Certifications

For Certification, a technology must have demonstrated confidence of continued effectiveness: i.e., it will perform as intended, conform to the seller’s specifications, and is safe for use as intended. In addition to the benefits provided under Designation, Certification allows Sellers of antiterrorism technologies to assert the Government Contractor Defense that immunizes Sellers from liability for claims arising from acts of terrorism. Technologies that receive Certification will be also placed on an Approved Products List for Homeland Security. Designation is a prerequisite for Certification.





Company/Technology

Ilitch Holdings, Inc.

Approved: September 21, 2015 | Expires: October 31, 2020

Ilitch Holdings, Inc., Olympia Entertainment, Inc., and the Detroit Tigers, Inc. provide the Security Program for Comerica Park (the “Technology”). The Technology is a comprehensive integrated security system which is comprised of physical and electronic security measures, tools, and procedures designed to detect, deter, prevent, respond to, and mitigate Acts of Terrorism at Comerica Park during Game Day, Non-Game Day (In-Season), Non-Season, and Special Events. The Technology includes the selection and maintenance of electronic security measures and the hiring, vetting, training, and management oversight of its employees and contractors.


Universal Protection Service, LP, and Universal Protection Service, LLC

Approved: September 21, 2015 | Expires: March 31, 2017

Universal Protection Service, LP, and Universal Protection Service, LLC provide Shopping Mall Security Services (the “Technology”). The Technology consists of physical security project management and trained security officers at retail commercial facilities. The Technology also includes training manuals, guides, and other materials.


Honeywell Technology Solutions Inc. (“HTSI”) and Honeywell International Inc.

Approved: August 25, 2015 | Expires: August 31, 2020

Honeywell Technology Solutions Inc. (“HTSI”) and Honeywell International Inc. provide Physical Security Services (the “Technology”). The Technology consists of the design, installation, and maintenance of physical security systems, including: intrusion detection systems, video surveillance systems, facility security barrier systems and gate operators, perimeter security and surveillance systems, wide area mass notification systems (e.g., Giant Voice), and cargo screening systems. The Technology is deployed for Federal Government users. The Technology also includes the selection of physical security system hardware and software, selection and oversight of subcontractors, and all technical manuals developed for use with the Technology.


Everbridge, Inc.

Approved: June 22, 2015 | Expires: July 31, 2020

Everbridge, Inc. provides the Unified Critical Communications Suite (the “Technology”). The Technology is a software-as-a-service (“SaaS”) mass notification and emergency communications system with a multimodal delivery system. The Technology is designed to facilitate communication between first responders, emergency managers, and constituents, such as residents in a given city or town, during emergency situations, including terrorist attacks, and non-emergency situations, such as interruptions to a customer’s Information Technology (“IT”) infrastructure. The Technology also includes help desk services and software maintenance.


Securitas AB, Securitas Holdings, Inc. and its subsidiaries and affiliates

Approved: June 22, 2015 | Expires: July 31, 2020

Securitas AB, Securitas Holdings, Inc., and the following of its subsidiaries and affiliates: Securitas Services, Inc., Securitas Security Services USA, Inc., Pinkerton Consulting & Investigations, Inc., Globe Aviation Services Corporation, Securitas Security Services of Puerto Rico, Inc., Securitas Critical Infrastructure Services, Inc., and Securitas Critical Infrastructure Services of Puerto Rico, Inc., Securitas Security Services Guam, Inc., Burns International Security Services Company, LLC, Burns International Services Company, LLC, and Pinkerton’s LLC, Paragon Systems Inc., and Security Consultants Group, Inc., provide Security Services (Designation) and Security Guard Services (Designation & Certification). Designation: Security Services (the “Technology”) is total security solution services based on the specific circumstances and characteristics of each deployment. Some services include: armed and unarmed security professionals, access control, ambulatory response, development of a security plan, and post-incident investigation and assessment. Certification: Security Guard Services (the “Technology”) is total security solution services based on the specific circumstances and characteristics of each deployment. Some services include: armed and unarmed security professionals, access control, and ambulatory response. The Technology is specific to security guards receiving ongoing anti-terrorism training.


FireEye, Inc.

Approved: April 22, 2015 | Expires: April 30, 2020

FireEye, Inc. ("FireEye") provides the Multi-Vector Virtual Execution (“MVX”) Engine and Cloud Services (the "Technology"). The Technology is a software platform and related services designed to protect customers from malware. By executing suspicious content in a virtual machine environment, the Technology analyzes software for malicious code and behaviors. Updates to the software are shared with customers via FireEye's cloud service. This is a cyber-related technology.


ServiceSource, Inc.

Approved: February 26, 2015 | Expires: March 31, 2020

ServiceSource, Inc. provides a Mail Processing, Screening, and Distribution Service (the “Technology”). The Technology is an integrated set of processes, procedures, equipment, and personnel designed to safeguard facilities, their occupants, and addressees against mail-borne chemical, biological, radiological, nuclear, and explosive threats. The Technology includes the receipt, screening, processing, and distribution of incoming mail and parcels. It is deployed in accordance with operational requirements set forth by the Department of Homeland Security. Included in the Technology are all manuals and technical documents associated with deployment of the Technology as well as the underlying process.


Virtual Emergency Services, LLC

Approved: January 21, 2015 | Expires: February 29, 2020

Virtual Emergency Services, LLC provides RESPONSEnet™ Emergency Mapping Database System (the “Technology”). The Technology is a scalable, modular, software database system that enables first responders and client personnel to create and securely access, via the Web, pre-determined tactical response plans and coordinate on-site Incident Command System activities to respond to emergency incidents. The Technology also includes total project management, data and imagery collection, data rendering and database population services, as well as onsite and Web-based customer training.


ARES Security Corporation

Approved: January 06, 2015 | Expires: January 31, 2020

ARES Security Corporation provides AVERT® (Automated Vulnerability Evaluation for Risks of Terrorism®) Software and Related Services (the “Technology”), a PC-based software tool for performing vulnerability assessments of user-defined facilities. The Technology uses graph algorithms, 3-D graphic tools, digital imagery information, and other components to develop a 3-D site map of a customer's facility or installation site. The Technology also includes analysts, consultant services to develop the site models and library data from customer-supplied information, associated manuals, related training, technical and optional tactical support.


The Boeing Company

Approved: December 17, 2014 | Expires: January 31, 2020

The Boeing Company (“Boeing”) provides the Aircraft Delivery Security Operations (“ADSO” or the “Technology”). The Technology is a program of plans, personnel, and procedures designed to maintain the safety and security of Boeing commercial aircraft delivery flights. The Technology includes service and maintenance of the Transportation Security Administration-certified screening equipment, software, data, materials, audits of screening processes, and training.