April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Research

GSN'S 2018 HSA Winners

CYBER SECURITY PRODUCTS and SOLUTIONS

Judging in this category is based on a combination of client organization, technological innovation or improvement, filling a recognized government IT security need and flexibility of a solution to meet current and future organizational needs.

 

Best Application Security Solution
Appthority – Platinum Winner

 

Best User & Entity Behavior Analytics Solution
LogRhythm - Platinum Winner

Bay Dynamics – Gold Winner
Gurucul – Silver Winner

 

Best Anti-Malware Solution
AppGuard Inc - Platinum Winner

Bromium – Gold Winner

 

Best Application Security Solution
Virsec– Platinum Winner
Code Dx, Inc – Gold Winner
Sargent and Greenleaf – Silver Winner
Bromium – Finalist

Waratek – Finalist

 

Best Sever Security Solution

AppGuard Inc - Platinum Winner

 

Best Threat Intelligence Solution

ProofPoint - Platinum Winner

 

Best Server Security Solution

SolarWinds Worldwide, LLC - Platinum Winner

 

Best Email Security/ Loss Management Solution
Proofpoint– Platinum Winner

 

Best identity Management Platform
CyberArk  – Platinum Winner
Beyond Trust– Gold Winner
Idaptive – Silver Winner
Centrify – Finalist

 

Best Continuous Monitoring & Mitigation Solution
SolarWinds Worldwide, LLC – Platinum Winner
Netwrix Corporation – Gold Winner

DFLabs – Silver Winner
CyberArk – Finalist

 

Best Physical Logical Privileged Access Management Solutions
Centrify– Platinum Winner
CyberArk – Gold Winner

 

Best Cyber Operational Risk Intelligence
RedSeal – Platinum Winner
DFLabs – Gold Winner
RiskSense – Silver Winner

 

Best Compliance/Vulnerability Assessment
RedSeal – Platinum Winner
Wombat Security Technologies, Inc. – Gold Winner

 

Best Network Security/Enterprise Firewall
OPAQ Networks – Platinum Winner

 

Best Multifactor Authentication Solutions
Optimal IdM – Platinum Winner

 

Best Endpoint Detection and Response Solution
Idaptive – Platinum Winner

 

Best Security Incident and Event (SIEM) Management
SolarWinds Worldwide, LLC – Platinum Winner

LogRhythm – Gold Winner

 

Best Industrial Cybersecurity Solution
Virsec – Platinum Winner

 

Category #2 Vendors of Physical Security Products and Solutions

 

Judging in this category is based on a combination of an increase in client organization, technological innovation or improvement, filling a recognized government IT security need and flexibility of a solution to meet current and future organizational needs.

 

VIDEO SURVEILLANCE SOLUTIONS

Best Thermo, Nightvision, Infrared Cameras
FLIR Systems, Inc. – Platinum Winner
CohuHD Costar Gold Winner – Gold Winner

 

Best City-Wide Video Surveillance
Logos Technologies – – Platinum Winner

COMMUNICATIONS SOLUTIONS

 

Best Interoperable First Responder Communications
LRAD Corporation – Platinum Winner

 

BARRIERS

 

Best Perimeter Protection, Intrusion Detection System
AMICO – Platinum Winner
PureTech Systems – Gold Winner
FLIR Systems, Inc. – Silver Winner

 

Best Crash Barriers (Fences, Gates, Barriers, Bollards)
TCP-Security Solutions – Platinum Winner

DETECTION PRODUCTS

 

Best Nuclear/Radiation Detection Solution
FLIR Systems, Inc. – Platinum Winner

 

Best Chemical Detection Product or Solution
Rapiscan Systems – Platinum Winner
FLIR Systems, Inc. – Gold Winner
Teknoscan Systems Inc. – Silver Winner

 

Best Explosives Detection Product or Solution
Rapiscan Systems   – Platinum Winner

 

Best Active Shooter Gunshot Detection Solution
Shooter Detection Systems – Platinum Winner

 

SERVICES EDUCATION

 

Best College/University in Homeland Security
Bellevue University – Platinum Winner

 

Best Disaster Preparedness, Recovery, Clean-up
High Rise Escape Systems Inc. – Platinum Winner

 

VENDORS OF IT

 

Best Access Control Hardware
Sargent and Greenleaf – Platinum Winner

 

GOVERNMENT ENTRIES

 

Most Notable Federal Government Security Program, Project of Initiative
Federal Risk Management Process Training Program (RMPTP)

Most Notable Law Enforcement Interdiction, Arrest, Counter Terrorism or Crime Protection Program – Federal, State or Local
Federal Risk Management Process Training Program (RMPTP)

 

Most Notable Federal Government Security Program, Project of Initiative
Department of Homeland Security Science and Technology Directorate

 

Edgile introduces new solution to address access management for enterprises shifting to clouds

AUSTIN, TX June 14, 2017 (SailPoint Navigate '17) Edgile, the leading cyber risk and compliance consulting firm, today announced the launch of Cloud Jumpstart, a program to address the identity provisioning and governance challenges faced with enterprise-wide shifts to the cloud. Designed to leverage both Microsoft Azure's secure access and SailPoint's identity governance, Edgile's Cloud Jumpstart helps organizations create business-aligned programs to ensure a secure and compliant shift.

"Enterprises moving to the cloud must ensure they maintain an appropriate level of security and account for increasing compliance issues in today's complex digital environment. Risk officers are realizing they need additional dedicated expertise if they want to successfully transform their company with a lasting, issue-free shift to the cloud," said Don Elledge, CEO of Edgile. "Our new Cloud Jumpstart program delivers organizations a customized blueprint for an efficient, secure, and compliant move to the cloud that improves their overall risk profile." 

Award winning expertise with Microsoft and SailPoint

The Cloud Jumpstart program enables enterprise customers to take advantage of Edgile's combination of deep IAM and cloud experience. With multiple EM+S and Azure Active Directory experts honored as Microsoft MVPs, Edgile has a long history of success as a Microsoft Gold Partner. Edgile was recently named a 2017 Microsoft Enterprise Mobility Award Partner of the Year finalist. Based on an outstanding track record as a SailPoint Premiere Partner, Edgile was also named SailPoint Partner of the Year for the Americas.

Through Edgile's new Cloud Jumpstart program, organizations can confidently leverage the cloud with a business-aligned strategy for hybrid access governance. The program defines a clear path to compliance in the cloud—combining SailPoint's identity governance capabilities and extending Azure Active Directory Premium—to cover the most demanding security needs of the modern enterprise.

"We're excited about the innovative new way Edgile's Cloud Jumpstart program helps customers strategically assess and implement Microsoft Azure Active Directory with SailPoint's Identity Governance to protect their entire enterprise," said Alex Simons, Director of Program Management, Identity Division, Microsoft Corp.

"Edgile is a valued strategic consulting partner and we have a long history of working together to help our customers fully leverage the power of our identity governance platform," said Kevin Cunningham, president and co-founder of SailPoint. "Edgile's Cloud Jumpstart program accelerates our joint customers' ability to leverage SailPoint's collaboration with Microsoft and integration with Azure Active Directory. This allows security organizations to quickly evaluate and strategically deploy an integrated SailPoint-Microsoft hybrid solution. This collaboration is a powerful combination. Once deployed, it empowers users with seamless access while ensuring security requirements are met through identity governance."

Supporting Resources: 

Edgile Cloud Risk & Security: We Secure the Cloud SM

The shift to the cloud is accelerating as the agility, reliability, and reduced costs of cloud services rapidly overcome concerns about protected information and regulatory compliance. Edgile provides clients with a secure and compliant path to the cloud by delivering a strategic roadmap while managing risk and modernizing the organizational security model. Our cloud specialists—with deep expertise in IAM, GRC, and cybersecurity—deliver a transformational skill set to successfully lead organizations through enterprise-wide shifts.

About Edgile

Edgile is the trusted security partner to the world's leading organizations, providing consulting, managed services, and regulatory content services. Our mission is to secure the modern enterprise by developing programs that increase business agility and create a competitive advantage for our clients. Our strategy-first model helps organizations achieve their business goals through on-premises and cloud security programs, IAM, GRC, and cybersecurity.

For more information about Edgile: www.edgile.com. Follow Edgile on Twitter and LinkedIn.

Technavio Announces Top Five Vendors in the Global Armored Vehicles Automatic Fire Extinguishing Systems Market from 2016 to 2020

LONDON --Technavio has announced the top five leading vendors in their recent global armored vehicles automatic fire extinguishing systems (AFES) market report. This research report also lists four other prominent vendors that are expected to impact the market during the forecast period.

Competitive vendor landscape

The global armored vehicles AFES market is highly competitive with vendors competing based on cost, reliability, quality, and aftermarket services. Therefore, to survive and succeed in such a highly competitive environment, it is crucial for the vendors to provide cost-effective and high-quality services. Vendors have to focus on maintaining a global presence, in-house manufacturing capabilities, product offerings, investment in R&D, and a strong client base to gain an edge over competitors.

According to Abhay Singh, a lead analyst at Technavio for defense, “The competition in this market is expected to rise over the next four years with the increase in product extensions, technological innovations, and increase in the number of M&A. International players may grow progressively during the projected period by acquiring smaller players.”

Top five armored vehicles AFES market vendors

Bulldog Direct Protective Systems

Bulldog Direct Protective Systems (Bulldog) was founded in 1998 and is headquartered in Cincinnati, Ohio, US. The company manufactures and markets bullet-resistant products that are used in applications in the homes, offices, and vehicles. The company, along with its diverse product portfolio, provides fire suppression systems primarily under Automatic Halon 1211, for armored, fire, police, and passenger vehicles. This system is triggered when its sensors detect fire. Bulldog also provides custom design services for its customers.

The company has been supplying armored vehicles and customized bulletproofs cars to the military and peacekeeping agencies since its inception in 1998.

Firetrace Aerospace

Firetrace Aerospace was founded in 2003 and is headquartered in Scottsdale, Arizona, US. The company manufactures and sells wheeled vehicles and aviation fire protection systems globally. It operates as a subsidiary of a UK-based health and safety technology provider, Halma.

The company provides fire suppression systems for the armored vehicles that are deployed in combat missions. It supplies fuel tank fire suppression systems (Fire Panel) to the US military, the US Marine Corps (USMC), and their allied forces for the deployment armored combat vehicles. The Fire Panel is designed to fit in the combat vehicles' fuel tanks during the design phase or in-theater phases.

Kidde Deugra

Kidde Deugra was founded in 1958 and is headquartered in Ratingen, Germany. The company provides fire protection systems for armored vehicles and non-military vehicles, as well as for the aviation industry.

The company offers fire protection solutions at two different points in the vehicle. It provides fire-extinguishing systems in the engine room, as well as installs the fire suppression systems for protecting crew's quarters in the armored vehicles. Its fire detection system sends alarms to the control unit of the engine room for automatic fire fighting process. In this process, the linear sensors or point detectors serve as a fire detection agent.

N2 Towers

N2 Towers was founded in 2002 and is headquartered in Belleville, Ontario, Canada. The company manufactures and sells inert gas generators (IGG) explosion and fire suppression systems that are used in many industries, including telecommunications and IT, transportation, oil and gas, mining, aviation, military armored vehicles, and medical facilities.

The company supplies automatic fire detection systems and generator explosion suppression systems for installation in military armored vehicles. These systems are installed either as a retrofit-type assembly or as new supplemental systems to ensure enhanced and sustainable protection for onboard military personnel.

Spectrex

Spectrex was incorporated in 1981 and is headquartered in Cedar Grove, New Jersey, US. The company manufactures and markets flame and open path gas detectors globally. The company provides automatic fire detection and suppression systems for the army and marine armored vehicles primarily in the US. It provides its products to different industries including oil and gas, chemical and petrochemicals, pipelines, power, automotive, mining, aviation, pharmaceuticals, and defense. Since September 2015, the company has been operating as a subsidiary of Emerson, a US-based technology and engineering services provider.

Browse Related Reports:

·         Global Fire Extinguisher Market 2015-2019

·        Global Fire Sprinkler Market 2016-2020

·        Global Fire Protection Systems Market in the Oil And Gas Industry 2016-2020

 

Purchase these three reports for the price of one by becoming a Technavio subscriber. Subscribing to Technavio’s reports allows you to download any three reports per month for the price of one. Contact [email protected]with your requirements and a link to our subscription platform.

BlackEnergy threatens U.S. infrastructure

Investigators have discovered a potential cyber security threat to the U.S. critical infrastructure. BlackEnergy is a trojan horse discovered within the software that controls oil and gas pipelines, water systems, and power transmission grids in the U.S. Using Black Energy, hackers could have the ability to use the internet to shut down pipelines, nuclear power plants, wind turbines, and water treatment plants.

Department of Homeland Security’s (DHS) Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) identified the sophisticated malware believed to be inserted by hackers sponsored by the Russian government.

ICS-CERT has determined that users of HMI products from various vendors have been targeted in this campaign, including GE Cimplicity, Advantech/Broadwin WebAccess, and Siemens WinCC. It is currently unknown whether other vendor’s products have also been targeted, according to DHS. ICS‑CERT is working with the involved vendors to evaluate this activity and also notify their users of the linkages to this campaign.

According to DHS, the BlackEnergy hacking campaign has been ongoing since 2011, but no attempt has been made to activate the malware to damage, modify, or otherwise disrupt affected systems. ICS-CERT officials believe that Russian intelligence agencies helped place the malware in key U.S. systems as a threat or a deterrent to a U.S. cyberattack on Russian systems -- mutual assured destruction from a cold war-era playbook.

ICS-CERT has not been able to verify if the intruders expanded access beyond the compromised HMI into the remainder of the underlying control system. However, typical malware deployments have included modules that search out any network-connected file shares and removable media for additional lateral movement within the affected environment. The malware is highly modular and not all functionality is deployed to all victims, according to DHS.

Black Energy is the same malware that was used by a Russian cyber-espionage group dubbed Sandworm, to target NATO and some energy and telecommunications companies in Europe earlier this year. Investigators found linkages in the shared command and control infrastructure between the BlackEnergy and Sandworm campaigns, suggesting both are part of a broader campaign by the same threat actor.

ICS-CERT coordinates control systems-related security incidents and information sharing with Federal, State, and local agencies and organizations, the intelligence community, and private sector constituents, including vendors, owners and operators, and international and private sector CERTs. The focus on control systems cybersecurity provides a direct path for coordination of activities among all members of the critical infrastructure stakeholder community.

'Serious flaws' found in most firewalls, test results misleading

Vik Phatak

If you want to keep any warm and fuzzy feelings you have about your firewall because it has received good grades from a test lab, you won't want to read the latest report from NSS Labs.

The independent testing lab in Carlsbad, CA, revealed in its Network Firewall Group Test Report for 2011's first quarter that five of the six firewalls examined by the organization failed to correctly handle a TCP Split Handshake spoof, or Sneak ACK attack. That failure is an invitation for hackers to breach your firewall.

The researchers also found that three out of six products tested failed to remain operational when subjected to the boffin's stability tests. "This lack of resiliency is alarming, especially considering the tested firewalls were ICSA Labs and Common Criteria certified," NSS said in a statement released April 12. Like NSS, ICSA and Common Criteria test and certify computer products.

Another finding in the report was that measuring network performance based on the RFC-2544 (UDP) standard does not provide an accurate picture of how a firewall will perform in real-world environments. RFC-2544 is a benchmarking methodology that discusses and defines a number of tests that may be used to describe the performance characteristics of network devices.

What's disconcerting about the NSS findings is that firewalls are considered the main barriers between an organization's internal and external networks. Over the past 25 years, they have become the foundation of perimeter security and are considered to be commodity products.

“IT organizations worldwide have relied on third-party testing and been misled,” NSS CTO Vik Phatak stated. “These test results point towards the need for a much higher level of continuous testing of network firewalls to ensure they are delivering appropriate security and reliability.”

All major firewall makers were invited to participate in the tests, which were conducted by NSS free of charge. Makers that took up the offer were

  • Check Point Power-1 11065
  • Cisco ASA 5585
  • Fortinet Fortigate 3950
  • Juniper SRX 5800
  • Palo Alto Networks PA-4020
  • Sonicwall E8500 

China, Thailand kings of dirty computers

More than 60 percent of the computers in China and Thailand are infected with malware, according to a report released April 5 by a maker of security software.

Close behind those Asian nations are a handful of countries with infection rates exceeding 50 percent—Japan, Latvia, Russia, Turkey and Saudi Arabia—the quarterly report from Panda Security's anti-malware lab revealed.

The United States dropped out of the top 20 infected computer list during the period. France, Spain and Ireland—all with infection rates of around 40 percent—had the dubious distinction of being added to the list during the quarter.

The most popular form of malware found on infected computers was the Trojan, the report said. In China, for example, more than 75 percent of all infections involved that form of bad app. The next most prevalent malware forms—adware and viruses—represented less than 15 percent of the malicious software pie in that nation.

During the quarter the report noted,  "We have seen a number of attacks on cell phones and Facebook remains the king of all social networking sites, which has turned it into a lucrative draw for cyber crooks aiming to trick users."

"Additionally," it continued, "some international events—like the civic rebellions sweeping across Northern Africa—have been largely reflected in the cyber-activism and security worlds."

"This first quarter has also seen cyber war and cyber espionage in the spotlight, with China as the usual suspect in most cases," it added.

Security firm declares 2010 year of cyber-crime toolkit

Folks with a yen for cyber crime found it easier than ever to embrace their dark side in 2010 thanks to the wide availability of "toolkits"—software designed to steal information from computers without its user needing much in the way of tech savvy, according to an annual report released March 31 by an Internet content security company.

"More than anything else, 2010 was distinguished by the full and proper emergence of toolkits as a means to perpetrate cyber crime," Trend Micro researchers noted in their 2010 Threat Trends report.

"While these have always been a part of the cybercrime underground," the report continued, "in 2010 they flourished and became an even bigger part of the overall threat landscape."

Toolkits cost a little more than say, an off-the-shelf office suite. The report pegged the basic price for a copy of a thiefware program called ZeuS to be $8000. "More features can easily double the price," it said. More modest offerings, like SpyEye, cost around $3000. "However," the report noted, "what that price buys cyber-crime gangs are proven, reliable, and stealthy malware that are capable of comprehensive theft."

Because toolkits remove what used to be a significant obstacle to entry into cyber crime, their impact can't be underestimated, the report maintained. "There used to be something of a barrier to entry, as technical knowledge and expertise were both necessary to enter the world of cyber crime," it said. "Today, with cyber-crime toolkits in full production, very little, if any, technical knowhow is needed to profit."

Trend Micro researchers also found that the Web has become the favorite means of information highwaymen for reaching their victims. More than 80 percent of the top bad apps of 2010 were delivered via the Web, they noted.

"Mass compromises continued to be a prevalent risk that Web users had to contend with," the report added. "For instance, in the early part of the June, some 100,000 sites were compromised. Users who visited infected sites ended up with systems infected by data stealers that targeted online games."

Another finding by the researchers was that spam volumes in 2010 continued to rise compared to the previous year. However, volumes did decline at the end of the year—a development that the researchers attributed to the end of the  Spamit network at the end of October.

"So far," the report said, "our analysts believe that spamming is still too lucrative a business to completely abandon so any intervention that may affect the overall volume can only lead to a temporary slump."

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...