Approved Technologies

The SAFETY Act provides two levels of liability protections for approval: Designation and Certification. By obtaining either Designation or Certification, companies obtain a level of legal protection in case their technology is ever put to use during a terrorist attack. See below for a list of approved technology certifications.





Company/Technology

ARES Security Corporation

Approved: June 29, 2023 | Expires: June 30, 2028

ARES Security Corporation provides AVERT C2 (the Technology). The Technology is a command and control software platform that enables integration of sensor feeds and system data into an interactive, web-based, graphical user interface that is configured by customers. The Technology also includes online support, a training knowledge base, consulting services, and operator training.


ARES Corporation

Approved: January 24, 2020 | Expires: February 28, 2025

ARES Security Corporation, a California corporation, provides AVERT® (Automated Vulnerability Evaluation for Risks of Terrorism®) Software and Related Services, a PC-based software tool for performing vulnerability assessments of user-defined facilities (the "Technology"). The Technology uses 3-D graphic tools, digital imagery information, and other components such as customer facility designs and geographic data to develop a 3-D site map of a customer’s facility. The Technology also includes associated manuals, related training, and options including support services, consultant services, and tactical review and validation of models by subject matter experts.


ARES Security Corporation

Approved: January 06, 2015 | Expires: January 31, 2020

ARES Security Corporation provides AVERT® (Automated Vulnerability Evaluation for Risks of Terrorism®) Software and Related Services (the “Technology”), a PC-based software tool for performing vulnerability assessments of user-defined facilities. The Technology uses graph algorithms, 3-D graphic tools, digital imagery information, and other components to develop a 3-D site map of a customer's facility or installation site. The Technology also includes analysts, consultant services to develop the site models and library data from customer-supplied information, associated manuals, related training, technical and optional tactical support.