Certifications

For Certification, a technology must have demonstrated confidence of continued effectiveness: i.e., it will perform as intended, conform to the seller’s specifications, and is safe for use as intended. In addition to the benefits provided under Designation, Certification allows Sellers of antiterrorism technologies to assert the Government Contractor Defense that immunizes Sellers from liability for claims arising from acts of terrorism. Technologies that receive Certification will be also placed on an Approved Products List for Homeland Security. Designation is a prerequisite for Certification.





Company/Technology

Leidos, Inc.

Approved: September 29, 2015 | Expires: October 31, 2020

Leidos, Inc. provides the Vehicle and Cargo Inspection System (“VACIS®” or the “Technology”). The Technology is a non-intrusive inspection tool used to create 2-dimensional radioscopic images of large vehicles, cargo containers, palletized cargo, and other bulk cargo. Operating as a density imager against the threat posed by Weapons of Mass Destruction, smuggling of stowaways, and conventional weapons, VACIS® detects threats through the projection of shapes, objects, or densities that are inconsistent with customs declarations and shipping documents.


Mutualink, Inc.

Approved: September 29, 2015 | Expires: October 31, 2020

Mutualink, Inc. provides Mutualink (the "Technology"). The Technology is an interoperability multimedia communications sharing product that securely connects disparate communication and media sources together for real-time collaboration. The Technology includes training, user manuals, creation, evaluation, exercise and use of concept of operations and standard operating procedures in concert with customers, roll call and table top exercises, live incident user and operational assistance as requested and other customer support services.


Harris Corporation and Exelis Inc.

Approved: September 21, 2015 | Expires: September 30, 2020

Harris Corporation and Exelis Inc. provide Operations and Maintenance (“O&M”) of the Tethered Aerostat Radar System (“TARS”) program (the “Technology”). The Technology is a set of services including program management, operations, maintenance, mission support, and life-cycle management support, and personnel training. The Technology includes the day-to-day operation at contract specific sites as well as a TARS Control Center that is active 24 hours per day/seven days per week, a Program Management Office, and a repair depot and warehouse facility known as the TARS Support Center.


Ilitch Holdings, Inc.

Approved: September 21, 2015 | Expires: October 31, 2020

Ilitch Holdings, Inc., Olympia Entertainment, Inc., and the Detroit Tigers, Inc. provide the Security Program for Comerica Park (the “Technology”). The Technology is a comprehensive integrated security system which is comprised of physical and electronic security measures, tools, and procedures designed to detect, deter, prevent, respond to, and mitigate Acts of Terrorism at Comerica Park during Game Day, Non-Game Day (In-Season), Non-Season, and Special Events. The Technology includes the selection and maintenance of electronic security measures and the hiring, vetting, training, and management oversight of its employees and contractors.


Universal Protection Service, LP, and Universal Protection Service, LLC

Approved: September 21, 2015 | Expires: March 31, 2017

Universal Protection Service, LP, and Universal Protection Service, LLC provide Shopping Mall Security Services (the “Technology”). The Technology consists of physical security project management and trained security officers at retail commercial facilities. The Technology also includes training manuals, guides, and other materials.


Honeywell Technology Solutions Inc. (“HTSI”) and Honeywell International Inc.

Approved: August 25, 2015 | Expires: August 31, 2020

Honeywell Technology Solutions Inc. (“HTSI”) and Honeywell International Inc. provide Physical Security Services (the “Technology”). The Technology consists of the design, installation, and maintenance of physical security systems, including: intrusion detection systems, video surveillance systems, facility security barrier systems and gate operators, perimeter security and surveillance systems, wide area mass notification systems (e.g., Giant Voice), and cargo screening systems. The Technology is deployed for Federal Government users. The Technology also includes the selection of physical security system hardware and software, selection and oversight of subcontractors, and all technical manuals developed for use with the Technology.


Everbridge, Inc.

Approved: June 22, 2015 | Expires: July 31, 2020

Everbridge, Inc. provides the Unified Critical Communications Suite (the “Technology”). The Technology is a software-as-a-service (“SaaS”) mass notification and emergency communications system with a multimodal delivery system. The Technology is designed to facilitate communication between first responders, emergency managers, and constituents, such as residents in a given city or town, during emergency situations, including terrorist attacks, and non-emergency situations, such as interruptions to a customer’s Information Technology (“IT”) infrastructure. The Technology also includes help desk services and software maintenance.


Securitas AB, Securitas Holdings, Inc. and its subsidiaries and affiliates

Approved: June 22, 2015 | Expires: July 31, 2020

Securitas AB, Securitas Holdings, Inc., and the following of its subsidiaries and affiliates: Securitas Services, Inc., Securitas Security Services USA, Inc., Pinkerton Consulting & Investigations, Inc., Globe Aviation Services Corporation, Securitas Security Services of Puerto Rico, Inc., Securitas Critical Infrastructure Services, Inc., and Securitas Critical Infrastructure Services of Puerto Rico, Inc., Securitas Security Services Guam, Inc., Burns International Security Services Company, LLC, Burns International Services Company, LLC, and Pinkerton’s LLC, Paragon Systems Inc., and Security Consultants Group, Inc., provide Security Services (Designation) and Security Guard Services (Designation & Certification). Designation: Security Services (the “Technology”) is total security solution services based on the specific circumstances and characteristics of each deployment. Some services include: armed and unarmed security professionals, access control, ambulatory response, development of a security plan, and post-incident investigation and assessment. Certification: Security Guard Services (the “Technology”) is total security solution services based on the specific circumstances and characteristics of each deployment. Some services include: armed and unarmed security professionals, access control, and ambulatory response. The Technology is specific to security guards receiving ongoing anti-terrorism training.


FireEye, Inc.

Approved: April 22, 2015 | Expires: April 30, 2020

FireEye, Inc. ("FireEye") provides the Multi-Vector Virtual Execution (“MVX”) Engine and Cloud Services (the "Technology"). The Technology is a software platform and related services designed to protect customers from malware. By executing suspicious content in a virtual machine environment, the Technology analyzes software for malicious code and behaviors. Updates to the software are shared with customers via FireEye's cloud service. This is a cyber-related technology.


ServiceSource, Inc.

Approved: February 26, 2015 | Expires: March 31, 2020

ServiceSource, Inc. provides a Mail Processing, Screening, and Distribution Service (the “Technology”). The Technology is an integrated set of processes, procedures, equipment, and personnel designed to safeguard facilities, their occupants, and addressees against mail-borne chemical, biological, radiological, nuclear, and explosive threats. The Technology includes the receipt, screening, processing, and distribution of incoming mail and parcels. It is deployed in accordance with operational requirements set forth by the Department of Homeland Security. Included in the Technology are all manuals and technical documents associated with deployment of the Technology as well as the underlying process.