The 2010 American Security Challenge

This text will be replaced
More: Photo Gallery
September 23, 2010 Event Agenda
2010 Challenger Winners

2010 American Security Challenge Generates at Least 14 Winners

Washington, DC, September 2010 – After thorough screening by over 100 experts, 14 companies were selected for customer and investor awards at the 2010 American Security Challenge (ASC) announcement ceremony held September 23 in the Washington DC area.  The American Security Challenge is the nation’s premier program to identify innovative technology that has security applications/implications and accelerate its deployment into the defense and intelligence community as well as private sector critical infrastructure owners. 

This year 150 companies (known as Challengers) submitted technology for the pilot and investor awards resulting in 13 different Challengers selected by award partners for a total of 16 awards.  Four Challengers-- Bit9, BlueCat Networks, Chiliad, Pikewerks, Rapid7 and Triumfant were selected to participate in pilots (which are sponsored by Pilot Award Partners including ArcSight, ManTech, Intuit, and others).  Seven Challengers-- Oculis Labs, RoundTrip, Widetronix, CipherOptics, Techno-Sciences, AginCourt, Rsignia and Harbor Wing were picked for final investment consideration by Investor Award Partners Grotech Ventures, Valhalla Partners, Active Angel Investors, Blue Heron Capital and .406 Ventures.  Challengers--  Rapid7 and Pikewerks  were selected for both pilot and investment awards.  Additionally, Raytheon selected Harbor Wing to apply for Mentor Protégé status program in conjunction with Department of Defense and Office of the Secretary of Defense. Finally, Agincourt was also voted by the audience as the Most Promising Technology presenter at the event.

Last year’s Challenge resulted in over $10M of term sheets, funding, sub-contracts and teaming agreements.  “I think we’ll be closer to $25M this year for two reasons,” said ASC Advisory Board Chairman Roger London.  “This year has seen a ten-fold increase in our traction with the consumers of security technology (defense, intelligence and Fortune 500 markets), and the near-term ‘deployability’ of the technologies submitted is much higher this year.”

“This is useful for ArcSight to explore all these new technologies,” said new Public Sector Chief Technology Officer (CTO) Prescott Winter, formerly CTO of the National Security Agency until recently moving to ArcSight.  “We picked up a large number of pilots…and will have our product facing folks get involved to talk about the value to our customers.  We are very excited about it; it is a valuable experience for the whole company.”

The daylong program included presentations from a number of the winning Challengers, discussions between industry security thought leaders and the presentation of the Patriot Award.  This year’s Patriot Award was presented to General Keith B. Alexander, Director of the NSA and Commander of the new U.S. Cyber Command who accepted the award on behalf of those at “NSA and CCS who protect this nation day in and day out with very little publicity.  They are in fact the true Patriots.”

Jumpstarting the program’s activities were a “Fireside Chat” with Governor Tom Ridge, moderated by FOXNews intelligence correspondent Catherine Herridge.  The country’s first DHS Secretary warned, “Cyber-war represents the biggest lurking threats for the U.S.  We are under attack constantly.  The targets are not the typical military targets present in a physical war, but a mix of critical private and public infrastructure, including gas, power and communications grids.”  

Raytheon’s Terry Downing, Manager of Special Projects was very pleased with Raytheon’s outcomes, “We were absolutely amazed; the benefits have been fantastic.  We ended up actively pursuing relationships with seven companies.  That’s a phenomenal win for us…and really pays tribute to the veracity of the American Security Challenge.”

“The process was not cumbersome and we are thrilled,” said one of the award winners Larry Butera, CEO of Rsignia.  “The Challenge gave us a great deal of exposure.  For a small company with limited marketing budget, it’s a great opportunity and was a tremendous experience for us.”

Among the winners and event presenters, the audience selected AginCourt as the Challenge’s Most Promising Technology in an exciting real-time text vote.

ASC will continue to pulse the market for new technologies and refresh its current inventory of Challengers as they upgrade their products, secure outside capital, acquire key customers or other note-worthy activities.

Back to top

Photo Gallery

SpeakersPrintable Version

Catherine Herridge Catherine Herridge
FOX News
Catherine Herridge is an award-winning correspondent for Fox News Channel. Based in Washington DC, Catherine covers Intelligence, the Justice Department, as well as the Department of Homeland Security. Catherine and her small team of experienced journalists travelled across the US and to Yemen to complete a five month investigation into the American born cleric Anwar al-Awlaki who is linked to three of the 9/11 hijackers, the Fort Hood attack, the attempted bombing Christmas Day as well as the failed attack on Times Square. It showed that critical information about Awlaki and his mysterious return to the US in October 2002 was withheld from investigators with the 9/11 Commission. Fox’s reporting, which has prompted letters from Capitol Hill, raised new questions about Awlaki. Catherine has also travelled extensively to Guantanamo Bay Cuba where she has reported on the military commissions including the arraignment of Khalid Sheikh Mohammed and his four co-conspirators.
Thomas J. Ridge Honorable
Thomas J. Ridge
Ridge Global LLC
The Honorable Tom Ridge is president and CEO of the international consulting firm Ridge Global. He served as the nation’s first Secretary of the U.S. Department of Homeland Security from January 2003 through January 2005, and as the Assistant to the President for Homeland Security from October 2001 through December 2002. Previously, he was governor of the Commonwealth of Pennsylvania from 1995 through October 2001 and a member of the U.S. House of Representatives from 1983 through 1995. A Vietnam combat veteran, Secretary Ridge continues to work with organizations to assist our nation’s veterans, serves as chairman of the National Organization on Disability and co-chairs the Flight 93 National Memorial. He holds a B.S. from Harvard University and J.D. from the Dickinson School of Law.
Keith B. Alexander General
Keith B. Alexander
National Security
General Keith B. Alexander, USA, is the Director, National Security Agency/ Chief, Central Security Service (NSA/CSS) and Commander, U.S. Cyber Command (USCYBERCOM), Fort George G. Meade, MD. As the Director of NSA and Chief of CSS, he is responsible for a Department of Defense agency with national foreign intelligence and combat support responsibilities. NSA/CSS civilian and military personnel are stationed worldwide. As Commander, USCYBERCOM, he is responsible to plan, execute and manage forces for coordinating DoD computer network attack (CNA) and computer network defense (CND) as directed by USSTRATCOM.

He was born in Syracuse, NY, and entered active duty at the U.S. Military Academy at West Point.
Prescott Winter Prescott Winter
Prescott B. Winter has served as our Chief Technology Officer for the Public Sector since March 2010. Prior to ArcSight, Dr. Winter served as Associate Deputy Director of National Intelligence for Information Integration for the National Security Agency (NSA) from 2008 to 2009. Dr. Winter served more than 25 years at the NSA, including positions as CIO and CTO; Chief, NSA Commercial Solutions Center; Chief, Customer Response; and Deputy Chief, Defensive Information Operations. Dr. Winter holds bachelor’s, master’s and PhD degrees from Stanford University.
Bryan Martin Bryan Martin
Mission, Cyber
& Technology
Mr. Bryan Martin is the Chief Technology Officer of ManTech’s Mission, Cyber & Technology Solutions group, a leading global provider of innovative technologies and solutions for mission-critical national security programs for the Intelligence Community; the departments of Defense, State, Homeland Security and Justice; the Space Community; National Oceanic and Atmospheric Administration; and other U.S. federal government customers. In his role as CTO he provides expertise in technical strategy development, business development, vendor and partner relationship management, and technical staff development for the MCTS group. He also manages an internal R&D portfolio of projects including identification, prioritization and execution.
Steve Fredrick Steve Fredrick
Grotech Ventures
Steve is a General Partner with Grotech Ventures, where he leads investments in the software, wireless, and digital media sectors. Steve currently serves on the boards of LogiXML, Omnilink Systems, RollStream, Invincea and TRAFFIQ. Steve earned his BS and MS in Electrical Engineering, from Virginia Tech. and served for several years as an Adjunct Professor of Entrepreneurship at the University of Maryland’s Smith School of Business. He is a frequent speaker on entrepreneurship and venture investing.
Bob Kipps Bob Kipps
& Co.
Mr. Kipps is a Managing Director at KippsDeSanto & Co., with over 20 years of experience in providing transaction advisory and financial consulting services to leading defense and technology firms.

Prior to founding KippsDeSanto & Co., Mr. Kipps was a Managing Director in Houlihan Lokey’s Washington, DC office and a leader of Houlihan Lokey’s Aerospace∙ Defense∙Government industry group. Some of his notable industry clients have included Oberon Associates, Phoenix Consulting, Foster-Miller, Kadix Systems, Datatrac, Alion Science and Argon ST. He was recognized in 2007 as the Dealmaker of the Year by the regional chapter of the Association for Corporate Growth.
Hugh Njemanze Hugh Njemanze
Mr. Njemanze co-founded ArcSight in 2000 and has served as EVP of Research and Development and CTO since 2002. He leads product development, information technology deployment and product research, and is an advisor at Silicon Valley Internet Capital. Prior to ArcSight, Mr. Njemanze served as CTO at Verity, a provider of knowledge retrieval software products. Mr. Njemanze also worked at Apple Computer in software engineering, where he was one of the key architects of the Apple Data Access Language (DAL). Prior to that, he co-architected CL/1 (Connectivity Language One) at Network Innovations and co-developed several language compiler products at Hewlett Packard. Mr. Njemanze is a CISSP and holds a B.S. in computer science from Purdue University. Hugh was honored as the 2010 Ernst & Young Entrepreneur Of The Year.
Haiyan Song Haiyan Song
Haiyan Song has served as our Vice President of Engineering since September 2005. From 2004 to September 2005, Haiyan served as Vice President of Engineering at SenSage, a provider of log management and compliance auditing applications. From 2003 to 2004, Ms. Song has served as Vice President of Engineering and support at Omniva Policy Systems, a provider of secure messaging solutions, acquired by Liquid Machines. Ms. Song led engineering organizations at various enterprise software and service providers including Ketera Technology, Escalate and Informix. As Executive Director at Informix for the system management product division, she led the development of trusted RDBMS server products. Ms. Song studied at Tsinghua University in Beijing and holds a B.S. in Computer Science and M.S. in Computer Engineering from Florida Atlantic University.
Gary Winkler Gary Winkler
Gary Winkler took command of the Program Executive Office for Enterprise Information Systems (PEO EIS) in October 2007. In this assignment, he is responsible for large-scale Department of Defense and Army Information Technology (IT) system development efforts supporting finance, logistics, personnel, communications infrastructure, biometrics, medical and warfighting functions. He leads a workforce of more than 2,600 military, civilian and contractor personnel around the world to effectively execute approximately $3 billion per year, about 35 percent of the Army’s IT budget.
David Hale David Hale
David Hale is the Chief Privacy Officer and a Senior Counsel for the leading on-line brokerage TD AMERITRADE. David oversees all privacy programs for a company with over six million clients and a constant push to bring innovation to the financial industry. Prior to TD AMERITRADE, David was a partner in the Baltimore law firm Astrachan Gunst Thomas, an associate at Wildman Harrold in Chicago and an adjunct professor at the University of Baltimore Law School. He received his JD from George Washington University Law School and a B.A. from Rice University.
Kevin Greene Kevin Greene
Valhalla Partners
Kevin Greene is a Principal at Valhalla Partners. He has over twelve years of operating, banking and investment experience with both early and late stage technology, healthcare and media companies. Prior to joining Valhalla Partners, Kevin was a principal at Flagship Ventures, a $600 million earlystage venture capital firm in Cambridge, Massachusetts where he served as a member of the investment team and worked closely with a number of Flagship’s portfolio companies. Before Flagship, Kevin worked for IBM out of its Research Triangle Park, North Carolina campus where he was responsible for establishing, retaining and growing relationships with IBM business partners across the globe. Prior to IBM, Kevin worked for several years at Goldman Sachs in its New York and Hong Kong offices where he executed over $30 billion in equity, equity-linked, and M&A financing transactions for technology, healthcare, media and energy-related clients.
Cyril Draffin Cyril Draffin
Cyril Draffin is Vice President, Homeland Security, Northrop Grumman Corporation. Mr. Draffin leads the development of campaigns and assessments to support homeland security customers, including the Department of Homeland Security, the Department of Defense, other federal agencies, state and local governments, and international organizations. He is responsible for identifying opportunities including border management; critical infrastructure protection; chemical, biological, radiological, and nuclear detection and response; emergency preparedness and response; and information analysis. Mr. Draffin received B.S. and M.S. degrees from MIT and is a Chartered Financial Analyst.

Back to top

September 23, 2010 Event AgendaPrintable Version

9:00 a.m. Registration and Networking
10:00 a.m. Welcome
Robert Kipps, Managing Director, KippsDeSanto & Co.
Roger London, American Security Challenge Advisory Board Chairman
10:15 a.m. Fireside Chat
Governor Tom Ridge, President, Ridge Global  LLC
Catherine Herridge, FOXNews journalist
11:00 a.m. 2010 Award Winners
Haiyan Song, ArcSight VP Engineering
Presentations from three Award Winners

- Chiliad
- Rapid7
- BlueCat Networks

11:30 a.m. 2010 Patriot Award Presentation
General Keith B. Alexander, Director, National Security Agency and Commander, U.S. Cyber Command
11:45 a.m. Department of Defense Mentor Protégé Program
Terry Downing, Manager of Special Projects, Raytheon
Presentation from Protégé Challenger Harbor Wing
12:00 p.m. Lunch
12:15 p.m. Lunch Speaker
Hugh Njemanze, CTO and EVP R&D ArcSight
12:30 p.m. 2010 Award Winners
Kevin Greene, Principal, Valhalla Partners
Presentations from three Award Winners
- AginCourt Solutions
- CipherOptics
- Techno-Sciences
1:00 p.m. Networking break
1:30 p.m. Welcome Back
Roger London, American Security Challenge Advisory Board Chairman
1:45 p.m. 2010 Award Winners
Steve Fredrick, General Partner, Grotech Ventures
Presentations from three Award Winners

- Bit9
- Widetronix
- Pikewerks

2:15 p.m. CTO Roundtable
Prescott Winter (Moderator), CTO Public Sector, ArcSight
Gary L. Winkler, PEO Enterprise Information Systems, United States Army
David R. Hale, Chief Privacy Officer and Senior Counsel, TD Ameritrade
3:15 p.m. Networking Break
3:45 p.m. Afternoon Keynote Speaker
Debora Plunkett, Director of the Information Assurance Directorate (IAD) at the National Security Agency
4:15 p.m. 2010 Award Winners
Bryan M. Martin, Vice President & Chief Technology Officer, ManTech Mission, Cyber & Technology Solutions (MCTS)
Presentations from three Award Winners

- Rsignia
- Roundtrip
- Oculis Labs

4:45 p.m. American (Idol) Security Challenge Winner
Roger London, American Security Challenge Advisory Board Chairman
5:00 p.m. Closing Remarks
5:15 p.m. Networking Reception

Back to top

2010 Challenger Winners

Agincourt: Cross-lingual semantic search engine

Agincourt delivers customized, actionable intelligence to clients by thoroughly analyzing the ubiquitous data churn in over 200 languages.  In short, we connect the dots across languages, entities, and concepts.  Our cutting-edge solutions provide: unparalleled document and media exploitation, semantic survey, multilingual search, and knowledge creation.  With impeccable business and academic credentials, our leadership team is comprised of successful entrepreneurs representing over 50 years of service supporting U.S. national security.

Bit9: Advanced threat protection and application whitelisting

Bit9 provides Advanced Threat Protection to detect and prevent modern malware.  InfoWorld’s 2010 Technology of the Year, the Bit9 Parity Suite leverages the world’s most complete authority on software and the industry’s #1 Application Whitelisting solution to provide comprehensive visibility, knowledge and control over the resources targeted by malware.  Unlike blacklist approaches that chase an unending list of viruses, Bit9 ensures only trusted software can run and delivers memory, registry and OS tamper protection, device control, file integrity monitoring and Application Whitelisting.

BlueCat: IP Address Management (IPAM), IPv6 and DNSEC Solutions

BlueCat Networks is the leader in IP Address Management (IPAM), IPv6, DNS (DNSSEC) & DHCP solutions, solving network visibility, management, control and security challenges.  BlueCat Networks solutions address multiple federal IT initiatives including: DNSSEC compliance, Audit and Reporting, IPv6 Transition, Cloud Computing and Virtualization.  Our hardware and virtual appliance, and cloud service solutions are deployed by a large number of Global 1000 companies.  BlueCat Networks also supports multiple civilian, defense and intelligence agencies across the federal government, operating on various classifications of networks.  To continue successfully driving further innovation, BlueCat has created a Technical Advisory Board, which includes former executives from within the Intelligence Community, commercial industry, and IPv6/DNS subject matter experts.

Chiliad: Information sharing fusion platform

Chiliad is the developer and patent holder of the most massively scalable Knowledge Fusion Platform™ known to be operationally deployed anywhere.  It seamlessly and ubiquitously  “Connects all the Dots™” in real  time among myriad types of distributed data, while dramatically empowering  any application(s) with a comprehensive  level of information integration, real time situational awareness, information sharing, and investigative analytics.  Chiliad is cloud enabled, application independent, and IT agnostic- coexisting in all operational environments.  Used by 12,000 analysts and agents daily, Officials term Chiliad: “the ‘Holy Grail’ of information sharing in the post 9/11 world.”  

CiphorOptics: Scalable security for high performance networks

CipherOptics has developed a breakthrough method of network encryption that enables organizations to secure any network without using performance-degrading tunnels and without requiring upgrades to the routed/switched infrastructure.  Our unique approach to policy and key management greatly simplifies the deployment and management of network encryption, resulting in significant improvements in data security and measurable savings in ongoing management.  The market relevant to our current capabilities is projected to be $1.6B in 2010 (growing to $2.1B in 2013).  Our proposed technology expansion, which includes end to end and cloud security, will expand our projected market to $10B in 2013.

Harbor Wing:  Wind-scavenging, persistent, unmanned marine systems

Harbor Wing Technologies is the leader in both unmanned and manned wind-powered vessel technology.  HWT’s environmentally friendly unmanned multi-hull craft, developed initially for the U.S. Navy, utilizes aeronautical design, advanced control software and patented WingSail™ technology.  In addition to unmanned systems, our WingSail™ offers an excellent alternative for commercial shipping interests and recreational boat builders seeking cost saving, green technologies to incorporate into vessel designs

Oculis Labs:  Protecting computer displays against eavesdroppers

Oculis Labs builds next generation secure display software that protects computer screens and monitors from eavesdroppers.  Our two products, Chameleon for the high security market and PrivateEye for the mass market, allow you to read classified or confidential information in a crowded room safely.  Unlike existing passive filter technologies, our software actively protects computer displays from physical and electronic threats.  Our products are currently deployed in Federal agencies and Fortune 1000 companies to protect data privacy.

Pikewerks: Cyber situational awareness

Pikewerks is a growing cyber security business that specializes in anti-tamper, anti-exploitation, forensics and insider threat technologies.  The 2010 ASC pilot Electronic Armor® Aware™ uses situational awareness to protect software and data on a running computer from theft and exploitation.  Situational awareness is determined using domains such as physical and network environments, as well as user and hardware / resource characteristics.  In contrast to traditional techniques, Electronic Armor Aware dynamically binds protection to the intended environment, which enables sensitive data to remain encrypted whenever it is removed or exposed by an attacker.

Rapid7: Vulnerability management and penetration testing

Rapid7’s Offensive and Defensive Security Solution combines the vulnerability management capabilities of Rapid7 NeXpose Enterprise ® with the Metasploit Express ™ penetration testing platform to offer the most easy-to-use, effective, and integrated offensive and defensive security solution.

RoundTrip: Long-range low-power stealth precision tagging & locating

RoundTrip’s tagging tracking and locating (TTL) systems quietly determine the location and status of tagged assets over long distances and time spans.  RoundTrip’s signal processing tags provide a combination of small size, long range, persistence, operational simplicity and accuracy unattainable with incumbent systems. RoundTrip has integrated regenerative, coherent, round-trip time and Doppler processing into a single low power chip. A 5 gram single chip tag with a year battery life can be precisely located in seconds from 40 kilometers using one aircraft carrying a RoundTrip locator.  RoundTrip tags may also be used with hand-held or networked locators. Production volumes will be available Q1 2011.

Rsignia: Cyber forensics with retaliatory response technology

Rsignia’s CyberScope appliance provides 100% packet capture at line rate - up to 40Gbs - operating in-line or in stealth mode.  In real time, packets are inspected, searched (using our proprietary string search algorithms), and data is stored and indexed for forensic analysis.  CyberScope is not only critical to protect and defend our own networks, but gives rise to the ability to counter an attack with a surgical strike(s) or, conduct proactive information operations.  CyberScope is scalable and can be deployed within a mesh network topology to provide expanded capability as well as the ability to conduct operations around the globe

Techno-Sciences: MDA and satellite ground systems for search and rescue

Techno-Sciences, Inc. (TSi) is an advanced technology company specializing in maritime surveillance systems and Satellite Aided Search and Rescue systems (SARSAT).  TSi leverages 35 years of experience with hardware and software engineering to deliver industry’s best products for complete Maritime Domain Awareness.  TSi-SARSAT systems have been installed in over 20 countries and help to save over 26,500 lives.  TSi-Trident Integrated Maritime Surveillance systems are installed in South East Asia for safety and security of one of the world’s most strategic and vulnerable sea areas.

Triumfant: Real-time malware detection and remediation

Triumfant uses granular change detection and patented analytics to discover, analyze and remediate malicious attacks on endpoint computers without prior knowledge of the attack.  Because Triumfant requires no prior knowledge such as signatures, it is uniquely able to detect the advanced persistent threat, zero day attacks and other malware that evades traditional protections.  Triumfant automatically builds contextual, situational, and surgical remediations that remove the attack and all associated collateral damage.  Triumfant leverages this same technology to continuously enforce security configurations, effectively reducing the attack surface on every machine, every day.

Widetronix: Small long-life batteries powering wireless sensors

Widetronix, based in Ithaca, N.Y., is bringing autonomous intelligence to wireless sensors with an enabling class of battery, called betavoltaics.  These patented batteries generate power by absorbing beta electrons from decaying radioactive material embedded onto a 6x6 mm semiconductor diode.  Betavoltaics compliment energy harvesting and power storage technologies by providing continuous, rather than intermittent, current (10's uA/chip) and voltage (2Voc/chip) over a flexible operational lifetime (25 days to 25 years).  The small size of betavoltaics enables integration with emerging ultra low power microprocessors for defense, infrastructure, and medical applications.