Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

Universal

Approved: February 03, 2015 | Expires: February 29, 2020

Universal Protection Service, LP, Universal Protective Service, LLC, and United Security, LLC d/b/a Universal Protection Service (together “Universal”), provide Security and Guard Services (the “Technology”). The Technology provides unarmed security guard services and is designed to deter, prevent, detect, alert, and respond to a variety of security threats at commercial buildings, industrial/manufacturing complexes, and healthcare facilities. The Technology includes: pre-deployment security assessments, customer training programs, and emergency preparedness services.


Virtual Emergency Services, LLC

Approved: January 21, 2015 | Expires: February 29, 2020

Virtual Emergency Services, LLC provides RESPONSEnet™ Emergency Mapping Database System (the “Technology”). The Technology is a scalable, modular, software database system that enables first responders and client personnel to create and securely access, via the Web, pre-determined tactical response plans and coordinate on-site Incident Command System activities to respond to emergency incidents. The Technology also includes total project management, data and imagery collection, data rendering and database population services, as well as onsite and Web-based customer training.


ARES Security Corporation

Approved: January 06, 2015 | Expires: January 31, 2020

ARES Security Corporation provides AVERT® (Automated Vulnerability Evaluation for Risks of Terrorism®) Software and Related Services (the “Technology”), a PC-based software tool for performing vulnerability assessments of user-defined facilities. The Technology uses graph algorithms, 3-D graphic tools, digital imagery information, and other components to develop a 3-D site map of a customer's facility or installation site. The Technology also includes analysts, consultant services to develop the site models and library data from customer-supplied information, associated manuals, related training, technical and optional tactical support.


Tailored Solutions & Consulting, Inc.

Approved: December 19, 2014 | Expires: January 31, 2018

Tailored Solutions & Consulting (dba “TSC Advantage”) provides the Threat Vector Manager™ (the “Technology”). The Technology is a methodology used for assessing and examining holistic cyber security risk. The deliverable produced through the execution of the Technology is called the Enterprise Security Assessment (“ESA”). The ESA examines an organization’s security maturity, resiliency, the effectiveness of existing security investments, and security preparedness within six categories.


The Boeing Company

Approved: December 19, 2014 | Expires: January 31, 2020

The Boeing Company provides the Boeing Entity Management Framework (the “Technology”). The Technology is a software framework designed for building identity management, case management, screening, incident reporting, and criminal history applications. The Technology consists of an entity management framework, a data repository, and a data ingest function. It also includes system development and customization, installation, integration, system administration, training, maintenance, and off-site support.


The Boeing Company

Approved: December 17, 2014 | Expires: January 31, 2020

The Boeing Company (“Boeing”) provides the Aircraft Delivery Security Operations (“ADSO” or the “Technology”). The Technology is a program of plans, personnel, and procedures designed to maintain the safety and security of Boeing commercial aircraft delivery flights. The Technology includes service and maintenance of the Transportation Security Administration-certified screening equipment, software, data, materials, audits of screening processes, and training.


Arizona Sports and Tourism Authority ("AZSTA")

Approved: December 17, 2014 | Expires: January 31, 2020

The Arizona Sports and Tourism Authority (“AZSTA”) provides the University of Phoenix (“UoPS”) Stadium Security Program (the “Technology”). The Technology is a comprehensive security program composed of policies; procedures; physical and electronic security equipment; and trained personnel to detect, deter, prevent, respond to, and mitigate Acts of Terrorism, exclusively at UoPS (inclusive of the Stadium facility and Sportsman’s Park, which consists of the pedestrian plaza, parking lots, and lawn space surrounding the Stadium) on event and on non-event days. The Technology includes the development of security policies and procedures, and is performed in accordance with the NFL Best Practices for Stadium Security.


Eagle Security Group, Inc.

Approved: December 16, 2014 | Expires: December 31, 2019

Eagle Security Group, Inc. provides Eagle Multi-Assault Counter Terrorism Action Capabilities (“MACTAC”) Instructor Course (the “Technology”). The Technology is an advanced law enforcement training course providing knowledge, skills, and abilities for law enforcement officers to develop departmental training programs and policies to counter active shooter and terrorist small arms/IED attacks. The Technology is based on existing MACTAC concepts and consists of both classroom and tactical training which includes 24 blocks of instruction delivered over 40 hours/5 days.


RhinoCorps, Ltd., Co.

Approved: December 12, 2014 | Expires: December 31, 2019

RhinoCorps Ltd., Co. provides Simajin/Vanguard Vulnerability Assessment Tool (the “Technology”). The Technology is a software tool used to assist facility operators in conducting risk assessments of their critical infrastructure and in quantifying the effectiveness of security procedures and defensive countermeasures. The Technology also includes systems engineering and technical assistance support services, execution of attack scenario simulations based on customer guidance and facility information, customer training, and technical documentation.


Messinger Mortuary & Chapel, Inc., d/b/a Messinger Indian School Mortuary, Inc.

Approved: December 11, 2014 | Expires: January 31, 2020

Messinger Mortuary & Chapel, Inc., d/b/a Messinger Indian School Mortuary, Inc., and its three subsidiaries Messinger Fountain Hills Mortuary, Inc., Messinger Pinnacle Peak Mortuary, Inc., and Messinger Payson Funeral Home, Inc., provide Certified Cargo Screening Facilities (the "Technology"). The Technology is designed to aid in meeting the congressional mandate that 100 percent of cargo placed on passenger airplanes be screened. The Technology includes, and provides, screeners and programmatic personnel for the screening of cargo in accordance with the Transportation Security Administration (“TSA”)’s Certified Cargo Screening Program at TSA-approved Certified Cargo Screening Facilities.