Certifications

For Certification, a technology must have demonstrated confidence of continued effectiveness: i.e., it will perform as intended, conform to the seller’s specifications, and is safe for use as intended. In addition to the benefits provided under Designation, Certification allows Sellers of antiterrorism technologies to assert the Government Contractor Defense that immunizes Sellers from liability for claims arising from acts of terrorism. Technologies that receive Certification will be also placed on an Approved Products List for Homeland Security. Designation is a prerequisite for Certification.





Company/Technology

Adesta, LLC.: Physical/Electronic Security Solution

Approved: December 06, 2006 | Expires: December 31, 2011

Adesta, LLC, provides the Physical/Electronic Security Solution, which consists of multi-disciplinary systems design, engineering, maintenance and integration services of electronic and physical security measures for the anti-terrorism protection of public and commercial infrastructure.


ITT Corporation: Explosive Suppressive System

Approved: November 28, 2006 | Expires: December 31, 2011

ITT Corporation provides the Explosive Suppressive System, a device designed to suppress the fragmentation, blast pressure and fireball from hand-carried Improvised Explosive Devices (IEDs) or other munitions.


Accenture LLP: United States Visitor and Immigration Status Indictor Technology (US VISIT) – Virtual Border Management (VBM) Support Services

Approved: November 21, 2006 | Expires: November 30, 2011

Accenture LLP, provides Virtual Border Management (VBM) Support Services for the Department of Homeland Security (DHS) under the U.S. Visitor and Immigration Status Indicator Technology (US-VISIT) Program.


Meridian Medical Technologies, Inc.: AtroPen®

Approved: November 09, 2006 | Expires: November 30, 2011

Meridian Medical Technologies, Inc., provides AtroPen®, a atropine auto-injector for the treatment of chemical nerve agent exposure.


Northrop Grumman Information Technology, Inc..: Integrated Security Services

Approved: November 09, 2006 | Expires: October 31, 2011

Northrop Grumman Information Technology, Inc., provides Integrated Security Services (ISS), a suite of services for the design, implementation, and testing of tailored, combinatorial security systems. ISS can aid in the deployment of information security systems, surveillance systems, perimeter intrusion detection, vehicle access control, or CBRNE detector networks.


Hach Company: Hach GuardianBlue™ Early Warning System

Approved: October 31, 2006 | Expires: November 30, 2011

Hach Company provides Hach GuardianBlue™ Early Warning System, a set of sensors with the ability to detect and identify chemical or biological contaminants in commercial water supplies.


E-Z-EM, Inc.: Reactive Skin Decontamination Lotion

Approved: September 12, 2006 | Expires: October 31, 2011

E-Z-EM, Inc., provides Reactive Skin Decontamination Lotion, a lotion that neutralizes, removes and subsequently renders non-toxic chemical weapon agents, blister agents and T-2 toxins that have come in contact with skin.


The Boeing Company: Technology Evaluation and Design Services

Approved: September 11, 2006 | Expires: October 31, 2011

The Boeing Company provides Technology Evaluation and Design Services for cargo container inspection facilities.  These services provide customers with a defined set of baseline recommendations, requirements, solutions, and selection criteria for a suite of sensor components.


Rapiscan Systems, Inc.: Metal Detection Systems

Approved: September 11, 2006 | Expires: October 31, 2011

Rapiscan Systems, Inc. provides Metal Detection Systems. The Metal Detection Systems include hand-held and walk-through metal detectors that can be used to detect metal objects.


Triple Canopy Inc.: Security Assessment Services

Approved: September 11, 2006 | Expires: October 31, 2011

Triple Canopy Inc. provides Security Assessment Services. These services identify physical and operational vulnerabilities at various facilities, including critical infrastructure, and recommend mitigation in a comprehensive security plan.