AEGIS Security Consultants Worldwide

Certified, Licensed & Experienced Experts

Our consultants are industry professionals with education and experience in business, homeland security, criminal justice, psychology, interview/interrogation, licenses including Private Patrol Operator and Private Investigator, and certifications including Certified Protection Professional, Certified Forensic Interviewer, Certified Safety Professional, and Certified Industrial Hygienist.

Risk management is activity directed towards the assessing, evaluating, measuring of risks, and ultimately mitigating risk to an acceptable level. In some cases the acceptable risk may be near zero. Risks can come from client activity, associates, accidents, natural causes, human error, and intentional acts.

Companies can minimize liability to their operations and risk to the staff and property by conducting a full analysis of their security program. Our broad but detailed evaluation includes our clients’ policies, procedures, operations, environment, and physical infrastructure. AEGIS employs a range of all-hazards techniques and tools to observe, orient, decide, and act creating deployable plans that enable our clients to remain safe and secure. AEGIS Security Consultants can deploy around the world in support of government agencies, corporate and commercial organizations, and non-profit organizations. Our goal is to maximize the existing framework by facilitating effective improvements with a high ROI resulting in detailed but easily followed deployable plans. Retained consulting services allows clients to gauge the effectiveness of their current security program with current industry standards.

AEGIS Security & Investigations specializes in high end, customer service focused security, investigative, training, and consulting solutions. Since our inception in 2007, our goal has been to meet and exceed our client’s expectations. We accomplish this by actively utilizing both internal and external active management techniques and focusing our services tuned to our clients’ hierarchy of needs, resulting in a high quality service our clients and employees appreciate and respect.

Broad Spectrum Consulting:

The step-by-step progression of the program is as follows:

  1. Intelligence gathering & preparation – environmental reports, crime reports, history of the site, historical issues, problem areas, current security program, and desired client initiatives
  2. Penetration testing designed to test security protocols
  3. Physical site assessment – CCTV, CPTED, alarms, access control, structural components, systems, lighting, etc
  4. Security program assessment – Post orders, officer implementation, supervision, quality control, etc
  5. Contingency planning and emergency operations plan assessment
  6. Guided discussion with department heads, site management, and corporate representatives
  7. Analysis and discuss of single point of failures and initial findings
  8. Research and analysis of potential solutions to findings
  9. Deliverable draft written and supplied to the client for review
  10. Final revisions and final deliverable supplied to the client

Risk Management Consulting:

AEGIS Risk Management consultants first analyze our client’s operations including the impact from their locations, supply chain, travel, infrastructure, logistics, finances, and staff. All hazards threat management, potential losses and operational failures are extrapolated to determine the where efforts must be made to harden the potential target. Our risk management solutions are designed around the specific needs of individual client and are implemented to mitigate and minimize risk.

Intelligence Gathering:

AEGIS Investigators support intelligence gathering for corporate entities positioning themselves for mergers, takeovers, and expanding operations in seasoned and emerging markets. Both on the ground and by conducting thorough research, AEGIS Security Consulting clients are better prepared to face the challenges presented by the current economic landscape.

Technical Surveillance Counter Measures (TSCM Bug Sweep) Surveys:

AEGIS Security Consultants deploy industry leading technology to conduct bug sweeps in support of government agencies, corporate and commercial organizations, and private individuals. Our analysis includes counter measures against traditional and state of the art eavesdropping and data skimming devices.

The final deliverable includes a color coded summary that easily defines in multiple categories the current standing of the facility, policies, procedures, and staff. The coding is implied based on the following:

GREEN – The current security framework is generally acceptable by industry standards such as: effective and proper use of security techniques, secure facilities/access control, effective use of technology and physical security improvements, and well defined security and emergency plans.

 YELLOW – The current security framework has minor or elevated issues that could be detrimental to the limitation of liability, impede risk management, or affect contract stability. Examples may include: customer service issues, potential safety hazards, exploitable gaps in security operations, observational training deficiencies, improper use of equipment, and incomplete or deficient security plans.

RED – The current security framework has severe issues that could immediately affect liability, can be considered dangerous or negligent, or compromises safety or security of people or property. Examples may include: no formalized policies or procedures, no contingency planning, no or minimal training, excessive use of force, dereliction of duty, safety hazards, and clearly visible gaps in security operations.

Immediate value is benefited from a reduction in risk or liability, lost materials, excessive labor, maximizing efficiency and a possible reduction in general liability and workers compensation insurance premiums. Indirect value comes for preventing injury or property damage resulting from an incident that could be valued in the tens of millions of dollars.

Upon the conclusion, our firm is capable of facilitating additional processes required to complete the security program including sourcing, staffing, plan development, and managing improvements. Our cross functional analysis and end-to-end support differentiates from other firms by allowing us to manage the entire process from inception through full scale deployment and operation, all while supporting core business strategies of high ROI, open communication, and  efficiency.

  • Government entities foreign and domestic
  • Corporate and satellite offices
  • Public, private and charter elementary, middle and high schools, colleges and universities
  • Property management and HOAs
  • Hotels and resorts
  • Shipping and distribution centers
  • Religious institutions and places of worship including Jewish temples, churches and mosques
  • Manufacturing plants
  • Theaters, public events, shopping malls
  • Law firms and attorneys
  • Retail and wholesale businesses
  • Venues, restaurants, clubs and lounges
  • Individuals experiencing a threat
  • Entertainment and production companies
  • Soft services companies including landscaping, janitorial and maintenance
AEGIS Security & Investigations: Our mission is to identify, meet, and exceed our clients’ security, investigation, training, and consulting expectations.
  • For Events: Describe the event: What kind of event, date, time, location, how many attendees, how many officers requested, attire requested, parking instructions.

    For Short/Long Term Security: Describe what services you are looking for (hours, days, type of security) and what need you have or issue you are trying to resolve with security.

    For Investigative Services: Describe your case/need and explain in detail what you are looking to find/accomplish.

    For Training: Describe what kind of training you are interested. Include the date/time/location/audience.

    For Consulting, Risk Assessments, and Threat Management: Describe in detail the nature of your need for support.

    For all other needs, describe in detail the service requested.