What We Assess
Perimeter and Grounds
-
Site boundaries, fencing, gates, lighting, landscaping, CPTED factors, parking areas, delivery bays, and perimeter intrusion detection systems.
Entrances and Access Control
-
Turnstiles, doors, locks, key control, visitor management, badge systems, biometrics, mantraps, tailgating controls, ADA compliance, and after‑hours controls.
Surveillance and Detection
-
Camera coverage, blind spots, image quality, retention, monitoring practices, alarm systems, duress devices, analytics, and SOC integration.
Security Operations
-
Guard force post orders, patrol patterns, incident response, escalation protocols, training, staffing levels, and supervision.
Critical Assets and Internals
-
Data centers, labs, cash/valuables handling areas, utilities, MEP rooms, server rooms, records storage, and hazardous materials.
Life Safety and Resilience
-
Emergency egress, muster points, mass notification, UPS/generator, fire protection interfaces, severe weather and earthquake considerations.
Policies, Processes, and Compliance
-
Badging policy, contractor controls, vendor access, deliveries, key/credential lifecycle, onboarding/offboarding, and alignment to ISO 27001 Annex A physical controls, NIST 800‑53 PE, and local regulatory requirements.
Technology and Integration
-
VMS, ACS, PSIM/SOC workflow, network segmentation for security devices, firmware/patching practices, and cybersecurity of physical security systems.
Methodology
Our certified security experts conduct a detailed physical inspection of your site(s), focusing on key domains:
Discovery and Threat Modeling
-
Stakeholder interviews, asset criticality mapping, business impact analysis, and location‑specific threat intelligence (crime stats, protests, terrorism, natural hazards).
Site Walkthroughs and Inspections
-
Day/night assessments to evaluate lighting, camera performance, access patterns, and operational realities.
Adversarial Path Analysis
-
Identification of intrusion paths, tailgating vectors, social engineering exposures, and insider threat opportunities.
Control Effectiveness Testing
-
Badge audits, door force tests, alarm response timing, CCTV retrieval drills, visitor process walkthroughs, and key control spot checks.
Documentation and Evidence
-
Photo logs, floorplan mark‑ups, camera field‑of‑view maps, and asset/door inventories.
Risk Quantification
-
Likelihood and impact scoring, control maturity ratings, and a heat‑mapped risk register to prioritize remediation.
Reporting and Roadmap
-
Executive summary, detailed findings, quick‑wins, capital and operational recommendations, and a 30/60/90‑day action plan.
Risk Analysis & Prioritization
This is where data becomes intelligence. We analyze the collected information to quantify risk. We use a standard industry formula to calculate a risk score for each identified vulnerability:
Risk = Threat× Vulnerability× Impact Risk
-
Threat (T)(T): The likelihood that a potential threat (e.g., theft, vandalism, corporate espionage) will materialize.
-
Vulnerability (V)(V): The likelihood that a security weakness could be successfully exploited.
-
Impact (I)(I): The severity of the consequences if the asset is compromised, measured in financial, operational, and reputational terms.
This calculation allows us to create a Risk Matrix, visually prioritizing vulnerabilities from “Low” to “Critical,” ensuring you focus resources where they are needed most.
Deliverables
-
Executive Brief
-
Clear, non‑technical summary of top risks, potential business impacts, and recommended investments.
-
-
Detailed Assessment Report
-
Findings per domain, evidence, standards mapping, and risk scores for each vulnerability.
-
-
Prioritized Remediation Plan
-
Ranked fixes with budget classes (no‑cost, low‑cost, capex), responsible owners, and target timelines.
-
-
Site Artifacts
-
Updated site risk map, camera coverage diagrams, access hierarchy, and guard post orders recommendations.
-
-
Board‑Ready Slide Deck
-
Visual narrative for decision makers to approve funding and timeline.
-
Why Choose Us
Security SME Expertise
-
Certified assessors with backgrounds in enterprise security, protective design, and guard force operations.
Standards‑Aligned, Pragmatic
-
Controls mapped to ISO, NIST, OSHA, and industry best practices—tailored to your operational realities.
Technology‑Aware
-
Deep knowledge of access control and video ecosystems, from legacy to cloud‑based, including cyber hardening of security devices.
Measurable Outcomes
-
Baseline metrics and KPIs so you can track risk reduction and program maturity over time.
Engagement Options
-
Single Site Deep‑Dive
-
Full assessment for a flagship site or critical facility.
-
-
Multi‑Site Portfolio Review
-
Risk triage across locations to standardize controls and prioritize investment.
-
-
Program Maturity Assessment
-
Organizational review of policy, governance, and SOC effectiveness.
-
-
Pre‑Design/Pre‑Move Advisory
-
Security requirements for new builds, renovations, and relocations.
-
Typical Timeline
-
Week 1: Kickoff, data request, threat intel, scheduling.
-
Weeks 2–3: On‑site assessments (day/night), interim debriefs.
-
Week 4: Analysis, scoring, and draft report.
-
Week 5: Final report, executive briefing, and action planning workshop.
Sample Findings We Address
-
Inadequate lighting enables a perimeter approach without detection.
-
Tailgating and visitor bypass at the main lobby during peak hours.
-
Camera blind spots at loading docks and stairwells.
-
Weak key control and uncontrolled master keys.
-
SOC alarm fatigue and delayed response to critical doors.
-
Unsegmented security devices are exposed on the corporate network.
-
Outdated post orders are misaligned with real threat scenarios.
What We Need From You
-
Floor plans, asset lists, prior incidents, and security system inventories.
-
Access to security leadership, facilities, IT, and HR stakeholders.
-
Escort access for restricted areas during site visits.
Next Steps
-
Contact us to schedule a discovery call.
-
We will scope the assessment to your sites and risk profile and provide a clear proposal with timeline and pricing.