Residential & Estate Security Assessments

A Comprehensive Review: Physical Improvements, Technology, & Emergency Plans

Our consultants are industry professionals with education and experience in business, homeland security, criminal justice, psychology, interview/interrogation, licenses including Private Patrol Operator and Private Investigator, and certifications including Certified Protection Professional, Certified Forensic Interviewer, Certified Safety Professional, and Certified Industrial Hygienist.

The objective is to minimize the risk to our clients, families, guests, homes, and valuables to a reasonable level. The process begins with understanding the client and analyzing their environment as well as the historical, actual, and perceived concerns. Based on the threat vectors, emergency plans, infrastructure upgrades, technology improvements, and security staffing deployment are considered, with operations consideration discussed and drafted create the highest ROI and expectation of success.

The “spheres of security” concept is applied at private estates and personal residences the same way it is applied in a government buildings, schools, or in the corporate buildings. A strong defensible perimeter, implementation of CPTED techniques, choke point granted access, and monitoring systems combined with simple emergency plans, communication systems, and first responder direction creates a full scale, easily deployable operations program.

After identifying threats, AEGIS security consultants will identify options for consideration to mitigate threats to a reasonable level. We will assist through all levels of implementation if required.

AEGIS Security & Investigations specializes in high end, customer service focused security, investigative, training, and consulting solutions. Since our inception in 2007, our goal has been to meet and exceed our client’s expectations. We accomplish this by actively utilizing both internal and external active management techniques and focusing our services tuned to our clients’ hierarchy of needs, resulting in a high quality service our clients and employees appreciate and respect.

A Rapid Security Assessment consists of an abbreviated and broader version of a more detailed Security, Risk, & Vulnerability Assessment. It’s designed to be an initial review if an assessment has never been completed or if a periodic review is needed. This customized rapid security assessment is based on crime prevention through environmental design principles with an emphasis on target hardening and root cause analysis as well as curosry review of both the standard operating procedures and emergency action plans. Prior incidents are discussed while perceived and potential threat vectors are identified.

At the conclusion of the assessment, a detailed set of field notes will be compiled to provide the basis for drafting proposed physical, SOP, and EAP improvements.

In comparison to a Rapid Security Assessment, a more detailed Security, Risk, & Vulnerability Assessment is designed to address all hazards/all crimes for clients, the families, and their residences. This customized security assessment is based on crime prevention through environmental design principles with an emphasis on target hardening and root cause analysis as well as review of both the standard operating procedures and emergency action plans. Prior incidents are discussed while perceived and potential threat vectors are identified.

The step-by-step progression of the program is as follows:

  1. Intelligence gathering & preparation – environmental reports, crime reports, history of the site, historical issues, problem areas, current security program, and desired client initiatives
  2. Physical site assessment – CCTV, CPTED, alarms, access control, structural components, systems, lighting, etc
  3. Standard operating procedures assessment – a review of the typical protocols as they relate to security
  4. Contingency planning and emergency operations plan assessment
  5. Security program assessment – Post orders, officer implementation, supervision, quality control, etc
  6. Analysis and discuss of single point of failures and initial findings
  7. Guided discussion with the client and staff
  8. Penetration testing designed to test security protocols
  9. Research and analysis of potential solutions to findings
  10. Deliverable draft written and supplied to the client for review and analysis

At the conclusion of the assessment, a detailed outline categorized by criticality with options for considerations will be compiled to provide the basis for drafting physical, technological, Standard Operating Procedures, and Emergency Action Plan options for consideration. The final deliverable includes a color coded summary that easily defines in multiple categories reviewed that includes:

GREEN – The current security framework is generally acceptable by industry standards such as: effective and proper use of security techniques, secure facilities/access control, effective use of technology and physical security improvements, and well defined security and emergency plans.

YELLOW – The current security framework has minor or elevated issues that could be detrimental to the limitation of liability, impede risk management, or affect contract stability. Examples may include: customer service issues, potential safety hazards, exploitable gaps in security operations, observational training deficiencies, improper use of equipment, and incomplete or deficient security plans.

RED – The current security framework has severe issues that could immediately affect liability, can be considered dangerous or negligent, or compromises safety or security of people or property. Examples may include: no formalized policies or procedures, no contingency planning, no or minimal training, excessive use of force, dereliction of duty, safety hazards, and clearly visible gaps in security operations.

Upon the conclusion, our firm is capable of facilitating additional processes required to complete the security program including sourcing, staffing, plan development, and managing improvements. Our cross functional analysis and end-to-end support differentiates from other firms by allowing us to manage the entire process from inception through full scale deployment and operation, all while supporting core business strategies of high ROI, open communication, and  efficiency.

  • This field is for validation purposes and should be left unchanged.