Security Assessment

Our security assessment methodology is based on a comprehensive and objective evaluation of security-related operations, program capabilities, organization composition, staffing, resources, technologies, funding, and liaison.


Our experience in the security industry has taught us that by nature, people don’t typically consider the services of a security professional until after something bad occurs. It’s a little like placing a traffic signal at an intersection after an accident instead of before which would have prevented the incident from occurring in the first place. A security assessment focuses on four major areas of your organization: technical, physical, procedural, and personnel. This is a holistic appraisal of all security operational competencies, program scope, strategy, budget, and expenditures; structure, personnel, and training; policies, procedures, and plans; physical security measures; and security-related technologies.

By leveraging years of experience in this field conducting similar security assessment projects, we determine the key findings and recommendations of the assessment through a comparative analysis of your organization with similar operations we have observed. These conclusions include costs and budget advice in order to align security expenditures with the entire organization, benchmarking the security program with industry best practices, and providing a strategic security roadmap that reflects a world-class operation.

The security assessment technical component is comprised of a review of security systems, such as closed-circuit television video surveillance (e.g., Internet protocol and digital), automated access control devices (e.g., proximity card or biometric), intrusion detection (e.g., motion detection, glass sensor, and door contact), and fire life safety (e.g., smoke detection, annunciation, and suppression). A critical element of the security assessment is the integration between these systems. Ideally, the camera systems are tied to access control, fire alarms, and intrusion detection so that if any of these devices is activated, the systems talk to each other to provide optimum situational awareness.

The security assessment physical security evaluation examines the fencing, walls, windows, doors, locks, keys, barricades, barriers, and other structural measures used to protect the property. Procedural security reviews all written guidelines, documents, policies, plans, and procedures; an example is an emergency management plan specifically created for the venue. Lastly, a the security assessment personnel review assesses corporate security staff, security officers (contract or proprietary), executive protection specialists, and medical support.


Do You Know How to Build the Perfect (Security) Beast ?

Building the Perfect (Security) Beast Download

By avoiding the 7 Deadly Security Sins ahead of time, you can proactively and preemptively address the risk. This White Paper will review these sins and provide a step-by-step, strategic, prevention-focused approach to minimize the risk. The White Paper is free. To download it, fill out the form.

  Schedule Your Free Consultation Today: