Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

ARES Corporation

Approved: September 26, 2022 | Expires: February 28, 2025

The Technology is a computer-based software tool, AVERT® (Automated Vulnerability Evaluation for Risks of Terrorism®) Software and Related Services, for performing vulnerability assessments of user-defined facilities. The output from the Technology is a computerized 3-D site map, vulnerability reports, and related outputs to estimate the probability of successful attack completion for scenarios as the customer defined. Using a combination of customer and Applicant input, the Technology provides a computer-modeled assessment of hypothetical terrorist attacks to aid in performing vulnerability assessments and to inform decision makers where security could be optimized.


ARES Corporation

Approved: January 24, 2020 | Expires: February 28, 2025

ARES Security Corporation, a California corporation, provides AVERT® (Automated Vulnerability Evaluation for Risks of Terrorism®) Software and Related Services, a PC-based software tool for performing vulnerability assessments of user-defined facilities (the "Technology"). The Technology uses 3-D graphic tools, digital imagery information, and other components such as customer facility designs and geographic data to develop a 3-D site map of a customer’s facility. The Technology also includes associated manuals, related training, and options including support services, consultant services, and tactical review and validation of models by subject matter experts.


ARES Corporation

Approved: September 16, 2009 | Expires: October 31, 2014

ARES Corporation provides Automated Vulnerability Evaluation for Risks of Terrorism® (AVERT). The Technology provides a computerized 3-D site map, quantitative, qualitative, and visual vulnerability reports and related outputs to estimate the probability of successful attack completion for scenarios as defined by the customer. The Technology also includes associated manuals, related training, and technical support.