Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

AMETEK, Inc.

Approved: February 10, 2015 | Expires: February 29, 2020

AMETEK, Inc., and Advanced Measurement Technologies, Inc., provide the Detective® product line (the “Technology”). The Technology is a series of stand-alone handheld, mobile, and portal radioactive isotope identifiers that can detect, locate, and identify radioactive and nuclear materials. The product line includes the Micro-Detective, Detective 100T, Detective 200, and Detective-SPM instrument classes. The Technology includes technical documentation, replacement batteries, transport cases, collimators, training, and warranty and maintenance services.


Electrolytic Technologies Corporation

Approved: February 06, 2015 | Expires: February 29, 2020

Electrolytic Technologies Corporation provides the KlorigenTM (the “Technology”). The Technology is a chemical process system for the on-site production of Chlorine or Sodium Hypochlorite solution at water treatment plants and chemical facilities. The Technology can be fully or partially implemented and includes an operating and maintenance manual, site assessments, supervision of installation, field and acceptance testing, training, and customizable service and warranty plans.


Universal

Approved: February 03, 2015 | Expires: February 29, 2020

Universal Protection Service, LP, Universal Protective Service, LLC, and United Security, LLC d/b/a Universal Protection Service (together “Universal”), provide Security and Guard Services (the “Technology”). The Technology provides unarmed security guard services and is designed to deter, prevent, detect, alert, and respond to a variety of security threats at commercial buildings, industrial/manufacturing complexes, and healthcare facilities. The Technology includes: pre-deployment security assessments, customer training programs, and emergency preparedness services.


Virtual Emergency Services, LLC

Approved: January 21, 2015 | Expires: February 29, 2020

Virtual Emergency Services, LLC provides RESPONSEnet™ Emergency Mapping Database System (the “Technology”). The Technology is a scalable, modular, software database system that enables first responders and client personnel to create and securely access, via the Web, pre-determined tactical response plans and coordinate on-site Incident Command System activities to respond to emergency incidents. The Technology also includes total project management, data and imagery collection, data rendering and database population services, as well as onsite and Web-based customer training.


ARES Security Corporation

Approved: January 06, 2015 | Expires: January 31, 2020

ARES Security Corporation provides AVERT® (Automated Vulnerability Evaluation for Risks of Terrorism®) Software and Related Services (the “Technology”), a PC-based software tool for performing vulnerability assessments of user-defined facilities. The Technology uses graph algorithms, 3-D graphic tools, digital imagery information, and other components to develop a 3-D site map of a customer's facility or installation site. The Technology also includes analysts, consultant services to develop the site models and library data from customer-supplied information, associated manuals, related training, technical and optional tactical support.


Tailored Solutions & Consulting, Inc.

Approved: December 19, 2014 | Expires: January 31, 2018

Tailored Solutions & Consulting (dba “TSC Advantage”) provides the Threat Vector Manager™ (the “Technology”). The Technology is a methodology used for assessing and examining holistic cyber security risk. The deliverable produced through the execution of the Technology is called the Enterprise Security Assessment (“ESA”). The ESA examines an organization’s security maturity, resiliency, the effectiveness of existing security investments, and security preparedness within six categories.


The Boeing Company

Approved: December 19, 2014 | Expires: January 31, 2020

The Boeing Company provides the Boeing Entity Management Framework (the “Technology”). The Technology is a software framework designed for building identity management, case management, screening, incident reporting, and criminal history applications. The Technology consists of an entity management framework, a data repository, and a data ingest function. It also includes system development and customization, installation, integration, system administration, training, maintenance, and off-site support.


The Boeing Company

Approved: December 17, 2014 | Expires: January 31, 2020

The Boeing Company (“Boeing”) provides the Aircraft Delivery Security Operations (“ADSO” or the “Technology”). The Technology is a program of plans, personnel, and procedures designed to maintain the safety and security of Boeing commercial aircraft delivery flights. The Technology includes service and maintenance of the Transportation Security Administration-certified screening equipment, software, data, materials, audits of screening processes, and training.


Arizona Sports and Tourism Authority ("AZSTA")

Approved: December 17, 2014 | Expires: January 31, 2020

The Arizona Sports and Tourism Authority (“AZSTA”) provides the University of Phoenix (“UoPS”) Stadium Security Program (the “Technology”). The Technology is a comprehensive security program composed of policies; procedures; physical and electronic security equipment; and trained personnel to detect, deter, prevent, respond to, and mitigate Acts of Terrorism, exclusively at UoPS (inclusive of the Stadium facility and Sportsman’s Park, which consists of the pedestrian plaza, parking lots, and lawn space surrounding the Stadium) on event and on non-event days. The Technology includes the development of security policies and procedures, and is performed in accordance with the NFL Best Practices for Stadium Security.


Eagle Security Group, Inc.

Approved: December 16, 2014 | Expires: December 31, 2019

Eagle Security Group, Inc. provides Eagle Multi-Assault Counter Terrorism Action Capabilities (“MACTAC”) Instructor Course (the “Technology”). The Technology is an advanced law enforcement training course providing knowledge, skills, and abilities for law enforcement officers to develop departmental training programs and policies to counter active shooter and terrorist small arms/IED attacks. The Technology is based on existing MACTAC concepts and consists of both classroom and tactical training which includes 24 blocks of instruction delivered over 40 hours/5 days.