1 / 62

Mobile Security Screening May 5, 2010

Mobile Security Screening May 5, 2010. Presenters: Peggy Lane, BlueStar plane@bluestarinc.com Jeff Webster, INPUT jwebster@input.com - Joseph Robinson, Salamander Technologies joseph@salamandertechnologies.com. BlueStar’s Government Initiative.

stacie
Download Presentation

Mobile Security Screening May 5, 2010

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobile Security Screening May 5, 2010 • Presenters: • Peggy Lane, BlueStar • plane@bluestarinc.com • Jeff Webster, INPUT • jwebster@input.com • - Joseph Robinson, Salamander Technologies • joseph@salamandertechnologies.com

  2. BlueStar’s Government Initiative • BlueStars Government initiative was created for resellers who currently sell into government, as well as for those interested in developing new government business. • Demand Generation • Educational Seminars and Webinars • ISV Solutions Development and Teaming • Grant Writing • Municipal Leasing

  3. BlueStar’s Government Initiative • Plan your market strategy • Partners need to determine the size of your market opportunity and define your short and long term government business strategies and goals. BlueStars expertise strategic planning, government procurement, will grow your business • Define your Sales Territories and Educate your Team • Having a highly skilled and knowledgeable team selling to the right customer at the right time makes the difference between bidding… and bidding and winning. • Develop and Grow your Government Pipeline • Creating a qualified pipeline is critical to accurately forecast revenue and make informed bid decisions. BlueStar has the resources you need to build a winning pipeline. • Develop Winning Proposals • Pursuing bid opportunities with an understanding of your government prospect’s pain-points and objectives means viewing the bid opportunity from their perspective.

  4. BlueStar’s Government Initiative Motorola Government Application Segments • E-Citation and Code Enforcement • First Responder Accountability • Security Screening Mobile Data Access • Inspections and Maintenance • Asset Management

  5. Motorola Government: Demand Generation BlueStar Bid Opportunities and Industry Information • Government Opportunities - Get the latest on the opportunities you choose to track • Agency Information - Access opportunities, contracts, news, and more for agencies of interest to you • States - Access opportunities, contracts, news, and more for states of interest to you • Local Governments - Access opportunities, contracts, news, and more for local governments of interest to you • Companies - Up-to-date news and awards for competitors and partners you follow • Grants - Receive easy access to your marked grant programs and awards • Task Orders - Stay up-to-date on the task orders you are interested in

  6. Motorola Government: Educate the Partner Motorola Government 101 Grants 101 Webinar Series • Educational series for our partners to understand purchasing and funding cycles for Federal, State and Local Government. • Vertical focused: Education, Public Safety, First Responder’s, Health etc..

  7. Educate the Partner

  8. Solutions Development and Teaming BlueStar ISV Partnerships: BlueStar Inc. is closely aligned with a select network of strategic ISV partners offering unique and customizable vertical solutions for Public Safety, State & Local Government, Industrial, Commercial, RFID and Retail market segments. We understand the need to build new solution sets that will allow you to grow your business in today's competitive markets Deliver Solution

  9. BlueStar’s Government & Municipal Leasing • Creative financing and leasing options for our Partners who sell into the public sector. • Our technology distribution expertise and focus in providing technology solutions to State and Local governments, affords us a thorough understanding into the unique financial and budgetary needs that the public sector requires. • BlueStar offers multiple options of Municipal Leasing and allows our resellers to tailor specific lease structures for the distinct requirements of government entities.

  10. THANK YOU! Peggy Lane 800-354-9776 x3313 plane@bluestarinc.com www.bluestarinc.com/motorola

  11. State and Local Public Safety/Homeland Security Grants Jeff Webster Senior Analyst, Justice/Public Safety & Homeland Security INPUT May 5, 2010

  12. Agenda • Grant process • Finding Grants and using them • Commonly used Homeland Security grant programs for asset and evidence management • Stimulus • Best practices and tips

  13. Grant Classifications & Sources of Information How does the federal grant process work? • Grant Classifications • Direct • Pass-Through • Further Classifications • Competitive • Formula • Sources of Grant Information • INPUT’s Grants Database • Grants.gov • Federal Register • Monthly Treasury Statements for Grants Funding • Catalog of Federal Domestic Assistance

  14. Finding Grants and Using Them

  15. Finding Grants • Grants are published in the Catalog of Federal Domestic Assistance (CFDA) • Search by Keyword • Search by Program Number • CFDA.gov • Grants.gov • FEMA Preparedness Grant • Search grant programs by equipment type

  16. Utilizing Grants • Agencies utilize grant funds for the following: • Equipment • Education and Training • Personnel • Technology • Everything that has a price tag • If you justify it, they will pay • Over 1,400 grant programs available

  17. Commonly Used Homeland Security Grant Programs

  18. Homeland Security Grant Programs • Homeland Security Grant Program • Urban Area Security Initiative (UASI) • State Homeland Security Grant Program (SHSGP) • Metropolitan Medical Response System Program • Citizen Corps Program • Buffer Zone Protection Program • Port Security Grant Program

  19. Funding Trends FY06-11 *Recommended Note: LETPP rolled into SHSGP for FY08

  20. DHS Grant Release dates FY2010

  21. Impact of Federal Stimulus

  22. ARRA Objectives for DHS • $2.75 billion allocated to the Department of Homeland Security in ARRA • $715M allocated to state and local programs • Border Security Fencing, Infrastructure, and Technology • Public Transportation and Rail Security Assistance • Firefighter Assistance • Emergency Food and Shelter • Disaster Assistance

  23. DOJ vs. DHS ARRA S&L Funding Source: American Recovery and Reinvestment Act, DHS, DOJ, and INPUT

  24. DOJ & DHS Formula Grants Allocations $100 million+ $75 million - $100 million WA VT MT ME ND MN OR NH ID NY SD MA WI WY MI RI PA IA CT NV NE OH NJ IN IL UT CO WV DE KS VA MO CA KY MD NC TN OK AZ AR NM SC GA MS AL LA TX AK FL $50 million - $75 million HI $25 million - $50 million $0 - $25 million State and local governments will receive $2.3 billion in DOJ/DHS formula grant funding through the ARRA Sources: Democratic Policy Committee, OVC, and INPUT

  25. Best Practices and Tips for Applying and Using Grants

  26. Best Practices • Do not judge a grant by its title • Your project is important • look for a variety of funding sources • Keep focused • Goal of project • Outcome of project • “Multi” projects • Grant management • Be realistic, clear, and specific

  27. Tips for applying • Get support from local officials • Read over previously awarded applications • Address goals • Short term • Long term • Place the most important information at the top of the application • Editing mistakes can be deadly • MEET DEADLINES!

  28. Questions?Jeff Webster703-707-4081jwebster@input.comTwitter: jwebsterINPUT

  29. Mobile Security Screening Solution Executing Federal Interoperability Standards

  30. Introductions • Terminology/Definition of Credentialing & Requirements • Credentialing Standards – A Quick History • Overview - Types of Cards - How it all works • Demonstration • How does it get paid for? • Recap / Questions? AGENDA

  31. Introductions Salamander Technologies’ Accountability Solutions provide agencies nationwide with a fully interoperable emergency incident command structure based upon NIMS operating procedures. Joseph Robinson, Vice President Marketing & Sales

  32. interTRAX Overview

  33. Welcome! • What’s your agenda today? • How much do you know about Federal Interoperability? • What do you hope to take away or learn from today’s meeting?

  34. Terminology FIPS IPL FIPS-201 PKI FRAC PIV-I Smart Card Locally Issued Photo ID HSPD-5 HSPD-12

  35. Terminology – High Level Definitions HSPD-5 – Homeland Security Presidential Directive 5 HSPD-12 -Policy for a Common Identification Standard for Federal Employees FIPS/FIPS201- Federal Information Processing Standards IPL- Identity Privilege List PKI- Personal Key Infrastructure PIV-I -Personal Identification Verification - Interoperability Specs FRAC – First Responder Access Credential Smart Card – embedded integrated circuit chip Locally Issued Photo ID – Bar Code to Hold Data – Not PIV-I compatible

  36. Definition of Credentialing & Requirements

  37. FIPS/FRAC = PIV-I = Initiative: Introduction Credentialing StandardsA Quick History Federal ID for Federal Government Workers Federal ID for Responders of Federal Disasters Now Law:

  38. FIPS/FRAC = PIV-I = Initiative: Introduction Credentialing StandardsA Quick History Federal ID for Federal Government Workers Federal ID for Responders of Federal Disasters Now Law:

  39. Types of Cards – How it WorksInteroperable vs. Not Interoperable • 3 Levels of Security • 3 Types of Cards • 3 Types of Agency Issuers

  40. Identification

  41. Identification At minimum add qualifications which can be validated at the scene without connectivity. This layer of validation is included in the Salamander Accountability system and makes the PIV-I or PIV- C card more useful.

  42. Incident

  43. Use the handheld for checking against a known list. The System can check either at a separate validation station or at a command station. The Goal is to build a platform for issuance and management.

  44. The System can check three levels of authentication at the handheld: • Check the Validation of the Card. • Check the Validation of the PIN. • Check the validation of the biometric

  45. The System can check the list via Cell or wireless or satellite or local Compact dataset on the laptop: • Check the Validation against Fed,State, local lists. • We sell a hub application called interTRAX exchange for this purpose and could mix it with an Fed list provider.

  46. There are Three places to validate cards. Command validation of the all the layers of authority including Fed Lists. Handheld validation using three factor authentication. Laptop validation of the all the layers of authority including Fed List. It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.

  47. There are Three places to validate cards. Command validation of the all the layers of authority including OCSP. Handheld validation using three factor authentication. rapidTAG validation of the all the layers of authority including OCSP. 1 It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.

  48. There are Three places to validate cards Command validation of the all the layers of authority including OCSP. Handheld validation using three factor authentication. rapidTAG validation of the all the layers of authority including OCSP. 2 It is not NIMS Protocol to use a FIPS/FRAC Card to determine Redzone admittance: Lack of Qualifications and Physical Card Holding is the reason.

More Related