
WE CAN HELP
​
WE WILL FIND THE BEST PROTECTION STRATEGY FOR YOUR FACILITY AND WORK DILIGENTLY WITH YOU TO IMPLEMENT IT.
​
​
Risk Assessments
Compliance Reviews
Program Design
We will asses your security needs and then work thoroughly to deliver a complete and accurate risk assessment of your unique security requirements by:
​​
-
Assessing your assets and associated risks
-
Review of current security programs, policies, training and technology
-
Analysis of cost and value considerations
-
Current and future threats
-
Look at current areas of exposure and past incidents in order to identify potential vulnerabilities
We partner with you to manage and conduct compliance audits in the areas that are critical in maintaining a successful security operation,
this includes:
​
-
Security Provider Compliance
-
Security Provider MSA
-
Safety Programs
-
Policies and Procedures
-
Critical Infrastructure
-
Facility Security Plans
-
Training Programs
-
Facility Regulated Requirements
-
Inventory Controls
​
Together we will be able to use analytical information to construct a more appropriate and cost effective
security defensive strategy that encompasses:
​
-
Access Control
-
Active Shooter Detection
-
Foreign Travel
-
Perimeter Security
-
Intrusion Detection Systems
-
Security Operations and Dispatch
-
Patrol Techniques and Reporting
-
Technology
-
Personal Surety
-
Security Officers
-
Security Management
​
SECURITY PLANS
The major components of a security plan normally include:​
-
Asset Risk - Assets will be categorized by how critical they are to the organization.
-
Identify Hazards - This includes identifying potential threats and the intent means and opportunity to carry out those threats.
-
Evaluate & Review - We will take a look at the current security program to identify any gaps that exist and establish prospective countermeasures
-
Implement Security Measures - Resources will be selected that best fits your needs, this will include, physical security, security enabled technology and P&P
-
Control & Monitor - This will ensure consistency in the implementation of a security control or execution of a security relevant business process.


POLICIES AND PROCEDURES
How do you know if your current policies will be efficient or effective? We can create polices that cover risk like workplace violence, bomb threats, active shooters or natural disasters.
​
Given the intricacy of most companies, developing effective security programs can be overwhelming.
​
If you find your current policies are no longer efficient or effective, we can create security procedures and services tailored to your direct risks and vulnerabilities.