Certifications

For Certification, a technology must have demonstrated confidence of continued effectiveness: i.e., it will perform as intended, conform to the seller’s specifications, and is safe for use as intended. In addition to the benefits provided under Designation, Certification allows Sellers of antiterrorism technologies to assert the Government Contractor Defense that immunizes Sellers from liability for claims arising from acts of terrorism. Technologies that receive Certification will be also placed on an Approved Products List for Homeland Security. Designation is a prerequisite for Certification.





Company/Technology

Everbridge, Inc.

Approved: June 22, 2015 | Expires: July 31, 2020

Everbridge, Inc. provides the Unified Critical Communications Suite (the “Technology”). The Technology is a software-as-a-service (“SaaS”) mass notification and emergency communications system with a multimodal delivery system. The Technology is designed to facilitate communication between first responders, emergency managers, and constituents, such as residents in a given city or town, during emergency situations, including terrorist attacks, and non-emergency situations, such as interruptions to a customer’s Information Technology (“IT”) infrastructure. The Technology also includes help desk services and software maintenance.


Securitas AB, Securitas Holdings, Inc. and its subsidiaries and affiliates

Approved: June 22, 2015 | Expires: July 31, 2020

Securitas AB, Securitas Holdings, Inc., and the following of its subsidiaries and affiliates: Securitas Services, Inc., Securitas Security Services USA, Inc., Pinkerton Consulting & Investigations, Inc., Globe Aviation Services Corporation, Securitas Security Services of Puerto Rico, Inc., Securitas Critical Infrastructure Services, Inc., and Securitas Critical Infrastructure Services of Puerto Rico, Inc., Securitas Security Services Guam, Inc., Burns International Security Services Company, LLC, Burns International Services Company, LLC, and Pinkerton’s LLC, Paragon Systems Inc., and Security Consultants Group, Inc., provide Security Services (Designation) and Security Guard Services (Designation & Certification). Designation: Security Services (the “Technology”) is total security solution services based on the specific circumstances and characteristics of each deployment. Some services include: armed and unarmed security professionals, access control, ambulatory response, development of a security plan, and post-incident investigation and assessment. Certification: Security Guard Services (the “Technology”) is total security solution services based on the specific circumstances and characteristics of each deployment. Some services include: armed and unarmed security professionals, access control, and ambulatory response. The Technology is specific to security guards receiving ongoing anti-terrorism training.


FireEye, Inc.

Approved: April 22, 2015 | Expires: April 30, 2020

FireEye, Inc. ("FireEye") provides the Multi-Vector Virtual Execution (“MVX”) Engine and Cloud Services (the "Technology"). The Technology is a software platform and related services designed to protect customers from malware. By executing suspicious content in a virtual machine environment, the Technology analyzes software for malicious code and behaviors. Updates to the software are shared with customers via FireEye's cloud service. This is a cyber-related technology.


ServiceSource, Inc.

Approved: February 26, 2015 | Expires: March 31, 2020

ServiceSource, Inc. provides a Mail Processing, Screening, and Distribution Service (the “Technology”). The Technology is an integrated set of processes, procedures, equipment, and personnel designed to safeguard facilities, their occupants, and addressees against mail-borne chemical, biological, radiological, nuclear, and explosive threats. The Technology includes the receipt, screening, processing, and distribution of incoming mail and parcels. It is deployed in accordance with operational requirements set forth by the Department of Homeland Security. Included in the Technology are all manuals and technical documents associated with deployment of the Technology as well as the underlying process.


Virtual Emergency Services, LLC

Approved: January 21, 2015 | Expires: February 29, 2020

Virtual Emergency Services, LLC provides RESPONSEnet™ Emergency Mapping Database System (the “Technology”). The Technology is a scalable, modular, software database system that enables first responders and client personnel to create and securely access, via the Web, pre-determined tactical response plans and coordinate on-site Incident Command System activities to respond to emergency incidents. The Technology also includes total project management, data and imagery collection, data rendering and database population services, as well as onsite and Web-based customer training.


ARES Security Corporation

Approved: January 06, 2015 | Expires: January 31, 2020

ARES Security Corporation provides AVERT® (Automated Vulnerability Evaluation for Risks of Terrorism®) Software and Related Services (the “Technology”), a PC-based software tool for performing vulnerability assessments of user-defined facilities. The Technology uses graph algorithms, 3-D graphic tools, digital imagery information, and other components to develop a 3-D site map of a customer's facility or installation site. The Technology also includes analysts, consultant services to develop the site models and library data from customer-supplied information, associated manuals, related training, technical and optional tactical support.


The Boeing Company

Approved: December 17, 2014 | Expires: January 31, 2020

The Boeing Company (“Boeing”) provides the Aircraft Delivery Security Operations (“ADSO” or the “Technology”). The Technology is a program of plans, personnel, and procedures designed to maintain the safety and security of Boeing commercial aircraft delivery flights. The Technology includes service and maintenance of the Transportation Security Administration-certified screening equipment, software, data, materials, audits of screening processes, and training.


Arizona Sports and Tourism Authority ("AZSTA")

Approved: December 17, 2014 | Expires: January 31, 2020

The Arizona Sports and Tourism Authority (“AZSTA”) provides the University of Phoenix (“UoPS”) Stadium Security Program (the “Technology”). The Technology is a comprehensive security program composed of policies; procedures; physical and electronic security equipment; and trained personnel to detect, deter, prevent, respond to, and mitigate Acts of Terrorism, exclusively at UoPS (inclusive of the Stadium facility and Sportsman’s Park, which consists of the pedestrian plaza, parking lots, and lawn space surrounding the Stadium) on event and on non-event days. The Technology includes the development of security policies and procedures, and is performed in accordance with the NFL Best Practices for Stadium Security.


Eagle Security Group, Inc.

Approved: December 16, 2014 | Expires: December 31, 2019

Eagle Security Group, Inc. provides Eagle Multi-Assault Counter Terrorism Action Capabilities (“MACTAC”) Instructor Course (the “Technology”). The Technology is an advanced law enforcement training course providing knowledge, skills, and abilities for law enforcement officers to develop departmental training programs and policies to counter active shooter and terrorist small arms/IED attacks. The Technology is based on existing MACTAC concepts and consists of both classroom and tactical training which includes 24 blocks of instruction delivered over 40 hours/5 days.


International Business Machines Corporation

Approved: December 11, 2014 | Expires: January 31, 2020

International Business Machines Corporation provides the Risk Assessment Platform (“RAP”) system (the “Technology”). The Technology is a system of integrated hardware, software, and services incorporated into an operating framework that can provide authentication and risk assessment information to the Transportation Security Administration (“TSA”). The main technical components that comprise the Technology are the TSA Consolidated Screening Gateway, the TSA Secure Flight program, and the TSA Transportation Vetting System. The Technology also includes installation and configuration, training, and maintenance services.