About Us
Our Services
Our primary capabilities lie in a full spectrum of security program development, security services and corporate training. This vertically combined approach results in a better quality product for our stakeholder...
Physical Security Survey and Assessment
A security survey is a thorough on-site examination and analysis of a facility to determine what assets are present and their value; to evaluate the existing security program; to identify differences or excesses; to determine the protection needed; and to support recommendations to improve overall security. The four critical areas are listed.
* Physical Security.
Physical Security relates to everything
that is tangible in your organization.
* People Security.
Humans typically present the greatest
threat to an organization's security, be it through
human error or by malicious intent.
* Infrastructure Security.
* Crisis Management.
Specializing in: Residential, Hospitals, Churches, commercial facilities.
Our specialists hold Certified Protection Professionals credentials (ASIS) and Crime Prevention Through Environmental Design - CPTED - industry certifications and have conducted surveys and assessments on hospitals, residential communities and privately held companies across the business spectrum.
Cyber-Security
Cyber security is the application of technologies, processes and controls to protect systems, networks, programs, devices and data from cyber attacks. It aims to reduce the risk of cyber attacks and protect against the unauthorized exploitation of systems, networks and technologies.
Specializing in: Network Security, Cyber Security Training, Backups, Anti-Malware, Infrastructure
Our Cyber security specialists will locate the vulnerabilities in your business and guide you through the remediation, applying extensive experience gained while assisting Federal agencies, U.S. Army, Navy, Marines, Air Force, British Navy, RAF, RCAF, JPL and NASA.
* Network Security Assessment
A network security assessment is a review of a network's infrastructure, management, security, policies, and performance. A network security assessment is designed to find vulnerabilities in a network that could interrupt business operations, leak sensitive information, or increase the likelihood of cyber attacks. Our specialists will identify network vulnerabilities of external (internet), internal (intranet), and wireless systems, review policies and procedures, test for operating system and firewall security flaws, to include intrusion detection and much more.
* Employee Cyber-Security Training
Our excellent security seminars are essential for every employee on the network. It includes awareness education for email, phone, and internet-borne intrusions including ransomware, phishing, and social-engineered attacks.
* Data Backup
Ransomware is a malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, cyber attackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files. The last line of defense after a disaster is your backup. We will evaluate its defensive strength against Ransomware and other attacks specifically designed to destroy your critical files. With proper threat protection, a backup can . provide accurate data recovery in any lost-data scenario.
* Anti-Malware Tools Assessment
Malware (short for “malicious software”) is a file or code, typically delivered over a network, that infects, explores, steals or conducts virtually any behavior an attacker wants. And because malware comes in so many variants, there are numerous methods to infect computer systems. Our specialists will assess the functionality and effectiveness of your installed .. protection against viruses, ransomware, spyware, trojans, keyloggers, adware, and make the necessary recommendations to protect your system.
* Infrastructure Power Protection
Infrastructure Power-protection systems do just what the name implies: They protect your equipment from the effects of power surges and power failures. In particular, power surges and spikes can damage computer equipment, and a loss of power can result in lost data. No computer network can operate reliably without clean power and no surge protection works without proper grounding. We can assess your resilience against power anomalies and outages that endanger your uptime and data.
Technical Surveillance and Counter Measures (TSCM)
Techniques and measurement used to detect and nullify a wide variety of technologies that obtain unauthorized access to classified security information, restricted data, and/or sensitive but unclassified information. TSCM locates and identifies concealed electronic devices designed to intercept/record electronic signals containing data, video, and voice communications belonging to clients.
Specializing in: Corporate, Government, and Private facilities.
Our TSCM specialists are U.S. Government trained and certified and have conducted examinations on Federal Government and private installations.
Executive Protection
The principles of executive protection are centered around the four pillars of defense — risk, intelligence, advance, and location. They describe a dynamic environment in which the methods used are situational, but not identical depending on the role in EP. A personal protection agent needs to consider what benefits the client (principal), while at the same time considering what is safety and security of others.
Specializing in: Dignitaries, Executives, Celebrities, Families.
Our EP specialists have protected U.S. Attorney General's, U.S. Congressmen, and U.S. Government agency level directors. They have received extensive U.S. Government and private sector EP training. Further, our specialists have worked as overseas contract EP specialists for the U.S. Government.
Corporate Security Training
Training programs are developed for the specific need of the client. Instruction in work place violence, active shooter, pre-incident indicators, management of aggressive behaviors, and BLS-CPR.
Specializing in: Active Shooter, Workplace Violence, MOAB, Security Awareness.
Our Specialists have taught in College and Corporate environments. They have strong academic credentials and have presented at national conferences for ASIS and the American Academy of Forensic Science. They have developed curriculum for specific topics in the security industry requested by our corporate clients.
Investigations and Expert Witness (SME)
Investigations will be conducted and SME testimony will be provided on a case by case basis and as needed by our clients.
Specializing in: Insurance Fraud, Civil/Domestic, Corporate, Testimony
Our specialists have Federal and Local Law Enforcement experience and a depth, width, and breadth of knowledge in conducting investigations in a variety of areas, as well as having testified in local, state, and federal jurisdictions as experts in security/investigative matters.