SlideShare a Scribd company logo
1 of 2
Download to read offline
Do you have a public safety or security offering?
Why aren’t you on this list?
Commentary on DHS SAFETY Act awards Q1 2017. May 2nd
Update.
Welcome to the first quarterly (ish) wrap up of what’s been happening in SAFETY Act land. These
updates will assume that the reader is familiar with the Act, but if there are questions about a term’s
meaning or significance, please let me know and I’ll set it straight.
To date, since the SAFETY Act program began in 2003, there have been nearly 1000 approved
applications. These sellers get the liability protection of coverage as well as the bragging rights that
come with a positive determination by DHS that your product or service is “effective”.
There have been 30 36 posted awards (yes, ~10 per month!) between December 8, 2016 and March 24,
2017. Below are some statistics:
• Products: 10 13
• Services: 20 22 (including 2 SaaS)
• Several of these are hybrids (products and services)
• Another NFL team is now covered (The Patriots) bringing the total to 7.
• An MLB stadium got renewed, bringing the total to 2.
• The NBA received Certification for its “Arena Security Standards, Security Audits, and Security
Training Programs”
• Type of award:
o Certification: 14 17
o Designation: 12 15
o Developmental Test and Evaluation Designation: 4
• Type of product:
o CBRNE
o Perimeter security
o Cyber
o Standards
o Mass notification
• Types of services:
o Threat and Vulnerability Analyses (TVA)
o Security policies and processes
o Situational awareness
o TSA Screening Partnership Program
SaaS: Up and
coming category!
Who received coverage this quarter?
Some big, traditional government contactors like:
• Lockheed Martin Corporation
• PriceWaterhouseCoopers LLP
• Raytheon Company
• Leidos Innovations Company (3)
• Accenture Federal Services LLP
• Boeing
Some smaller companies you may not know like:
• Lion Apparel, Inc.
• Qylur Intelligent Systems, Inc.*
• Cybernance Corporation
• iControl, Inc.
• American Science & Engineering*
And a few you may know like:
• Contemporary Services Corporation* (2)
• The Port Authority of New York and New Jersey
• ASIS International, Inc.
• Ameristar Perimeter Security USA, Inc. (2)
So, what does this tell us? The biggest message is that the SAFETY Act has grown to include big business
and small business, products and services, public and private interests, and seems to be running at a
rate of 120 awards per year. Any product or service that, in some way, could counter at terrorist attack
is eligible.
Why aren’t you on this list?
*In the spirit of full disclosure, the marked companies are clients of mine.
Also, all links are informational, not product endorsements.
For questions or more information, please contact:
David A. McWhorter, PhD | Founder
Dave@TheHSCGroup.com | 202-288-3995
This could be yours!

More Related Content

What's hot

What's hot (6)

CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st EnforcementCCPA Update: What You Need to Know about CPRA & July 1st Enforcement
CCPA Update: What You Need to Know about CPRA & July 1st Enforcement
 
IoT
IoT  IoT
IoT
 
Is your cloud GDPR compliant?
Is your cloud GDPR compliant?Is your cloud GDPR compliant?
Is your cloud GDPR compliant?
 
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
 
Three pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and PrivacyThree pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
Three pillars for building a Smart Data Ecosystem: Trust, Security and Privacy
 
(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach(SACON) Srinivas posarala - Challenges & Approach
(SACON) Srinivas posarala - Challenges & Approach
 

Similar to UPDATE. Do you have a public safety or security offering? Why aren’t you on this list?

CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to KnowCMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
PECB
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
Ulf Mattsson
 
proavguidetogovtbiz
proavguidetogovtbizproavguidetogovtbiz
proavguidetogovtbiz
Tom Zind
 

Similar to UPDATE. Do you have a public safety or security offering? Why aren’t you on this list? (20)

2018-11-15 IT Assessment
2018-11-15 IT Assessment2018-11-15 IT Assessment
2018-11-15 IT Assessment
 
Dealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response PlanDealing Data Leaks: Creating Your Data Breach Response Plan
Dealing Data Leaks: Creating Your Data Breach Response Plan
 
Is it time for an IT Assessment?
Is it time for an IT Assessment?Is it time for an IT Assessment?
Is it time for an IT Assessment?
 
Biometric Authentication & Identification Market Competitive Research And Pre...
Biometric Authentication & Identification Market Competitive Research And Pre...Biometric Authentication & Identification Market Competitive Research And Pre...
Biometric Authentication & Identification Market Competitive Research And Pre...
 
Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3Data1 qbit investor presentation v1.3
Data1 qbit investor presentation v1.3
 
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to KnowCMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
CMMC 2.0 vs. ISO/IEC 27001 vs. NIST 800-171: What You Need to Know
 
Securing Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best PracticesSecuring Fintech: Threats, Challenges & Best Practices
Securing Fintech: Threats, Challenges & Best Practices
 
New regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscapeNew regulations and the evolving cybersecurity technology landscape
New regulations and the evolving cybersecurity technology landscape
 
Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3Forecast cybersecurity regulation v3
Forecast cybersecurity regulation v3
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 
2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment2017 06-27 Time for an IT Assessment
2017 06-27 Time for an IT Assessment
 
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
Growing trend of finding2013-11 Growing Trend of Finding Regulatory and Tort ...
 
Quick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for BusinessesQuick Start Guide to IT Security for Businesses
Quick Start Guide to IT Security for Businesses
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
Sample Customer Advisory Board Deck
Sample Customer Advisory Board DeckSample Customer Advisory Board Deck
Sample Customer Advisory Board Deck
 
The Geospatial Future of Insurance
The Geospatial Future of InsuranceThe Geospatial Future of Insurance
The Geospatial Future of Insurance
 
Legal issues of domain names & trademarks
Legal issues of domain names & trademarksLegal issues of domain names & trademarks
Legal issues of domain names & trademarks
 
Complying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and DataComplying with Cybersecurity Regulations for IBM i Servers and Data
Complying with Cybersecurity Regulations for IBM i Servers and Data
 
proavguidetogovtbiz
proavguidetogovtbizproavguidetogovtbiz
proavguidetogovtbiz
 
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP) 8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
8 Questions for 2016 Federal Cybersecurity National Action Plan (CNAP)
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024Top 10 Symfony Development Companies 2024
Top 10 Symfony Development Companies 2024
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 

UPDATE. Do you have a public safety or security offering? Why aren’t you on this list?

  • 1. Do you have a public safety or security offering? Why aren’t you on this list? Commentary on DHS SAFETY Act awards Q1 2017. May 2nd Update. Welcome to the first quarterly (ish) wrap up of what’s been happening in SAFETY Act land. These updates will assume that the reader is familiar with the Act, but if there are questions about a term’s meaning or significance, please let me know and I’ll set it straight. To date, since the SAFETY Act program began in 2003, there have been nearly 1000 approved applications. These sellers get the liability protection of coverage as well as the bragging rights that come with a positive determination by DHS that your product or service is “effective”. There have been 30 36 posted awards (yes, ~10 per month!) between December 8, 2016 and March 24, 2017. Below are some statistics: • Products: 10 13 • Services: 20 22 (including 2 SaaS) • Several of these are hybrids (products and services) • Another NFL team is now covered (The Patriots) bringing the total to 7. • An MLB stadium got renewed, bringing the total to 2. • The NBA received Certification for its “Arena Security Standards, Security Audits, and Security Training Programs” • Type of award: o Certification: 14 17 o Designation: 12 15 o Developmental Test and Evaluation Designation: 4 • Type of product: o CBRNE o Perimeter security o Cyber o Standards o Mass notification • Types of services: o Threat and Vulnerability Analyses (TVA) o Security policies and processes o Situational awareness o TSA Screening Partnership Program SaaS: Up and coming category!
  • 2. Who received coverage this quarter? Some big, traditional government contactors like: • Lockheed Martin Corporation • PriceWaterhouseCoopers LLP • Raytheon Company • Leidos Innovations Company (3) • Accenture Federal Services LLP • Boeing Some smaller companies you may not know like: • Lion Apparel, Inc. • Qylur Intelligent Systems, Inc.* • Cybernance Corporation • iControl, Inc. • American Science & Engineering* And a few you may know like: • Contemporary Services Corporation* (2) • The Port Authority of New York and New Jersey • ASIS International, Inc. • Ameristar Perimeter Security USA, Inc. (2) So, what does this tell us? The biggest message is that the SAFETY Act has grown to include big business and small business, products and services, public and private interests, and seems to be running at a rate of 120 awards per year. Any product or service that, in some way, could counter at terrorist attack is eligible. Why aren’t you on this list? *In the spirit of full disclosure, the marked companies are clients of mine. Also, all links are informational, not product endorsements. For questions or more information, please contact: David A. McWhorter, PhD | Founder Dave@TheHSCGroup.com | 202-288-3995 This could be yours!