2021 ‘ASTORS’ Award Winners & 9/11 Special Guests Honored (Part 3 NE-Si) – 107.180.56.147

2021-‘astors’-award-winners-&-9/11-special-guests-honored-(part-3-ne-si)-–-10718056.147

As you may know !

Legendary Police Commissioner William Bratton of the New York Police Department, the Boston Police Department, and former Chief of the Los Angeles Police Department, was live at the 2021 'ASTORS' Awards Luncheon, meeting with attendees and signing copies of his latest work ‘The Profession: A Memoir of Community, Race, and the Arc of Policing in America,’ courtesy of the generosity of our 2021 ‘ASTORS’ Awards Premier Sponsors AMAROK, ATI Systems, Attivo Networks, Automatic Systems of America, Fortior Solutions, Reed Expositions, and SIMS Software.
Legendary Police Commissioner William Bratton of the NYPD, BPD, and LAPD, was live at the 2021 'ASTORS' Awards Luncheon, meeting with attendees and signing copies of his latest work ‘The Profession: A Memoir of Community, Race, and the Arc of Policing in America,’ courtesy of the generosity of our 2021 ‘ASTORS’ Awards Premier Sponsors AMAROK, ATI Systems, Attivo Networks, Automatic Systems of America, Fortior Solutions, Reed Expositions, and SIMS Software. (Be sure to see AST Exclusive Interview facilitated by Dr. Kathleen Kiernan in Part 5.)

The 2021 ‘ASTORS’ Homeland Security Awards Presentation Luncheon was an exclusive event featuring two hundred representatives of law enforcement, public safety, and top industry leaders who came together to honor the selfless service of those who stand on the front lines, and those who stand beside them – providing the capabilities and technologies to create a safer world for generations to come. (Continued)

  • NEC I:Delight


  • Star Alliance, one of the world’s largest airline alliance, connecting customers of prominent airlines like Lufthansa, United Airlines, and Air Canada, late last year launched Star Alliance Biometrics, powered by NEC technology’s NEC I:Delight identity platform software.

NEC I-Delight
NEC I:Delight revolutionizes the customer experience by streamlining your physical and digital identities into a trusted ecosystem, creating a unified experience. With contactless solutions that make touchpoints touchless, NEC I:Delight shapes personalized experiences that are safe, secure and hygenic while being seamlessly enjoyable.
  • A service that benefits everyone from passengers to TSA agents, NEC’s I:Delight offers a contactless mechanism that ultimately makes the airport experience more hygienic, something we’re all grateful for as the fight against COVID-19 rages on.

  • Technology truly made for its time; the NEC face matching algorithm has proven its accuracy even with a face mask, as identity verification can occur in as little as 1.5 seconds .

  • Biometrics-powered security is the future of travel, one where passengers seamlessly navigate across a global network with a single secure digital ID.

(The world’s largest global airline alliance, Star Alliance, launched its new #biometrics service, Star Alliance Biometrics in November 2020. The identity management platform provides travelers with a seamless curb-to-gate, #touchless experience using NEC I:Delight. This technology enables travelers simply create a single #DigitalID to pass through the airport from check-in, bag drop, security checkpoints to boarding, and beyond. Courtesy of NEC Corporation of America.)

  • NEC NeoFace Thermal Express

  • As the COVID-19 pandemic has stretched on through the year, airports have gone above and beyond to avoid becoming hotspots of virus contraction as people cross paths from across the globe.

Hawaii has deployed NEC’s innovative NeoFace Thermal Express technology, at all five Hawaiian aiports which automatically screens the body temperature of every arriving passenger entering the airport terminal.
  • Every state has taken a different approach to combat the deadly virus’s presence in travel hubs, the Hawaii Department of Transportation (HDOT) turned to the experts in AI-powered technology for safety and security, NEC Corporation.

  • The State of Hawaii has deployed NEC’s innovative NeoFace Thermal Express technology, at all five Hawaiian airports which automatically screens the body temperature of every arriving passenger entering the airport terminal, to ensure they do not become hotspots of virus contraction as people cross paths from across the globe.

(The Hawaii Department of Transportation (DoT) partners with NEC to install a hygienic, contactless thermal body temperature screening solution at Hawaii’s 5 major airports. The purpose of this project is to protect the health and safety of the traveling community, the visitors and the residents and to prevent the spread of COVID-19. Courtesy of NEC Corporation of America and YouTube.)

  • *NEC Corporation of America was also recognized in the 2018, and 2017 ‘ASTORS’ Homeland Security Awards Programs.

  • NeoFace, deployed by Leidos

  • NEC National Security Systems (NSS) provides full-service solutions for large agencies using the intellectual property and resources of the global NEC brand. 

NEC National Security Systems (NSS) provides full-service solutions for large agencies using the intellectual property and resources of the global NEC brand. (Courtesy of YouTube)
NEC National Security Systems (NSS) provides full-service solutions for large agencies using the intellectual property and resources of the global NEC brand. (Courtesy of YouTube)
  • Redstone Arsenal, one of the most important military bases in the US (serving the DoDDOJ, the NASA, and the likely future home of USSPACECOM, requires best-in-class security solutions, and with 44,000 employees and guests using the facility, it also requires solutions geared towards improving daily efficiency around the base.

  • In March 2021 Redstone began using a new NEC Face Recognition Algorithm (NeoFace) deployed by Leidos to verify all entries onto the base, while seated comfortably in their vehicles.

  • The NeoFace System minimizes time-consuming manual checks, and gives security personnel an added tool to verify identity with greater assurances.

(Redstone Arsenal is the only base in the country with this facial recognition technology.  “We are the only post right now with facial recognition. So, we are leading the army in this part of the technology,” said Redstone Garrison Commander Col. Glenn Mellor. “…all Arsenal employees, members of the military, and retirees and their dependents who utilize a Defense Common Access Card for entry to the installation are automatically registered in the pilot programs database via hand-held scanners at the Gates. Once the initial scan is complete, the registered individual is clear to use the Facial Recognition lanes,” added Arsenal representatives. Courtesy of WZDX News and YouTube. Posted on Mar 12, 2021.)

  • NetAccess

  • NetAbstraction’s patented NetAccess technology protects online identity by isolating, disguising, anonymizing, and providing dynamic misattribution for Internet activities so that users can communicate on the Internet anywhere in the world securely and with non-traceable connectivity.

  • The lack of a traceable digital footprint protects user activity, presence, and their organization’s resources, including networks, applications, mobile devices, software and data. NetAbstraction provides security by obscurity: If hackers can’t find you they can’t attack you.

NetAbstraction
Securely conduct research online, examine threats and enable cyber activities without attribution to you. Protect mobile communication devices & software.
  • NetAbstraction augments the multi-layered security capabilities provided by the commercial cloud providers to include implementing dynamic security policies which help ensure that malicious traffic is not allowed to enter the network.

  • NetAbstraction is being used by Fortune 500 organizations in a wide array of industries, including Financial Services, Healthcare, Law Enforcement, Government Agencies, Professional Services, National Infrastructure providers, and more, to help with initiatives including providing secure, private networks, and disaster recovery, including fast backup network restoration. 

  • The NetAbstraction network has been extensively red-teamed and approved for a range of offensive and defensive cyber operations, and is only available to organizations that are registered, validated, and initiated directly through NetAbstraction, Inc.

(Using patented technology developed and proven by leaders in the US intelligence community, NetAbstraction controls your information and obfuscates all of your cyber activity. Courtesy of NetAbstraction and YouTube.)

  • Netskope Security Cloud

  • Netskope safely and quickly connects users directly to the internet, any application, and their infrastructure from any device, on or off the network.

  • With CASB, SWG, and ZTNA built natively in a single platform, Netskope is fast everywhere, data-centric, and cloud smart, all while enabling good digital citizenship and providing a lower total-cost-of-ownership, with over 25% of Fortune 100 companies trust Netskope to deliver the SASE architecture digital transformation requires.

Netskope Security Cloud
The Netskope Security Cloud provides unrivaled visibility and real-time data and threat protection when accessing cloud services, websites, and private apps from anywhere, on any device.
  • Netskope truly understands the cloud and takes a data-centric approach that empowers security teams with the right balance of protection and speed they need to secure their digital transformation journey.

  • Using patented technology called Netskope Cloud XD™, the Netskope Security Cloud eliminates blind spots by going deeper than any other security provider to quickly target and control activities across thousands of cloud (SaaS and IaaS) services and millions of websites. 

  • Named by Gartner as the 2021 Gartner Peer Insights Customers’ Choice for both CASB and SWG, Netskope serves more than 1,500 worldwide customers, including over 30 companies of the Fortune 100.

(Hear from three industry experts, Enrique Salem, Former CEO of Symantec, John Thompson, Chair of the Board for Microsoft, and Mark Anderson, Former President of Palo Alto Networks, on why Netskope is exactly what companies need to secure their users and data. Courtesy of Netskope and YouTube.)

  • BS in CyberSecurity

  • Center of Academic Excellence in Cybersecurity Defense is a multidisciplinary Center that supports New Jersey City University’s (NJCU) mission as an institution that provides its diverse population of students, faculty, and community with scholarship and pragmatic approaches to the field of Information Assurance.

The Cybersecurity Program at NJCU takes a leadership role within information assurance and cyber defense by contributing to the Homeland Defense initiative.
The Cybersecurity Program at NJCU takes a leadership role within information assurance and cyber defense by contributing to the Homeland Defense initiative.
  • Information Assurance is generally defined to include cyber security, cyber forensics, data quality, data completeness, data accuracy, privacy, and issues associated with the storage, communication, and sharing of data and information.

  • The Center involves faculty and students from across the University in teaching and learning, service projects, and research.

  • The Center aligns itself with faculty and students at other institutions such as Community and other four-year Colleges, with an overall mission to enhance the security and integrity of information within the geographical region, with future plans to extend nationally and beyond.

  • The Cybersecurity Program at NJCU takes a leadership role within information assurance and cyber defense by contributing to the Homeland Defense initiative.

  • *New Jersey City University was also recognized in the 2020 ‘ASTORS’ Awards, and NJCU Adjunct Professor Ewart Williams was honored in the 2019 ‘ASTORS’ Homeland Security Awards Program.

  • E-Request

  • E-Request from NICE is a new cloud-based solution in the Evidencentral platform that supports timely disclosure of 911 audio evidence through automation.

  • As disclosure laws mandate stricter deadlines for reproducing and sharing 911 audio recordings and other evidence, agencies across the public safety and criminal justice continuum are struggling to keep up with requests using current manual processes.

e-request
Eliminates backlogs, duplicate work requests, downloading and copying to discs, handling of physical media; improves productivity, service levels, transparency and accountability; frees up ECC time and resources.
  • E-Request digitally transforms how emergency communications centers (ECCs) receive and process 911 audio evidence requests and share incident information with district attorneys, police investigators, and other key stakeholders.

  • NICE’s e-Request works with NICE’s existing recording solution (NICE Inform) to address this challenge, by ensuring timely disclosure of 911 audio evidence through automation.

(Law enforcement leaders are under more pressure than ever coming from every possible direction demanding greater transparency – to questions and complaints over police response and incident handling. The key to getting answers to questions lies in getting control of your data. NICE Investigate brings all of your data together in one place so you can get operational insights and answers to questions fast. Courtesy of Nice Public Safety and YouTube.)

  • NICE Investigate

  • Today, police departments have a “big data” problem, and crime solving hinges on digital evidence.

The NICE Investigate Digital Evidence Management software solution is comprised of three application portals: the Public Portal​, the Investigation Portal​ and the Prosecution Portal​.
  • But there’s so much data coming from so many silos​ that it’s becoming increasingly difficult for investigators to ingest it, correlate it and absorb the relevant facts of a case.

  • The NICE Investigate Digital Investigation and Digital Evidence Management Software (DEMS) Solution which automates the entire digital investigation and evidence management process, helping investigators close more cases faster.

(Explore the challenges law enforcement investigators face every day, and the many ways that NICE Investigate, one of the solutions in the Evidencentral cloud-based, open, end-to-end digital transformation platform, can help. Courtesy of Nice Public Safety and YouTube.)

  • *NICE has now been recognized with Multiple Awards in all Six of in the Annual ‘ASTORS’ Homeland Security Awards.

  • OnSolve Risk Intelligence

  • OnSolve offers a suite of AI-powered risk intelligence, critical communications, and incident management capabilities, so organizations can control the entire critical event management process, keep ahead of change, monitor disasters, and be empowered to make quicker, more accurate decisions during the times that matter most.

Accelerate Crisis Response with Onsolve Risk Intelligence – Identify and respond quickly when lives and business assets are threatened.
  • Organizations are able to gain risk intelligence information that allows them to prepare in advance for disasters and ensure business resiliency, send out mass alerts to notify the right people at the right time during a crisis, leverage a mobile incident management platform to retain full control during emergencies, and more.

  • Before, during, and after a critical event strikes, organizations now have the power of AI to inform timely and accurate situational awareness, the relevance and speed of leading mass notification services to manage critical communications, and the ability to holistically and seamlessly manage critical events through incident management – all from OnSolve.

  • OnSolve risk intelligence technology continues to keep people safe and informed, allowing them to better protect themselves, their employees and communities.

(There’s a fine line between critical event management and critical event mis-management. With speed, relevance, and usability, we give our customers what they need to successfully resolve crises — true actionable intelligence. The OnSolve Platform for Critical Event Management combines AI, machine learning, unmatched expertise and a modern platform to do what no one else can. We get the right information to the right people in the right way at the right time — when every minute counts™. Courtesy of OnSolve and YouTube.)

  • OnSolve Control Center

  • Gain 360-control of critical events. With Risk Intelligence, Critical Communications, and Incident Management capabilities unified in a comprehensive interface, you’ll have real-time critical event management.

The New OnSolve Control Center Unifies and Integrates the Entire Critical Event Management Lifecycle to Optimize Response and Outcomes
Through a single pane of glass, OnSolve Control Center provides organizations with a common operating picture of their people, places and property and enables active responses to risks that threaten them.
  • Spot emerging threats early. With OnSolve’s AI-powered engine users can filter through all the noise and delivers accurate, actionable intelligence, so they can launch crisis workflows earlier.

  • Ensure the right information gets to the right people at the right time. With a common operating picture, clients can assess the impact and activate relevant teams for immediate resolution.

  • Third-party integration enables clients to manage risk without disrupting existing operations and infrastructure.

  • OnSolve Risk Intelligence

  • Get Real-Time Visibility into Critical Events.

  • View actionable information on an intuitive dashboard, and easily visualize and filter critical event intelligence.

  • Dynamic maps of facilities, logistics, and personnel movements provide visibility into an event’s impact on your business or agency.

(If you are responsible for helping your organization respond to a crisis, OnSolve has the experience and capabilities to help you save time, money, and lives. We’re in the business of successful results, and we help you achieve them through the speed, relevance, and usability of our innovative OnSolve Platform for Critical Event Management. Courtesy of OnSolve and YouTube.)

  • *OnSolve was also recognized with Multiple Wins in the 2020, 2019 and 2018 ‘ASTORS’ Awards Programs.

  • PlateSmart ARES 3.0

  • The all-new PlateSmart ARES 3.0 solution offers more than just license plate data, it’s a true vehicle intelligence solution.

  • Whether your objective is preventing crime or growing revenue, PlateSmart ARES 3.0 delivers actionable intelligence you can use.

Do you have a restraining order against a former employee? Have security notified the moment they drive onto your property.
  • In a nutshell, ARES 3.0 starts with ALPR, driven by cutting-edge AI and deep learning, and ends by delivering virtually unprecedented vehicle analytics.

  • Capture the license plate and jurisdiction as well as the vehicle make and color, and then use the software’s powerful analytical tools to make smarter decisions.

  • Even better, ARES 3.0 offers almost unlimited scalability, making it ideal whether monitoring three cameras or 3000.

  • The software integrates with top video management systems (VMS), and it’s capable of integrating with virtually any third-party software solution, offering customers enhanced functionality via ALPR.

Part of the power of ARES 3.0 is the software’s ability to narrow down the vehicle data you collect to just the right portion to analyze.
  • Fighting crime is a key application for PlateSmart ARES 3.0 software. That’s why it integrates seamlessly with NCIC and state Fusion Center databases, to help your local police solve more crimes and keep you safer by notifying them when a suspect vehicle arrives at your location.

  • *PlateSmart Technologies has now been recognized for their Sixth Consecutive Year in the Annual ‘ASTORS’ Homeland Security Awards. 

  • Camera Canvass Tracker

  • Camera Canvass Tracker, a patented pending technology used to simplify canvassing for surveillance cameras, a task done by investigators every day.

  • Camera Canvass Tracker automatically builds a database of camera locations along with other pertinent information that allows the investigator to calculate time differences, record the DVR/cameras, view the database on a list or on a map, and export the database when needed.

Camera Canvass Tracker software automatically builds a database of camera locations along with other pertinent information that allows the investigator to calculate time differences, record the DVR/cameras, view the database on a list or map and export the database as needed.
Camera Canvass Tracker software automatically builds a database of camera locations along with other pertinent information that allows the investigator to calculate time differences, record the DVR/cameras, view the database on a list or map and export the database as needed.
  • With Camera Canvass Tracker you can:

    • Map It – Create a centralized database of surveillance cameras within your jurisdiction. Search your database with our interactive geo-coded map.

    • Organize your Data – Store the name, address, and contact information for the custodians of the surveillance cameras. Save all DVR information for future reference.

    • Usable Data – Upload camera angle screenshots for future reference. Update the DVR data and add important notes for you and the rest of your agency to benefit from the next time you need it.

    • Calculate – Calculate those difficult time calculations down to the second. Saves valuable time and reduces the risk of human error. Creates a permanent record for future reference and strengthen testimony.

Probable Cause Solutions is owned and operated by three partners with more than 65 years of experience in law enforcement, primarily in an investigative capacity, who know firsthand how valuable Camera Canvass Tracker can be in making investigations more efficient and closing cases faster.
Probable Cause Solutions is owned and operated by three partners with more than 65 years of experience in law enforcement, primarily in an investigative capacity, who know firsthand how valuable Camera Canvass Tracker can be in making investigations more efficient and closing cases faster. 
    • Incident Tracking & Custom Mapping – After creating your “Incident” Document the locations visited and create custom maps. Customize the map with a variety of pins and notes while plotting the course of travel.

    • Detailed Exports – Strengthen your case and testimony with proper documentation.

    • Group Plans – Share DVR data across your entire jurisdiction with everyone in your agency/group. Users can access the database from ANY internet-capable device, including their desktop computer.

  • *Probable Cause Solutions was also recognized in the 2020, 2019, 2018 and 2017 ‘ASTORS’ Homeland Security Awards Programs.

  • BTH-550-MAX & Drop-in Charger Bundle

  • The new BTH-550-MAX Wireless Speaker Microphone is the star of the revolutionary PRYMEMAX product suite, the world’s first crossover accessory solution that combines two-way radio and cellphone PoC operation in a single platform.

NEW BTH-550-ZU – Wireless Speaker Microphone with ROTARY volume control and built-in wireless PTT
  • With rotary volume control and built-in wireless PTT, the BTH-550-MAX is completely universal, and with a new, more advanced chipset technology, one MAX speaker mic will work with virtually any two-way radio brand or PTT application to deliver exceptional performance.

  • Pryme created a BTH-550-MAX Bundle especially for first responders which includes a bonus Drop-in Desktop Charger, in addition to a wall charger and mini USB charging cable it already comes with.

  • The BTH-550-MAX is designed to be rugged and functional, with a waterproof front-facing speaker and dust/weather/rain resistance to IP56 levels, yet it’s small and lightweight with a 360° swivel clip and a 3.5 jack that fits a variety of headsets, from acoustic tube earphones to motorcycle helmet kits.

  • *Pryme was also recognized in the 2016 ‘ASTORS’ Homeland Security Awards Program.

  • PureActiv

  • PureTech Systems has been recognized with a record Six 2021 ‘ASTORS’ Awards for it’s PureActiv fully integrated automated outdoor wide-area and perimeter protection system.

  • PureActiv integrates with a vast array of short- and long-range perimeter sensors such as radar, buried or on-fence fiber detection systems, and ground sensors either singularly or in a combination to provide just the right level of protection to cost-effectively meet the most secure perimeter requirements.

    And PureActiv delivers among the highest probability of detection with the lowest nuisance alarm rates for securing facilities, infrastructure, and borders.

(See a brief introduction to PureTech’s PureActiv automated outdoor wide-area and perimeter protection system in action. Courtesy of PureTech Systems and YouTube.)

  • PureActiv for Borders

  • Controlling national borders is an important part of a nation’s security, and the ability to effectively monitor vast areas in varied weather conditions and terrain, while accurately identifying potential threats at great distances is a complicated scenario.

PureActiv® uses geospatial (GIS map-based) map technology to display camera, radar, and other sensors locations and their field-of-views, alarm events, and target tracks. I
PureActiv® uses geospatial (GIS map-based) map technology to display camera, radar, and other sensors locations and their field-of-views, alarm events, and target tracks. I
  • The solution calls for knowledgeable personnel and accurate sensors that work together to quickly assess a situation and enable border agents to effectively intervene.

  • Ideal for Border Security, the PureActiv Automated Perimeter Intrusion Detection System enables detection, and classification of intruders up to 6 miles away.

  • Once PureActiv automatically identifies an intruder, the system has the ability to automatically track them and quickly provide accurate intruder location on a GIS map to the end-user.

(The MVSS platform utilizes PureTech Systems’ PureActiv software as its central command and control, providing AI enhanced video detection and classification, user interface display, and sensor collaboration logic for the surveillance suite. The suite consists of visible and thermal cameras, laser illuminators and range finders mounted on telescoping masts located in the back of commercial pickup trucks. Courtesy of Fox 5, PureTech Systems, and YouTube.)

  • PureActiv

  • Our nation and the world depend on safe and efficient shipment of goods around the globe. 

  • Threats to seaports and the resultant potential loss of lives and economic losses due to service interruptions make it imperative that seaports throughout the world are properly protected from terrorist and safety-related events. 

puretech
Seaports around the world bring commerce from all geographic areas and countries and our nation depends on the safe and efficient shipment of goods around the globe.
  • PureTech’s PureActiv wide area and perimeter protection solutions help Port Authorities improve the safety and security of seaports with a tangible return on investment, and automates the protection of land and water-side perimeters to help ensure the safety and security of personnel and critical assets. 

  • By detecting intrusion events at the perimeter before they result in more catastrophic events, loss of life, and operational downtime, port authorities, and law enforcement can intervene to deescalate situations and quickly return to normal operations. 

  • The PureActiv system provides detection, alerting, and proactive deterring of potential safety and security events, which helps protect lives, cargo, and critical assets. 

  • PureActiv

  • PureActiv AI Auto-verify Analytics eliminates 95% of nuisance alarms from radar, fence sensors, and motion video analytics.

  • With expertise from 16 years of real-world deployments and cutting-edge innovation, PureTech Systems patented Video Analytics are AI Deep Learning and Geospatially boosted and provide among the highest in probability of detection, and lowest in nuisance alarm rates for electronically securing perimeters around facilities, infrastructures, and borders. 

(See how PureActiv’s deep-learning trained automated perimeter protection system includes intrusion detection, auto-verification, PTZ Auto-follow, and invoking non-lethal acoustic deterrents. Our enhanced capabilities detect, geolocate, classify and track intrusions, alerting only on verified threats ensuring near-zero nuisance alarms with market-leading detection rates. Courttesy of PureTech Systems and YouTube.)

  • PureActiv

  • Key benefits of PureActiv AI Deep Learning Geospatial Video Analytics include:

    • Automatically detects, classifies, geolocates, tracks and alarms only on Objects of Interest.

    • Technology backed up by 13 patents and over 16 years of innovation and field training data.

PureTech PureActiv
Location-based AI video analytics PureActiv, integrates with a vast array of short- & long-range perimeter sensors such as radar, buried or on-fence fiber detection systems for a fully integrated automated outdoor wide-area & perimeter protection solutions. 
    • Lower total cost of ownership when considering infrastructure cost and maintenance,

    • Effective in the most challenging of outdoor conditions.

    • Uses Convolutional, Neural Network Deep Learning, and Geo-spatial data for high fidelity classification.

    • Longest detection ranges in the industry (over 5 miles)- requires fewer cameras.

    • Higher accuracy – Industry-leading Probability of Detection and low Nuisance Alarm Rate.

    • Simplified configurations support rapid deployment.

    • Image Stabilization.

    • Autonomous PTZ camera lock-on-target tracking enhances situational awareness.

    • Object geo-location on map enhances situational awareness.

    • Combines with other detection sensors (radar, fence, ground, etc.) for most demanding applications such as nuclear power plants.

    • Seamless integration with market-leading VMS systems including Genetec,  Milestone, PureActiv AlertView, and others.

    • Easily scales to fit your needs today and tomorrow.

    • Camera agnostic- deploys on edge devices and/or servers.

  • PureActiv Rapid Deploy Virtual Perimeter

  • Scalable to small and large perimeters, the new Rapid Deploy Virtual Perimeter Unit (RDVPU) provides a temporary or permanent virtual perimeter protection system that requires very little deployment time.

PureActiv Rapid Deploy Virtual Perimeter
A fast and effective Perimeter Intrusion Detection System for airports, borders, ports of entry, military bases, seaports and utilities.
  • The smart and effective protection system uses a wireless connection to transmit alarms and video to a co-located or remote command and control center and is enhanced with the use of radar, a pan-tilt-zoom (PTZ) camera, and optional loud hailers and light deterrents.

  • The RDVPU is equipped with PureTech’s patented AI and geospatially boosted video analytics, PureActiv, which provides among the highest probability of detection while maintaining near-zero nuisance alarms.

  • Additionally, the RDVPU is solar-powered, needing little to no backup fuel, thus providing an environmentally friendly protection system that does not require ground penetration and has no impact on local wildlife.

(Click Image above to view a Rapid Deploy Virtual Perimeter Unit Deployment in Action. Courtesy of PureTech Systems.)

  • *PureTech Systems was recognized with Multiple Awards Wins in the 2020 ‘ASTORS’ Homeland Security Awards Program, and also won a Platinum ‘ASTORS’ Award in the 2018 ‘ASTORS’ Awards Program.

  • Pivot3 Surety

  • Organizations are finding themselves overwhelmed by managing and monitoring all the various servers and appliances in use for video recording, video analytics, access control, intrusion detection, and other physical security applications, especially in environments with multiple distributed locations, but also in large, centralized environments.

Pivot3 Surety improves effectiveness of physical security infrastructure through simplified, centralized management.
  • The time it takes to gather all the right information to ensure all the servers and appliances are healthy, performing optimally, and up to date takes them away from other more critical tasks, yet a problem with just one of those servers can put their entire organization at risk.

  • Pivot3 Surety, which was recently acquired by Quantum Corporation,  unifies the management and monitoring of both Pivot3 servers and appliances along with non-Pivot3 servers, and provides visibility and management of key information through a single-pane-of-glass management console, saving clients time and ensuring their security applications are running at their peak performance and efficiency.

  • VS-HCI Series Edge

  • The Quantum VS-HCI Series is purpose-built for supporting video management systems (VMS), video storage, and video analytics plus enabling the consolidation of other related applications such as access control onto an integrated server and storage platform called hyperconverged infrastructure (HCI).

  • The Quantum VS-HCI Series uses innovative software-based intelligence and automation to simplify management, provide the highest levels of resilience and efficiency, and ensure scaling and maintenance are easy. With solutions optimized for edge and centralized environments as well as security operations centers, and support for any VMS and video analytics, the VS-HCI Series can cover all your video capture, storage, and visualization needs.

(See how Quantum provides organizations with the software and services to manage and enrich data, including the most complex unstructured data and video files, and when  enriched, data delivers the insights clients need to drive your business forward—faster than ever before. Courtesy of Quantum Corporation and YouTube.)

  • *Quantum Corporation was also recognized in the 2018, and 2017 ‘ASTORS’ Awards Programs, and Pivot3 was recognized in the 2020, 2018, and the 2016 ‘ASTORS’ Homeland Security Awards Programs, respectively.

  • Rajant BreadCrumb Hawk

  • The Rajant Hawk is a high-performance, dual-radio industrial-grade, wireless Kinetic Mesh BreadCrumb.

The Rajant Hawk is a high-performance, dual-radio industrial-grade, wireless Kinetic Mesh BreadCrumb.
The Rajant Hawk is a high-performance, dual-radio industrial-grade, wireless Kinetic Mesh BreadCrumb.
  • Infused with Rajant’s patented InstaMesh protocol, the Hawk offers higher throughput with enhanced security performance using 256QAM, 80 MHz channels, and hardware acceleration.

  • The Hawk is reliable in extreme environmental conditions and has several mounting options, and contains two transceivers delivering MIMO operation over multiple frequencies for reliable and resilient connections.

  • The platform combines high-speed, highly flexible mobile connectivity to reliably power new applications at the edge with unlimited coverage through a Layer-2 multi-radio mesh fabric extended across the deployment.

(Introducing the Hawk, one of Rajant’s newest industrial-grade high-performance BreadCrumb platforms that offer dual MIMO transceivers, up to 1.7Gbps aggregated data rate, higher throughput, and enhanced security performance. Courtesy of Rajant and YouTube.)

  • *Rajant was also recognized in the 2020 ‘ASTORS’ Awards Program.

  • RangeForce Cybersecurity Training

  • RangeForce helps organizations achieve cyber resiliency by providing a metrics-driven platform that assesses strengths and weaknesses and trains and cross-trains staff so they can confidently address cyber threats with expertise, both individually and as a well-oiled team.

rangeforce
Upskill your team with hundreds of interactive modules and challenges. Understand the threat landscape and see industry leading security tools and concepts in action.
  • RangeForce has developed the industry’s first integrated cybersecurity training platform and virtual cyber range that uses real IT infrastructure, tools, and malware.

  • RangeForce cybersecurity training is 100% cloud-based and can be performed remotely via web browser/login, which changes the old paradigm of traditional, time-consuming, and expensive classroom-based cyber training.

  • Enterprises can now operationalize a SaaS-based cybersecurity training program in hours, which saves them up to 65% over traditional training and up to $1M annually on hosted cyber ranges.

(RangeForce makes creating highly skilled cybersecurity defenders simple, flexible, and fast for all enterprises. Powered by the industry’s first SaaS-based, integrated cybersecurity simulation and virtual cyber range, we help customers operationalize a security training program in hours, saving up to 65% over traditional training and up to $1M annually on hosted cyber ranges. Courtesy of RangeForce and YouTube.)

  • Rave Coronavirus Recovery Solution

  • As public safety and first responders continue to struggle with the implications of COVID-19, it is more crucial than ever that they are able to proactively identify, communicate with and respond to those at greatest risk.

Mobile team communications apps like Multiple 2020 ‘ASTORS’ Award Winner Rave Mobile Safety, are fast becoming the go-to solution across the spectrum, from small business to major enterprises, and spanning every industry, whether working in a shared workplace or remotely.
Mobile team communications apps like Multiple 2020 ‘ASTORS’ Award Winner Rave Mobile Safety are fast becoming the go-to solution across the spectrum, from small businesses to major enterprises, and spanning every industry, whether working in a shared workplace or remotely.
  • Of equal importance is ensuring the protection of first responders to COVID-19 exposure, and in order to provide better safety and communication capabilities to organizations across all industries, Rave Mobile Safety developed its Coronavirus Recovery Solution, to enable these organizations and agencies to adhere to national and local guidelines while creating a safe environment for their staff and community.

  • Two key applications include Critical Communications for timely, targeted, and personal notifications to employees and members within an organization; and Mass Notifications across 9-1-1, first responders, and emergency management to protect public safety through natural disasters, operational events, and crisis incidents.

(Learn what to look for in a critical communications platform and how it can help your agency improve response efforts during your coronavirus recovery efforts. Courtesy of Rave Mobile Safety and YouTube.)

  • Rave Collaborate

  • It’s challenging to have paper-based checklists sitting in a folder or notes on a personal mobile phone when lifesaving decisions and actions must be made.

  • Teams need to be prepared for all possible events and make strategic decisions quickly during those initial critical moments of an incident as first responders arrive on scene.

  • Rave Collaborate ensures all key resources can be easily found and implemented when the unimaginable occurs.

  • Staff can quickly see what needs to be done, make appropriate response decisions, and account for their actions.

(See how you can Mitigate Operational Disruptions, and initiate communication during major events, from severe weather to facility closures, power outages and road closures to operational issues that impact your supply chain, infrastructure and IT. Courtesy of Rave Mobile Safety.)

  • *Rave Mobile Safety was also recognized with Multiple Award Wins in the 2020, 2019, 2018 and 2017 ‘ASTORS’ Homeland Security Awards Programs.

  • Regroup Mass Notification

  • Regroup Mass Notification® empowers better mass communication to keep people safe and informed during critical and daily events and is used every day by thousands of organizations to save lives, improve safety for entire communities, respond to potential hazards, prepare for emergencies, and more.

Regroup Mass Notification
Powerful During Emergencies, Useful Every Day – Regroup connects you with the people you care about to keep them safe and informed – anytime, anywhere.
  • Regroup’s easy-to-use system enables administrators to send thousands of notifications per minute, rapidly alerting large groups of recipients to danger. Administrators can also expand their reach by distributing messages via websites, PA systems, digital signage, and more.

  • Whether used for critical or routine communications, Regroup Mass Notification helps organizations across America communicate quickly to improve homeland security, strengthen operational resilience, mitigate risk, and thrive in an increasingly unpredictable world.

  • Regroup Mass Notification is dedicated to making continuous service improvements, towards making our nation more resilient and secure, and especially during the current pandemic that is still impacting so many American communities and businesses.

(See why Regroup’s award-winning platform is a top choice for emergency and day-to-day notifications for universities, hospitals, corporations, and venues across North America and worldwide. Courtesy of Regroup Mass Notification and YouTube.)

  • *Regroup Mass Notification was also recognized in the 2020, 2019, 2018, and 2017 ‘ASTORS’ Homeland Security Awards Programs.

  • Warehouse Access Control Cabling

  • Remee Wire & Cable is being recognized for a project involving a Warehouse Access Control Security Cabling Installation for a large online retailer with hundreds of distribution centers around the globe.

Remee Wire & Cable designs and manufactures a wide range of electronic wire and cable.
Remee Wire & Cable designs and manufactures a wide range of electronic wire and cable, and specializes in complex cable constructions, such as siamese cable, composite wire and cable, hybrid cable, bundled cable and messengered cable.
  • A retailer has strong security software platforms and related hardware to operate their very efficient security system however, with an average of 30-50 access-controlled doors per warehouse and the mandatory 3-5 cables needed per door, plus other devices, there were roughly 200-250 cables to run to the various security system panels.

  • Mistakes were made, and over time wires became mixed, mislabeled, confused, and terminated to the wrong control panels for a variety of reasons, which slowed down the commissioning of the warehouse’s access control doors.

  • Security designer Acenes, working alongside Remee successfully aggregated all 5 component cables under single, color-coded jackets, reducing the average number of cables pulled from 250 to just 50 – an 80% reduction in the number of individual cable pulls, which lowered the overall installation cost. 

  • This project began in 2021, and its immediate success resulted in this solution becoming the worldwide standard for the global retailer, to be installed in the hundreds of warehouse facilities worldwide.

  • ROSA180

    • ROSA180 is a supplemental security device that includes critical autonomous response capabilities to help simulate security personnel actions at a fraction of the cost.

  • The device’s 180° field of view through dual hi-resolution, full-color, always-on digital cameras provide 24/7 visibility and monitoring.

  • ROSA180 can also be used to recognize and deter loitering, and the device’s built-in continually active analytics can activate security alerts to onsite security or law enforcement, as defined by the end-users particular needs.

(See an illustration of ROSA180, a proven perimeter surveillance superstar for Robotic Assistance Devices (RAD), with its human and vehicle detection analytics and keen ability to detect and deter trespassers, loiterers and vagrants. Courtesy of Robotic Assistance Devices and YouTube.)

  • ROSA180

  • ROSA180 comes equipped with RAD’s AI-driven security systems including both human and vehicle detection, license plate recognition, and complete integration with the RAD Software suite notification and response library.

ROSA includes RAD’s AI-driven security systems including both human and vehicle detection, license plate recognition, and complete integration with the RAD Software suite notification and response library, and has been a proven perimeter surveillance superstar with its keen ability to detect and deter trespassers, loiterers and vagrants.
  • Additionally, ROSA180 has stood out as a proven perimeter surveillance superstar with its keen ability to detect and deter trespassers, loiterers, and vagrants, as well as enforce COVID-19 mask requirements in a non-confrontational manner.

  • ROSA180 houses dual cameras with a combined 180° Field of View that drive its internal AI-analytics to detect any unexpected movement (human or vehicle) then initiate any number of autonomous responses both visual and audible.

  • The system also opens direct video and audio communication to remote monitoring personal who are able to view and speak with any detected persons.

  • ROSA180 is a game-changer in the security services industry, allowing a very cost-effective force multiplier in nearly every environment.

  • *Robotic Assistance Devices was also recognized with Multiple Award Wins in the 2018, and 2017 ‘ASTORS’ Homeland Security Awards Programs.

  • SafeGuard Cyber Platform

  • Business today thrives in the cloud. Connections, collaborations, trials, and transactions all happen in the cloud, and while the cloud provides unprecedented convenience and computing, it also brings unquestionable risk.

  • When people do business outside of the IT infrastructure, they lose the power to keep connections and data safe, and social engineering threats, ransomware, compliance gaps, and unprotected sensitive information are just some of the risks plaguing businesses that remain unseen and unaddressed by current security protocols for cloud-based applications.

  • SafeGuard Cyber protects the human connections businesses need to thrive in a digital world, by securing business-critical communications, detecting and stopping cyber threats, and ensuring compliance in real-time without disruption to natural workflows.

  • In 2020 alone over a trillion dollars was lost to insider threats, data breaches, and ransomware attacks. And while some businesses struggle to protect themselves from bad actors, others in regulated industries like banking and pharmaceutical deal with the significant compliance hurdles that come hand-in-hand with a digital sales force.

  • Whether somebody is a CISO charged with securing their entire organization, or a Chief Compliance Officer responsible for adhering to strict industry regulations, SafeGuard Cyber provides security and governance and compliance for business-critical digital communications of an entire enterprise and its workforce.

(SafeGuard Cyber is a pioneer in Communication Security. Learn how the platform works to keep your business secure and compliant while permitting the adoption of modern collaboration and communication cloud applications. Save money, reduce risk, enable growth, and above all SafeGuard Human Connections. Courtesy of SafeGuard Cyber and YouTube.)

  • CryptoComply

  • CryptoComply has quickly become a preferred encryption module deployed by technology vendors into the Public Sector.

  • By combining cryptographic technology with FIPS 140-2 validation expertise, SafeLogic has perfected a drop-in crypto bundle for regulated industries.

  • Vendors develop their products around the CryptoComply core, focusing on what they do best, while the SafeLogic team ensures FIPS 140-2 validation, the benchmark certification for encryption in the federal government.

  • The validation (administered by NIST) is delivered in less than 8 weeks, a huge competitive advantage for clients who are facing rivals in procurement RFPs as well as any pursuing additional compliance initiatives like FedRAMP, Common Criteria, DoDIN/UC APL, or the upcoming CMMC.

(See how SafeLogic simplifies and accelerates the FIPS 140-2 validation process. Courtesy of SafeLogic and YouTube.)

  • *SafeLogic was also recognized in the 2020, 2019, and 2018 ‘ASTORS’ Homeland Security Awardss Program.

  • Securiti Platform

  • Organizations are collecting petabytes of sensitive data regulated by GDPR, CCPA, CPRA, PCI DSS, HIPAA, and more, which is distributed across hundreds of assets, often impossible to find, let alone protect.

Securiti

  • Securiti has innovated AI-driven Sensitive Data Intelligence (SDI), which automates data privacy and protection to make compliance with privacy regulations faster and cheaper while reducing the risk of sensitive data leaks.

  • By combining data security and privacy on a single platform, Securiti eliminates blind spots and the need for redundant, siloed tools, and is capable of real-time, integrated data privacy and security management across complex enterprise environments that include on-premise, cloud, multi-cloud, Saas applications, in structured and unstructured data stores.

  • With more than 200 native data connectors, Securiti SDI integrates easily into existing environments to identify and protect high-risk data, wherever it resides, and help customers ensure strong data security, privacy and governance as they pursue modernization, cloud data migration, digital transformation, and privacy by design.

  • Automatic Injury Detection (AID) System

  • The Automatic Injury Detection (AID) system provides help in seconds when the sensing panel has been pierced by a bullet, knife or shrapnel.

Select Engineering Services Automatic Injury Detection (AID) System includes thin lightweight, flexible and maintenance free, mylar panels inserted into the officers body armor, (both front and back) for complete concealment and no modifications required to the body armor.
The Automatic Injury Detection (AID) System includes thin lightweight, flexible, and maintenance-free, mylar panels sensor panels that detect when the wearer has been attacked and automatically sends a notification and request for assistance to the appropriate authorities.
  • When an AID flexible mylar sensor panels (front & back, comfortably inserted into the wearer’s bulletproof vest) is pierced by either a bullet, knife or shrapnel from an IED, the communications module will sense the break in the circuit and automatically sends an emergency alert with GPS location to phone, radio or communication system.

  • The automated and instant emergency alerts help save lives by improving the response from medics and backup personnel to stop, apprehend or contain the attacker, even when the officer is incapacitated.

  • Personal Emergency Transmitter (PET)

  • The Personal Emergency Transmitter (PET), is a wearable device that automatically sends alert text messages, with your personal info and a link to your GPS location in the event of an emergency.

PET improves personal safety in a variety of scenarios when in a panic, under heavy duress, and in a medical emergency. (Courtesy of Select Engineering Services, LLC.)
PET improves personal safety in a variety of scenarios when in a panic, under heavy duress, and in a medical emergency. (Courtesy of Select Engineering Services, LLC.)
  • The PET system provides a covert method to summon help when you are faced with a dangerous situation and it’s impossible to call help without alerting your attacker (i.e. reaching for your cell phone).

  • The PET system allows you to avoid escalating a potentially dangerous confrontation and have backup on the way in seconds.

  • *Select Engineering Services was also recognized with Multiple Award Wins in the 2020, 2019, 2018, and 2017 ‘ASTORS’ Homeland Security Awards Programs.

  • Symphony Common Operating Platform

  • The Senstar Symphony™ Common Operating Platform with sensor fusion is a modular solution for security management and data intelligence.

  • In addition to being an open, highly scalable video management system with built-in video analytics, it includes full-featured access control and perimeter intrusion detection modules.

  • But what truly sets Senstar Symphony apart is its sensor fusion engine. By intelligently combining low-level sensor data with video analytics, the sensor fusion engine achieves the highest levels of performance, far beyond that of the individual devices.

  • Senstar Symphony seamlessly incorporates sensor fusion, event algorithms, and rule-based actions to provide unmatched capabilities, flexibility, and performance.

(Central to Senstar’s vision of unifying security and operations is Senstar Symphony, Senstar’s video, security and information management platform. Courtesy of Senstar and YouTube.)

  • *Senstar was also recognized with Multiple Award Wins in the 2019, and 2018 ‘ASTORS’ Homeland Security Awards Programs.

  • SENSR for Security

  • Seoul Robotics, a 3D computer vision company building a perception platform that uses AI and deep learning to power the future of mobility, robotics and smart cities, has introduced the SENSR™ for Security.

  • SENSR™ for Security is the first-of-its-kind deep learning software application able to create flexible, scalable 3D data solutions for the security market.

  • The first non-proprietary 3D software application on the market, SENSR for Security is compatible with more than 75 different brands and models of sensors, making it highly versatile, additionally, a single solution can even comprise a variety of different sensors from multiple manufacturers within one system, a first for the industry.

  • The SENSR™ for Security solution is powered by Seoul Robotics’ proprietary deep learning software platform and works in tandem with 3D data collected by LiDAR sensors.

(See how SENSR can keep track of more than 500 people or objects within a location at a given time as well as total the number who have come and gone. Courtesy of Seoul Robotics and YouTube.)

  • ShotSpotter Connect

  • ShotSpotter® Connect™ is AI-driven software that helps law enforcement deter crime by pro-actively directing patrol resources to specific locations that have the highest likelihood of crime that day.

Directed Patrols Prevent Crime

Research shows that high visibility patrols are an effective deterrent to crime. Agencies receive precise locations to patrol based on AI that is superior to traditional hot spot analysis.
  • Connect develops risk assessments for future crimes by collecting and analyzing three sources of data: historical crime data from a police jurisdiction; public data such as weather, transportation points, locations of parks, schools, and liquor establishments; and exclusive ShotSpotter gunfire data.

  • Machine learning determines the areas of highest risk and the forecasts are turned into data-driven patrol plans by shift and beat every day, and disseminated electronically to officers in the field, and carefully meters out recommended time spent on a directed patrol, suggests tactics by crime type, and automatically randomizes patrol locations to minimize the possibility of over or under policing any area.

  • ShotSpotter Connect has been proven to reduce crime by 33%, measured over a period of 90 days in one part of a district where patrol officers use the software and compared to crime levels where officers in a neighboring part of the district do not use the software.

(See a brief overview of ShotSpotter Connect – a Community First Patrol Management Software that dynamically direct patrol resources to areas of greatest risk, more effectively deter crime, and serve the community. Courtesy of ShotSpotter and YouTube.)

  • ShotSpotter Respond

    • Gun violence in America’s cities is a devastating epidemic, which has killed more than 65,000 individuals and injured several hundred thousand in just the last five years, and yet 88% of gunfire incidents are never reported to police.

  • ShotSpotter’s real-time alerts notify police precisely when and where gunshot incidents occur, within 60 seconds, with critical data such as number of rounds fired, number of shooters, and type of weapons used.

  • This results in a faster, more accurate response to the scene to better recover evidence, interview witnesses, and attend to gunshot victims—improving overall police effectiveness.

  • By working with ShotSpotter, law enforcement agencies can better connect with their communities and bolster their mission to protect and serve.

(Learn how law enforcement agencies can proactively address gun violence and build community trust with ShotSpotter Gunshot Detection. Courtesy of ShotSpotter and YouTube.)

  • *ShotSpotter was also recognized in the 2020, 2019 and 2018 ‘ASTORS’ Awards Programs.

  • Simeio Identity as a Service

  • Employees, partners, and customers require secure, role-appropriate access, and they need it now, not tomorrow.

  • That’s why Simeio’s team of identity professionals, powered by the company’s Identity Orchestrator platform and Identity Intelligence Center, have the required expertise to provide a comprehensive IAM solution, and can even integrate with and manage clients’ existing IAM system(s). 

  • If a client needs it, Simeio can provide all the benefits of a dedicated team of security and identity professionals without the overhead.

  • Their hosted IAM solutions eliminate the large, up-front capital investments required for IAM infrastructure, shifting costs to pay-as-you-go operating expenses.

  • Simeio eliminates clients’ complexity and replaces it with consistent and reliable identity services and a single point of contact for operations and support, backed by their stringent service level agreements. 

(Is your organization saddled with aging identity and access management infrastructure? IAM has grown increasingly complex and costly to maintain. So see what Simeio’s Identity as a Service can do for your organization. Courtesy of Simeoio and YouTube.)

  • *Simeio was also recognized in the 2020, 2019 and 2018 ‘ASTORS’ Awards Programs.

View Part 1 Intro & Winners A – D         View Part 2 Winners E – Na 

NEXT – Part 4 Winners SI – Govt     View Part 5 Winners Excellence

The 2021 ‘ASTORS’ Awards Program was Proudly Sponsored by AMAROK, Fortior Solutions, and SIMS Software, along with Returning Premier Sponsors ATI Systems, Attivo Networks, Automatic Systems, and Reed Exhibitions.

Let's not forget that camDown helps stop hackers from getting access to the webcam that I use for my work. Now I can get even more gigs as a freelancer and advertise that I have top security with my home computer and I can tell your friends would feel the same!