br />

secure credential, such as contact and contactless cards.<br />

<strong>The</strong> handheld enables government and enterprise<br />

personnel to perform identity and credential checks and<br />

initiate workflows anywhere, anytime. Incorporating a<br />

FAP30 fingerprint sensor, the Verifier Sentry captures<br />

more data points than FAP10 sensors found in many<br />

mobile devices. This is imperative when matching an<br />

unknown subject’s fingerprint to a backend database or<br />

watchlist. A March 2014 report from the National Institute<br />

<strong>of</strong> Standards and Technology (NIST)* states FAP10<br />

submissions fail to identify their target approximately<br />

twice as <strong>of</strong>ten as FAP20 or FAP30 – a situation that could<br />

lead to missed apprehensions, compromised safety, denied<br />

benefits or unauthorized access in commercial or<br />

government use cases. While FAP10 may be sufficient on<br />

personal devices or one-to-one matching <strong>of</strong> a cooperative<br />

subject, a FAP30 is the best solution for identifying<br />

unknown or uncooperative persons. <strong>The</strong> Verifier Sentry<br />

is <strong>of</strong>fered with <strong>Digital</strong>Persona ® Commander, a mobile<br />

device management tool that provides the secure communications<br />

tunnel to the handheld and remote matching<br />

databases, protecting data integrity and personal<br />

14


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.crossmatch.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.crossmatch.com/verifier-sentry/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

John Hinmon, Vice President, Worldwide Marketing<br />

Crossmatch<br />

privacy. Match requests from multiple Verifier Sentry<br />

devices are aggregated by the secure server-based Commander<br />

application for centralized administration and<br />

submission to one or more matching databases. Administrators<br />

using Commander have the ability to efficiently<br />

manage and configure deployed devices and perform<br />

watchlist management tasks. <strong>The</strong>y can also locate, lock<br />

or even wipe Verifier Sentry devices in the field, as well<br />

as control who logs in and at what times.<br />

Solution Benefits:<br />

• Listed on FBI Approved Products List<br />

• Superior FAP30 PIV certified fingerprint sensor<br />

• Ergonomic one-handed operation<br />

• Wide range <strong>of</strong> supported credentials, including PIV,<br />

and PIV derivatives such as CAC, TWIC, and FRAC and<br />

RFID cards.<br />

• PIV specified facial image capture<br />

• Wireless (Wi-Fi, Bluetooth, 3G GSM)<br />

• On-device matching for autonomous operation<br />

• Centralized administration capabilities via <strong>Digital</strong>Persona<br />

Commander Reference:<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 561-493-7401<br />

cell: 561-346-5862<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

john.hinmon@crossmatch.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

3950 RCA Boulevard, Suite 5001<br />

Palm Beach Gardens, FL 33410<br />

* NIST IR 7950<br />

15


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Securiport<br />

<strong>2015</strong> Winner<br />

Best Access Control/Identification<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best ePassport Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Securiport<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In today’s globalized world, international travel is essential<br />

to business success. Trade and tourism depend<br />

on safe and efficient immigration controls. However,<br />

terrorism, identity theft and human trafficking pose<br />

grave risks to border security. Securiport solves border<br />

security challenges with innovative technology solutions<br />

that keep citizens and travelers safe. At Securiport, we<br />

leverage cutting-edge ultrasound biometric technologies<br />

and advanced data analytics tools to provide authorities<br />

with the knowledge and assurance to ensure order and<br />

efficiency across transnational borders. With solutions<br />

currently in place across dozens <strong>of</strong> countries around<br />

the world, and a dedicated team <strong>of</strong> pr<strong>of</strong>essionals developing<br />

innovative tools to meet emerging challenges,<br />

Securiport is the global leader in intelligent immigration<br />

controls solutions.<br />

Securiport’s innovative eVisa Solutions Provide a<br />

Faster, Smarter, Safer Way To Travel, Benefitting<br />

Tourism and Local Economies<br />

Section 1 – Introduction to Visa Challenges<br />

A visa is an <strong>of</strong>ficial mark or stamp on a passport that<br />

allows someone to enter or leave a country usually for<br />

a particular reason [1] . Historically, immigration <strong>of</strong>ficials<br />

would grant a visa when a visitor arrived in a foreign<br />

country, but today, a traveler wishing to enter another<br />

country must apply for a visa in advance. This causes<br />

numerous challenges for both civilians and government<br />

<strong>of</strong>ficials all over the world. <strong>The</strong> first obvious disadvan-<br />

16


tage <strong>of</strong> applying for or issuing a visa is the time required<br />

to process the application. Under normal circumstances,<br />

a traveler seeking to apply for a visa would need to<br />

fill out the necessary paperwork and then either mail<br />

or hand deliver the paperwork to the desired nation’s<br />

local embassy or consulate. After this time-consuming<br />

procedure, the embassy will process the documents<br />

and then mail the visa back to the applicant if approved.<br />

As a result, the life cycle <strong>of</strong> receiving a visa could take<br />

anywhere from two weeks to two months. This can be<br />

very costly and time consuming for immigration <strong>of</strong>ficials<br />

and can cause problems if a traveler needs to apply for a<br />

visa last minute. Another obstacle travelers and <strong>of</strong>ficials<br />

face is the lack <strong>of</strong> infrastructure and personnel available.<br />

Many developing nations are simply not equipped with<br />

the proper personnel, technology and infrastructure<br />

needed to issue these documents in a timely and efficient<br />

manner without compromising safety or security.<br />

Long queues build up at immigration desks at airports,<br />

embassies and consulates, further increasing the document<br />

process time. This increased workload for the immigration<br />

staff can hinder their ability to work efficiently<br />

and securely. Governments should look to improve<br />

their immigration processes, starting with the system for<br />

issuing visas. Many <strong>of</strong> the challenges caused by the visa<br />

application process can be overcome by simply transitioning<br />

to an electronic visa system, which streamlines<br />

the process and ensures accountability for both governments<br />

and travelers. By transitioning to an electronic<br />

visa system, governments will improve and ease the process<br />

<strong>of</strong> applying for a visa, which can lead to a multitude<br />

<strong>of</strong> benefits for the country. For example, a country such<br />

as Honduras could benefit greatly from implementing<br />

an electronic visa system. Honduras, located in Central<br />

America, is home to some <strong>of</strong> the world’s best beaches,<br />

coral reefs and diving locations in addition to the world<br />

famous Mayan city <strong>of</strong> Copan and Rio Platano Biosphere.<br />

<strong>The</strong>se attractions make Honduras a great location for<br />

travelers who wish to experience the wonders <strong>of</strong> Central<br />

America. However, the long process for applying for a<br />

visa can be a major deterrent to tourism in the country.<br />

Just recently, the Honduran government has made<br />

tourism a national priority, believing that the tourism<br />

industry will not only benefit the country by stimulating<br />

the economy, but also by strengthening the national<br />

identity, increasing development and providing Hondurans<br />

with a higher standard <strong>of</strong> living. By implementing<br />

an electronic visa system, like Securiport’s eVisa Management<br />

System, countries, such as Honduras, could<br />

save time and money by operating more efficiently to<br />

improve the way they communicate and engage with<br />

citizens. By addressing key challenges and streamlining<br />

the process it takes to apply and receive a visa, the<br />

number <strong>of</strong> total visa applications and number <strong>of</strong> visitors<br />

will inevitably increase, improving revenue generated<br />

from tourism. Government <strong>of</strong>ficials, business travelers,<br />

and tourists alike will benefit from a more convenient<br />

and efficient visa application process.<br />

Section 2 – Features and Benefits <strong>of</strong> the eVisa System<br />

Securiport’s eVisa Management System is a modern,<br />

comprehensive ICAO-compliant system that provides<br />

travelers with a quick, convenient and completely<br />

secure way to apply for a visa. It can be easily integrated<br />

and deployed to preexisting visa procedures and systems<br />

such as national centers and consulates, providing<br />

immediate support to immigration <strong>of</strong>ficials. Securiport’s<br />

s<strong>of</strong>tware engineers and cyber security pr<strong>of</strong>essionals have<br />

invested a substantial amount <strong>of</strong> time and resources<br />

into developing an absolutely secure system. When dealing<br />

with such sensitive information, it is imperative that<br />

proper research and precautions regarding security are<br />

taken. Securiport’s advanced proprietary systems and<br />

superior cyber security methods ensure that both travelers<br />

and government <strong>of</strong>ficials can use the eVisa Manage-<br />

Continued on next page<br />

17


ment System with full confidence. <strong>The</strong> system provides<br />

travelers with a secure application portal, which can<br />

be accessed at any time <strong>of</strong> day from virtually anywhere<br />

in the world via a web browser. This innovative system<br />

provides a multitude <strong>of</strong> benefits for both travelers and<br />

governments by providing an alternate method <strong>of</strong> applying<br />

for a visa. Not only does this new, virtual application<br />

method save government <strong>of</strong>ficials time and money by<br />

decreasing employee workloads and reducing lines at<br />

consulates and embassies, but it allows travelers to apply<br />

for a visa up to one day before travelling. This timeframe<br />

is a massive improvement over the current, erratic<br />

method that could leave travelers waiting two months<br />

for a visa. <strong>The</strong>re are many different circumstances in<br />

which someone may need to travel without an extended<br />

notice, and this new system will allow travelers to do so<br />

with ease. <strong>The</strong> eVisa system also provides travelers with<br />

an alternate application method if they are unable to<br />

mail in or hand deliver their application to the appropriate<br />

consulate or embassy. <strong>The</strong> eVisa Management System<br />

utilizes Securiport’s secure application portal, which<br />

can be accessed from any browser-based system. This<br />

includes, but is not limited to: computers, tablets, smart<br />

phones and kiosks conveniently located at consulates,<br />

embassies and immigration checkpoints. <strong>The</strong> system<br />

includes real-time background checks and watch-list vetting<br />

against national security and INTERPOL databases<br />

for all applicants and leverages Securiport’s Intelligent<br />

Information Management System (IIMS), which creates<br />

intelligent information reports based on traveler information<br />

and statistical data. <strong>The</strong> system is linked to a central<br />

visa database through a secure Internet connection<br />

and provides governments and immigration <strong>of</strong>ficials<br />

with the proper data and information needed to confirm<br />

a traveler’s identity with confidence at each stage <strong>of</strong> the<br />

immigration process. <strong>The</strong> eVisa Management System<br />

also pairs perfectly with Securiport’s Integrated Immigration<br />

Control System (IICS), which empowers border<br />

management and immigration <strong>of</strong>ficers by utilizing<br />

advanced biometric identification systems and providing<br />

proprietary intelligent information used to identify<br />

potential security risks and criminal activity. This can be<br />

very beneficial for countries such as Honduras, who are<br />

working towards improving the country’s tourism. By<br />

integrating these advanced security solutions, countries<br />

will be communicating to the world that they are taking<br />

an active role in enhancing traveler safety by investing<br />

into advanced security solutions for immigration ports.<br />

Securiport’s eVisa Management System is more timely,<br />

cost-effective, and efficient than the current application<br />

process. By saving travelers’ time and eliminating many<br />

<strong>of</strong> the hassles associated with obtaining a visa today,<br />

the system streamlines the visa application process,<br />

and inevitably increases the amount <strong>of</strong> visitors to countries,<br />

helping international business and boosting local<br />

economies.<br />

Section 3 – Details and Applications <strong>of</strong> eVisa Technolog<br />

y<br />

Securiport’s eVisa Management System provides travelers<br />

with a web-based application portal that <strong>of</strong>fers a<br />

quick, convenient, and secure way to apply for a visa.<br />

<strong>The</strong> system can be easily integrated and deployed to<br />

preexisting visa procedures and systems such as national<br />

centers and consulates. <strong>The</strong> traveler’s sole task is<br />

to fill out the application and submit a payment. Once<br />

an application and payment have been submitted, the<br />

applicant’s information is submitted to the IICS for<br />

background validation and vetted against IIMS Pr<strong>of</strong>iles<br />

to detect a Person <strong>of</strong> Interest. <strong>The</strong> applicant is compared<br />

against local watch lists, INTERPOL Notices and Stolen<br />

& Lost Travel Documents, as well as all previous traveler<br />

data. Once the applicant’s information has been processed<br />

and crosschecked, they will receive a notification<br />

depending on whether the application was approved or<br />

rejected. If the application is approved, an attachment<br />

18


will be sent with the notification that must be shown on<br />

arrival. On arrival, the Immigration Workstation Application<br />

provides the immigration <strong>of</strong>ficial with an extremely<br />

easy-to-use interface to process the traveler. <strong>The</strong> immigration<br />

<strong>of</strong>ficial scans the barcode <strong>of</strong> the attachment,<br />

which is then sent to the server for validation. If successfully<br />

validated, the immigration <strong>of</strong>ficial will continue the<br />

immigration process and begin to capture the traveler’s<br />

biometric information. <strong>The</strong> biometrics are stored with<br />

the traveler’s visa and immigration record and are validated<br />

when the travelers enter or leave the country. All<br />

<strong>of</strong> the traveler data and information collected is stored<br />

securely in Securiport’s IICS servers. Travelers who<br />

arrive to a country without a visa can utilize either the<br />

automated eVisa kiosks or the eVisa Application that is<br />

integrated with the Immigration Workstation Application<br />

to submit their information, biometrics and payment. All<br />

the information submitted is sent to the IICS and IIMS<br />

servers for validation and once complete, the approved<br />

visa is printed and the traveler is directed to immigration<br />

processing. eVisa applications can also be configured<br />

to be manually approved or rejected. Once the<br />

background validation has been completed, the application<br />

is ready for manual approval or rejection via the<br />

Visa Review Application. If approved, a notification is<br />

sent to the traveler with an attachment for them to provide<br />

on arrival. If the application is rejected, a notification<br />

is sent to the traveler informing them a visa cannot<br />

be issued and to contact the embassy or consulate for<br />

guidance. If more information is needed, a notification<br />

is sent to the traveler requesting them to update their<br />

application with the specific information needed.<br />

Section 4 – Strategic Benefits to Governments<br />

With an increase in the demand for international travel<br />

in our evolving global marketplace, it is necessary to<br />

have an efficient and effective system that simplifies<br />

the visa application process. Utilizing an eVisa system<br />

such as Securiport’s eVisa Management System, governments<br />

can prevent excessive hours waiting at visa desks,<br />

reduce the workload <strong>of</strong> staff working at airports, embassies<br />

and consulates, and provide easier facilitation for<br />

tourists and business travelers. By reducing the time and<br />

money it takes to apply for and issue visas, governments<br />

can only expect to see an increase in visa applications as<br />

well as the number <strong>of</strong> visitors, tourism and foreign trade<br />

revenue. Just recently, the Turkish government launched<br />

an e-Visa application system similar to Securiport’s eVisa<br />

Management System. Just weeks after implementing the<br />

e-Visa system, the Turkish government saw an increase<br />

in visa applications, going from a weekly average <strong>of</strong> 400<br />

applications to receiving more than 1,500 in just a few<br />

days [2] . <strong>The</strong> Turkish government hopes to develop and<br />

improve Turkey’s tourism and increase foreign trade<br />

with this eVisa reformation. By utilizing Securiport’s<br />

eVisa Management System that leverages their Integrated<br />

Immigration Control System (IICS) and Intelligent<br />

Information Management System (IIMS), governments<br />

and immigration <strong>of</strong>ficials can equip themselves with<br />

the actionable data and information needed to confirm<br />

a traveler’s identity at ports <strong>of</strong> entry and exit as well<br />

as at each stage <strong>of</strong> the immigration process. And with<br />

dynamic configurations, government <strong>of</strong>ficials can issue<br />

and manage any number <strong>of</strong> visa types required by their<br />

country.<br />

Section 5 – Summary and Conclusion<br />

Governments can derive great benefit from updating<br />

visa and immigration processes to leverage new technology<br />

that provides enhanced security and improved<br />

efficiency. Currently, the visa application process takes<br />

time, money and a high workload <strong>of</strong> the staff at airports,<br />

immigration checkpoints, embassies and consulates.<br />

Additionally, the time constraints <strong>of</strong> the current application<br />

process create multiple challenges and roadblocks<br />

for travelers who may need to apply for a visa very<br />

Continued on next page<br />

19


quickly. Securiport’s eVisa Management System can help<br />

governments, such as Honduras, better serve citizens<br />

and solve these challenges. By transitioning to an eVisa<br />

Management System, governments will be able to provide<br />

travelers with a quick and convenient way to apply<br />

for a visa and initiate their travel to the country while<br />

ensuring absolute security <strong>of</strong> sensitive information. By<br />

simplifying the visa application process, governments<br />

can expect the volume <strong>of</strong> visa applications and visitors<br />

will inevitably increase, further increasing the revenue<br />

generated from tourism. In addition, by implementing<br />

these advanced security solutions, governments will<br />

be showcasing to the rest <strong>of</strong> the world that they are<br />

invested in improving their security and immigration<br />

processes. With the ability to seamlessly integrate with<br />

preexisting visa procedures or systems, as well as Securiport’s<br />

Integrated Immigration Control System (IICS),<br />

the eVisa Management System provides governments<br />

and immigration <strong>of</strong>ficials with the necessary traveler<br />

data and information needed to confirm the traveler’s<br />

identity throughout the immigration process. This innovative<br />

system creates safer travels and a more secure<br />

nation that when coupled with Securiport’s IICS and<br />

IIMS; provide a complete immigration control system<br />

that is tailored to provide benefits to both travelers and<br />

governments.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.securiport.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.securiport.com/improving-travelersafety-with-advanced-security-immigrationsolutions-to-create-safer-nations/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Gal Borenstein, CEO<br />

Borenstein Group<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 703-385-8178 x28<br />

cell: 703-597-1610<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

gal@borensteingroup.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Borenstein Group, Inc.<br />

11240 Waples Mill Road Suite 420<br />

Fairfax, VA 22030<br />

20


Improving Traveler Safety with Advanced Security & Immigration Solutions to Create Safer Nations<br />

21


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Honeywell Security<br />

<strong>2015</strong> Winner<br />

Best Access Control/Identification<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical/Logical Priviledged Access Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Pro-Watch 4.2<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In high-security areas like government agencies, airports<br />

and major technology companies, many people<br />

come and go throughout the premises each day. With<br />

so many people in such high-pr<strong>of</strong>ile areas, safety is <strong>of</strong><br />

the utmost importance. Honeywell’s Pro-Watch 4.2 is<br />

a visitor management, access control, IP-video surveillance<br />

and intrusion system that enable security personnel<br />

to quickly and easily protect people and property.<br />

Designed to meet the challenges <strong>of</strong> today’s demanding<br />

environments, the Pro-Watch security management suite<br />

provides the flexibility, scalability and control required<br />

for comprehensive security management. Pro-Watch is<br />

fully compatible with a wide range <strong>of</strong> biometric readers<br />

and wireless locks, including options from Allegion (AD-<br />

400 Series), Assa Abloy (Aperio line) and Salto (Sallis<br />

and SVN). Its wireless lockset technology allows security<br />

personnel to install readers in typically hard-to-reach<br />

locations. <strong>The</strong> wireless readers are also less expensive to<br />

install, allowing users to implement access control in locations<br />

that may have been previously passed-over due<br />

to costs, resulting in a more-secure facility. <strong>The</strong> openplatform<br />

system makes it possible for security personnel<br />

to leverage existing hardware as the system expands.<br />

This allows users to save time and money as they upgrade<br />

their security systems. Pro-Watch is also capable<br />

<strong>of</strong> system conversions. A drop-in board replacement<br />

for Mercury-based systems allow for easy transitions<br />

from legacy readers and access equipment over to the<br />

updated platform without replacing existing hardware.<br />

Pro-Watch also lets security personnel access and man-<br />

22


age the system from any computer. <strong>The</strong> Pro-Watch Web<br />

Client uses existing network infrastructure to provide<br />

remote security management for badging, reporting<br />

and alarm and event monitoring. This flexible security<br />

management allows security personnel to provide<br />

remote security management across buildings, across<br />

campuses and even across the country to governmental<br />

sites like border controls. Pro-Watch is compatible with<br />

Honeywell’s Vindicator ® Intrusion Detection systems<br />

–commonly used at high-pr<strong>of</strong>ile, critical infrastructure<br />

government sites – and gives users control <strong>of</strong> intrusion,<br />

access control and video surveillance systems through<br />

one common interface. By equipping buildings systems<br />

with Pro-Watch 4.2, time and money, which were previously<br />

allocated to repairs and s<strong>of</strong>tware upgrades, can be<br />

eradicated. From airport campuses to government agencies,<br />

Pro-Watch 4.2 gives security managers the advanced<br />

security management platform they need to protect<br />

their premises from any security threat.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellsecurity.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellintegrated.com/products/<br />

integrated-security/sms/7757...<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Solveig Hommema, Assistant Account Executive<br />

Weber Shandwick<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 952-346-6050<br />

cell: 612-501-0949<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

shommema@webershandwick.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8000 Norman Center Drive, Suite 400<br />

Bloomington, MN 55437<br />

23


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Best Access Control/Identification<br />

STANLEY Access Technologies<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical/Logical Priviledged Access Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

4900 ASR Security Revolver<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

If you want to beat a criminal, you have to think like<br />

one. That’s exactly what the STANLEY engineers and<br />

product designers did when they conceptualized the<br />

4900 ASR Security Revolver. To bring our vision to<br />

life, we pulled together unparalleled industry-leading<br />

technology that ultimately created the new standard <strong>of</strong><br />

secure entryways, allowing our customers a safe environment<br />

and peace <strong>of</strong> mind. <strong>The</strong> 4900 ASR provides<br />

anti-tailgating and optional anti-piggybacking detection<br />

through the use <strong>of</strong> Time-<strong>of</strong>-Flight (TOF) technology.<br />

This anti-piggybacking detection is achieved through the<br />

self-contained infrared light sources and camera capturing<br />

the reflected light. An internal processor measures<br />

the time <strong>of</strong> reflected light and creates a depth image<br />

to analyze the objects within the revolving door. This<br />

allows the built-in processor to determine if one or two<br />

persons have entered into the security revolving door.<br />

<strong>The</strong> processor compares the images with image stored<br />

in memory to detect security violations.<br />

FEATURES AND BENEFITS<br />

• Prevents unauthorized entry, ensures a safe and secure<br />

internal environment for employees and property<br />

• Anti-Piggybacking TOF technology detects if two<br />

people are trying to enter into the secured facility at the<br />

same time using one door quadrant with a single authorization<br />

• Anti-Tailgating - TOF technology detects if an unauthorized<br />

person or persons are trying to enter into the<br />

secured facility using an empty quadrant without a valid<br />

24


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

StanleyAccess.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––:<br />

http://www.stanleyaccess.com/4900-automaticthree-wing<br />

authorization<br />

• TOF technology provides higher resolution and accuracy<br />

than other sensing systems and is not affected by<br />

ambient light or dark shadows and heavy dark objects<br />

(coats, carts, luggage, etc.) which can give false signals<br />

• Automatic operation, providing either one-way or<br />

two-way security options<br />

• STANLEY Rush collapsing mechanism for emergency<br />

egress from the building<br />

• PLC based programmable control integrates with all<br />

access systems<br />

• Collapsing wings release on activation <strong>of</strong> (fire) alarm<br />

(security) signal<br />

• Factory preset program provides safe, reliable door<br />

operation<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Adria Boyle, Brand Marketing Manager<br />

STANLEY Access Technologies<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (860) 679-6473<br />

cell: (860) 919-5279<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

adria.boyle@sbdinc.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Adria.Boyle@sbdinc.com<br />

25


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Best Detection Solutions<br />

Advanced Detection Technology, LLC<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Cargo/Vehicle Screening<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LowCam under-vehicle inspection systems (UVIS)<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Although there are others within our realm <strong>of</strong> manufacturing,<br />

our LowCam under-vehicle inspection systems<br />

(UVIS) are very unique in their approach to inspecting<br />

the undercarriage <strong>of</strong> incoming and outgoing vehicles.<br />

Basically, just as an overview, our UVIS technology<br />

replaces the mirrors that are commonly used when circling<br />

a vehicle and looking at the undercarriage. Instead<br />

we provide a camera system (much like CCTV) that a<br />

vehicle simply drives over, then the undercarriage image<br />

is instantly displayed on a monitor in a central control<br />

room or in a safe stand-<strong>of</strong>f location for a thorough, yet<br />

quick, inspection. While other solutions available on the<br />

market <strong>of</strong>fer only a black and white static, single image<br />

(imagine a photocopy), the LowCam UVIS <strong>of</strong>fers not<br />

only the single image viewing, but also full-color, real-<br />

time video so that the inspecting operator can view the<br />

vehicle’s undercarriage using play, pause, zoom, fastforward<br />

and rewind - much like a CCTV camera allows<br />

in other security operations. All vehicle data - including<br />

license plate information and/or driver image - gathered<br />

by the LowCam UVIS is stored in a centralized database<br />

for future review. All facilities can easily pull historical<br />

information to inquire on who is entering or leaving<br />

their facility, and if any security measures or breaches<br />

were detected. Besides capturing license plate and<br />

driver information, the most advanced UVIS are now<br />

equipped with a video-analytical tool known as “Foreign<br />

object Detection”. This s<strong>of</strong>tware scans quickly the approaching<br />

vehicle’s undercarriage for abnormal colors,<br />

sizes/shapes <strong>of</strong> objects and variations made to the<br />

26


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://advanced-detection-technology.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://advanced-detection-technology.com/resources/downloads<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Candace Carpenter, Gobal Marketing Director<br />

Advanced Detection Technology<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (704) 696-0708<br />

cell: (828) 308-2580<br />

undercarriage in order to automatically highlighting and<br />

alerting (using on-screen and visual queues) the operator<br />

<strong>of</strong> the potential danger these detected items could<br />

represent. Often used in conjunction with other vehicle<br />

screening and access control devices, such as bollards,<br />

stoplights and even the larger vehicle X-Ray inspection<br />

systems, our LowCam UVIS have been battle-tested<br />

and proven globally for over 12 years. Our company is<br />

proud to serve airports, seaports and border crossings<br />

around the world!<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cancarpenter@advanced-detection.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

215-1 Overhill Drive<br />

Mooresville, NC 28117<br />

27


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

SureScan Corporation<br />

<strong>2015</strong> Winner<br />

Best Detection Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Explosives/Narcotics/Contraband Detection<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

x1000 Multi-Energy Stationary Gantry CT Explosives<br />

Detection System for Checked Baggage Screening<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

TSA Certified x1000 Multi-Energy Stationary Gantry<br />

CT Explosives Detection System for Checked Baggage<br />

Screening SureScan Corporation Brings NEW Technology<br />

to the Market, Focused on Lower Life Cycle Costs <strong>The</strong><br />

SureScan x1000 checked baggage-screening solution,<br />

is engineered and designed with innovative technology<br />

and low maintenance and lifecycle costs. Built from the<br />

ground up for checked baggage screening rather than<br />

an adaptation <strong>of</strong> medical technology, the x1000 is suited<br />

to the airport environment and designed with a baggage-handling<br />

interface in mind. Unlike a medical environment,<br />

baggage-handling areas in airports are constrained,<br />

dusty environments with operation every day,<br />

365 days a year. <strong>The</strong> x1000 is designed to install and<br />

function seamlessly in this environment. <strong>The</strong> x1000 is<br />

TSA certified and currently being utilized in Department<br />

<strong>of</strong> Homeland Security research projects and undergoing<br />

ECAC Standard 3 approval. Features include: Stationary<br />

Gantry: No moving parts, low maintenance and replacement<br />

costs Large Rectangular Tunnel throughout: Fits<br />

tall and wide baggage, preventing costly bag jams and<br />

system downtime Multi-Energy Detection: For atomic<br />

number analysis detects current and emerging threats<br />

such as home made explosives (HMEs) with a high level<br />

<strong>of</strong> accuracy and low false alarm rates Efficient Platform:<br />

Easy to set up and self-calibrates Decreased Power Usage:<br />

50 percent lower operating power consumption<br />

and simple air-cooling eliminates pricey air condition<br />

operation and fees Upgradable Processing and Algorithm<br />

Engines: Field-upgradeable options to address<br />

28


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.surescaneds.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

TDS:http://surescaneds.com/pdf/<strong>2015</strong>0401_<br />

SSx1000TDSE.pdf; FOX NEWS REPORThttp://<br />

video.foxnews.com/v/4072808566001/new-technology-set-to-revolutio...<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Susan Cooper, Director <strong>of</strong> Marketing<br />

SureScan Corporation<br />

future requirements, such as increased belt speeds,<br />

lower false alarm rates, and future threats SureScan<br />

Corporation is an emerging leader and global company<br />

bringing advanced, explosive detection technology and<br />

superior manufacturing to the homeland security marketplace.<br />

SureScan sits firmly as a leading edge developer<br />

<strong>of</strong> security technology, providing solutions that meet<br />

the most rigorous quality and performance standards<br />

while remaining efficient and cost-effective.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 973-830-6798<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

susan.cooper@surescaneds.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

PO Box 210, 2507 Wayne Street, Endicott, NY 13760<br />

Visit www.surescaneds.com for the full technical data<br />

sheet download and to contact us for an overview <strong>of</strong> the<br />

x1000 solution.<br />

info@surescaneds.com<br />

+1 (607) 321-0042<br />

www.surescaneds.com<br />

29


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Rapiscan Systems<br />

<strong>2015</strong> Winner<br />

Best Detection Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Nuclear/Radiation Detection<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rapiscan Systems<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rapiscan Systems, a leading provider <strong>of</strong> security screening<br />

solutions, is well known for the high quality, reliability<br />

and affordability <strong>of</strong> its solutions. With products<br />

sold into four market segments, including Baggage and<br />

Parcel Inspection, Cargo and Vehicle Inspection, Hold<br />

Baggage Screening and People Screening, the company<br />

has a solution for the most demanding threat detection<br />

situations its customers could face. An important<br />

part <strong>of</strong> Rapiscan’s product portfolio is its radiation<br />

detection product line, which addresses the need for<br />

global governments and organizations to monitor and<br />

locate radioactive threat materials that can be used in<br />

atomic weapons and dirty bombs. <strong>The</strong> product line is<br />

comprised <strong>of</strong> s<strong>of</strong>tware and hardware based solutions<br />

for inspecting vehicles, packages and people. Radiation<br />

detection products can be used in a standalone deployment<br />

or integrated with Rapiscan’s X-ray and metalbased<br />

threat detection solutions. <strong>The</strong> newest addition to<br />

Rapiscan’s radiation detection product line is the Rapiscan<br />

MP100 Backpack Radiation Detection system. A high<br />

performance, easy to use radiation monitor combining<br />

gamma and optional neutron detection is housed in<br />

a lightweight, compact commercial backpack, making<br />

the system perfect for covert inspection situations. <strong>The</strong><br />

MP100 is ideal for supporting security operations and<br />

performing radiation surveys in a variety <strong>of</strong> markets –<br />

including critical infrastructure, customs and border<br />

control, event security, defense and law enforcement<br />

applications. All <strong>of</strong> the features required for radiation<br />

detection are integrated in the MP100 so it can be used<br />

30


as a standalone device and connected wirelessly to a<br />

Rapiscan oversight system for remote data collection<br />

and display. Using the MP100 is as easy as slipping<br />

the backpack on and walking around. Weighing just<br />

18 pounds, the MP100 is lightweight and easy to use.<br />

Additionally, the onboard battery enables 16 hours <strong>of</strong><br />

continuous operation in a wide range <strong>of</strong> environments.<br />

<strong>The</strong> Rapiscan RadviewerTM Android app displays the<br />

operator’s current position and direction toward the<br />

radiation source. <strong>The</strong> design <strong>of</strong> the MP100’s radiation<br />

detectors provides increased directional sensitivity <strong>of</strong><br />

the radiation detection. A radiation alarm is signaled audibly<br />

via a headphone jack on the backpack or visually<br />

via RadviewerTM. In this way, the MP100 enables users<br />

to effectively detect and locate radioactive threats. <strong>The</strong><br />

MP100 is manufactured by Rapiscan’s Radiation Detection<br />

Products division, which has supplied thousands <strong>of</strong><br />

radiation monitors that are deployed at border crossings,<br />

seaports, airports and facilities around the world.<br />

<strong>The</strong> MP100 uses Rapiscan’s proven radiation detection<br />

technology adapted for a backpack deployment. <strong>The</strong><br />

radiation detection performance meets the requirements<br />

<strong>of</strong> ANSI N42.53. <strong>The</strong> MP100 <strong>of</strong>fers customers<br />

efficient, easy to use and reliable man-portable radiation<br />

detection with high performance at an affordable cost <strong>of</strong><br />

acquisition and operation.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.rapiscansystems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.rapiscansystems.com/en/products/<br />

radiation_detection<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Jennifer Edgerly, Senior Account Director,<br />

SpeakerBox Communications<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 703-287-7809<br />

cell: 202-486-0518<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

jedgerly@speakerboxpr.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

7900 Westpark Drive, Suite T410, McLean, VA<br />

31


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

PureTech Systems<br />

<strong>2015</strong> Winner<br />

Best Communications Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best MOB Tracking and/or Wrist Devices<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Man Overboard Detection System<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Man Overboard events continue to be a common occurrence<br />

in the cruise industry and other related markets.<br />

<strong>The</strong> problem is compounded by the fact that when<br />

these events occur the timely availability <strong>of</strong> important<br />

data is missing. Accurate confirmation <strong>of</strong> the event<br />

including time <strong>of</strong> occurrence, location on the ship and<br />

location in the sea is critical, but <strong>of</strong>ten unavailable for<br />

hours following an occurrence, if at all. Fortunately,<br />

proactive detection systems such as the Man Overboard<br />

Detection System from PureTech Systems, accurately<br />

detects man overboard events and provides immediate,<br />

actionable data to response personnel. We feel such a<br />

system deserves award consideration for its potential<br />

to save lives within the cruise line and ocean platform<br />

industries.<br />

ACCURATE VIDEO DETECTION<br />

<strong>The</strong> system utilizes commercially available infrared imagers<br />

combined with PureTech’s geospatial video analytics,<br />

which not only provide instant visual pro<strong>of</strong> <strong>of</strong> an event,<br />

but also achieves detection rates over 99% in various<br />

ranges <strong>of</strong> sea states and weather conditions. Detection<br />

coverage encompasses the length <strong>of</strong> ship, including all<br />

passenger floor levels and is accurate for both cold and<br />

warm water cruise routes.<br />

FIELD PROVEN FOR LOW FALSE ALARMS<br />

Almost as important as detection accuracy, false alarms<br />

from weather conditions and cruise operations can minimize<br />

the effectiveness <strong>of</strong> detection systems. <strong>The</strong> Man<br />

Overboard Detection System from PureTech Systems was<br />

32


subjected to hundreds <strong>of</strong> hours <strong>of</strong> real world environmental<br />

and operational conditions on actual cruise<br />

ships and the results demonstrated accurate detection<br />

(i.e. approaching 100%) with little to no false alarms.<br />

SITUATIONALLY AWARE USER INTERFACE<br />

Use <strong>of</strong> geospatial data within the detection algorithms<br />

allows for a user interface that is easy to understand and<br />

simple to use. In situations, such as a man overboard<br />

events, providing a high level <strong>of</strong> situational awareness<br />

aids first responders in gaining a full understanding<br />

<strong>of</strong> the event as quickly as possible. This is achieved<br />

through geolocation <strong>of</strong> the alarm location, instant access<br />

to detection images, looping videos <strong>of</strong> the event, as well<br />

as audio notification. <strong>The</strong> system includes a full alarm<br />

database and video playback capability.<br />

HIGHLIGHTS<br />

• Automatic Detection <strong>of</strong> Man Overboard Events<br />

• 99%+ detection rates over wide variations in sea state<br />

and weather conditions.<br />

• Very Low False Alarm rate<br />

• Instant video validation <strong>of</strong> event for immediate action<br />

• Reporting <strong>of</strong> event latitude and longitude (i.e. location<br />

in the sea)<br />

• Fall origin guidance (i.e. location on the ship)<br />

• Alarm and Video Retention and Review<br />

• Situational presentation <strong>of</strong> incident data to decision<br />

makers<br />

• In Service Installation<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.puretechsystems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.puretechsystems.com/man-overboard-detection.html<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Eric Olson, VP <strong>of</strong> Marketing<br />

PureTech Systems,<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 602-424-9842 X112<br />

cell: 480-522-6331<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Eric.olson@PuretechSystems.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1950 W Rose Garden Lane #140<br />

Phoenix, AZ 85027<br />

33


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

LRAD Corporation<br />

<strong>2015</strong> Winner<br />

Best Communications Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Mass Notification System<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LRAD 360X<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

During large events or area emergencies, the ability<br />

to broadcast crystal clear voice messages is crucial for<br />

communicating to, and ensuring the safety <strong>of</strong>, those attending<br />

events and the public. <strong>The</strong> LRAD 360X delivers<br />

LRAD ® ’s renowned, highly intel¬ligible voice broadcasts<br />

and warning siren with uniform 360° coverage.<br />

Each lightweight, power efficient LRAD 360X emitter<br />

array broadcasts uninterrupted clear voice messages<br />

and warning sirens over a 1.3-kilometer radius. Featuring<br />

LRAD’s optimized driver and waveguide technology,<br />

LRAD 360X ONE VOICE mass notification &<br />

communication systems ensure every voice broadcast<br />

cuts through wind, engine and crowd noise, and is<br />

clearly heard and understood throughout an event or<br />

emergency. Featuring the industry’s highest level <strong>of</strong><br />

intelligibility and quality <strong>of</strong> sound, the LRAD 360X <strong>of</strong>fers<br />

true continuous activation and maintains a smooth<br />

frequency response with an intensity variation <strong>of</strong> less<br />

than 5 dB over in the range between 300 Hz and 6.5<br />

kHz. <strong>The</strong> 360X avoids audio fading and <strong>of</strong>fers clear communication<br />

across all frequencies over distance. LRAD<br />

360X systems can be mounted on buildings and/or<br />

stand-alone poles, and are rugged enough to withstand<br />

up to 200 mph winds. <strong>The</strong> 360X is field upgradeable for<br />

added area coverage and features flexible power options<br />

including AC only, AC/DC for true UPS, generator, and/<br />

or solar. Single or multiple systems can be integrated<br />

for remote activation and operation via TCP/IP, satellite,<br />

GPRS/GSM, and/or redundant analog or digital radio<br />

control interface. LRAD ONE VOICE systems can be<br />

34


activated on site or remotely. LRAD 360X - Highly Intelligible<br />

Mass Notification & Communication Until recently,<br />

voice communication had been an afterthought for most<br />

mass notification systems. While high power speaker<br />

arrays sound sirens to alert <strong>of</strong> approaching danger,<br />

most are incapable <strong>of</strong> broadcasting specific information<br />

about the severity <strong>of</strong> the situation or recommended<br />

actions that could protect and save lives. LRAD 360X<br />

systems broadcast with exceptional intelligibility and<br />

vocal clarity to provide authorities ONE VOICE to communicate<br />

potentially lifesaving information over local<br />

or large areas before, during, and in the aftermath <strong>of</strong> an<br />

emergency or disaster. LRAD systems are self-contained<br />

and do not rely on external power or communication<br />

infrastructure. LRAD 360X systems and accessories have<br />

been installed in a number <strong>of</strong> Asian countries replacing<br />

and upgrading their mass notification systems to include<br />

LRAD’s highly intelligible voice capability.<br />

FEATURES<br />

• Fully ruggedized space saving 1RU amplifier modules<br />

• Low power consumption for continuous operation<br />

during extended power outages<br />

• Unparalleled vocal clarity and intelligibility<br />

• Combined P.A. and mass notification in one system<br />

• Safely alerts, communicates and calms the public during<br />

emergency situations<br />

• Audio output easily modulated<br />

• Does not require heavy equipment for installation,<br />

reducing installation costs<br />

• Comes standard with LRAD’s hardened MP3 Controller/Player<br />

for recording, storing and playing back messages,<br />

and push button system control<br />

• All-weather microphone to record and playback messages<br />

on the fly<br />

LRAD Corporation www.LRADX.com<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lradx.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lradx.com/lrad_products/lrad-360x/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

E. Brian Harvey, Director Capital Markets and Investor<br />

Relations<br />

LRAD Corporation<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 858-676-0519<br />

cell: 858-753-8974<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ebharvey@lradx.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LRAD Corporation<br />

16990 Goldentop Road, Suite A<br />

San Diego, CA 92127<br />

35


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

LRAD Corporation<br />

<strong>2015</strong> Winner<br />

Best Communications Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Acoustic Hailing Service<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LRAD ® 450XL<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> Industry’s Loudest, Most Intelligible AHD for its<br />

Size & Weight LRAD Corporation’s LRAD 450XL is the<br />

communication industry’s loudest, most intelligible<br />

acoustic hailing device (AHD) for its size and weight.<br />

Low pr<strong>of</strong>ile, lightweight and designed for temporary<br />

or fixed mounting on tripods, vehicles and vessels, the<br />

LRAD 450XL uses an enhanced, patent pending technology<br />

to generate the audio output <strong>of</strong> a unit almost twice<br />

its size and weight with the same high level <strong>of</strong> clarity<br />

and intelligibility consistent with the LRAD product<br />

line. <strong>The</strong> LRAD 450XL is easily transported to provide a<br />

highly effective, long range communication and warning<br />

capability where required, and is rapidly being adopted<br />

for public safety and national defense applications<br />

around the world. Featuring LRAD’s optimized driver<br />

and waveguide technology, the LRAD 450XL ensures<br />

every broadcast cuts through wind, engine and background<br />

noise and is clearly heard and understood even<br />

inside vehicles and buildings. Through the use <strong>of</strong> live<br />

or pre-recorded multilingual voice messages and alert<br />

tones, LRAD systems establish large safety zones, unequivocally<br />

determine intent, favorably resolve uncertain<br />

situations and save lives on both sides <strong>of</strong> the Long<br />

Range Acoustic Device ® . <strong>The</strong> LRAD 450XL provides<br />

highly intelligible communication up to 1,700 meters<br />

and safely communicates beyond stand<strong>of</strong>f distances to<br />

determine intent, create an instant acoustic stand<strong>of</strong>f<br />

perimeter, and provide time for appropriate responses.<br />

<strong>The</strong> LRAD 450XL also uses variable beam width for extended<br />

coverage, providing clear, long range, directional<br />

36


communication. As part <strong>of</strong> field and special response<br />

team operations, the LRAD 450XL safely extends the<br />

perimeter in friendly or escalated environments keeping<br />

the public, law enforcement and national defense<br />

personnel out <strong>of</strong> harm’s way.<br />

<strong>The</strong> LRAD 450XL is also used to:<br />

• Communicate to large crowds during parades, festivals,<br />

concerts and sports events<br />

• Establish safety zones and humanely enforce perimeters<br />

• Control traffic congestion<br />

• Conduct SWAT operations<br />

• Disperse crowds<br />

• End hostage and barricaded subject situations<br />

• Serve high risk warrants<br />

• Extract inmates safely from cells<br />

• Secure jails, prison yards and facility perimeters<br />

• Communicate to protesters<br />

• Stop threatened suicides<br />

• Evacuate neighborhoods during emergencies and<br />

disasters<br />

• Conduct search & rescue operations from the land<br />

and air<br />

• Communicate potentially lifesaving information to<br />

affected populations throughout disasters<br />

Law enforcement agencies and first responders around<br />

the world, including over 100 U.S. cities, counties and<br />

states, are currently using LRAD systems and support<br />

equipment. LRAD Corporation www.LRADX.com<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lradx.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lradx.com/lrad_products/lrad-450xl/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

E. Brian Harvey, Director Capital Markets and Investor<br />

Relations<br />

LRAD Corporation<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 858-676-0519<br />

cell: 858-753-8974<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ebharvey@lradx.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LRAD Corporation<br />

16990 Goldentop Road, Suite A<br />

San Diego, CA 92127<br />

37


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

TCOM, LP<br />

<strong>2015</strong> Winner<br />

Best Surveillance Systems<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Coastal Surveillance Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

71M Low Altitude Surveillance System<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Maintaining continuous aerial security is a daunting information needed to secure the skies.<br />

task. Threats such as low-flying, extremely fast aircraft<br />

can take advantage <strong>of</strong> the earth’s curvature and exploit SURVEILANCE FOR COASTS OF THE U.S.<br />

terrain obstructions. This renders ground-based radars AND ITS ALLIES VIA AEROSTATS<br />

unable to provide target information in time to take Now, specifically, given the recent terroristic threats<br />

appropriate action. Slow, low flying missiles with a small from terrorists attacking with small suicide boats large<br />

cross section may also avoid early detection and pose a U.S. ships, pirates taking over commercial fleets, to<br />

significant threat. Manned aerial surveillance can decrease<br />

the risk for short periods <strong>of</strong> heightened alert, but immigration and drug smuggling via oceans and wa-<br />

protecting the borders <strong>of</strong> the United States from illegal<br />

the operational costs are much too high for extended terways, to detecting threats, persistent surveillance <strong>of</strong><br />

use. To meet this airborne coverage challenge effectively TCOM’s aerostats have become a staple in what Homeland<br />

Security and US Military have been using here and<br />

and inexpensively, TCOM developed the 71M Low<br />

Altitude Surveillance System. With over 1,000,000 hours in the Gulf. Monitoring territorial waters on a round-theclock<br />

basis while providing intelligence in time to take<br />

<strong>of</strong> operation these systems are the only operational<br />

airborne defense assets to routinely provide the continuous<br />

round-the-clock, low altitude target detection Ground-based and shipboard systems have a limited<br />

appropriate action is a major challenge to many nations.<br />

38


ange against surface targets, while continuous use<br />

<strong>of</strong> aircraft is prohibitively expensive. Nations need an<br />

effective and affordable system that <strong>of</strong>fers continuous,<br />

wide-area maritime surveillance and timely provision <strong>of</strong><br />

target information. TCOM Sea surveillance systems use<br />

persistent surveillance medium-class tethered aerostats,<br />

equipped with an advanced maritime radar, thermal<br />

imaging and optical sensors, and communications payloads<br />

that detect and track maritime targets at distances<br />

<strong>of</strong> 60 nautical miles and beyond. A single sea surveillance<br />

system can cover thousands <strong>of</strong> square miles for<br />

weeks at a time at the lowest possible hourly cost for an<br />

airborne asset. <strong>The</strong> early detection and direct communications<br />

with air and sea assets affords the critical window<br />

<strong>of</strong> time to evaluate the situation, coordinate forces<br />

and engage, if required. <strong>The</strong> versatility <strong>of</strong> the sea surveillance<br />

system makes it ideal for responding to requirements<br />

or threats that change rapidly. <strong>The</strong> system is fully<br />

transportable and can be easily relocated with no site<br />

preparation. Although fully mature, the system can be<br />

shaped to better meet the needs <strong>of</strong> the client. Additional<br />

capabilities such as passive surveillance and remote data<br />

linking can be included. View TCOM’s innovative solution<br />

video right here: https://youtu.be/6KkZCycrdkU<br />

About TCOM<br />

With headquarters in Columbia, Maryland and operations<br />

in over 12 countries around the world, TCOM is<br />

the global authority in airborne persistent surveillance<br />

solutions. For over 40 years, TCOM innovations have<br />

defined the industry, and our pioneering achievements<br />

continue to revolutionize the design, manufacture and<br />

deployment <strong>of</strong> LTA systems. With corporate headquarters<br />

in Columbia, MD and manufacturing and testing<br />

facilities in Elizabeth City, NC, TCOM is the world’s<br />

only company solely devoted to the design, fabrication,<br />

installation and operation <strong>of</strong> persistent surveillance<br />

aerostat systems. Our complete platform solutions<br />

include numerous classes <strong>of</strong> aerostats that can each be<br />

equipped with a broad selection <strong>of</strong> proven payloads that<br />

are customizable for specific customer requirements.<br />

View TCOM’s corporate capability: https://youtu.be/<br />

i_7GjO9iH7g An illustration <strong>of</strong> the expanding maritime<br />

threat in U.S. allied countries, is in this release: http://<br />

www.tcomlp.com/tcom-president-ron-bendlin-signsmou-with-bintang-kencana-in-presence-<strong>of</strong>-malaysianprime-minister-dato-sri-mohd-najib-tun-hj-abdul-razakin-providing-aerostat-systems-to-improve-maritime-sec/<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.tcomlp.com/our-company/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.tcomlp.com/sea-surveillance-systems/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Gal Borenstein, CEO<br />

Borenstein Group<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 703-385-8178 x28<br />

cell: 703-597-1610<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

gal@borensteingroup.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Borenstein Group 11240 Waples Mill Road Suite 420<br />

Fairfax, VA 22030<br />

39


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Honeywell Security<br />

<strong>2015</strong> Winner<br />

Best Surveillance Systems<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Video Analytics/Intrusion Detection<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

MAXPRO Cloud<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

National security efforts keep citizens safe and secure,<br />

whether in airports or at sea. With multiple sites, locations<br />

and checkpoints, it’s important to recognize how<br />

complex national security can be; as such, airports,<br />

and seaports need even-more intuitive and streamlined<br />

ways to manage their security systems. MAXPRO Cloud<br />

is an integrated, cloud-based video and access management<br />

system that enables organizations to significantly<br />

streamline multi-site management, providing access<br />

from anywhere, anytime. Designed for multi-site facilities,<br />

it allows owners to easily manage their facilities’<br />

security system all through one user-friendly interface.<br />

In these high-security areas, it’s imperative that security<br />

procedures are strong enough to keep threats at bay but<br />

easy enough to seamlessly manage multiple areas at the<br />

same time. Honeywell’s user experience design team<br />

crafted the MAXPRO Cloud interface to streamline ease<br />

<strong>of</strong> use. <strong>The</strong> single sign-on enables control <strong>of</strong> all facets<br />

<strong>of</strong> the system after entering one set <strong>of</strong> credentials. <strong>The</strong><br />

smart dashboard allows users to easily manage their<br />

systems, from granting or rescinding access permissions<br />

and unlocking site-specific doors to reviewing access<br />

logs and captured video to evaluate a potential alarm<br />

event. MAXPRO Cloud also integrates with Google Maps<br />

to provide a visual, map-based depiction <strong>of</strong> physical<br />

sites. This enhances ease <strong>of</strong> use by simplifying multisite<br />

management. For example, an airport operations and<br />

security manager can access a map <strong>of</strong> every building on<br />

an airport campus and inspect which airport employees<br />

have credentials for which checkpoints (perhaps an<br />

40


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellsecurity.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.maxprocloud.com/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Solveig Hommema, Assistant Account Executive<br />

Weber Shandwick<br />

airline security screener is given access to ten <strong>of</strong> the 15<br />

checkpoints but an aircraft mechanic only needs access<br />

to a single checkpoint). <strong>The</strong> ability to visually manage<br />

multisite locations removes the need for the manager to<br />

remember which location is assigned to which system<br />

ID and lets the manager quickly view and modify access<br />

permissions to specific sites. <strong>The</strong> flexibility and scalability<br />

<strong>of</strong> MAXPRO Cloud makes it applicable to a wide range<br />

<strong>of</strong> applications, from a maritime port <strong>of</strong> two buildings to<br />

a major international airport. This customization allows<br />

aviation, maritime and other national security facilities<br />

to use access and video surveillance services proportionate<br />

to the size <strong>of</strong> their precincts. MAXPRO Cloud<br />

provides proactive system health reports and alerts to<br />

the dealer and user, enabling the dealer to actively address<br />

issues as they arise instead <strong>of</strong> reactively responding<br />

to failed hard drives, cameras that have lost video<br />

or equipment that has stopped working. This constant<br />

vigilance helps to prevent security breaches before they<br />

have a chance to occur, resulting in improved security.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 952-346-6050<br />

cell: 612-501-0949<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

shommema@webershandwick.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8000 Norman Center Drive, Suite 400<br />

Bloomington, MN 55437<br />

41


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

CohuHD Costar<br />

<strong>2015</strong> Winner<br />

Best Surveillance Systems<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Long-Range/Day-Night Surveillance<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CohuHD Costar’s 8800HD Series<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CohuHD is a leader in rugged, outdoor video surveillance<br />

cameras for critical infrastructure environments.<br />

<strong>The</strong> 8800HD Series combines full HD image resolution<br />

with high-powered performance lens optics for delivering<br />

unprecedented image quality and detail for longrange<br />

surveillance applications.<br />

<strong>The</strong> 8800HD Series long-range camera system <strong>of</strong>fers an<br />

unprecedented feature set:<br />

• First truly long-range high-definition camera positioner<br />

• Powerful HD optical zoom magnification, up to 137x<br />

• Industry’s narrowest HAFOV with HD resolution, as<br />

low as 0.17° degrees<br />

• Boresighted optics with programmable day/night<br />

focusing<br />

• Greatest detection distances on the market, humansized<br />

objects detected at distances up to 30 miles (based<br />

on Johnson Criteria with optimum conditions)<br />

• First long-range HD camera positioner with built-in<br />

H.264 compression and web server, operating over standard<br />

digital networks<br />

• Precision positioning with speed range <strong>of</strong> 0.05° to<br />

45°/second, and with built-in brakes for stability<br />

• Highest environmental standards: IP67, ASTM-B117,<br />

TS-2 Shock & Vibe, and MIL-STD-810F for salt/fog, immersion<br />

and sand/dust CohuHD’s 8800HD Series can<br />

deliver up to 6 times the resolution and detail <strong>of</strong> traditional<br />

standard-definition long-range camera systems.<br />

42


With this exceptional performance, the 8800HD is ideal<br />

for:<br />

• Border patrol<br />

• Airports<br />

• Seaports<br />

• Military<br />

• Perimeter security<br />

• Maritime<br />

• Other critical infrastructure environments<br />

In addition to superior image quality and excellent longrange<br />

zoom optics, the 8800HD system delivers its HD<br />

video across standard digital network infrastructures. It<br />

does this by using H.264 image compression technology,<br />

which requires a fraction <strong>of</strong> the bandwidth traditional<br />

MPEG4 or MJPEG requires. <strong>The</strong> 8800HD superior<br />

image quality is generated by a 1/2.7” CMOS 1080p30<br />

progressive scan day/night sensor. Image performance<br />

and color reproduction are superb even under challenging<br />

lighting conditions. In night mode, the camera<br />

enhances low light viewing by automatically switching<br />

the IR filter out <strong>of</strong> the optical path, delivering a monochrome<br />

image. Long-range surveillance is achieved by<br />

the integrated 60x HD-quality zoom lens optics, with<br />

focal length ranging from 16.7 mm to 1,000mm. <strong>The</strong><br />

lens includes a remotely controlled 2x optical extender<br />

which can be inserted in the optical path, increasing the<br />

maximum focal length to 2,000mm. Horizontal Angular<br />

Field Of View as low as 0.17 is achieved at full zoom<br />

with extender inserted. <strong>The</strong> 8800HD provides a fullfunction<br />

web server, enabling complete administrative<br />

and operator control. Administrative features include<br />

configuring network settings, assigning user passwords,<br />

setting video streaming properties, defining camera<br />

positioning presets and tours, and assigning camera ID<br />

labels. <strong>The</strong> 8800HD is designed to operate in extreme<br />

weather, with its IP67 sealed and pressurized enclosure<br />

Continued on next page<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.Cohuhd.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CohuHD Costar’s 8800HD Series:<br />

http://www.cohuhd.com/content/8800hd<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dana Varga, Marketing Manager<br />

CohuHD Costar<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 858-391-1712<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

dvarga@cohuhd.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

12367 Crosthwaite Circle<br />

Poway, CA 92064<br />

43


protection. This eliminates the effects <strong>of</strong> water intrusion,<br />

pollutants and corrosives. It is designed to operate<br />

in a broad temperature range, from winter in the Arctic<br />

to summer in the desert, with heaters and fans, and<br />

electrical and mechanical components that are rated<br />

for the full range. CohuHD has proudly manufactured<br />

its products in the USA for more than 50 years. <strong>The</strong><br />

8800HD is installed and protecting marquee projects<br />

around the world including the Port <strong>of</strong> Corpus Christi,<br />

Integrated Fixed Towers (IFTs) at the Jordan Border and<br />

the USS Ponce.<br />

<strong>The</strong> 8800HD Series long-range camera system <strong>of</strong>fers an<br />

unprecedented feature set:<br />

• First truly ultra long-range high-definition camera<br />

positioner<br />

• Powerful HD zoom magnification <strong>of</strong> up to 2,000mm<br />

• Industry’s narrowest HAFOV with HD resolution, as<br />

low as 0.17 degrees<br />

• Boresighted optics with programmable day/night<br />

focusing<br />

• Greatest detection distances on the market, humansized<br />

objects detected at distances up to 30 miles (based<br />

on Johnson Criteria with optimum conditions)<br />

• First long-range HD camera positioner with built-in<br />

H.264 compression and web server, operating over standard<br />

digital networks<br />

• Precision positioning with speed range <strong>of</strong> 0.05 to 45/<br />

second, and with built-in brakes for stability<br />

• Highest environmental standards: IP67, ASTM-B117,<br />

TS-2 Shock & Vibe, and MIL-STD-810F for salt/fog, immersion<br />

and sand/dust<br />

44


45


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Betafence USA<br />

<strong>2015</strong> Winner<br />

Best Perimeter Protection, Fencing, Gates, Guard Booths<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Fencing<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Guardian Fence System ®<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> reason Betafence USA should win the Best Fencing,<br />

Barriers, Bollards, Gates award is due to the Guardian<br />

Fence System ® . It is the original modular steel security<br />

fence solution, providing high strength protection.<br />

<strong>The</strong> patented design allows a variety <strong>of</strong> configurations,<br />

from medium security to high security fencing and<br />

partitions. We also <strong>of</strong>fer more than 40 available security<br />

mesh panel styles. <strong>The</strong> Guardian Fence System ® also<br />

<strong>of</strong>fers the greatest range <strong>of</strong> security solutions, from<br />

perimeter fencing, partitioning, visual screening barriers<br />

and pedestrian and vehicular gates. <strong>The</strong> Guardian<br />

Fence System ® configurations include: Guardian 5000<br />

(high security) and Guardian 7000 (ultra-high security).<br />

For high security fencing applications, the Guardian<br />

Fence System ® features an exceptional “Smart Fence”<br />

trenchless integration design, providing a steel conduit/<br />

raceway within the fence system for intrusion detection,<br />

surveillance, access control and communication, fiber<br />

optics and cabling, shielding them from view, weathering<br />

and vandalism. <strong>The</strong> system is also capable <strong>of</strong> incorporating<br />

restrictive components such as barbed tape<br />

concertina and either cable-based or rail-based vehicular<br />

anti-crash resistance. Fences can be easily upgraded<br />

without removing existing posts; exact spacing <strong>of</strong> posts<br />

is not a requirement <strong>of</strong> the Guardian Fence System ® .<br />

This system is also capable <strong>of</strong> employing a dual layer <strong>of</strong><br />

46


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.betafenceusa.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.betafenceusa.com/ProductLine.<br />

aspx?Id_ProductLine=24&Tab=Intro<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Debbie Corkin, Controller<br />

Betafence USA<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 972-878-7000<br />

security mesh panels - either the same type, or two different<br />

types that may be complementary in nature based<br />

on the application. <strong>The</strong> Guardian system can also use<br />

one type mesh style at the bottom <strong>of</strong> the barrier, and an<br />

alternate type arranged vertically based on a particular<br />

purpose. By design, the Guardian Fence System ® can<br />

also be installed more quickly, and at less expense, than<br />

other fence solutions providing similar levels <strong>of</strong> security.<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

dcorkin@betafenceusa.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

3309 SW Interstate 45 Ennis<br />

TX 75119<br />

47


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Tilt-A-Way<br />

<strong>2015</strong> Winner<br />

Best Perimeter Protection, Fencing, Gates, Guard Booths<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Perimeter Protection, Fencing, Gates, Guard<br />

Booths<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Tilt-A-Way vertical pivot gates<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Tilt-A-Way vertical pivot gate is a perfect fit in the Airport,<br />

Seaport and Border security industry. <strong>The</strong> Tilt-A-<br />

Way gate is installed in many <strong>of</strong> the gated areas <strong>of</strong> the<br />

Airport, Seaport and Border Patrol facilities. with it’s<br />

quick open and close activation cycle time. Tilt-A-way<br />

keeps any facility a safer place preventing tailgating <strong>of</strong><br />

multiple vehicles. Another great feature <strong>of</strong> a Tilt-A-Way<br />

gate. Being that it pivots from a horizontal position into<br />

itself in the vertical position so it requires a smaller footprint<br />

therefore leaving more real estate for structures<br />

or more parking spaces. Tilt-A-Way also <strong>of</strong>fers a full line<br />

<strong>of</strong> anti-Terrorist crash gates such as the M-50, M-40 and<br />

M-30 crash tested gates. Tested at the Texas Transportation<br />

institute. <strong>The</strong> M-50 is tested with a 15,000 pound<br />

truck traveling 50 MPH. At this weight and speed the<br />

gate is engineered to withstand the hit and not let the<br />

vehicle penetrate through the gate.<br />

48


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.tiltaway.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.idealmanufacturing.biz<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Ideal Manufacturing<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 406-656-4360<br />

cell: 406-670-3746<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

daveh@idealmfginc.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

2011 Harnish Blvd<br />

Billings, Mt 59101<br />

49


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Best Perimeter Protection, Fencing, Gates, Guard Booths<br />

Global Elite Group<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Guard Service, Facility Protection Service<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Global Elite Group<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Since its inception, Global Elite Group (GEG) has been<br />

committed to providing security services and solutions<br />

to the aviation industry. GEG recognizes potential<br />

threats to aviation security before they occur, providing<br />

guidance with programs to develop secure operational<br />

processes and procedures, both on the ground and in<br />

the air. Ever since the events that occurred on September<br />

11, 2001, threats against the airline industry have<br />

been highly publicized, and concerns continue to be<br />

raised over the safety at our nation’s airports. Assisting<br />

airports and carriers in developing their own unique security<br />

initiatives and processes is accomplished through<br />

a comprehensive security management program developed<br />

by GEG covering internal and external operations.<br />

<strong>The</strong> customized program tackles not only the security<br />

lapses but provides a thorough review <strong>of</strong> current operations<br />

and implementation <strong>of</strong> specifically designed practices.<br />

Each location has unique requirements, therefore,<br />

an assessment would be recommended. Most locations<br />

benefit from having security systems reviewed, updated<br />

if necessary, and adding physical security components.<br />

<strong>The</strong> combination <strong>of</strong> this approach will act as a deterrent<br />

and a security solution should the unthinkable happen.<br />

<strong>The</strong> service <strong>of</strong>ferings from GEG are always evolving<br />

to meet the demand <strong>of</strong> changing security threats,<br />

these include utilizing guard posts, inspection patrols,<br />

proper placement <strong>of</strong> fencing and barricades as well as<br />

perimeter security monitoring and lighting. Technology<br />

incorporated into the security plan adds another layer<br />

<strong>of</strong> protection through access control, video monitor-<br />

50


ing and analytics, integration <strong>of</strong> security systems with a<br />

dispatch center and alarm monitoring. Aviation readiness<br />

also encompasses the ability to address weather<br />

related emergencies that have the potential to disrupt<br />

service. Contingency planning for weather events, GEG<br />

assists with focusing in on the company’s ability to have<br />

the infrastructure in place to address emergencies <strong>of</strong><br />

any kind. An area <strong>of</strong> concern for most companies in the<br />

aftermath <strong>of</strong> an emergency is communications. GEG<br />

establishes an <strong>of</strong>f-site area to provide the hub for these<br />

services with satellite and landline communications as<br />

well as a place where all backup computer data would<br />

be stored. A seamless operation from emergency back<br />

to a functioning is the goal <strong>of</strong> all contingency plans.<br />

GEG’s diverse security and consulting experience has<br />

proven that in order to be successful, there is an inherent<br />

need for taking a customized approach to security<br />

in order to mitigate risks. This formula has since been<br />

adapted to service multiple industries. For instance,<br />

GEG provided security for World Cup delegates during<br />

site visits to Brazil for the World Cup games, as well as<br />

during the games themselves. <strong>The</strong> security preparations<br />

for the world’s most anticipated rivalry, required<br />

numerous visits to ensure the safety <strong>of</strong> the players and<br />

visitors who arrived to the games in Brazil. GEG, known<br />

for its protection services around the globe, provided<br />

security services for the World Cup personnel, in charge<br />

<strong>of</strong> planning the security for the upcoming games in a<br />

country known for its beauty and its crime. <strong>The</strong> scope<br />

<strong>of</strong> the service, which included in-depth threat assessment<br />

and risk mitigation plan, was to ensure the safety<br />

and security <strong>of</strong> all persons traveling to and from Rio,<br />

and various destinations while travelling within the<br />

country. <strong>The</strong> closely guarded group required the use<br />

<strong>of</strong> translators, protective services and drivers as some<br />

support services needed for the trip. This trip required<br />

a regional staff that knew the country in every sense.<br />

Continued on next page<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.globaleliteinc.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.prweb.com/releases/2013/3/<br />

prweb10546252.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Victor Anderes, Executive Vice President<br />

Global Elite Group<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (516) 393-3538<br />

cell: (516) 507-8812<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

vanderes@globaleliteinc.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

825 East Gate Blvd Suite 301<br />

Garden City, NY 11530<br />

51


Once this was in place, extensive background investigations<br />

were carried out. When the details for the trip<br />

were addressed the group was able to travel to the most<br />

recognized and scenic landscapes in South America.<br />

Many <strong>of</strong> the locations visited while famous and beautiful,<br />

were also located near crime-ridden communities<br />

known as Favelas. It was an early indicator as to some<br />

<strong>of</strong> the possible challenges to security these games could<br />

face. To prepare for a large group, visiting a region <strong>of</strong><br />

the world with known security risks, takes a great deal<br />

<strong>of</strong> arrangements. GEG places a premium on advance site<br />

visits. During the planning phase we reach out to local<br />

and federal authorities, when reliable, in advance <strong>of</strong> the<br />

trip. <strong>The</strong>re is also a strict schedule to adhere to taking<br />

advantage <strong>of</strong> daylight hours, optimal travel times and<br />

to ensure there are enough vehicles for the duration<br />

<strong>of</strong> the trip. All <strong>of</strong> this attention to detail takes time and<br />

skill. Other considerations because foreign visitors can<br />

become a target is to map out routes away from high<br />

crime areas, thorough inspections <strong>of</strong> vehicles, multiple<br />

egress routes, pre inspection <strong>of</strong> facilities and secured<br />

communications are just some <strong>of</strong> the procedures used<br />

to mitigate the risks associated with high pr<strong>of</strong>ile security<br />

protection services. Contingency planning is an invalu-<br />

able asset to any assignment and having multi-layered<br />

preparations will ensure the likelihood <strong>of</strong> a successful<br />

outcome. GEG staff is steeped in experience at every<br />

level <strong>of</strong> law enforcement and military experience earned<br />

in the most civilized and roughest regions <strong>of</strong> the world.<br />

Our programs incorporate experience with superior<br />

communications and technology usage.<br />

52


53


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Network Harbor, Inc.<br />

<strong>2015</strong> Winner<br />

Best Integrated Security Programs<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical Security Information Management<br />

System - PSIM<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

LightHouse<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Network Harbor’s LightHouse platform delivers<br />

unified security management for enterprise organizations,<br />

extending the capabilities <strong>of</strong> physical security<br />

incident management (PSIM) to include geographical<br />

information system (GIS) and non-physical products in<br />

a truly comprehensive safety and security management<br />

environment. LightHouse is unique in that it integrates<br />

every security system, physical or non-physical, into a<br />

single, seamless oversight system. Its intuitive interface<br />

drives faster recognition <strong>of</strong> potential threats, as well<br />

as gives first responders the information they need to<br />

make better informed, more appropriate decisions.<br />

LightHouse is designed to support the IT side <strong>of</strong> inci-<br />

dent management, too. Its click-and-go ability to adopt<br />

the full functionality <strong>of</strong> any security system’s API within<br />

its own capabilities means that there’s no “dumbing<br />

down” <strong>of</strong> features or functions – just a seamless, consistent<br />

user interface, anywhere across the enterprise.<br />

It installs easily, and is quickly mastered by administrators<br />

and end users alike. LightHouse supports almost<br />

all major security product manufacturers including<br />

access control, video, audio, mass notification, IDS,<br />

RTLS and more. LightHouse has been designed to add<br />

additional system integration’s to the platform without<br />

disruption or encumbrance <strong>of</strong> any existing integration<br />

in an expedient, stable and secure process. LightHouse<br />

54


IPM (integrated process management) provides an<br />

additional element <strong>of</strong> extensibility and power for policy<br />

management and workflow processing that is virtually<br />

unlimited in its capabilities. <strong>The</strong> end result is an intuitive,<br />

comprehensive automated security management<br />

platform that operates identically, anywhere within the<br />

organization. <strong>The</strong>re’s no need to retrain staff when they<br />

move from one facility to another, or when new components<br />

are connected to the platform, which in turn saves<br />

customers significant amounts <strong>of</strong> time and money.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.networkharbor.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://youtu.be/-ucfAR5psac<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

John Convy, Principal<br />

Convy Associates<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 202-421-3777<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

john@convyassociates.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8380 Greensboro Drive Suite 514<br />

McLean, VA 22102<br />

55


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Honeywell Security<br />

<strong>2015</strong> Winner<br />

Best Integrated Security Programs<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical Security Information Management<br />

System - PSIM<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Vindicator Keypad Solution<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Protecting entities such as airports, seaports and government<br />

regulated critical infrastructure sites such as border<br />

controls can be a difficult task. A primary reason for<br />

this is that technology designed for these markets must<br />

meet rigorous regulatory standards, such as the ICD-<br />

705 for SCIF security, or the NERC standards for energy<br />

generation facilities. Honeywell’s Vindicator Keypad<br />

Solution (VKS) meets these regulations in a cost effective,<br />

extremely efficient manner. In addition, the VKS<br />

is the first map-based system that provides assessment<br />

at a glance. Its s<strong>of</strong>tware charts the location <strong>of</strong> sensors<br />

and alarms, resulting in a perimeter map <strong>of</strong> the building<br />

or partition (a previously designated area or grouping).<br />

Operators can see the location <strong>of</strong> each sensor as<br />

it relates to the overall structure <strong>of</strong> the protected area,<br />

and can also see whether the sensor is armed based<br />

upon the color shown on the display – a huge operational<br />

efficiency compared to text-based systems. For<br />

example, a standard text-based system could inform the<br />

user that Zone 10 is compromised. However the user<br />

must be very familiar with the physical site and be able<br />

to remember where Zone 10 is and what the implications<br />

<strong>of</strong> a security event in that area means, in order to<br />

adequately respond. Further, during high-stress events,<br />

a user might confuse zone areas, resulting in a delayed<br />

or inappropriate response to security events. <strong>The</strong> VKS’s<br />

map-based system, on the other hand, shows the user<br />

exactly which sensors have been activated on the map <strong>of</strong><br />

the building, giving a clear, easy-to-understand picture<br />

<strong>of</strong> the events that are occurring.<br />

56


<strong>The</strong> VKS brings many unique attributes to facilities,<br />

including:<br />

1. ASSESSMENT AT A GLANCE: <strong>The</strong> VKS is the only<br />

keypad solution with a map-based interface for immediate<br />

situational assessment. <strong>The</strong> intuitive, graphic display<br />

gives operators visual confirmation <strong>of</strong> alarm locations<br />

and states, instead <strong>of</strong> text-only communication, making<br />

local arm/disarm and alarm response easier, faster and<br />

safer.<br />

2. SPEED & RELIABILIT Y: <strong>The</strong> solution’s controller<br />

panel with embedded firmware is not dependent on an<br />

outside server or PC, eliminating common issues such<br />

as hard-drive crashes and time-consuming Windows<br />

upgrades. Its embedded processing provides instantaneous<br />

notification <strong>of</strong> alarm events. <strong>The</strong> controller can<br />

withstand extreme environmental conditions – from<br />

extreme cold and high winds to high heat and corrosive<br />

environments – ensuring reliability in even the most<br />

rugged situations.<br />

3. COST-EFFECTIVE: <strong>The</strong> VKS cost is comparable to<br />

traditional text-based LCD keypads and meets ICD 705<br />

regulations for SCIFs without the need for third-party<br />

converters or devices. IP-communication reduces time<br />

needed for installation, keeping deployment costs low.<br />

4. SECURIT Y: <strong>The</strong> VKS controller panel, the Vindicator<br />

Premise Controller (VPC), processes logic through its<br />

proprietary operating system. Its firmware is embedded<br />

within the physical controller, marking it stronger<br />

against hacking, viruses and worms, and meets AES encryption<br />

standards. <strong>The</strong> system polls for events every 8<br />

milliseconds, can annunciate five simultaneous events in<br />

two seconds and can manage up to 10,000 alarm points<br />

without latency in reporting alarm events.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellsecurity.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.honeywellvindicator.com/..<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Solveig Hommema, Assistant Account Executive<br />

Weber Shandwick<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: 952-346-6050<br />

cell: 612-501-0949<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

shommema@webershandwick.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

8000 Norman Center Drive, Suite 400<br />

Bloomington, MN 55437<br />

57


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF AIRPORT/SEAPORT/BORDER SECURITY AWARDS RECIPIENTS<br />

Best Integrated Security Programs<br />

Emergency Response Technology, LLC<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Integrated Harbor Security Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Integrated Harbor Security Program for the Port <strong>of</strong><br />

Greater Baton Rouge<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

According to the American Association <strong>of</strong> Port Authorities,<br />

the Lower Mississippi River (LMR), where the Port<br />

<strong>of</strong> Greater Baton Rouge operates, provides transportation<br />

for over 45% <strong>of</strong> all energy resources and more than<br />

60% <strong>of</strong> all U.S. commerce, making it the most critical<br />

and at the same time vulnerable critical infrastructure<br />

in the U.S. Each day that the transportation <strong>of</strong> maritime<br />

commerce on the LMR is interrupted costs the U.S.<br />

economy over $275 million per day, and international<br />

commerce over $500 million per day. A tanker cut a<br />

barge into 2 pieces in 2008, releasing 419,000 gallons<br />

<strong>of</strong> diesel and shutting down the LMR for 11 days. This<br />

interruption <strong>of</strong> transportation <strong>of</strong> maritime commerce<br />

on the LMR created a loss <strong>of</strong> over $3 billion to the U.S.<br />

economy and $6 billion to international commerce<br />

(www.cnn.com/2008/US/07/25/mississippi.spill/). But<br />

without an emergency response capability for secondary<br />

emergencies, the collision could have been much<br />

worse. <strong>The</strong> tanker had just uploaded approximately 3<br />

million gallons <strong>of</strong> Styrene monomer, a compound that<br />

reacts with itself in “autopolymerization”. If this had<br />

happened, the tanker would have exploded with the<br />

force <strong>of</strong> from 3 to 5 times that <strong>of</strong> the truck bomb used<br />

in Oklahoma City in 1995, causing extensive collateral<br />

damage and closing the river much longer. <strong>The</strong> Emergency<br />

Response Technology (ERT) IHSP is designed<br />

to autonomously detect and report multiple threats<br />

simultaneously using both active and passive advanced<br />

sensors using surveillance s<strong>of</strong>tware. Chemical releases<br />

from either accidents or intentional acts <strong>of</strong> terrorism at<br />

58


or near the Port <strong>of</strong> Greater Baton will affect local public<br />

health and interrupt the transportation <strong>of</strong> maritime<br />

commerce, not only on the LMR, but also at the Port<br />

Allen lock <strong>of</strong> the strategic Gulf Intracoastal Waterway<br />

(GIWW) located at the port, as well as overseas transportation<br />

<strong>of</strong> maritime commerce. <strong>The</strong> IHSP will provide<br />

CONOPS, situational awareness, and enhance chemical<br />

security and response for the Port <strong>of</strong> Greater Baton using<br />

integrated orthogonal chemical sensors. “Orthogonal”<br />

means that multiple sensor methodologies will be<br />

deployed to reduce false/positive detection. ERT CEO<br />

George Lane also teaches Homeland Security program<br />

at Tulane University. For portable chemical monitoring<br />

at the port, the IHSP will deploy Differential Mobility<br />

Spectrometry (DMS) sensors in JUNO ® , developed by<br />

Chemring Sensors & Electronic Systems for JCAD-2. As<br />

a tunable ion sensor DMS separates, detects, and measures<br />

individual chemicals in complex mixtures. Portable<br />

chemical detectors will also be deployed in maritime<br />

emergency response vessels operating on the LMR. For<br />

fixed chemical monitoring and scanning <strong>of</strong> chemical<br />

releases at a distance <strong>of</strong> up to 5 km, the IHSP will utilize<br />

the RAPID (Remote Air Pollution Infrared Detector)<br />

chemical detector, developed by Bruker Detection for<br />

deployment on the military’s Stryker reconnaissance<br />

vehicle. RAPID uses a Fourier Transform infrared (FTIR)<br />

sensor which identifies the characteristic “fingerprint”<br />

signatures <strong>of</strong> chemicals. Sophisticated s<strong>of</strong>tware discriminates<br />

against interferences, avoids false alarms, and can<br />

determine the origin <strong>of</strong> the release. When deployed, the<br />

ERT IHSP will protect both public health and critical infrastructure<br />

around the port, and mitigate the interruption<br />

<strong>of</strong> domestic maritime commerce on the LMR and<br />

GIWW, and international maritime commerce overseas.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Fixed sensor in IHSP:<br />

www.bruker-industrial.com/RAPID.html<br />

Portable sensor in IHSP:<br />

www.chemringds.com/products/chemical-detection/juno.aspx<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

George Lane; CEO<br />

Emergency Response Technology<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cell: 225-281-3141<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

georgelane@hotmail.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Emergency Response Technology<br />

999 9th Street Suite 206<br />

Baton Rouge, LA 70802<br />

59


<strong>The</strong> <strong>GSN</strong> <strong>2015</strong><br />

Homeland Security<br />

<strong>Awards</strong>


Winners in the <strong>2015</strong><br />

Homeland Security <strong>Awards</strong> Program<br />

VENDORS OF IT SECURITY<br />

PRODUCTS AND SOLUTIONS<br />

Best Anti-Malware Solution<br />

Blue Ridge Networks – Winner<br />

Best Identity Management<br />

Platform<br />

Gemalto – Winner<br />

Best Compliance/Vulnerability<br />

Solution<br />

Agiliance Inc. – Winner<br />

Best Endpoint Detection and<br />

Response Solution<br />

RSA, <strong>The</strong> Security Division <strong>of</strong> EMC – Winner<br />

Best Big Data Analytics Solution<br />

RSA, <strong>The</strong> Security Division <strong>of</strong> EMC – Winner<br />

Best Privileged Access<br />

Management Solution<br />

BeyondTrust – Winner<br />

CyberArk – Winner<br />

Best Continuous Monitoring and<br />

Mitigation Solution<br />

CyberArk – Winner<br />

SolarWinds – Winner<br />

Best Security Incident and<br />

Event Management (SIEM) Solution<br />

SolarWinds – Winner<br />

VENDORS OF PHYSICAL SECURITY<br />

PRODUCTS AND SOLUTIONS<br />

Best Biometric Identification<br />

Solution<br />

Securiport, LLC – Winner<br />

Best Integrated System for<br />

HSP D-12/FIPS 201 Compliance<br />

Viscount Systems – Winner<br />

Best Mass Notification Systems<br />

Acoustic Technology, Inc. – Winner<br />

Best Chemical Detection<br />

Product or Solution<br />

908 Devices – Winner<br />

Best Explosive Detection<br />

Product or Solution<br />

Implant Sciences – Winner<br />

Best Intelligent Video<br />

Surveillance Solution<br />

Qognify – Winner<br />

Best Crash Barrier (Gates,<br />

Fences, Bollards, Guard Booths)<br />

B.I.G. Enterprises, Inc. – Winner<br />

CINCH systems, Inc. – Winner<br />

Best Physical Security Information<br />

Management (PSIM) Solution<br />

Qognify – Winner<br />

Best Facility Security/Force<br />

Protection Service<br />

AlliedBarton Security Services – Winner<br />

MOST NOTABLE GOVERNMENT<br />

SECURITY PROGRAMS, PROJECTS,<br />

INITIATIVES<br />

Most Notable Federal Government<br />

Security Program/Project<br />

or Initiative<br />

TSA - TSA Airport and Aviation security – Winner<br />

U.S. Department <strong>of</strong> State – Winner<br />

Most Notable State Government<br />

Security Program/Project<br />

or Initiative<br />

New York State Division Of Homeland Security<br />

and Emergency Services (DHSES) – Winner<br />

California Department <strong>of</strong> Motor Vehicles,<br />

Investigations Division – Winner<br />

Most Notable Cybersecurity<br />

Program, Project or Initiative<br />

City <strong>of</strong> Los Angeles - Centralization <strong>of</strong><br />

Cybersecurity Incident Data Analysis – Winner<br />

Most Notable County/Municipal<br />

Program/Project or Initiative<br />

Nanded India, Safe City - Qognify – Winner<br />

SAMMC (San Antonio Military Medical Center)<br />

Advanced Security Program, Suspect Search -<br />

Qognify – Winner<br />

Most Notable Law Enforcement<br />

Interdiction, Arrest, Counter<br />

Terrorism or Crime Prevention<br />

Program – Federal/State or Local<br />

Memphis Police Department – Winner<br />

61


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Blue Ridge Networks<br />

<strong>2015</strong> Winner<br />

IT Security Products and Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Anti-Malware Platform<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

AppGuard<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Introduction<br />

Blue Ridge Networks’ AppGuard is a unique Anti-<br />

Malware solution that stops malware breaches at the<br />

earliest stages <strong>of</strong> attack without requiring detection,<br />

scanning, or updates. Recognized by leading industry<br />

analysts as effective, next generation endpoint protection,<br />

AppGuard delivers a multi-layered defense that<br />

prevents breaches from emerging undetectable threats<br />

and generates earlier Indicators <strong>of</strong> Attack (IOA) without<br />

a compromise occurring. AppGuard is compatible with<br />

all current Windows versions, is easy to deploy with<br />

scale, is non-disruptive to users and productivity, and<br />

works “on” and “<strong>of</strong>f ” enterprise without on-going management<br />

dependencies.<br />

Technological Innovation<br />

Other endpoint protection products allow malware to<br />

“detonate”, relying on detecting and responding to a<br />

compromise in time to limit breach effects. Without<br />

a known signature or IOC (Indicator <strong>of</strong> Compromise),<br />

breaches can go undetected by breach<br />

detection, whitelisting, blacklisting (antivirus),<br />

sandboxing or other conventional<br />

techniques for weeks or months,<br />

placing an enterprise at risk.<br />

AppGuard <strong>of</strong>fers an effective<br />

defense against these emerging<br />

undetectable threats that cannot<br />

be addressed by conventional<br />

62


means. Without relying on detection, identification,<br />

signatures, or scanning, AppGuard disrupts breach attempts<br />

before a compromise can occur from zero-day<br />

malware, polymorphic malware, phishing, “malvertising”,<br />

watering-holes, weaponized documents, drive-bydownloads,<br />

ransomware and other forms <strong>of</strong> undetectable<br />

malware attacks. AppGuard’s patented technology<br />

establishes trust zones protecting applications, operating<br />

system resources, firmware, memory, and other<br />

core processes. Protection policies are automatically<br />

dynamically extended to descendant “child” processes<br />

eliminating the need for complex rules specific to each<br />

application and ensuring effective protection without<br />

management overhead or impact to<br />

user productivity.<br />

When AppGuard stops a malware<br />

attack, it collects Indicators <strong>of</strong> Attack<br />

(IoA) that can be analyzed and used to<br />

identify new malware before any IOC is<br />

known. This provides valuable earlywarning<br />

data for enhanced Threat Intelligence without<br />

the exposure <strong>of</strong> a compromise.<br />

Reliable, Versatile, Usable, Scalable, Affordable<br />

AppGuard has demonstrated with Enterprise, Business<br />

63<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.blueridge.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.appguardit.com<br />

www.appguardbusiness.com<br />

www.appguardenterprise.com<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Nancy Canty, VP <strong>of</strong> Product Management<br />

Blue Ridge Networks<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (703) 633-7331<br />

cell: (571) 232-9149<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

nancy@blueridge.com<br />

(SME), and Personal use customers and in continuous<br />

extensive penetration testing, the ability to stop breaches<br />

other approaches cannot stop. It is compatible with<br />

all current Windows versions (Win XP, Vista, 7, 8, 8.1,<br />

Continued on next page


and 10 including DeviceGuard and Virtual Secure Mode)<br />

on desktops, laptops, tablets, servers, and embedded<br />

appliances (ATMs, Point-<strong>of</strong>-Sale appliances, Healthcare<br />

devices, etc.). “Out-<strong>of</strong>-the-box”, it protects a wide range<br />

<strong>of</strong> popular applications (Office, Office365, IE, Adobe,<br />

etc.) and can be configured to protect custom applications,<br />

VDIs, VPNs, VDIs, etc. <strong>The</strong> Enterprise version<br />

places AppGuard endpoint s<strong>of</strong>tware agents under the<br />

administration and control <strong>of</strong> the enterprise to deploy<br />

and manage customized enterprise policies with a<br />

separate management plane to ensure protection and<br />

situational awareness “on” on “<strong>of</strong>f ” the enterprise. AppGuard’s<br />

underlying technologies are also extensible to<br />

Internet-<strong>of</strong>-Things applications.<br />

Other References<br />

AppGuard has been recommended by respected security<br />

authorities, including Bob Bigman, former CISO, CIA:<br />

http://www.activecyber.net/interview-with-bob-bigmanformer-ciso-<strong>of</strong>-cia/<br />

Gartner and other leading industry analysts have regularly<br />

cited AppGuard in numerous reports as an emerging<br />

next-generation endpoint protection.<br />

64


65


Gemalto<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Identity Management Platform<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Coesys Document Verification<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Identity theft pr<strong>of</strong>oundly affects the public and private<br />

sectors worldwide. In 2013, according to Javelin Strategy<br />

and Research, one incident <strong>of</strong> identity fraud occurs<br />

every 3 seconds in the United States. Clearly, there is<br />

a growing need for reliable identity document verification.<br />

However, verifying identity documents is becoming<br />

increasingly more complex. Public and private administrations<br />

face the challenge <strong>of</strong> detecting suspected fraud<br />

on various types and versions <strong>of</strong> documents (passports,<br />

identity cards, driver’s licenses, etc.) from an array <strong>of</strong> issuing<br />

countries. <strong>The</strong> California Department <strong>of</strong> Motor Vehicles<br />

made it a priority to address this issue head-on by<br />

implementing an advanced solution through Gemalto,<br />

the world leader in digital security. In July <strong>2015</strong>, the California<br />

DMV selected Gemalto as the choice provider <strong>of</strong><br />

identify document verification s<strong>of</strong>tware to its nearly 200<br />

field and investigative <strong>of</strong>fices. <strong>The</strong> California DMV issues<br />

thousands <strong>of</strong> ID documents every day and places a high<br />

premium on securing the integrity <strong>of</strong> an identity. Reliable<br />

verification is vital for the DMV in order to combat<br />

identity fraud and related criminal activities. Gemalto’s<br />

Coesys Document Verification s<strong>of</strong>tware solution successfully<br />

allows DMV <strong>of</strong>ficials to verify the authenticity <strong>of</strong><br />

documents such as passports, identity cards and driver<br />

licenses by simply checking the graphical data and security<br />

features against reference templates from an array <strong>of</strong><br />

issuing countries. <strong>The</strong>se reference templates are stored<br />

in a database, administrated centrally and automatically<br />

synchronized into all local repositories. With Coesys<br />

Document Verification, each document type and version<br />

66


is recognized. Gemalto’s solution provides unmatched<br />

results identifying counterfeit documents and accepting<br />

genuine ones. Using Gemalto’s sophisticated technology,<br />

the California DMV is able to streamline its review<br />

process, overcome the challenge <strong>of</strong> authenticating foreign<br />

documents and identify any document abnormalities<br />

or defects. Gemalto’s solution is designed to make<br />

it easy to quickly confirm on-the-spot the authenticity <strong>of</strong><br />

documents and the identity <strong>of</strong> an applicant. Importantly,<br />

Coesys Document Verification enables DMV <strong>of</strong>ficials<br />

to verify identity documents with peace <strong>of</strong> mind. Gemalto<br />

was selected because <strong>of</strong> the company’s ability to meet<br />

the California DMV’s specific requirements and in the<br />

specified timeframe. Gemalto’s experts understood the<br />

California DMV’s specific business practices and were<br />

able to provide a consistent solution to all <strong>of</strong> the DMV’s<br />

nearly 200 <strong>of</strong>fices. For DMV representatives, Gemalto’s<br />

Coesys Document Verification is simple to use and<br />

provides instantaneous results identifying counterfeit<br />

documents and accepting genuine ones. Gemalto also<br />

worked with the California DMV to bring an automated<br />

synchronization solution connected to a central document<br />

repository, which reduces the burden <strong>of</strong> manual<br />

updates on each authentication workstation located<br />

within the DMV field <strong>of</strong>fices. More than just s<strong>of</strong>tware,<br />

Coesys Document Verification is a fully-customizable<br />

editing platform that enables customers like the California<br />

DMV to pilot each and every verification action<br />

on any identity document. Coesys Document Verification<br />

is part <strong>of</strong> Gemalto’s Border and Visa Management<br />

suite. Its flexible architecture enables customization to<br />

suit any customer deployment configuration. Gemalto’s<br />

objectives for its Coesys Document Verification s<strong>of</strong>tware<br />

solution are to: mitigate risk <strong>of</strong> identity fraud; provide a<br />

solution flexible enough to keep up with the demands<br />

<strong>of</strong> changing infrastructures, technologies, document<br />

standards and attempts to perpetrate fraud; and provide<br />

its customers with ease <strong>of</strong> use and peace <strong>of</strong> mind.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.gemalto.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.gemalto.com/press/Pages/California-selects-Gemalto-for-automated-identitydocument-verification.aspx<br />

http://www.gemalto.com/govt/coesys/doc-verification<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Michelle Leech<br />

Gemalto<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (512) 605-2110<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ellenmichelle.leech@gemalto.com<br />

67


Agiliance Inc.<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Compliance/Vulnerability Assessment Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RiskVision 7.5<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> biggest inhibitor <strong>of</strong> effective security and vulnerability<br />

management lies in the fact that the number <strong>of</strong><br />

threats to organizations has grown exponentially over<br />

the past few years. This is largely due to the increasing<br />

number <strong>of</strong> IT assets under management, which are<br />

creating a big data challenge. To ensure proper coverage,<br />

government organizations in many cases are relying<br />

on multiple tools to produce the necessary vulnerability<br />

assessment data. This only adds to the volume, velocity,<br />

and complexity <strong>of</strong> data feeds that must be analyzed,<br />

normalized, and prioritized. Relying on human labor<br />

to comb through mountains <strong>of</strong> data logs is one <strong>of</strong> the<br />

main reasons that critical vulnerabilities are not being<br />

addressed in a timely fashion. According to the Verizon<br />

Data Breach Investigations Report, 92% <strong>of</strong> breaches<br />

were discovered by a third party and not through internal<br />

resources. As a result, government organizations are<br />

seeking technical solutions to automate data aggregation,<br />

normalization, and business impact correlation.<br />

<strong>The</strong> ultimate objective is to shorten the window attackers<br />

have to exploit a s<strong>of</strong>tware flaw, thereby reducing the<br />

overall risk <strong>of</strong> cyber-attacks and insider threats. Agiliance<br />

is assisting civilian, defense, and intelligence agencies in<br />

achieving continuous monitoring and enabling them to<br />

report on their organizations risk and security posture<br />

in near real time. <strong>The</strong> company’s RiskVision s<strong>of</strong>tware<br />

gathers data feeds from otherwise silo-based security<br />

and IT tools such as SIEMs, configuration management<br />

databases, vulnerability scanners, threat data feeds and<br />

advisory services, database security management, etc.<br />

68


and then aggregates, normalizes, and correlates this<br />

information based on business criticality. This enables<br />

a near real time snap shot <strong>of</strong> an organization’s security<br />

posture. In addition, RiskVision automates an organization’s<br />

governance processes, providing insight into the<br />

agency’s compliance posture. <strong>The</strong> final result is a riskbased<br />

assessment <strong>of</strong> the organization’s infrastructure<br />

which prioritizes remediation actions based on business<br />

criticality. If needed, RiskVision can also assist with automatic<br />

ticket creation. By using the Agiliance ticketing<br />

system or integrating with leading ticketing and patch<br />

management systems, an organization’s security operations<br />

team can shadow the progress the IT team makes<br />

in mitigating the vulnerabilities. This eliminates the<br />

traditional approach best described as throwing something<br />

over the fence and praying for the best outcome.<br />

For one major government agency, using RiskVision<br />

resulted in a dramatic increase in operational efficiency.<br />

Prior to using Agiliance, it took 60 full-time employees<br />

working 24 x 7 for a month to manually create 180,000<br />

remediation tickets. With RiskVision, the agency was<br />

able to reduce the headcount required to oversee ticket<br />

creation by more than 80% and shrink the processing<br />

time from one month to a couple <strong>of</strong> days. RiskVision<br />

is considered by many to be the best compliance and<br />

vulnerability management solution on the market for<br />

its ability to combine risk intelligence, using big data<br />

gathered and correlated from security operations tools,<br />

with automated remediation that establishes bi-directional<br />

workflows with IT operations. <strong>The</strong> end result is<br />

improved operational efficiency through automated<br />

continuous monitoring and ticketing to remediate only<br />

business critical risks.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.agiliance.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RiskVision Named Best New Risk Management S<strong>of</strong>tware<br />

in <strong>2015</strong> Security Products Magazine <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0923_<br />

SecurityProduct_<strong>Awards</strong>.html<br />

Agiliance Dominates at American Business <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0915_<br />

American_business_award.html<br />

RiskVision Helps Retailers Minimize Cyber Risk Exposure:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0910_<br />

Cyber_Risk_Exposure.html<br />

Agiliance Scores Big at International Stevie <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0814_<br />

Stevie_<strong>Awards</strong>.html<br />

Agiliance Named to Cybersecurity 500:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0907_<br />

Cybersecurity_500.html<br />

RiskVision Earns Two IT World <strong>Awards</strong> from Network<br />

Products Guide:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0807_<br />

Nation_Product_Guide_Winner.html<br />

RiskVision Scores Twice at Info Security Products<br />

Guides <strong>2015</strong> Global Excellence <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>2104_<br />

Info_Security_Products_Guides.html<br />

Cyber Defense Magazine Names RiskVision Most<br />

Innovative Risk Management Solution for Second-<br />

Consecutive Year:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>2004_<br />

Most_Innovative_Solution.html<br />

69


RiskVision Named Best Monitoring Solution in Govies<br />

<strong>2015</strong> <strong>Awards</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>1704_<br />

Best_Monitoring_Solution.html<br />

Agiliance to Showcase Essential Building Blocks for<br />

Cyber Security at RSA Conference <strong>2015</strong>:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>1404_<br />

Essential_Building_Blocks_for_CyberSecurity.<br />

html<br />

RiskVision 7.5 Enables Good Cyber Hygiene to<br />

Achieve Immediate and Effective Defenses Against<br />

Cyber-Attacks:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>0704_<br />

RiskVision_75.html<br />

Agiliance Becomes a Board and Business Standard for<br />

Managing Cyber Security Operational Risks in 2014:<br />

http://www.agiliance.com/news/pr_<strong>2015</strong>1601_<br />

Agiliance_Cyber_Security_Operational_Risk.<br />

html<br />

Agiliance / ESG White Paper: Beyond GRC: SRM and<br />

the Move to Integrated Risk Management:<br />

http://www.agiliance.com/forms/WhitePaper-<br />

Reg.html?doc=Beyond_GRC<br />

Agiliance White Paper: How to Achieve a Continuous<br />

Monitoring Framework:<br />

http://www.agiliance.com/infocenter/whitepaper.html<br />

Agiliance Data Sheets:<br />

http://www.agiliance.com/infocenter/<br />

Agiliance Case Studies:<br />

http://www.agiliance.com/infocenter/casestudy.<br />

html<br />

Agiliance Recorded Webcasts:<br />

http://www.agiliance.com/news/webcasts.html<br />

Agiliance Product Tours:<br />

http://www.agiliance.com/infocenter/tour.html<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Torsten George, Vice President <strong>of</strong><br />

Worldwide Marketing and Products<br />

Agiliance, Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (408) 200-0461<br />

cell: (408) 431-3250<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

tgeorge@agiliance.com<br />

70


71


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

RSA, <strong>The</strong> Security Division <strong>of</strong> EMC<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Endpoint Detection and Response Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA ECAT<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA President Amit Yoran said “IT Security has Failed.”<br />

Organizations across a wide range <strong>of</strong> industries are<br />

breached, new malware, zero-day vulnerabilities are<br />

everywhere. Money, intellectual-property, hacktivism<br />

are only a few <strong>of</strong> the reasons. <strong>The</strong>y are bombarded with<br />

crimeware, adware, targeted campaigns, and nationstate<br />

attacks. Attackers today can easily bypass traditional<br />

signature-based defenses, create persistency, move<br />

laterally, exfiltrate data while leaving organizations blind<br />

from those types <strong>of</strong> threats that will put their name on<br />

the first page <strong>of</strong> today’s news. RSA does not believe in<br />

this status quo! How is RSA ECAT doing things differently?<br />

ECAT is an endpoint threat detection and response<br />

solution focused on malware and other threats’ behavioral<br />

detection, able to provide visibility to how wide-<br />

spread an attack is and instantly determine the scope<br />

and mitigate in real-time. Analysts trust ECAT to identify<br />

both the known and unknown zero-day malware based<br />

on its behavioral-based detection capabilities.<br />

RSA ECAT’s approach provides:<br />

• Behavioral modeling via ECAT’s Instant Indicator <strong>of</strong><br />

Compromise (IIOC). ECAT provides an out-<strong>of</strong>-the-box<br />

list (~300) <strong>of</strong> IIOCs for both Windows and Mac operating<br />

systems, being able to identify the exact attack<br />

vector used by threats and generic behavior indicative<br />

<strong>of</strong> malware. Based on IIOCs triggered, a machine and<br />

module risk score are generated enabling analysts for<br />

better detection and prioritization capabilities. ECAT’s<br />

IIOCs expose the attack characteristics by pointing the<br />

72


analysts automatically at the suspicious modules and<br />

attack vectors identified such as: floating code, hidden/<br />

temp/program data folder write to executable, scripts<br />

run (PSexec, whoami, etc.) which equips the analyst<br />

with tools and techniques used to not only identify the<br />

how but the who as well. All IIOCs are executed serverside<br />

as data is processed, reducing no overhead on the<br />

agent and client performance.<br />

• Detection and Visibility through Layered Approach.<br />

While ECAT performs live memory analysis and in-depth<br />

inspection <strong>of</strong> host behavior, it is also leveraging other<br />

ways <strong>of</strong> enriching data for analysis by using OPSWAT,<br />

Yara, module reputation models, and multiple threat<br />

intelligence data feeds including RSA Research and<br />

community-based intel via STIX, enabling analysts to<br />

quickly come to a resolution and take response action.<br />

• Detect, Investigate and Response. While threats will<br />

find their way into the organization, being able to trigger<br />

a response action to shorten dwell time is a key.<br />

ECAT is able to block and quarantine suspicious modules<br />

for endpoints within a corporate network as well as<br />

endpoints <strong>of</strong>f network connected to the Internet.<br />

• Machine Learning Risk Score system. <strong>The</strong> Risk Score<br />

system collects and analyzes vast amounts <strong>of</strong> data on<br />

the endpoint and network data transferred in/out and<br />

compiles a module and machine risk score based on a<br />

statistical machine-learning, adaptive model. ECAT’s analysts<br />

leverage the risk score as the basis for prioritized<br />

investigation, working on the most risky endpoints such<br />

as: module behavior, machine status, threat intelligence,<br />

business context, etc. Significant contributors to ECATs<br />

Risk Scoring system are RSA’s data-science team and Incident<br />

Responders providing contact feedback and new<br />

findings identified.<br />

• Enterprise Scalability. ECAT protects 50,000 agents<br />

with a single ECAT server.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA ECAT Home Page:<br />

https://www.emc.com/security/rsa-ecat.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Bryan Grillo, Vice President<br />

CHEN PR<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (781) 466-8282<br />

cell: (617) 947-0547<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

bgrillo@chenpr.com<br />

73


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

RSA, <strong>The</strong> Security Division <strong>of</strong> EMC<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Big Data Analytics Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Security Analytics<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> application <strong>of</strong> Big Data Analytics/Data Science<br />

techniques to the challenge <strong>of</strong> IT security is in its early<br />

stages, but what is clear given the seemingly unending<br />

stream <strong>of</strong> major breaches, is that what the security<br />

industry is doing today isn’t working. A new approach<br />

to IT security is needed. A key challenge is that the<br />

detection <strong>of</strong> what can be very subtle and targeted attacks<br />

is nearly impossible with the signature, perimeter,<br />

and log/SIEM dependent security systems that are most<br />

prevalent today. <strong>The</strong> attraction <strong>of</strong> Big Data Analytics<br />

and its associated Data Science techniques are that they<br />

provide capabilities that are most in need to address<br />

today’s security challenges, namely the ability to ingest<br />

and manipulate a very large and diverse set <strong>of</strong> data<br />

from across an enterprise, over a long time horizon,<br />

and apply analytic techniques to it which are tuned to<br />

finding subtle signals <strong>of</strong> an attack amongst the everyday<br />

normal activity <strong>of</strong> the organization. Attackers have<br />

learned to hide in plain sight and move low-and-slow to<br />

remain undetected. By using Data Science models with<br />

the right data, one can shine a light on this activity. RSA<br />

Security Analytics deserves to win this award because<br />

it uniquely combines the ability to collect, ingest and<br />

make sense out <strong>of</strong> large amounts <strong>of</strong> internal telemetry<br />

– logs, events, full network traffic, netflow, endpoint<br />

activity, IT asset, identity, and other business context<br />

and combine it with external threat intelligence to<br />

massively increase the security visibility <strong>of</strong> the organization.<br />

To this data RSA Security Analytics applies multiple<br />

detective analytic techniques, including those based<br />

74


on Big Data Analytics/Data Science, to surface security<br />

anomalies that are highly suggestive <strong>of</strong> advanced or<br />

targeted attacks. Our Data Science models use hundreds<br />

<strong>of</strong> indicators to identify activities such as beaconing and<br />

suspicious domain activity. No other security product<br />

on the market combines the capabilities <strong>of</strong> broad and<br />

deep, enterprise-wide, data collection, data enrichment,<br />

with the delivery <strong>of</strong> tested detective oriented, Data Science<br />

based algorithms which can be applied to a given<br />

organization with only modest customization. Some<br />

competitive products natively collect some <strong>of</strong> this data,<br />

but usually not the most important (network packets<br />

& endpoint activity data) sets, while other products<br />

collect no data at all and only provide an analytic platform,<br />

leaving the data collection as an exercise for the<br />

customer. Other products provide general purpose Big<br />

Data Analytics capabilities, but leave it to the organization<br />

and their own data scientists (which most security<br />

organization don’t have) to apply these general purpose<br />

tools to the security domain. RSA Security Analytics is<br />

a detective and investigative platform that was specifically<br />

designed for the security domain, provides its own<br />

native data collection and management capabilities for<br />

the data most likely to have the subtle signals <strong>of</strong> an attack,<br />

and marries this with analytic algorithms that were<br />

specifically designed by RSA’s security researchers and<br />

data scientists to aide in the detection <strong>of</strong> today’s most<br />

advanced and targeted attackers.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.emc.com/domains/rsa/index.htm<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

RSA Security Analytics Home Page:<br />

http://www.emc.com/security/security-analytics/security-analytics.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Chris Conway, Associate Account Executive<br />

CHEN PR, Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (781) 672-3113<br />

cell: (508) 212-4226<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cconway@chenpr.com<br />

75


BeyondTrust<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Privileged Access Management Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

PowerBroker for Unix & Linux<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Whether the goal for attackers is to compromise sensitive<br />

government data, steal personally identifiable information<br />

(PII) or disrupt normal operations, the increasing<br />

sophistication <strong>of</strong> attacks is making it more difficult<br />

to safeguard the federal government’s cyber critical<br />

infrastructure. Adding to the complexity <strong>of</strong> cybersecurity<br />

is the compliance landscape for government agencies<br />

that changes with almost every administration. <strong>The</strong>re<br />

are always new requirements – and penalties – that<br />

agencies must anticipate, implement, and report on.<br />

Large-scale information breaches, like the recent Office<br />

<strong>of</strong> Personnel Management attack, <strong>of</strong>ten begin with an attacker<br />

exploiting a single external vulnerability on a lowlevel<br />

system or through contractor credentials, and then<br />

capitalizing on privileges to gain access to critical sys-<br />

tems and data. It is also very possible for a government<br />

employee to abuse access privileges from the inside to<br />

steal sensitive information. One has to look no farther<br />

than Edward Snowden as a pro<strong>of</strong> point. BeyondTrust’s<br />

PowerBroker for Unix & Linux for least privilege helps<br />

balance the privilege requirements <strong>of</strong> users, with those<br />

<strong>of</strong> security and compliance teams, for routers/switches,<br />

and mainframes in Unix and Linux environments. <strong>The</strong><br />

solution enables IT Security teams to confidently deploy<br />

secure and compliant network gear, servers and<br />

desktops, while giving employees the correct amount <strong>of</strong><br />

privileged access to applications without affecting a user’s<br />

ability to remain productive. <strong>The</strong> result is improved<br />

security, through reduced risk and attack surface, along<br />

with improved system uptime and availability. Sudo<br />

76


presents unique challenge faced by government departments<br />

and agencies using Unix or Linux – specifically<br />

the time and effort it takes for their organization to migrate<br />

to a commercially supported solution and whether<br />

or not their existing data and policies can be integrated.<br />

With PowerBroker for Unix & Linux, organizations do<br />

not have to sacrifice existing sudoer files for the sake<br />

<strong>of</strong> centralization. Instead, organizations can store and<br />

centralize multiple sudoer files in PowerBroker, adding<br />

enhanced policy groupings to more easily define user<br />

roles across the enterprise. <strong>The</strong> result is a simplified migration<br />

path from sudo. Auditing and controlling activity<br />

inside scripts and third-party applications within Unix<br />

and Linux systems have also been difficult for many<br />

organizations to achieve, especially when it is easy to<br />

“cheat” the system by pointing shortcuts to unapproved<br />

applications. PowerBroker for Unix & Linux overcomes<br />

these challenges by providing enhanced system level<br />

control and audit capabilities over any application – regardless<br />

<strong>of</strong> how the application is initiated. When users<br />

click on an icon, all activity (including keystroke information)<br />

is recorded. This helps organizations control<br />

actual commands and actions at the system level. <strong>The</strong>se<br />

and other capabilities enable PowerBroker customers to<br />

meet the privileged access control requirements <strong>of</strong> government<br />

and industry mandates including SOX, HIPAA,<br />

PCI DSS, GLBA, PCI, FDCC, FISMA and more. With more<br />

than 200 U.S. Federal departments and agencies as customers,<br />

BeyondTrust delivers powerful privileged access<br />

management solutions that have been proven in a wide<br />

range <strong>of</strong> large and complex IT environments.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.beyondtrust.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.beyondtrust.com/Products/Power-<br />

BrokerUnixLinux/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Douglas De Orchis, Client Executive<br />

Voce Communications<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (617) 897-8259<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

ddeorchis@vocecomm.com<br />

77


CyberArk<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Privileged Access Management Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CyberArk Privileged Account Security Solution<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> CyberArk Privileged Account Security Solution<br />

focuses on eliminating the most advanced cyber threats<br />

– those that exploit privileged credentials to attack the<br />

heart <strong>of</strong> the enterprise. <strong>The</strong> CyberArk solution helps<br />

identify existing privileged credentials across networks,<br />

makes sure those credentials are locked down and secure,<br />

and leverages continuous monitoring <strong>of</strong> privileged<br />

account credentials to detect anomalous behavior and<br />

stop an attack early in the cycle to reduce damage. In<br />

July <strong>2015</strong>, CyberArk achieved Common Criteria Certification<br />

for the CyberArk Privileged Account Security<br />

Solution. This designation is an important independent<br />

evaluation <strong>of</strong> the security capabilities <strong>of</strong> IT products<br />

and a key differentiator when working with the federal<br />

government. CyberArk is also the first vendor in the<br />

industry to achieve the certification for a comprehensive<br />

privileged account security solution. CyberArk has been<br />

working with government agencies to use its solution<br />

to address privileged user security priorities set forth in<br />

the federal government’s 30-day Cybersecurity Sprint.<br />

CyberArk designed the Privileged Account Security Solution<br />

for low total cost <strong>of</strong> ownership, with ease <strong>of</strong> management<br />

and access to ongoing training. <strong>The</strong> CyberArk<br />

Privileged Account Security Solution is built on a shared<br />

technology platform, is designed to integrate into any IT<br />

environment, and delivers enterprise-class security, scalability<br />

and high availability on a single integrated solution.<br />

With the modular Privileged Account Security Solution,<br />

organizations can better protect their networks by:<br />

securely storing, rotating and controlling access to SSH<br />

78


keys; isolating, monitoring, recording and controlling<br />

privileged sessions on critical systems; and providing<br />

targeted, immediately-actionable threat alerts through<br />

patent-pending analytic technology. <strong>The</strong> CyberArk<br />

solution is further differentiated by its patented <strong>Digital</strong><br />

Vault technology and Master Policy engine. Launched in<br />

the past year, the CyberArk SSH Key Manager enables<br />

customers to secure and manage SSH keys, just like any<br />

other privileged credential. Also available as part <strong>of</strong> the<br />

solution is CyberArk Privileged Threat Analytics, which<br />

detects, alerts and responds to cyber attacks by collecting,<br />

monitoring and analyzing privileged account data,<br />

including activity from the CyberArk Vault, and data<br />

feeds from security information and event management<br />

(SIEM) systems to identify and lessen the most serious<br />

<strong>of</strong> risks. An independent study from Nucleus Research<br />

on customer ROI found that the CyberArk Privileged<br />

Account Security Solution reduced customers’ cyber security<br />

risk pr<strong>of</strong>ile, as well as delivered complete payback<br />

within six months, providing greater ROI as the Cyber-<br />

Ark platform is used over time. CyberArk was named a<br />

leader in the IDC MarketScape: Worldwide Privileged<br />

Access Management 2014 Vendor Assessment, calling<br />

CyberArk the “privileged access management pure-play<br />

‘big gorilla’ with the most revenue and largest customer<br />

base.” Today, CyberArk has a customer base <strong>of</strong> more<br />

than 1,900, including 40 percent <strong>of</strong> the Fortune 100, 19<br />

percent <strong>of</strong> the Global 2000 and 17 <strong>of</strong> the world’s top 20<br />

banks, and includes leading enterprises in a diverse set<br />

<strong>of</strong> industries, such as energy and utilities, financial services,<br />

healthcare, manufacturing, retail, technology and<br />

telecommunications, as well as government agencies.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.cyberark.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Background on the CyberArk Privileged Account Security<br />

Solution:<br />

http://www.cyberark.com/products/privilegedaccount-security-solution/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Liz Campbell, Sr. Manager,<br />

Corporate Communications<br />

CyberArk<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (617) 558-2191<br />

cell: (781) 820-9840<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

liz.campbell@cyberark.com<br />

79


CyberArk<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring and Mitigation Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CyberArk Privileged Threat Analytics<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> devastating cyberattacks on Sony Pictures, Anthem<br />

and U.S. Office <strong>of</strong> Personnel Management (OPM) demonstrate<br />

that today’s cyber security battle has shifted<br />

from the perimeter to inside the IT network. Once<br />

inside a targeted network, attackers immediately seek<br />

to steal and exploit privileged accounts – the gateway<br />

to sensitive and valuable information. Attackers exploit<br />

these accounts to navigate the system, conduct reconnaissance<br />

and escalate privileges – all while impersonating<br />

authorized users. In fact, industry research indicates<br />

that privileged credential exploitation is a signature in<br />

almost every advanced attack. That’s why organizations<br />

need to be proactively monitoring and recording all<br />

privileged activity to ensure attackers – whether they’re<br />

outside hackers or malicious insiders – are not able to<br />

gain access to critical networks, move laterally across<br />

the network to the target goal, or exfiltrate data without<br />

detection. CyberArk Privileged Threat Analytics detects,<br />

alerts and responds to cyber attacks by collecting, monitoring<br />

and analyzing privileged account data, including<br />

activity from the CyberArk Vault, and data feeds from<br />

security information and event management (SIEM)<br />

systems to identify and lessen the most serious <strong>of</strong> risks.<br />

This solution enables incident response teams to identify<br />

an attack in real time, take the necessary steps to<br />

mitigate the attack and reduce damage. Through industry-leading<br />

analytics, including self-learning, behaviorbased<br />

algorithms, CyberArk enables customers to detect<br />

attacks faster by pinpointing malicious privileged account<br />

activity previously hidden in the sheer volume <strong>of</strong><br />

80


information collected by big data analytics solutions.<br />

With proactive controls and threat detection, CyberArk<br />

Privileged Threat Analytics is the only analytic solution<br />

able to detect malicious activity and actively respond by<br />

invalidating account access. This enables incident response<br />

teams to quickly contain threats by invalidating<br />

stolen credentials to stop an attacker from continuing<br />

their attack. By reducing an attacker’s window <strong>of</strong> opportunity<br />

and residual damage through real-time alerts on<br />

in-progress attacks, CyberArk Privileged Threat Analytics<br />

improves organizations’ effectiveness by enabling response<br />

teams to identify anomalous privileged activities<br />

and prioritize only the most critical security incidents.<br />

Privileged Threat Analytics is part <strong>of</strong> the CyberArk Privileged<br />

Account Security Solution. CyberArk delivers regular<br />

updates to ensure customers can proactively take<br />

advantage <strong>of</strong> new features including new algorithms that<br />

are added to the analytic engine. <strong>The</strong> R&D and Cyber-<br />

Ark Lab teams are constantly researching attacks in the<br />

wild and building new detection capabilities and algorithms<br />

to detect the latest attacks. Today, CyberArk has a<br />

customer base <strong>of</strong> more than 1,900, including 40 percent<br />

<strong>of</strong> the Fortune 100, 19 percent <strong>of</strong> the Global 2000 and<br />

17 <strong>of</strong> the world’s top 20 banks, and includes leading<br />

enterprises in a diverse set <strong>of</strong> industries, such as energy<br />

and utilities, financial services, healthcare, manufacturing,<br />

retail, technology and telecommunications, as well<br />

as government agencies. CyberArk serves customers in<br />

more than 65 countries and has more than 200 global<br />

partners.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.cyberark.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Main page for Privileged Threat Analytics information,<br />

including data sheets:<br />

http://www.cyberark.com/products/privilegedaccount-security-solution/privileged-threatanalytics/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Liz Campbell, Sr. Manager,<br />

Corporate Communications<br />

CyberArk<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (617) 558-2191<br />

cell: (781) 820-9840<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

liz.campbell@cyberark.com<br />

81


SolarWinds<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Continuous Monitoring and Mitigation Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds User Device Tracker<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds User Device Tracker (UDT) delivers automated<br />

user and device tracking with powerful switch<br />

port management capabilities empowering federal IT<br />

Pros with strong continuous monitoring capabilities and<br />

visibility into who or what is connected to their network.<br />

Highlights include:<br />

• Automatically discovers, maps and monitors switches,<br />

ports and network devices<br />

• Quickly finds devices and retrieves user name, port<br />

details, connection history and more<br />

• Enables searching on IP address, user name, hostname<br />

or MAC address to track endpoints<br />

• Allows whitelisting and watch lists with automatic<br />

alerts and click-<strong>of</strong>-a-button port shutdown<br />

• Provides detailed switch port usage data, capacity<br />

analysis and built-in reporting<br />

With the ever-increasing use <strong>of</strong> personal devices and<br />

applications, SolarWinds UDT provides federal IT Pros<br />

with peace <strong>of</strong> mind about the security <strong>of</strong> their network<br />

and the devices on it by continuously monitoring who<br />

and what connects to their network. Additionally, Solar-<br />

Winds UDT can track down lost or rogue devices with a<br />

simple search <strong>of</strong> a user name, IP address, hostname or<br />

MAC address, ensuring that all devices that can connect<br />

to federal networks stay in the right hands. SolarWinds<br />

UDT also features alerting that signifies unauthorized<br />

network access and provides the ability to quickly shut<br />

82


down switch ports to secure access to sensitive information.<br />

Updates to SolarWinds UDT coincide with the<br />

latest issues being tackled by IT Pros such as BYOD. In<br />

the latest update to scalability and additional support<br />

and optimization for varying devices and vendors was a<br />

priority. And, by working closely with and listening to<br />

its user community, SolarWinds is able to gain real-time<br />

and candid feedback from IT practitioners, so its products<br />

can address the problems and challenges prevalent<br />

in IT security today. SolarWinds UDT provides three<br />

critical capabilities for network and systems managers.<br />

First, it makes it possible to physically locate an enduser<br />

device or user on the network extremely quickly.<br />

Second, it allows for rapid quarantine <strong>of</strong> users or systems<br />

by remotely shutting down a switch port. Finally,<br />

it supports watch-lists and can alert when certain types<br />

<strong>of</strong> devices or specific users connect to the network and<br />

even take pre-defined actions to help protect information<br />

and other assets. SolarWinds s<strong>of</strong>tware is built to<br />

scale and can support an IT environment <strong>of</strong> any size<br />

and is used by nearly every U.S. federal civilian agency,<br />

DoD branch and intelligence agency. SolarWinds UDT<br />

complements other products, such as SolarWinds Network<br />

Configuration Monitor, SolarWinds Log & Event<br />

Manager, and SolarWinds Server & Application Monitor,<br />

to name a few, providing additional breadth and depth<br />

for continuous monitoring. SolarWinds s<strong>of</strong>tware can<br />

“collect once and report to many,” which gives IT, information<br />

assurance, and security departments the unique<br />

functionality they each need from a single, cost-effective<br />

set <strong>of</strong> tools. SolarWinds UDT licensing is based on the<br />

number <strong>of</strong> switch ports to being monitored. <strong>The</strong> licensing<br />

model features large jumps in switch port count<br />

allowing for rapid growth <strong>of</strong> an organization before an<br />

additional licensing level is reached and can scale to an<br />

unlimited number <strong>of</strong> switch ports.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.solarwinds.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Web page:<br />

http://www.solarwinds.com/user-device-tracker.aspx<br />

Additional information:<br />

https://www.youtube.com/watch?v=s4G_<br />

yPZq7Jc<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rebecca Orr, Corporate Communication<br />

Solarwinds<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (512) 498-6372<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rebecca.orr@solarwinds.com<br />

83


SolarWinds<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

IT Security Products and Solutions<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Security Incident & Event Management (SIEM)<br />

Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SolarWinds Log & Event Manager<br />

Reason this entry deserves to win:<br />

–––––––––––––––––––––––––––––––––––––––– • Threat intelligence feed to help identify malicious<br />

SolarWinds Log & Event Manager (LEM) is a comprehensive<br />

security information and event management • File Integrity Monitoring delivers broader compliance<br />

activity<br />

(SIEM) solution that delivers powerful real-time event support and deeper security intelligence<br />

correlation and analysis for immediate, actionable threat • Fast and powerful forensics via cutting-edge search<br />

intelligence to thwart attacks, contain breaches, and and visual data exploration<br />

maintain continuous compliance in an ever-evolving • Out-<strong>of</strong>-the-box compliance reporting with predefined,<br />

threat landscape.<br />

customizable templates<br />

SolarWinds LEM Highlights:<br />

• Immediate threat detection via true real-time, inmemory<br />

event correlation<br />

• Proactive defense against cyber-attacks and insider<br />

abuse<br />

• Hands-free threat remediation through built-in, automated<br />

responses<br />

With SolarWinds LEM, organizations get what they need<br />

to stay ahead <strong>of</strong> security threats, compliance violations,<br />

and operational issues – all in one package. It<br />

gives users the ability to capture and analyze log data in<br />

real-time from multiple sources around specific incidents,<br />

which is instrumental in quickly identifying and<br />

responding to threats, uncovering policy violations, and<br />

84


esolving vital network issues. SolarWinds LEM surpasses<br />

other solutions by providing built-in Active Responses,<br />

event normalization, and a drag-and-drop UI to create<br />

custom dashboards easily. Active Responses enable<br />

users to take automatic actions for hands-free threat<br />

mitigation, including shutting down breached systems,<br />

blocking IP addresses, killing unexpected processes,<br />

and disabling user accounts. Event normalization makes<br />

reporting and identifying security incidents across different<br />

types <strong>of</strong> log sources simple. Additionally, Solar-<br />

Winds LEM provides advanced search functionality and<br />

easy-to-use data visualization tools to quickly explore<br />

log data, perform event forensics, and identify the rootcause<br />

<strong>of</strong> a security incident or network problem – fast.<br />

SolarWinds LEM goes well beyond traditional SIEM<br />

solutions with key innovations like in-memory correlation,<br />

automated Active Responses, USB Defender technology,<br />

and a groundbreaking approach to IT search.<br />

SolarWinds LEM’s latest release in September <strong>2015</strong><br />

added threat intelligence feed integration to its already<br />

strong feature set, helping the system stay up-to-date on<br />

known threats. Most importantly, SolarWinds listens to<br />

the IT security community to continually improve and<br />

update solutions based on user feedback and real-world<br />

needs. SolarWinds’ user community, thwack, features<br />

a forum in which IT pros can request and vote on new<br />

features and thus directly influence product updates.<br />

Check out the SolarWinds LEM feature request forum<br />

to see this process in action. SolarWinds LEM alleviates<br />

the complexity associated with compliance reporting<br />

by providing over hundreds <strong>of</strong> built-in, “audit-proven”<br />

report templates to address both internal policies and<br />

regulatory requirements, including NIST FISMA, DISA<br />

STIG, PCI-DSS, HIPAA, SOX, and more. Additionally, SolarWinds<br />

LEM is an integral part <strong>of</strong> a continuous monitoring<br />

strategy to maintain security and compliance.<br />

SolarWinds LEM is available on the U.S. General Services<br />

Administration (GSA) Schedule, Department <strong>of</strong> Defense<br />

ESI, and other contract vehicles. SolarWinds s<strong>of</strong>tware is<br />

built to scale and can support an IT environment <strong>of</strong> any<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.solarwinds.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Web page:<br />

http://www.solarwinds.com/siem-security-information-event-management-s<strong>of</strong>tware.aspx<br />

Compliance Video:<br />

https://thwack.solarwinds.com/docs/DOC-<br />

186983<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rebecca Orr, Corporate Communication<br />

Solarwinds<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (512) 498-6372<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rebecca.orr@solarwinds.com<br />

size, small business IT shops and large enterprises alike,<br />

and is used by nearly every U.S. federal civilian agency,<br />

DoD branch and intelligence agency. SolarWinds LEM<br />

employs a node-based license model vs. volume-based,<br />

allowing users to stay within a planned budget as they<br />

deploy and expand their IT infrastructures across multiple<br />

datacenters and geographies. Further, a Workstation<br />

Edition license makes monitoring logs from Windows ®<br />

workstations very cost effective.<br />

85


Securiport, LLC<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

ACCESS CONTROL AND IDENTIFICATION<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Biometric Identification Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Securiport, LLC<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Improving Civil Aviation Security with Securiport’s<br />

Civil Aviation & Immigration Security Services for<br />

Homeland Security & Allies <strong>of</strong> United States <strong>of</strong> America<br />

In today’s interconnected world, Civil Aviation plays<br />

a powerful and impactful role in fueling the global<br />

economy. It has the power to bridge cultural gaps and<br />

bring people together from all over the world. But with<br />

great power, also comes great responsibility. It is up<br />

to governments and their countries to take proactive<br />

steps towards strengthening their Civil Aviation Security<br />

capabilities. With the growing popularity and freedom<br />

to travel basically anywhere in the world with Civil Aviation,<br />

many individuals and criminal organizations are<br />

taking advantage <strong>of</strong> systems in place to conduct illegal<br />

activity such as smuggling narcotics, weapons, and even<br />

humans. In addition, Civil Aviation has increasingly<br />

become the focus <strong>of</strong> the operational activity <strong>of</strong> various<br />

terrorist organizations as a subject, rather than an<br />

implement, <strong>of</strong> their actions [2] . Due to these increased<br />

security risks, it is paramount that airports and security<br />

checkpoints are equipped with the necessary technology,<br />

resources, processes, systems, and training needed<br />

to effectively identify potential security risks and criminal<br />

activity. Securiport’s Integrated Immigration Control<br />

System (IICS) can help countries, such as Honduras,<br />

strengthen their airport security capabilities. By implementing<br />

an intelligent solution that utilizes the most<br />

advanced technologies (such as biometric identification<br />

systems), and is connected with international traveler<br />

databases, security <strong>of</strong>ficials are provided a comprehensive<br />

set <strong>of</strong> traveler data and information that can be used<br />

to confirm a passenger’s identity and uncover certain<br />

security risks. By leveraging these systems, government<br />

86


<strong>of</strong>ficials and immigration <strong>of</strong>ficers will be able to equip<br />

themselves with the actionable data and necessary<br />

information needed to keep all ports <strong>of</strong> entry secure,<br />

ultimately creating safer and more secure nations. This<br />

creates a complete Civil Aviation Security solution, one<br />

that elicits safer travels, more secure nations and is<br />

tailored to provide benefits to both travelers and governments.<br />

<strong>The</strong> Civil Aviation industry has been around<br />

for over 100 years, since Tony Jannus piloted a plane<br />

across Tampa Bay, Florida on January 1st, 1914. Today,<br />

more than 3.3 billion people utilize aviation and take to<br />

the air each year [1] . Whether it’s for business or visiting<br />

family, the Civil Aviation industry has revolutionized<br />

the way people connect, interact and conduct business.<br />

This ability to bring people together from different parts<br />

<strong>of</strong> the globe, known as aviation connectivity, has been<br />

the catalyst for economic growth, connecting individuals<br />

from all over the globe ultimately fueling the global<br />

economy. IATA’s Director General and CEO, Tony Tyler,<br />

spoke about aviation’s role in the global economy and<br />

stated “aviation is helping fuel the growth <strong>of</strong> the global<br />

economy. It brings people together – families, friends<br />

and business colleagues. It helps minds to meet and<br />

exchange ideas in forums. It gives people the freedom<br />

to be almost anywhere in just 24 hours. And it has<br />

turned our wonderfully big planet into a wonderfully<br />

small world <strong>of</strong> enormous and wonderful opportunities.”<br />

<strong>The</strong> aviation industry is truly the lifeblood <strong>of</strong> the<br />

global economy; it supports over 58 million jobs and<br />

$2.4 trillion in annual economic activity [1] . It stimulates<br />

tourism, supports and creates jobs for farmers who<br />

sell fresh produce and flowers in world markets, and<br />

facilitates global supply chains to support collaboration<br />

among workers in different countries to build cars,<br />

airplanes and computers. Aviation helps deliver many <strong>of</strong><br />

the real world goods that are traded in global markets<br />

and has been the catalyst for global economic and social<br />

development. With the increase in popularity and usage<br />

<strong>of</strong> aviation, there has been a “transportation revolution”<br />

around the world, which has paved the way for rapid<br />

and free movement <strong>of</strong> people, commodities and ser-<br />

87<br />

vices on a global scale [2] . This is known as globalization<br />

and provides many positives for our world, but regretfully<br />

has a negative side as well. Beyond any doubt, the<br />

emergence <strong>of</strong> terrorism as a global threat is the biggest<br />

challenge facing the Civil Aviation and security industries.<br />

Terrorism has evolved into a major geopolitical<br />

factor, capable <strong>of</strong> causing systematic crises at a global<br />

scale. And by virtue <strong>of</strong> its functional significance and<br />

vulnerability, Civil Aviation is increasingly becoming<br />

the focus <strong>of</strong> the operational activity <strong>of</strong> different terrorist<br />

groups [2] . High taxes and a lack <strong>of</strong> resources and a<br />

proper infrastructure can hinder the performance and<br />

efficiency <strong>of</strong> Civil Aviation Security from identifying<br />

potential suspects and uncovering criminal activity. In<br />

addition to the threat <strong>of</strong> terrorism, aviation has been<br />

used as a hotbed for a plethora <strong>of</strong> other criminal activity,<br />

such as drug smuggling and passengers traveling<br />

under false names and documents. This makes it critical<br />

to take practical and necessary steps toward improving<br />

the security capabilities at international points <strong>of</strong> entry<br />

such as airports.<br />

Solution: Securiport’s Civil Aviation and Immigration<br />

Security Services (CAISS)<br />

With the increase in globalization and aviation connectivity,<br />

criminal activity and the threat <strong>of</strong> attacks on<br />

aircrafts by terrorists remain persistent and growing<br />

concerns for our world. Countries around the globe<br />

have a number <strong>of</strong> safeguards in place to prevent attacks<br />

against commercial aircrafts such as security checkpoints<br />

at airports where passengers and their carry-on items<br />

are screened for dangerous objects, such as weapons<br />

and explosives. Historically, however, screeners who<br />

operate checkpoints in the U.S. have had difficulty in<br />

detecting potentially dangerous situations, missing as<br />

many as 20% during tests [3] . With the large number<br />

<strong>of</strong> passengers traveling through airports every day, it<br />

is critical that immigration and security checkpoints are<br />

equipped with the proper resources and infrastructure<br />

needed to identify potential security risks and criminal ac-<br />

Continued on next page


tivity. Countries should look to implement intelligent Civil<br />

Aviation solutions that utilize the latest technology, such<br />

as Securiport’s Civil Aviation and Immigration Security<br />

Services (CAISS). Securiport, a global leader in the design<br />

and implementation <strong>of</strong> passenger biometric recognition,<br />

immigration control systems, and intelligent information<br />

management and reporting s<strong>of</strong>tware systems, is committed<br />

to the Science <strong>of</strong> Safer Nations by empowering governments<br />

to enhance their Civil Aviation Security and combat<br />

criminal activity. Securiport’s Integrated Immigration<br />

Control System (IICS) is a comprehensive security solution<br />

that empowers border management and immigration<br />

<strong>of</strong>ficials. <strong>The</strong> IICS utilizes advanced biometric identification<br />

systems and provides proprietary intelligent information<br />

used to identify potential security risks and criminal<br />

activity, further strengthening the effectiveness <strong>of</strong> their<br />

security capabilities. When coupled with Securiport’s Intelligent<br />

Information Management System, a methodology<br />

for cross-referencing passenger information across international<br />

traveler databases, such as INTERPOL’s I-24/7, the<br />

CAISS provides governments, airport security, and immigration<br />

<strong>of</strong>ficials with a comprehensive set <strong>of</strong> traveler data<br />

and information that can be used to confirm a passenger’s<br />

identity and uncover certain security risks. <strong>The</strong> CAISS also<br />

includes Watch-list Management, which crosschecks passenger<br />

information against multiple government databases<br />

and performs real-time identification checks. Implementing<br />

a solution such a Securiport’s CAISS, governments<br />

and airport security <strong>of</strong>ficials can drastically improve the<br />

performance and effectiveness <strong>of</strong> airport security checkpoints<br />

and better prevent terrorists and criminals from illegally<br />

entering or leaving their country’s borders. Beyond<br />

increasing the performance and effectiveness <strong>of</strong> airport<br />

security checkpoints, countries and airliners can work<br />

together to strengthen Civil Aviation Security by improving<br />

the passenger experience. Earlier this year, Securiport was<br />

named a Strategic Partner to the International Air Transport<br />

Association (IATA) and has been involved in discussions<br />

within program areas <strong>of</strong> expertise such as Security<br />

and Passenger Experience. As a contributing member <strong>of</strong><br />

the Passenger Experience area <strong>of</strong> expertise, Securiport has<br />

focused on improving the passenger experience across 14<br />

steps, including security and immigration processes. Many<br />

key stakeholders within the Civil Aviation industry are very<br />

optimistic about mobile technology helping the industry<br />

to meet passengers’ expectations and to provide a more<br />

seamless experience going through security and immigration<br />

checkpoints. Having a better-defined process in place<br />

that incorporates modern technology and intelligent systems<br />

creates a more streamlined airport experience, and<br />

therefore will improve the capabilities and effectiveness <strong>of</strong><br />

airport security checkpoints.<br />

Benefits to Governments<br />

Through implementing Securiport’s Civil Aviation and Immigration<br />

Security Services and other various security solutions,<br />

countries such as Honduras could benefit greatly.<br />

In recent months, the Government <strong>of</strong> the Republic <strong>of</strong><br />

Honduras has been working to prevent and reduce human<br />

and narcotic traffickers as well as other criminals from<br />

illegally crossing its borders. Honduras and the U.S. held a<br />

High Level Security Dialogue to discuss ways the U.S. and<br />

Honduras can continue to work together to strengthen<br />

both countries’ borders. Honduras highlighted its notable<br />

successes over the past year, including the extradition <strong>of</strong><br />

major drug traffickers to the United States and an impressive<br />

drop in the homicide rate. Honduras also outlined its<br />

strategy for countering threats like transnational organized<br />

crime and trafficking in persons and drugs [4] . By strengthening<br />

airport security capabilities and improving traveler<br />

safety, governments such as the Honduran government,<br />

can substantially decrease the amount <strong>of</strong> resources needed<br />

to monitor and deter criminals from illegally entering<br />

or leaving the country. To help accomplish this, Securiport<br />

provides a substantial investment in the technology, training,<br />

and processes for countries in regards to immigration<br />

and security. This ensures the security <strong>of</strong>ficials are<br />

equipped with the necessary knowledge and resources<br />

to improve their security capabilities with little to no<br />

investment from the country itself. With the assistance <strong>of</strong><br />

88


Securiport, implementing advanced solutions such as the<br />

Integrated Immigration Control System and Intelligent<br />

Information Management and Pr<strong>of</strong>iling, Honduras can<br />

substantially improve their border security and dismantle<br />

human smuggling networks and other criminal activity.<br />

Just last year, Securiport’s Intelligent Information Management<br />

Data Analytics enabled international authorities to<br />

interdict a Senegal-based human trafficking ring, resulting<br />

in numerous criminal arrests. In addition, Securiport’s<br />

IICS assisted in the identification and arrest <strong>of</strong> an individual<br />

traveling with a stolen passport, who belonged to a vast<br />

network <strong>of</strong> counterfeiters. By leveraging these systems,<br />

countries such as Honduras will be able to equip themselves<br />

with the actionable data and necessary information<br />

needed to keep all <strong>of</strong> ports <strong>of</strong> entry secure. This creates<br />

safer and more secure nations.<br />

Business Outcomes:<br />

1) http://www.securiport.com/securiports-intelligent-information-management-data-analytics-enable-internationalauthorities-interdict-senegal-based-human-trafficking-ringresulting-numerous-criminal-arrests-preservati/<br />

2) http://www.securiport.com/securiports-integratedimmigration-control-system-assist-in-the-identification-andarrest-<strong>of</strong>-a-passenger-traveling-to-senegal-with-a-stolenpassport/<br />

3) http://www.securiport.com/solutions/intelligent-information-management-and-pr<strong>of</strong>iling/<br />

4) http://www.securiport.com/technology/biometric-identification-systems/<br />

References:<br />

http://www.iata.org/pressroom/speeches/Pages/2014-10-14-01.aspx<br />

http://www.comw.org/tct/fulltext/0503arasly.pdf<br />

http://www.gao.gov/assets/160/156968.pdf<br />

http://www.state.gov/r/pa/prs/ps/<strong>2015</strong>/01/235867.htm<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.securiport.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1) http://www.securiport.com/securiport-and-inmarsat-partner-to-deliver-new-border-securityservice/<br />

2) http://www.securiport.com/securiports-intelligent-information-management-data-analyticsenable-international-authorities-interdict-senegal-based-human-trafficking-ring-resultingnumerous-criminal-arrests-preservati/<br />

3) http://www.securiport.com/securiports-integrated-immigration-control-system-assist-inthe-identification-and-arrest-<strong>of</strong>-a-passengertraveling-to-senegal-with-a-stolen-passport/<br />

4) http://www.securiport.com/solutions/intelligent-information-management-and-pr<strong>of</strong>iling/<br />

5) http://www.securiport.com/technology/biometric-identification-systems/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Borenstein Group<br />

Nominating contact’s <strong>of</strong>fice telephone and<br />

email:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Gal Borenstein, (PR Point <strong>of</strong> Contact)<br />

(703) 385-8178 x28 gal@borensteingroup.com<br />

Megan Gallagher, Client Director <strong>of</strong> Comm.<br />

(202) 339-6288 mgallagher@securiport.com<br />

89


Viscount Systems<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

ACCESS CONTROL AND IDENTIFICATION<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Integrated System for HSP D-12/FIPS 201<br />

Compliance<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Freedom Access Control<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Freedom is an IT-centric access control system that<br />

eliminates the need for traditional access control panels.<br />

Fully compliant with FIPS-201 and HSPD-12, Freedom<br />

leverages the power <strong>of</strong> the IT infrastructure to control<br />

access points through encryption bridges that transform<br />

card readers into IP addressable devices. Data<br />

is encrypted to eliminate the opportunity for cyber<br />

threats, ensuring a high level <strong>of</strong> security is maintained.<br />

Network complexity and upfront costs are immediately<br />

reduced due to a reduction in hardware and infrastructure<br />

investments, allowing users to meet strict budget<br />

requirements, and experience immediate and long-term<br />

return-on-investment. Freedom’s unique architecture<br />

leverages existing IT infrastructure to meet the FICAM<br />

(Federal Identity Credential and Access Management)<br />

requirements by integrating the PIV and PIV-I (personal<br />

identity verification - interoperability) credential<br />

certificate validation and authentication functionality<br />

directly into the access control s<strong>of</strong>tware. Physical access<br />

points are controlled using IP encryption bridges to<br />

connect door hardware and transform card readers into<br />

IP addressable devices. Credentials are presented at the<br />

reader and cryptographically challenged by the Freedom<br />

PACS Validation s<strong>of</strong>tware. <strong>The</strong>se credentials are then authenticated<br />

and validated before an authorization check<br />

is performed to grant or deny access to the cardholder.<br />

Freedom Access Control allows companies to build integrated<br />

access control and video management systems<br />

under one centrally managed or distributed network.<br />

Freedom expands as the security needs and physical<br />

90


footprint <strong>of</strong> the organization change, enabling it to build<br />

large physical security networks without requiring any<br />

additional investment in communication infrastructure.<br />

Organizations <strong>of</strong> any size can integrate physical security<br />

devices such as card readers, ID management, visitor<br />

entry, alarm points, and video applications. Video management<br />

systems can be easily added to Freedom for a<br />

single, unified system. Another unique advantage inherent<br />

on the Freedom s<strong>of</strong>tware platform is an open API<br />

for third-party technology partners or the enterprise’s<br />

IT department for specialized or custom integrations.<br />

Viscount Systems has been awarded contracts to provide<br />

access control for government agencies such as USCIS<br />

because <strong>of</strong> the unique technical capabilities <strong>of</strong> its Freedom<br />

access control solution as well as its compliance<br />

with FIPS-201 and HSPD-12. As part <strong>of</strong> the FICAM testing<br />

process, Freedom underwent a series <strong>of</strong> stringent<br />

compliance tests to ensure the system is not prone to<br />

any type <strong>of</strong> unauthorized network access. <strong>The</strong> result is<br />

a lower cost per door with overall lower annual maintenance<br />

costs than the traditional panel alternatives.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.viscount.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Freedom unifies physical and logical access control initiatives<br />

across enterprises:<br />

http://www.viscount.com/access-control/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CompassPR<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

delphine@compasspulicrelations.com<br />

91


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

COMMUNICATION PRODUCTS<br />

Acoustic Technology, Inc.<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Mass Notification Systems<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

MassAlert ®<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Acoustic Technology, Inc. (ATI Systems) has successfully<br />

developed, designed, manufactured and installed<br />

highly integrated and advanced mass notification systems<br />

for the campus, community, industrial and military<br />

markets since 1981. With a staff well experienced in<br />

acoustic modeling and GIS, ATI is the worldwide leader<br />

in providing Mass Notification Systems that deliver<br />

superior sound coverage and intelligibility for outdoor<br />

and indoor areas, ensuring the safety <strong>of</strong> the populace.<br />

ATI provides complete end-to-end solutions that include<br />

hardware and s<strong>of</strong>tware for audible and visual warning<br />

via multiple layers. <strong>The</strong> solutions consist <strong>of</strong> a simplecompact<br />

design, flexible user-friendly s<strong>of</strong>tware, and<br />

communication methods including RF, P25, IP, Fiber,<br />

DSL, Cellular, or Satellite. MassAlert ® is ATI’s easy-to-use<br />

and configurable GUI s<strong>of</strong>tware. <strong>The</strong> s<strong>of</strong>tware controls<br />

and monitors the system from either an on-site control<br />

station or from a remote locations. MassAlert can<br />

trigger any type <strong>of</strong> alert to an outdoor and/or indoor<br />

coverage area, and to computers or handheld devices<br />

via SMS, email, telephone, or computer popups. This<br />

multi-layered warning system provides a redundant<br />

means <strong>of</strong> notification to ensure that as many people as<br />

possible are being warned <strong>of</strong> the threat/danger. ATI has<br />

installed Mass Notification Systems at thousands <strong>of</strong> DoD<br />

installations worldwide, providing the ability to rapidly<br />

communicate both outside and inside <strong>of</strong> buildings on a<br />

base or facility. ATI’s systems are designed to meet the<br />

Unified Facilities Criteria (UFC) 4-021-01 for the Design,<br />

Operation and Maintenance <strong>of</strong> Mass Notification<br />

92


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.atisystem.com/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.atisystem.com/products/mas.htm<br />

http://www.atisystem.com/products/wp.htm<br />

http://www.atisystem.com/markets/militarymass-notification-systems.htm<br />

http://www.atisystem.com/markets/communitywarning-systems.htm<br />

Systems. ATI’s products are designed with the ability<br />

to easily integrate with other systems or equipment via<br />

Common Alerting Protocol (CAP), IPAWS, dry contact,<br />

RS232, or analog. ATI products can also interface with<br />

any type <strong>of</strong> digital or analog radio, modem, or media<br />

converter. With decades <strong>of</strong> experience in system consulting,<br />

acoustic design, manufacturing and integration,<br />

ATI is the leader in providing reliable mass notification<br />

solutions that utilizes every channel <strong>of</strong> communication<br />

available to ensure that end users receive critical lifesaving<br />

information and direction.<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Tarek Bassiouni<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (617) 567-4969<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

tarek@atisystem.com<br />

93


908 Devices<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

DETECTION PRODUCTS<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Chemical Detection Product or Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

M908<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Today’s First Responders require many different tools to<br />

get answers. With more than six billion chemicals in the<br />

world, First Responders are encountering and uncovering<br />

more unknowns than ever before. As a result,<br />

First Responders require an expansion <strong>of</strong> the tools and<br />

capabilities used directly in the hotzone. 908 Devices<br />

has expanded First Responder capabilities with their<br />

flagship product, M908TM – the first and only handheld<br />

mass spectrometer for downrange threat detection and<br />

identification. M908 utilizes high-pressure mass spectrometry<br />

(HPMS) to provide first responders, CST<br />

teams and the military with the capabilities to detect<br />

and identify a wide range <strong>of</strong> priority threats at the point<br />

<strong>of</strong> need. HPMS enables M908 to operate in the field with<br />

unprecedented levels <strong>of</strong> selectivity and sensitivity. As a<br />

result, the device alerts the user in seconds to the presence<br />

<strong>of</strong> priority chemical warfare agents, toxic industry<br />

chemicals, and precursor materials with incredibly low<br />

false alarm rates even when interferents are present.<br />

Weighing in at 4.4lbs, M908 is battery powered for continuous<br />

operation in the field and has been ruggedized<br />

to MIL-SPEC standards. In addition, unlike conventional<br />

mass spectrometry devices, the device requires little to<br />

no training to operate effectively. Regardless <strong>of</strong> their<br />

level <strong>of</strong> experience, first responders across multiple disciplines<br />

can operate the device with confidence. M908<br />

was specifically purpose-built to fill technology gaps<br />

and meet the evolving needs <strong>of</strong> today’s response mission.<br />

When used in conjunction with presently fielded<br />

Raman, FTIR and IMS devices, M908 adds the “gold<br />

94


standard” <strong>of</strong> mass spectrometry to the survey mission.<br />

M908 can be used as an emergency alert and initial survey<br />

tool for priority threat detection in vapor, solid and<br />

liquid form, from trace to bulk quantities, and render<br />

the scene safe from priority threats. This allows users<br />

more time when using Raman/FTIR tools (bulk solid<br />

and liquid detectors) to further interrogate samples for<br />

identification. Global departments <strong>of</strong> defense, civilian<br />

and military organizations, along with state, local,<br />

federal and foreign government agencies are currently<br />

using M908. To date, M908 has supported missions from<br />

drug interdiction to explosive threat detection within<br />

the past year. 908 Devices’ M908 and HPMS technology<br />

has been proven a success in the field by the Massachusetts<br />

State Hazmat Response Division, who purchased<br />

eight devices this year. <strong>The</strong> company has also been<br />

awarded contracts with the U.S. Army’s Next Generation<br />

Chemical Detector (NGCD) and Defense Threat Reduction<br />

Agency (DTRA) programs to create custom successors<br />

to M908 utilizing HPMS technology. In September<br />

2014, the team was awarded $2.6M in funding from the<br />

U.S government’s Technical Support Working Group<br />

(TSWG) to achieve even higher levels <strong>of</strong> selectivity and<br />

sensitivity with HPMS for field identification and detection<br />

<strong>of</strong> trace explosives.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.908devices.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

More about M908:<br />

http://908devices.com/products/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rebecca Gatesman, Account Executive<br />

PAN Communications<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (617) 502-4365<br />

cell: (716) 218-8531<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rgatesman@pancomm.com<br />

95


Implant Sciences<br />

<strong>2015</strong> Winner<br />

<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

DETECTION PRODUCTS<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Explosive Detection Product or Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

QS-B220<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Explosives Detection Solution: Implant Sciences<br />

QS-B220 Explosives Trace Detector One way to judge<br />

a product is to observe who steps up to buy it. At the<br />

completion <strong>of</strong> a series <strong>of</strong> rigorous and highly competitive<br />

tests, the Department <strong>of</strong> Homeland Security’s Transportation<br />

Security Administration (TSA) and ten European<br />

nations have committed tens <strong>of</strong> millions <strong>of</strong> dollars to<br />

one particular explosive trace detection (ETD) product,<br />

Implant Sciences’ QS-B220. <strong>The</strong> TSA, considered the<br />

leading ETD evaluation agency in the world, qualified<br />

the QS-B220 for passenger and baggage screening in August<br />

<strong>of</strong> 2014, calling it “the new gold standard in trace<br />

detection.” In October, 2014, the QS-B220 became the<br />

first system to pass the European Union’s stringent laboratory<br />

testing protocol. <strong>The</strong>se certifications, based on<br />

the unique capabilities <strong>of</strong> the Implant Sciences technology<br />

platform, quickly led to a number <strong>of</strong> large contracts.<br />

<strong>The</strong> TSA issued an exclusive ID/IQ (basically an open<br />

purchase order) to Implant Sciences for $162 million,<br />

followed by an initial order for 1170 units. <strong>The</strong>se units<br />

are being deployed at airports throughout the U. S. <strong>The</strong><br />

Netherlands, France, Germany, Belgium, Norway, Austria,<br />

the Czech Republic, Romania, Cyprus and Poland<br />

are ECAC countries that have selected the QS-B220 to<br />

date. Nations across the globe have become particularly<br />

concerned about ISIS and other radical groups, who kill<br />

and maim indiscriminately. One <strong>of</strong> their favorite techniques<br />

is to find holes in a country’s aviation systems,<br />

and exploit them. <strong>The</strong> downing <strong>of</strong> a Russian airline<br />

with 224 passengers aboard is the most recent example,<br />

96


though not the only one. <strong>The</strong> hundreds <strong>of</strong> thousands <strong>of</strong><br />

refugees from Syria and Iraq pose another threat – most<br />

refugees want a better life; some are allied with ISIS<br />

and Al Qaeda. No one at this point can tell the difference.<br />

Yet another threat is “homegrown” terrorists,<br />

individuals raised in the West but loyal to radical groups.<br />

Militants have carried out many attacks, including the<br />

marathon bombing in Boston. Some 3700 soldiers<br />

from Western countries, including at least 180 from the<br />

U.S., have served in Iraq and Syria, and the threat is,<br />

they will bring their ideology and terror tactics back to<br />

their home countries. <strong>The</strong> TSA and EU selected Implant<br />

Sciences’ technology to help counter the threats. <strong>The</strong><br />

QS-B220 provides fast, accurate real-time detection <strong>of</strong><br />

trace amounts <strong>of</strong> a wide variety <strong>of</strong> military, commercial<br />

and homemade explosives, as well as drugs, featuring<br />

lower total cost <strong>of</strong> operation. <strong>The</strong> system is easy to use,<br />

with intuitive controls that eliminate or reduce training<br />

requirements. A patented automatic internal calibration<br />

system eliminates the need for manual calibration<br />

using costly disposable materials, and its small footprint<br />

is well suited to crowded security checkpoints. Unlike<br />

some competing systems, its low false alarm rate keeps<br />

airport operations on track. Implant Sciences’ QS-B220<br />

has won Government Security News’ Homeland Security<br />

Award for “Best Explosives Detection Solution” in 2013<br />

and 2014, a judgment clearly confirmed by the TSA and<br />

European authorities who have selected the company’s<br />

system as the best way to protect people and property<br />

from the threat <strong>of</strong> terrorism.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.implantsciences.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Implant Sciences’ QS-B220 has won Government Security<br />

News’ Homeland Security Award for “Best Explosives Detection<br />

Solution” in 2013 and 2014, a judgment clearly confirmed by<br />

the TSA and European authorities who have selected the company’s<br />

system as the best way to protect people and property<br />

from the threat <strong>of</strong> terrorism. Additional relevant information is<br />

available at:<br />

http://www.implantsciences.com/technology/<br />

overview<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Bob Liscouski, Presdident<br />

Implant Sciences Corporation<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (978) 752-1700<br />

cell: (703) 407-9437<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

rliscouski@implantsciences.com<br />

http://www.implantsciences.com/technology/overview/<br />

http://www.implantsciences.com/products/desktopexplosives-drugs-trace-detector/<br />

http://www.implantsciences.com/technology/patents/<br />

97


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

VIDEO SURVEILLANCE/CCTV<br />

Qognify (Formerly NICE Security)<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Intelligent Video Surveillance Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Object Origin by Qognify<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In mere seconds, Object Origin can analyze hours <strong>of</strong><br />

surveillance video in order to detect the first time an object<br />

appears within a recorded scene. A patented video<br />

analytics solution, this unique capability is critical for<br />

high-traffic environments where unattended bags, suspicious<br />

objects, or unauthorized vehicles can cause costly<br />

disruptions or worse. And when combined with Suspect<br />

Search, a video analytics solution that can identifsy and<br />

tracks an individual’s movement in recorded video, law<br />

enforcement and security personnel are able to respond<br />

much faster, potentially criminal and dangerous situations<br />

by finding the object owner’s current location<br />

within seconds.<br />

Why it’s the best Intelligent Video Surveillance solution<br />

When it comes to safety and security, the sooner good<br />

decisions can be made, the more likely risk and damage<br />

can be mitigated. When a suspicious object is involved,<br />

there’s no time to manually scan hours <strong>of</strong> video, and no<br />

room for second-guessing. Object Origin saves precious<br />

time by quickly providing insight into how a suspicious<br />

object got there. With just one click on the object <strong>of</strong><br />

interest, Object Origin starts searching to reveal when,<br />

how, and who placed the object at the scene. This allows<br />

security personnel and law enforcement to make<br />

informed decisions that can save time, resources, cost,<br />

and in some instances lives. While Object Origin can<br />

be used on its own, when it’s part <strong>of</strong> a comprehensive<br />

security solution in conjunction with NICE Suspect<br />

Search, the individual who left the object can also be<br />

quickly located. <strong>The</strong> operator simply uses uploads the<br />

video image <strong>of</strong> the object’s owner the target suspect and<br />

98


Suspect Search goes to work right away to display the<br />

suspect’s path and last known location on premise.<br />

A Range <strong>of</strong> Applications and Attributes<br />

Object Origin mitigates risk and prevents criminal activity<br />

by determining if a suspicious object was intentionally<br />

placed or simply forgotten. Moreover, it is a valuable<br />

forensics tool allowing investigators to quickly find the<br />

origin <strong>of</strong> an object (a piece <strong>of</strong> luggage or a . parked car<br />

for example). And when combined with Suspect Search,<br />

it accelerates suspect apprehension.<br />

Incredible Time Saver<br />

On average, Object Origin can review one hour <strong>of</strong> video<br />

in less than 10 seconds. In a critical situation this is invaluable.<br />

As a business benefit, it can save organizations<br />

substantial costs, such as the case with airports, where<br />

every minute <strong>of</strong> delay or terminal closure can be tens<br />

<strong>of</strong> thousands <strong>of</strong> dollars. It is very efficient during, also<br />

in the case <strong>of</strong> post event investigations, saving hours<br />

<strong>of</strong> manpower otherwise needed to manually reviewing<br />

video footage.<br />

Fast, Accurate and Versatile<br />

Object Origin can be used in a real-time mode as an<br />

incident is unfolding as well as after-the-fact for forensic<br />

investigations. It can provide accurate results for almost<br />

any-sized object, from small purse to car, truck or cargo<br />

container and even if the object is partially occluded. It<br />

can be put into use for searching the origin <strong>of</strong> a variety<br />

<strong>of</strong> objects, from small as a purse or bag up to a car,<br />

truck or container.<br />

Extremely intuitive and Easy-to-use<br />

Simply open the search window on any video channel,<br />

select the object by placing a rectangle around it, and<br />

click search. Results are returned in seconds, showing<br />

the relevant video footage from the movement <strong>of</strong> first<br />

appearance in the scene.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com/video-analytics/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hagar Lev, Marketing Director<br />

Qognify<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: +49 (0) 69 97 17 738<br />

cell: +49 (0) 171 1637-667<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hagar.lev@qognify.com<br />

Part <strong>of</strong> a Comprehensive Security Solution<br />

Once Object Origin has found the initial appearance<br />

<strong>of</strong> the object and who placed it there, the video image<br />

can be input into Suspect Search to locate the person<br />

<strong>of</strong> interest and reveal that person’s last known location<br />

or current whereabouts. Response personnel can be immediately<br />

dispatched.<br />

99


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

OTHER PRODUCTS<br />

B.I.G. Enterprises, Inc.<br />

<strong>2015</strong> Winner – Guard Booths<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Crash Barrier (Gates, Fences, Bollards, Guard<br />

Booths)<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Xtreme Facility Protector (guard booth)<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

At 120 square feet, <strong>The</strong> Xtreme Facility Protector is<br />

built to MIL-A-12560H, UFC 3-340-01, and UFC 3-340-<br />

02 specifications. This buard booth is the top defender<br />

made today. <strong>The</strong> booth delivers the highest level <strong>of</strong><br />

ballistic and blast-resistance available in the industry,<br />

allowing security personnel to remain effective in the<br />

midst <strong>of</strong> the most extreme emergency situation. In addition,<br />

when properly installed, the unit is capable <strong>of</strong><br />

withstanding a direct hit from an F5 tornado. While this<br />

level <strong>of</strong> protection may seem extreme for some applications,<br />

it serves as an example <strong>of</strong> B.I.G.’s commitment<br />

to building guard booths that can meet any challenge.<br />

Sensitive installations <strong>of</strong> all descriptions, including data<br />

storage centers, nuclear installations, and military complexes<br />

can benefit from <strong>The</strong> Xtreme Facility Protector’s<br />

defensive capabilities.<br />

100


Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.bigbooth.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.bigbooth.com/case-studies/october-<strong>2015</strong><br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Sharon Bailey Beckett, President<br />

Brand Orbit<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (626) 791-7954<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

sharonb@brandorbit.com<br />

101


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

OTHER PRODUCTS<br />

CINCH systems, Inc.<br />

<strong>2015</strong> Winner – Crash Barriers/Gates/Fences<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Crash Barrier (Gates, Fences, Bollards, Guard<br />

Booths)<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Rampart Vehicle Barrier System Control<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Shortly after the attacks on 9/11/2001, the world <strong>of</strong> security<br />

changed and expanded like never before. One <strong>of</strong> the<br />

new frontiers <strong>of</strong> security involved the ability to control<br />

and/or prevent vehicle access to high pr<strong>of</strong>ile buildings,<br />

parking areas and even roads surrounding the building<br />

during a threat. Retractable bollards and wedge barriers<br />

were installed at countless government and military<br />

facilities world-wide to control and prevent entry <strong>of</strong><br />

vehicles used for forced access and possible destruction.<br />

Fifteen years have gone by since retractable bollards and<br />

wedge barriers were installed during the early 2000’s.<br />

It has become common that many <strong>of</strong> the barriers systems<br />

installed during this time had become inoperable<br />

and remained in a normally “open” or down position.<br />

Without the ability to have the barriers function when<br />

needed, the facilities were now exposed to a possible<br />

breach. This problem affected a wide-range <strong>of</strong> facilities<br />

that included several important buildings in the Washington<br />

DC area and even a pr<strong>of</strong>essional baseball park in<br />

the Midwest. In each <strong>of</strong> these cases, after inspection it<br />

was found that the bollards and barriers were in working<br />

condition but the controls that sends the proper<br />

signals for up or down, were not working properly.<br />

Enter the Solution <strong>The</strong> Rampart Vehicle Barrier System<br />

(VBS) Control from CINCH systems has proven to be an<br />

ideal solution to get a VBS System back in action, doing<br />

the job it was designed to do—control vehicle access or<br />

seal-<strong>of</strong>f an area. <strong>The</strong> Rampart is the industry’s first AES<br />

Encrypted End-To-End, VBS processor based control<br />

system. <strong>The</strong> Rampart provides encrypted communi-<br />

102


cation between all devices connected to the system,<br />

engineered specifically for high security and vehicle<br />

barrier applications. <strong>The</strong> system is capable <strong>of</strong> controlling<br />

operation <strong>of</strong> one barrier, a sally port or multiple sally<br />

ports or up to 20 barriers for immediate vehicle lockdown.<br />

Rampart’s on-board 233 million event history<br />

provides quick detailed information on the operation<br />

<strong>of</strong> the system and critical ‘black box’ information in the<br />

event <strong>of</strong> an incident at any barrier or gate.<br />

<strong>The</strong> Rampart system is capable <strong>of</strong> controlling and<br />

monitoring:<br />

• Up to 20 VBS controls for bollards, wedge barriers<br />

gate arms, traffic lights and rolling gates.<br />

• 252 definable user access codes.<br />

• On-board storage for up to 233 million events for<br />

archival documentation using a removable SD memory<br />

card.<br />

• Connections through, Copper, Fiber Optics or TCP/IP.<br />

• Field upgradeable s<strong>of</strong>tware, via USB CINCH stick.<br />

• Modular and expandable.<br />

As a testament to the Rampart VBS Control System —<br />

the following is a comment received from a military<br />

facility that was testing installation, operation and reliability<br />

<strong>of</strong> the Rampart system:<br />

“After the installation was complete, my crew<br />

mentioned this was the first time ANY barrier installation<br />

they have done or know <strong>of</strong>, that passed<br />

certification on the first attempt.”<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.cinchsystems.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.cinchsystems.com/products/index.<br />

html<br />

https://www.youtube.com/<br />

watch?v=lMMmgVxM6Po<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Steve Craig<br />

CINCH systems, Inc.<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (763) 497-1059<br />

cell: (651)207-2407<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

steve.craig@cinchsystems.com<br />

103


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

OTHER PRODUCTS<br />

Qognify (Formerly NICE Security)<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Physical Security Information Management<br />

(PSIM) Solution<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Situator by Qognify<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Qognify (formerly NICE Security) continues to innovate<br />

the way PSIM technology is being utilized and increasing<br />

the impact it brings organizations. With Situator being<br />

used by some <strong>of</strong> the world’s largest, most high pr<strong>of</strong>ile<br />

and security-conscious organizations, Qognify has<br />

gained the insight to extract value far beyond the initial<br />

promise PSIM <strong>of</strong>fered. Situator is helping organizations’<br />

save time, cost, resources, reputation, and in some<br />

cases lives. Why it’s the best PSIM solution Measurable<br />

Value According to one <strong>of</strong> the world’s largest oil and gas<br />

companies, using Situator and NiceVision, saved them<br />

$1.2 million in 2014 and expect even greater savings in<br />

<strong>2015</strong>. <strong>The</strong> company, which spent $8 million annually<br />

in guard costs prior to implementing these solutions,<br />

now uses Situator to remotely monitor sites. By selec-<br />

tively moving work that was previously conducted by<br />

on-site security guards to the Global Security Operations<br />

Center (GSOC), the company has been able to cut costs<br />

by 15 percent. Situator’s ability to effectively manage<br />

major incidents was demonstrated at LAX when a recent<br />

SkyWest flight made an emergency landing without its<br />

left landing gear. Situator and GIS were used to successfully<br />

manage the incident from start to finish, including<br />

guiding all first responders – police, fire, operations,<br />

and maintenance – and coordinating the smooth transfer<br />

<strong>of</strong> passengers from plane to safety. <strong>The</strong> Netherland’s<br />

national rail infrastructure operator, ProRail has been<br />

able reduce incident response time by over 60 percent<br />

with Situator, cutting the average intake time down from<br />

fourteen minutes to four. This is a real game changer for<br />

104


the national train system, impacting passenger satisfaction<br />

and its’ bottom line. Operators not only reach<br />

better decisions faster, incidents are managed more<br />

consistently, and ProRail now has full audit capabilities<br />

to prove it is complying with rail regulations. Successful<br />

Global Deployments and Expansions in a Range<br />

<strong>of</strong> Sectors An excellent indicator <strong>of</strong> the value Situator<br />

delivers is the rate at which organizations expand the<br />

solution. One the world’s largest mass transit organizations<br />

initially deployed Situator in several test locations.<br />

In a relatively short period <strong>of</strong> time, they’ve now decided<br />

to expand coverage to their entire environment, helping<br />

protect the over 11 million passengers that travel<br />

with them every day. <strong>The</strong> U.S. government is also using<br />

Situator to help secure one <strong>of</strong> the world’s largest datacenters,<br />

as is the Department <strong>of</strong> Transportation for one<br />

<strong>of</strong> the nation’s largest cities. Market Leadership Industry<br />

Recognition IHS has ranked Situator the global leader<br />

in PSIM solutions (Situator) and named the company<br />

the leading PSIM vendor worldwide. In addition, Frost<br />

& Sullivan has defined Situator as one <strong>of</strong> the few Tier<br />

1 PSIM solutions available. New, extended capabilities<br />

Suspect Search, the award-winning video analytics<br />

technology that reduces search time for individuals in<br />

recorded video from hours or days to minutes, can now<br />

be seamlessly integrated with Situator. Whether it’s an<br />

active shooter situation or when searching for a missing<br />

child, every second counts. <strong>The</strong> integration <strong>of</strong> Situator<br />

and Suspect Search makes them both even more powerful.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com/situation-management-psim/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hagar Lev, Marketing Director<br />

Qognify<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: +49 (0) 69 97 17 738<br />

cell: +49 (0) 171 1637-667<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hagar.lev@qognify.com<br />

105


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Physical Security Products and Solutions<br />

SERVICES<br />

AlliedBarton Security Services<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Best Facility Security/Force Protection Service<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

AlliedBarton RTD-Denver Security Bike Patrol<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

With more than 150 bus routes, six light rail lines,<br />

and many specialty services, Regional Transportation<br />

District-Denver is a primary form <strong>of</strong> transportation for<br />

many. In February 2013, AlliedBarton Security Services,<br />

the industry’s premier provider <strong>of</strong> highly trained security<br />

personnel, transitioned the account, taking on more<br />

than 3800 weekly hours <strong>of</strong> security services, including<br />

armed security <strong>of</strong>ficers, fare verification, special event<br />

support, exterior patrols, rider assistance and more.<br />

AlliedBarton security <strong>of</strong>ficers are posted throughout the<br />

system’s various locations in Denver and the surrounding<br />

counties, 24 hours a day, 365 days a year. Keeping<br />

passengers and employees safe, securing critical<br />

infrastructure and providing customer service is <strong>of</strong> the<br />

utmost importance to transit agencies like RTD. Because<br />

they serve large numbers <strong>of</strong> people in publicly accessible<br />

facilities, public transit agencies have unique security<br />

challenges. In addition, security has become a viable<br />

solution to a traditional transit facility challenge: graffiti.<br />

When RTD was faced with the problem <strong>of</strong> graffiti along<br />

parts <strong>of</strong> the system, AlliedBarton’s local management<br />

suggested developing a bike patrol program to deter<br />

this crime. RTD Transit Police Chief Tarbert agreed to<br />

pilot the program, and within the month, AlliedBarton<br />

worked with Denver Transit to purchase bikes and train<br />

security <strong>of</strong>ficers on the specifics <strong>of</strong> bike patrol through<br />

their partnership with the local police department. <strong>The</strong><br />

first few weeks <strong>of</strong> the pilot proved to be a success, as<br />

graffiti crimes dropped 30%, saving the transit system<br />

thousands <strong>of</strong> dollars on graffiti removal. <strong>The</strong> value <strong>of</strong><br />

106


the program was quickly seen by RTD, transit riders and<br />

the general public. In addition to addressing the graffiti<br />

issue, the bike patrol creates a larger security presence<br />

overall. In August 2014, bike <strong>of</strong>ficers heard a cry for<br />

help along the rail line. <strong>The</strong>y responded to a woman in<br />

distress who had slid down an embankment. <strong>The</strong>y were<br />

able to provide first aid and call for EMS. Had the bike<br />

patrol not been in place, she likely she would not have<br />

been heard or found. With the reopening <strong>of</strong> the Denver<br />

Union Station in the summer <strong>of</strong> 2014, AlliedBarton’s<br />

bike patrol services needed to expand. This highlytravelled<br />

area is the main hub for entertainment venues,<br />

pr<strong>of</strong>essional sports events and many other tourist destinations<br />

and activities. <strong>The</strong> highly-visible bike patrols<br />

are a constant security presence, effective crowd control<br />

and pedestrian traffic management resource, and a fast<br />

response when foot or vehicle patrols cannot respond.<br />

<strong>The</strong> addition <strong>of</strong> AlliedBarton’s bike patrol security <strong>of</strong>ficers<br />

are an effective brand enhancement for RTD and<br />

have become a staple in the downtown Denver area<br />

and along the transit system. Now at over 4787 hours <strong>of</strong><br />

security services a week, bike patrols <strong>of</strong>fer RTD a rapid<br />

deployment force, able to move quickly and respond to<br />

emergencies. <strong>The</strong> visible presence <strong>of</strong> well-trained, uniformed<br />

AlliedBarton security <strong>of</strong>ficers provides a sense <strong>of</strong><br />

security and safety to transit passengers and employees<br />

alike at RTD. <strong>The</strong> collaborative partnership between<br />

AlliedBarton and RTD has created a proactive culture<br />

where security services evolve to meet changing needs.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.alliedbarton.com/Industries-Served/<br />

Transportation<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.alliedbarton.com/Industries-Served/<br />

Transportation<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Charles Bohnenberger, VP Government Services<br />

AlliedBarton Security Services<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (484) 351-1340<br />

cell: (484) 213-6420<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Charles.bohnenberger@alliedbarton.com<br />

katie.killmeyer@alliedbarton.com<br />

107


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable Federal Government Security Program/Project or Initiative<br />

TSA - TSA Airport and Aviation security<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Airport/Aviation Security Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

TSA Airport and Aviation security<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

TSA ETD Fulfillment Program Nations across the globe<br />

have become particularly concerned about “homegrown”<br />

terrorists, individuals raised in the West but<br />

loyal to ISIS, Al Qaida and other radical groups. Some<br />

3700 soldiers from Western countries, including at least<br />

180 from the U.S., have served in Iraq and Syria, and<br />

the threat is, they will bring their ideology and terrorist<br />

tactics back to their home countries. A country’s aviation<br />

system is a particularly inviting target, as bringing<br />

down an airliner or bombing an airport can inflict mass<br />

casualties, sow wide spread fear and gain broad publicity.<br />

<strong>The</strong> agency charged with ensuring that the U. S.<br />

aviation system is safe from extremists is the Transportation<br />

Security Administration (TSA), a unit <strong>of</strong> the federal<br />

Department <strong>of</strong> Homeland Security. <strong>The</strong> TSA is <strong>of</strong>ten<br />

maligned, but the agency has a reputation as a global<br />

leader in evaluating and implementing aviation security<br />

technology. So just as terror groups are awake to opportunity,<br />

the TSA remains vigilant, constantly improving<br />

its systems, including systems used to screen for explosives.<br />

<strong>The</strong> TSA determined that existing explosive trace<br />

detection (ETD) systems were approaching the end <strong>of</strong><br />

their useful life, and two years ago began planning to<br />

replace them with more modern and efficient detectors.<br />

<strong>The</strong> agency’s world-renowned TSA Lab took the<br />

lead in helping identify the best ETD solution. <strong>The</strong> Lab,<br />

located on a 12acre campus at Atlantic City International<br />

Airport, and its staff <strong>of</strong> leading physicists, chemists and<br />

engineers perform research and evaluate a variety <strong>of</strong><br />

technologies on an ongoing basis, including validating<br />

108


solutions to detect and mitigate the threat <strong>of</strong> improvised<br />

explosive devices. <strong>The</strong> testing process is objective and<br />

rigorous. Primary factors considered by the TSA Lab<br />

when evaluating explosive trace detection systems were<br />

the ability to quickly and accurately detect a wide variety<br />

<strong>of</strong> chemicals; a low incidence <strong>of</strong> false alarms, which play<br />

havoc with airport operations; and ease <strong>of</strong> use. A new<br />

but critical factor also in the mix was a product’s high<br />

threshold <strong>of</strong> networking security effectiveness, a recent<br />

requirement for all DHS systems. <strong>The</strong> TSA Lab sent its<br />

report to TSA management, which considered other<br />

important factors, including training requirements and<br />

total cost <strong>of</strong> ownership. Three companies were qualified<br />

by the agency and asked to bid on the ETD replacement<br />

program. <strong>The</strong> process – thorough and impartial – led<br />

to the selection <strong>of</strong> Implant Sciences Corporation’s QS-<br />

B220 explosives detection product. <strong>The</strong> agency awarded<br />

Implant Systems, headquartered in Wilmington, Massachusetts,<br />

an ID/IQ (basically an open purchase order)<br />

amounting to $162 million, and followed up with an initial<br />

order for 1170 systems. Installation <strong>of</strong> the new systems<br />

is scheduled to begin before year end. <strong>The</strong> TSA is<br />

dedicated to keeping the flying public safe. Its ability to<br />

measure risks and identify deterrents is a point <strong>of</strong> pride<br />

to the agency, which is perceived by security agencies in<br />

Europe and around the globe as the leader in assessing<br />

technologies that keep people and property safe from<br />

those who would do harm. As organizations emerge that<br />

use terror to murder and intimidate, as terrorists leave<br />

the battlefield and return home, the Transportation<br />

Security Administration remains a critical, vigilant line<br />

<strong>of</strong> defense for America’s airports and the millions who<br />

fly. <strong>The</strong> agency’s ETD program involving the planning,<br />

evaluation and deployment <strong>of</strong> hundreds <strong>of</strong> advanced<br />

explosive trace detectors at airports throughout the<br />

country is a testament to the agency’s foresight and effectiveness,<br />

and the reason it deserves the <strong>GSN</strong> Government<br />

Excellence award.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.tsa.gov<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Scott Arnold<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (207) 651-4949<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

scttrnld26@gmail.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

160 Brackett Hill Rd<br />

Alfred, ME 04002<br />

109


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable Federal Government Security Program/Project or Initiative<br />

U.S. Department <strong>of</strong> State<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Continuous Clearance Evaluation Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Continuous Clearance Evaluation Program<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> U.S. government currently has about five million<br />

people holding security clearances – confidential, secret<br />

or top secret – all providing consent to certain ongoing<br />

checks in order to maintain that status. Under the<br />

current system, clearances at the confidential, secret<br />

and top secret level are reviewed at 15, 10 and five years<br />

respectively. However, major life changes may occur<br />

within the span <strong>of</strong> five to 15 years, ranging from common<br />

occurrences like financial or marriage changes<br />

to more severe transgressions, such as arrests, drug<br />

or criminal activity. Any <strong>of</strong> these factors could affect a<br />

clearance holder’s personal stability and would merit<br />

a review <strong>of</strong> the access privileges granted to that user.<br />

However, the only check currently in place relies on the<br />

individual self-reporting changes against the 13 Federal<br />

Adjudicative Standards, such as personal conduct, foreign<br />

influence, criminal conduct, drug involvement, etc.<br />

This is an unreliable safeguard, as it places the reporting<br />

requirement on the individual who has a vested interest<br />

in maintaining clearance status. In fact, only a minority<br />

<strong>of</strong> clearance holders actually self-report, and in some<br />

cases, criminal activity went unreported. As the government<br />

continues its efforts to mitigate insider threats,<br />

agencies have been moving to establish more effective<br />

controls. To this effect, agencies have primarily focused<br />

on their physical and network security environment, but<br />

these measures are unable to account for a full picture<br />

<strong>of</strong> risk informed by life events. In a pioneering effort to<br />

change that, the State Department has implemented a<br />

comprehensive risk-based oversight system that utilizes<br />

110


advanced analytics in conjunction with vast amounts <strong>of</strong><br />

available public records and data. By applying information<br />

from sources such as public records, to the 13 Federal<br />

Adjudicative Standards, the State Department can<br />

more effectively identify if an individual has a propensity<br />

to “do bad” (or better yet, identify an individual who<br />

does NOT have such a propensity). This process – similar<br />

to what is successfully used by the insurance industry<br />

to determine if individuals qualify for insurance and at<br />

what rate – enables the Department to make better decisions<br />

on who they might want to engage more closely.<br />

<strong>The</strong> State Department’s structured, phased approach<br />

includes continuous evaluation and re-investigation. By<br />

using public records and data analytics to establish if a<br />

clearance holder has violated the rights provided under<br />

that clearance, the State Department can consistently<br />

evaluate and assess that individual using constantly<br />

updated data stores and establishing re-evaluations for<br />

deeper examination when necessary. <strong>The</strong> implementation<br />

<strong>of</strong> an analytics-fueled continuous evaluation approach<br />

has provided the Department with a complete<br />

picture <strong>of</strong> employees with security clearances: their situation<br />

today; their recent and past history; their potential<br />

susceptibility to outside influence; and their propensity<br />

to commit fraud, as well as deviant or other unsuitable<br />

behavior. It is a breakthrough solution to a governmentwide<br />

issue that can be easily replicated by other agencies.<br />

<strong>The</strong> State Department’s innovation and initiative<br />

deserves to be recognized.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.state.gov<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://lexisnexisspecialservices.com/what-wedo/continuous-evaluation/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Steve Nguyen, Vice President<br />

Federal Programs and LexisNexis Special Services Inc.<br />

(LNSSI)<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

cell: (571) 277-8770<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Steve.Nguyen@Lnssi.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1150 18th Street, N.W., Suite 250<br />

Washington, DC 20036<br />

111


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable State Government Program, Project or Initiative<br />

New York State Division Of Homeland Security<br />

and Emergency Services (DHSES)<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable State Government Security Program/<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

County Emergency Preparedness Assessment (CEPA)<br />

Initiative<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>The</strong> County Emergency Preparedness Assessment<br />

(CEPA) is a statewide initiative to better understand how<br />

the State and local governments are prepared to deal<br />

with various threats and hazards facing New York. As<br />

the number one target <strong>of</strong> terrorism in the Country, and<br />

a State with numerous natural disasters (4th most in<br />

the nation), CEPA is a critical component <strong>of</strong> our overall<br />

homeland security strategy. <strong>The</strong> CEPA process was<br />

developed in collaboration with State and local subject<br />

matter experts and involves facilitated workshops with<br />

each <strong>of</strong> New York’s 58 counties (including NYC) to capture<br />

risk, capability and resource information using an<br />

intuitive, standardized and repeatable process. Through<br />

the CEPA process, DHSES is able to better understand<br />

local capabilities and resource gaps across the entire<br />

homeland security spectrum (e.g., counter-terrorism,<br />

critical infrastructure, communications, cyber-security,<br />

emergency management, public health, etc.), and CEPA<br />

has identified a series <strong>of</strong> common gaps and trends than<br />

can now be better addressed. This information from<br />

CEPA is helping both the State and our local partners<br />

make more informed resource decisions and increasing<br />

our efficiency and effectiveness by focusing our<br />

collective efforts to where they are most needed. CEPA<br />

has also helped us identify and promote best practices<br />

across the State, and the highly collaborative nature<br />

<strong>of</strong> the process has served to strengthen relationships<br />

with our partners. To date, more than 1,300 public<br />

112


and private sector stakeholders have participated in<br />

the CEPA process, and New York’s innovative approach<br />

to the CEPA initiative recently led to a Public Service<br />

Excellence Award from the State Academy for Public<br />

Administration. <strong>The</strong> CEPA process has helped New York<br />

address the longstanding problem <strong>of</strong> how measure and<br />

quantify preparedness. We now have a baseline preparedness<br />

assessment and the ability to monitor and<br />

track our progress over time. <strong>The</strong> federal government,<br />

academics, think-tank and others have long struggled<br />

with how to assess preparedness, but rather than wait<br />

for someone else to develop a solution to this challenge,<br />

New York took decisive action and created a solution<br />

that could serve as national model, and we are actively<br />

sharing information about CEPA with others so that they<br />

may learn from our experiences. <strong>The</strong> growing threat<br />

<strong>of</strong> extreme weather coupled with the complex terrorism<br />

threat environment warrants new and innovative<br />

approaches to increase preparedness, and the CEPA<br />

initiative is an embodiment <strong>of</strong> that ideology. As such,<br />

we would greatly appreciate consideration for the <strong>2015</strong><br />

<strong>GSN</strong> Homeland Security Award.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.dhses.ny.gov/<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

CEPA Overview from DHSES website:<br />

http://www.dhses.ny.gov/planning/<br />

Article about CEPA:<br />

https://www.chds.us/c/item/2543<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Terry Hastings, DHSES Senior Policy Advisor<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (518) 242-5163<br />

cell: (518) 764-0009<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

terry.hastings@dhses.ny.gov<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

NYS DHSES 1220 Washington Ave, Building 7a (7th fl)<br />

Albany, NY 12242<br />

113


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable State Government Program, Project or Initiative<br />

California Department <strong>of</strong> Motor Vehicles,<br />

Investigations Division<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable State Government Security Program/<br />

Project or Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

California DMV Identity Management Program<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In late 2013, the California state legislature passed a law<br />

that went into effect on January 1st <strong>of</strong> this year. <strong>The</strong> law<br />

allows applicants who are unable to provide satisfactory<br />

pro<strong>of</strong> that their presence in the U.S. is authorized under<br />

federal law to receive an original driver’s license without<br />

the fear <strong>of</strong> criminal repercussion. As a result <strong>of</strong> this legislation,<br />

the number <strong>of</strong> Californians who have applied<br />

for a driver’s license has exploded, with half a million<br />

applications filed by April <strong>of</strong> <strong>2015</strong>, double the number<br />

<strong>of</strong> applications that the Department <strong>of</strong> Motor Vehicles<br />

(DMV) originally anticipated. A great majority, 91% <strong>of</strong><br />

these applicants, are still providing the necessary identity<br />

and residency documents, and 203,000 immigrants<br />

had received their licenses by April <strong>2015</strong>. While this<br />

indicates substantial progress towards achieving Califor-<br />

nia’s goal <strong>of</strong> accurately accounting for all residents with<br />

driver’s licenses, it also can result in individuals trying<br />

to beat the system by committing fraud or other crimes<br />

to obtain driver’s licenses. In order to help crack down<br />

on any undocumented immigrants who may wish to<br />

remain undocumented for the furthering <strong>of</strong> criminal activities,<br />

the California DMV’s Investigations Division has<br />

implemented identity pro<strong>of</strong>ing solutions designed to<br />

assist in verifying an individual’s identity. Identity pro<strong>of</strong>ing<br />

integrates data and analytics for identity verification,<br />

knowledge-based authentication and investigative information<br />

into a sophisticated algorithm that generates a<br />

true identity picture. Identity pro<strong>of</strong>ing makes intelligent<br />

information connections beyond the obvious and draws<br />

insights from public records data, while taking steps to<br />

114


observe the highest levels <strong>of</strong> privacy and compliance.<br />

<strong>The</strong> first step in the process is identity discovery as<br />

presented by the applicant. <strong>The</strong> second step is identity<br />

verification. <strong>The</strong> process is accomplished by running it<br />

through a series <strong>of</strong> algorithms to determine if the information<br />

in-hand belongs to an actual person. <strong>The</strong> information<br />

is checked against vast amounts <strong>of</strong> open source<br />

data sets and confirmed by thousands <strong>of</strong> public records.<br />

<strong>The</strong> final step is to authenticate that the applicant is in<br />

fact the owner <strong>of</strong> the identity. This is done through a<br />

quiz engine that tailors questions to the verified individual’s<br />

public records and area demographics based<br />

upon a multitude <strong>of</strong> data domains that are selected by<br />

the agency. This process <strong>of</strong>fers identity authentication<br />

input options beyond just name, address and Social<br />

Security Number, all <strong>of</strong> which can be easily falsified.<br />

<strong>The</strong> ability to properly identify individuals applying for<br />

driver’s licenses has a major impact on homeland security<br />

and public safety. By resolving identities in advance<br />

<strong>of</strong> issuing licenses, the California DMV Investigations<br />

Division is helping to prevent criminal activities before<br />

they occur.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

https://www.dmv.ca.gov/portal/dmv/dmv/<strong>of</strong>fices/investigations<strong>of</strong>fice<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://www.lexisnexis.com/risk/government/<br />

gov-identity-management.aspx<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Dale Ferranto, Law Enforcement Liaison<br />

Western USA, LexisNexis Risk Solutions<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (949) 276-6601<br />

cell: (949) 542-0442<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

dale.ferranto@lexisnexis.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1000 Alderman Dr.<br />

Alpharetta, GA 30005<br />

115


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable Cybersecurity Program, Project or Initiative<br />

City <strong>of</strong> Los Angeles - Centralization <strong>of</strong> Cybersecurity<br />

Incident Data Analysis<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Cybersecurity Program, Project or<br />

Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

City <strong>of</strong> Los Angeles Centralizes Cybersecurity Incident<br />

Data Analysis with Customized Solution<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

With more than 4 million residents, the City <strong>of</strong> Los Angeles<br />

is the second largest city in the Unites States. <strong>The</strong><br />

City <strong>of</strong> LA’s Information Technology Agency (ITA) manages<br />

the IT systems and network traffic for more than<br />

37 departments, including those that support the city’s<br />

financials, taxes and public internet for citizens. ITA is<br />

dedicated to using the most secure, cost effective, highly<br />

efficient and interoperable enterprise-wide technology<br />

to serve the City <strong>of</strong> LA. In recent years, the cybersecurity<br />

threat landscape has dramatically evolved, with an everincreasing<br />

number <strong>of</strong> advanced persistent threats and<br />

targeted breaches. State and city governments today are<br />

tasked with safeguarding citizen data and confidential<br />

information, making them a target for malicious threat<br />

actors. Until recently, if an inconsistency or potential security<br />

breach was found, the protocol in place required<br />

pulling security logs from each individual department,<br />

reviewing and analyzing the disparate reports and then<br />

correlating the data manually with multiple security<br />

tools. This was a time consuming process that not only<br />

left room for error, but did not allow ITA to proactively<br />

tackle enough <strong>of</strong> the cyber threats attempting to infiltrate<br />

the city’s networks. Led by Timothy Lee, the city’s<br />

chief information security <strong>of</strong>ficer (CISO), ITA sought<br />

to implement an advanced security information and<br />

event management (SIEM) solution, to help consolidate,<br />

maintain and analyze security data across the city’s multiple<br />

departments. Given the limited resources Lee and<br />

116


his team faced—from staffing to budget—ITA deployed a<br />

unique, cloud-based SIEM solution to enhance cybersecurity<br />

capabilities. In addition, Lee led the city’s Cyber<br />

Intrusion Command Center (CICC), a city-wide cybersecurity<br />

working group that leads cybersecurity preparation<br />

and response to security incidents, implemented<br />

the city’s first Integrated Security Operations Center<br />

(ISOC). This ISOC collects and correlates log data and<br />

security events from different security appliances across<br />

the city’s departments into a single database and a useable<br />

dashboard and actionable threat intelligence to<br />

enable a high-level security posture city-wide. Instead <strong>of</strong><br />

going to each <strong>of</strong> the 40 plus departments, Lee and his<br />

team can now monitor everything from clickstreams and<br />

transactions, to security events and network activity, and<br />

analyze all the correlated data from a centralized, customized<br />

dashboard, 24x7 anytime, anywhere; turning<br />

machine-generated data into valuable intelligence that,<br />

in turn, drives good decisions. <strong>The</strong> SIEM solution takes<br />

the City <strong>of</strong> LA to another level <strong>of</strong> cybersecurity intelligence.<br />

With the data in one place, the City <strong>of</strong> LA and its<br />

FBI counterpart, FBI Cyberhood Watch, can quickly and<br />

efficiently gather information about threats, and identify<br />

strategies to prevent future intrusions. <strong>The</strong> solution<br />

has undoubtedly enhanced the city’s ability to manage<br />

and protect the city’s critical infrastructure and digital<br />

assets serving Angelenos. Lee states, “I can confidently<br />

say we have avoided a number <strong>of</strong> security breach situations<br />

because we implemented these proactive tools.<br />

We have blocked intrusion attempts, have been able to<br />

swiftly correlate data and share threat information to the<br />

stakeholders, and have been able to expedite the time it<br />

takes to close these security incident tickets.”<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

http://ita.lacity.org/index.htm<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Caralyn Duke, Account Executive<br />

Qorvis MSLGROUP<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: (202) 683-3203<br />

cell: (202) 658-9201<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

caralyn.duke@mslgroup.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

1201 Connecticut Ave, NW Suite 500<br />

Washington, DC 20036<br />

117


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable County/Municipal Program, Project or Initiative<br />

Nanded India, Safe City -<br />

Qognify (Formerly NICE Security)<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable County/Municipal Program, Project or<br />

Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Nanded India, Safe City<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Nanded is the second largest city in the Marathwada<br />

District <strong>of</strong> Maharashtra, India with over half a million<br />

citizens. <strong>The</strong> city holds historical and religious significance,<br />

making it a destination city. Several times a year,<br />

religious tourism spikes, bringing an influx <strong>of</strong> tens <strong>of</strong><br />

thousands <strong>of</strong> visitors and the risk associated with a<br />

swelling population. Maintaining safety and security<br />

is a priority for the municipality, not just during peak<br />

visitation, but every day. Serving as a model for future<br />

deployments around the Maharashtra state and India in<br />

general, the Safe City project was named C-Cube after<br />

the command, control and communication center that<br />

monitors the entire city, 24/7. <strong>The</strong> Safe City solution is<br />

comprised <strong>of</strong> several different integrated components<br />

that work together to provide law enforcement with<br />

situational awareness and management. NICE Situa-<br />

tor Express is the PSIM backbone <strong>of</strong> the solution, with<br />

NiceVision video surveillance including NVRs, decoders<br />

and Crowd Monitoring video analytics supporting it. In<br />

addition, Panic Buttons have been deployed throughout<br />

the city and pre-configured advanced Standard Operating<br />

Procedures (SOP) in the local language, Marathi,<br />

have been developed and implemented to address<br />

the various security and disaster situations that could<br />

potentially occur. Nanded <strong>of</strong>ficials outlined very specific<br />

challenges that they wanted to address effectively, yet<br />

affordably, with the Safe City solution.<br />

<strong>The</strong>y include:<br />

NICE Crowd Monitoring analytics or Panic Button<br />

activation alert C-Cube <strong>of</strong> crowd formations – This<br />

allows operators at C-Cube to control the situation with<br />

118


the help <strong>of</strong> Situator with embedded pre-defined SOPs in<br />

the local language.<br />

Citywide Public Address (PA)System — Nanded is<br />

using NiceVision as their PA system in the event <strong>of</strong> an<br />

emergency – eliminating their need for additional<br />

equipment. Using Nice Vision’s audio out capability, an<br />

operator can simply click on any camera and the camera’s<br />

loudspeaker makes the announcement.<br />

Affordable State-<strong>of</strong>-the-Art Control Room — with a<br />

4x2 LCD video wall and powered by a NICE decoder<br />

and Video Matrix license, providing a true video wall<br />

feel to C-Cube.<br />

Procession and VIP Route Monitoring — NICE Situator<br />

with predefine SOPS help law enforcement monitor<br />

and manage routine operations. For example, during<br />

VIP Route Monitoring the SOP dictates that the corresponding<br />

cameras along the route are displayed on the<br />

video wall enabling real-time monitoring.<br />

Disaster Management — with predefined, escalating<br />

SOPs, operators have the ability effectively and consistently<br />

manage emergency situations including structure<br />

collapses, flooding, railway accidents, earthquakes and<br />

others.<br />

“Nanded’s historical and religious significance made<br />

safety and security a high priority. <strong>The</strong> C-Cube was designed<br />

to facilitate better communications between law<br />

enforcement <strong>of</strong>ficials and the public, and to centralize<br />

safety and security management. With NICE’s support,<br />

we were able to bring our vision to fruition and even<br />

create a public address system that allows us to communicate<br />

quickly with our citizens. We’re experiencing<br />

improvement in security, operations, and communications,<br />

and in the way incidents are handled,” attested,<br />

Mr. Sushil Khodwekar, Municipal Commissioner <strong>of</strong><br />

Nanded City.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

nwcmc.gov.in<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com/situation-management-psim/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hagar Lev, Marketing Director<br />

Qognify<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: +49 (0) 69 97 17 738<br />

cell: +49 (0) 171 1637-667<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hagar.lev@qognify.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Rd<br />

Paramus, NJ 07652<br />

United States<br />

(C/O Steve Maron, @ NICE Systems Inc.)<br />

119


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable County/Municipal Program, Project or Initiative<br />

SAMMC (San Antonio Military Medical Center)<br />

Advanced Security Program, Suspect Search –<br />

Qognify (Formerly NICE Security) <strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable County/Municipal Program, Project or<br />

Initiative<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

SAMMC (San Antonio Military Medical Center) Advanced<br />

Security Program, Suspect Search<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

In the early morning hours, a “code pink” alarm has<br />

been triggered. A newborn baby was moved from its<br />

bed. <strong>The</strong> RFID bracelet on her wrist triggered an alarm<br />

once she was past a predefined security access point.<br />

Automatically, video from relevant nearby cameras is<br />

streamed to the control room, revealing a fast walking<br />

figure, dressed in street clothing. <strong>The</strong> person is clearly<br />

visible when seen on the video camera closest to where<br />

the infant’s RFID bracelet triggered the alarm. That image<br />

is imported into the system, and within seconds, an<br />

album <strong>of</strong> pre-indexed persons appeared on the screen.<br />

From here, visual verification <strong>of</strong> the suspected person<br />

is swift, and his trail across the cameras is shown on the<br />

screen. <strong>The</strong> abductor was clever, selecting a course that<br />

would not be easily traceable otherwise. He knows the<br />

hospital well. But the system is smarter, and security<br />

personnel are dispatched. <strong>The</strong>y track him down to the<br />

parking lot, before leaving hospital grounds. <strong>The</strong> infant<br />

is safe again. <strong>The</strong> above is not a true story, but based<br />

on many incidents that have occurred, nationwide, with<br />

hospital related crime on the rise*. But what if the right<br />

system is deployed – one that enables the happy ending<br />

described above? That potential happy ending is why<br />

this entry deserves to win. <strong>The</strong> San Antonio Military<br />

Medical Center (SAMMC), is the largest U.S. Department<br />

<strong>of</strong> Defense Military Medical facility and Level I Trauma<br />

and Burn Research Center. It is an expansive medical<br />

center; with over 2.1 million square feet. Its ER process-<br />

120


es more than 5,700 emergency room visits a month and<br />

serves hundreds <strong>of</strong> thousands <strong>of</strong> U.S. service members<br />

and their families. SAMMC’s was an early adopter <strong>of</strong><br />

Suspect Search video analytics solution, enabling personnel<br />

to track and locate missing patients or suspicious<br />

persons during time-critical scenarios. Qognify Suspect<br />

Search provides real-time forensics <strong>of</strong> surveillance video<br />

to locate a person <strong>of</strong> interest in situations when time is<br />

<strong>of</strong> the essence. Using a video image, uploaded photo, or<br />

user-generated composite (an “avatar”, based on verbal<br />

description <strong>of</strong> suspect, its clothing, etc)- Suspect Search<br />

can scan hours <strong>of</strong> video in minutes and automatically<br />

filter out 95 percent <strong>of</strong> irrelevant images. Its mapping<br />

capabilities provide geo-spatial awareness by retracing<br />

a suspect’s movements across cameras and pinpointing<br />

his current or last known locations on your premises.<br />

All images, related video, and locations associated with<br />

the search are digitally stamped and can be saved or<br />

shared among law enforcement agencies for use in<br />

investigations and prosecution. <strong>The</strong> adoption <strong>of</strong> Suspect<br />

Search builds on and integrates with SAMMC’s existing<br />

NiceVision video surveillance solution, which has been<br />

used to investigate incidents related to patient safety<br />

and well-being. Now, the combined solution helps<br />

SAMMC teams locate and track persons <strong>of</strong> interest in<br />

a matter <strong>of</strong> seconds and amidst hours <strong>of</strong> footage. <strong>The</strong><br />

combined security program enables SAMMC benefits<br />

such as accelerated response times; contained impact<br />

<strong>of</strong> potential criminal or harmful activity; reduction in<br />

shutdown times and the associated negative impact on<br />

patient care.<br />

* Violent crimes at hospitals on the rise: Over 200 infant<br />

abductions documented from hospitals and other locations<br />

When Hospital Safeguards Against Drug <strong>The</strong>ft Aren’t Enough<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.bamc.amedd.army.mil/sammc.asp<br />

Link to additional information on product,<br />

service or program, with brief description:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.qognify.com/suspect-search-next-generation-video-analytics/<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Hagar Lev, Marketing Director<br />

Qognify<br />

Nominating contact’s <strong>of</strong>fice telephone and cell<br />

phone:<br />

––––––––––––––––––––––––––––––––––––––––<br />

<strong>of</strong>fice: +49 (0) 69 97 17 738<br />

cell: +49 (0) 171 1637-667<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

hagar.lev@qognify.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

461 From Rd<br />

Paramus, NJ 07652<br />

United States<br />

(C/O Steve Maron, @ NICE Systems Inc.)<br />

121


<strong>GSN</strong> <strong>2015</strong> DIGITAL YEARBOOK OF HOMELAND SECURITY AWARDS RECIPIENTS<br />

Most Notable Law Enforcement Interdiction, Arrest, Counter Terrorism<br />

or Crime Prevention Program – Federal/State or Local<br />

Memphis Police Department<br />

<strong>2015</strong> Winner<br />

<strong>Awards</strong> Category:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Most Notable Law Enforcement Interdiction, Arrest,<br />

Counter Terrorism or Crime Prevention Program<br />

Name <strong>of</strong> Nominated Product, Service,<br />

or Program:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Memphis Police Department<br />

Reason this entry deserves to win:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Memphis, a city with a rich history <strong>of</strong> creative and trailblazing<br />

American icons, has captured the city’s creative<br />

spirit in crime prevention as well. <strong>The</strong> Memphis Police<br />

Department is using a combination <strong>of</strong> traditional and<br />

unconventional video surveillance to protect the city’s<br />

citizens and critical infrastructure. MPD has established<br />

a network <strong>of</strong> about 600 surveillance cameras throughout<br />

the city. Many <strong>of</strong> these cameras have smart features<br />

such as line crossing and intrusion detection to make<br />

surveillance more effective. <strong>The</strong>se features can send<br />

alerts to the police when someone enters or leaves a<br />

designated area. Live footage flows back to the MPD<br />

Real Time Crime Center (RTCC). <strong>The</strong> RTCC is a sophisticated<br />

way for the city to fight crime. It features a large<br />

video wall that can pull up live streams from surveil-<br />

lance cameras throughout the city, as well as unique<br />

s<strong>of</strong>tware that provides instant information on recent<br />

criminal activity in a radius around a crime, existing<br />

crime patterns in the surrounding area, and a history<br />

<strong>of</strong> people with arrest records who may frequent the<br />

neighborhood. MPD has also invested in mobile trailers<br />

that are each equipped with two cameras. <strong>The</strong>se trailers,<br />

powered by generators or solar energy, monitor parking<br />

lots, malls, and special events. Officers in the RTCC<br />

can monitor events live and respond as needed. Another<br />

fascinating element <strong>of</strong> this crime prevention program<br />

is a gunshot detection feature that works in tandem<br />

with the PTZ (pan, tilt, zoom) cameras. A circuit board<br />

is programmed to listen for gunshots and essentially<br />

filters out all other noise. Microphones atop the enclo-<br />

122


sure pick up any possible gunshot sounds, and if those<br />

sounds are heard, the detector triangulates the location<br />

<strong>of</strong> the shot. It then guides the camera to pan, tilt, and<br />

zoom in the direction <strong>of</strong> the gunshot within seconds.<br />

Many cameras are placed on utility poles in unique, patented<br />

enclosures that house the cameras and all <strong>of</strong> their<br />

related equipment: a DVR or NVR, an encoder, a power<br />

supply, and a router. A flashing blue light — a nod to<br />

a police car’s light bar on the ro<strong>of</strong> — is placed on the<br />

enclosure as a finishing touch. <strong>The</strong>se units are peppered<br />

throughout the city, from Beale Street to the ports and<br />

many areas in between. To further protect police force<br />

and sensitive operations, a local wifi system is employed<br />

that enables <strong>of</strong>ficers to pull up to an enclosure, connect<br />

to the network, and discreetly pull data without even<br />

exiting the car. Not only is the department receiving a<br />

lot <strong>of</strong> positive feedback on its crime prevention efforts,<br />

but the cameras have become an instrumental tool in<br />

catching criminals — MPD has several cases prosecuted<br />

each week thanks to incidents being captured on video.<br />

Plus, the police are able to dispatch calls from the RTCC<br />

and view live video before the <strong>of</strong>ficer even arrives on the<br />

scene. From gunshot detection to the video evidence<br />

used in prosecutions, it’s clear that MPD’s crime prevention<br />

program has made a measurable impact on public<br />

safety.<br />

Link to Web Page <strong>of</strong> Nominated Organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

www.memphispolice.org<br />

Name and organization <strong>of</strong> nominating<br />

contact for this entry, including name, title,<br />

organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

Anna Boudinot, Content Manager<br />

Hikvision USA<br />

Nominating contact’s email address:<br />

––––––––––––––––––––––––––––––––––––––––<br />

anna.boudinot@hikvision.com<br />

Address <strong>of</strong> nominating contact’s organization:<br />

––––––––––––––––––––––––––––––––––––––––<br />

908 Canada Court<br />

City <strong>of</strong> Industry, CA 91748<br />

123


<strong>The</strong> News Leader in Physical, IT and Homeland Security<br />

CEO/Editorial Director:<br />

Adrian Courtenay<br />

(O) 212-344-0759, X3<br />

(C) 917-696-5782<br />

acourtenay@gsnmagazine.com<br />

Publisher:<br />

Michael Madsen<br />

(O) 212-344-0759, X1<br />

(C) 732-233-8119<br />

mmadsen@gsnmagazine.com<br />

Senior Writer:<br />

Steve Bittenbender<br />

(C) 502-552-1450<br />

sbittenbender@gsnmagazine.com<br />

Senior Writer:<br />

Karen Ferrick-Roman<br />

(C) 412-671-1456<br />

karenferrickroman@gmail.com<br />

Columnist:<br />

John Convy<br />

Convy on Netcentric Security<br />

john@convyassociates.com<br />

Columnist:<br />

Shawn Campbell<br />

shawncampbell@safenetat.com<br />

Guest Expert Contributor:<br />

Denise Rucker Krepp<br />

(C) 202-546-2533<br />

kdrkrepp@hotmail.com<br />

Art Director:<br />

Gerry O’Hara<br />

OHDesign3<br />

(C) 203-249-0626<br />

gerry@ohd3.com<br />

Production Director:<br />

Tammy Waitt<br />

(O) 732-233-0245<br />

twaitt@gsnmagazine.com<br />

Mailing Address:<br />

Government Security News<br />

P.O. Box 7608<br />

Greenwich, CT 06836<br />

Government Security News (ISSN 1548-940X and UPS 022-845) is published in six print editions (Jan, Mar, May, Jul, Sep, Nov) and<br />

six digital editions (Feb, Apr, Jun, Aug, Oct, Dec) per year by World Business Media, LLC, P.O. Box 7608, Greenwich, CT 06836.<br />

Telephone (212) 344-0759. Periodicals postage paid at New York, NY and additional mailing <strong>of</strong>fices. POSTMASTER: Send address<br />

changes to <strong>GSN</strong>: Government Security News, Subscription Department, P.O. Box 316, Congers, NY 10920-0316. For Government<br />

decision makers and business executives involved with security products, systems and series. Qualified U.S. subscribers received<br />

<strong>GSN</strong>: Government Security News at no charge. Non-qualified subscribers in the U.S. are charged $75.00 per year. Canadian and<br />

foreign subscribers are charged $140 International Airmail. Copyright 2016 by <strong>GSN</strong>: Government Security News. All rights reserved.<br />

Printed in the U.S.A. <strong>GSN</strong>: Government Security News assumes responsibility for validity <strong>of</strong> claims in items reported.<br />

126

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!