Security & Vulnerability Assessments

A Comprehensive Review: Physical Improvements, Standard Procedures, & Emergency Plans

Our consultants are industry professionals with education and experience in business, homeland security, criminal justice, psychology, interview/interrogation, licenses including Private Patrol Operator and Private Investigator, and certifications including Certified Protection Professional, Certified Forensic Interviewer, Certified Safety Professional, and Certified Industrial Hygienist.

The objective is to minimize the risk to life, equipment, and the facility to a level deemed acceptable to the client by beginning with operational, policy, and procedural improvements, and ending with infrastructure upgrades and security staffing deployment changes, designed to create the highest ROI by the conclusion of the services.

The analysis includes both an internal and external assessment of the site, employees, infrastructure, market environment, flow, policies, procedures, perceived threats, and contingency planning. Our model is based on all hazards and all crimes and is designed to identify and articulate those that are of the highest priority first. Our approach is based on the addressing individual problems with proposed solutions while keeping the security program fully integrated.

The “spheres of security” concept is applied at schools and commercial facilities the same way it is applied in a government buildings, schools, or in the faith based community. A strong defensible perimeter, implementation of CPTED techniques, choke point granted access, and monitoring systems combined with simple emergency plans, communication systems, and first responder direction creates a full scale, easily deployable operations program.

The step-by-step progression of the program is as follows:

  1. Intelligence gathering & preparation – environmental reports, crime reports, history of the site, historical issues, problem areas, current security program, and desired client initiatives
  2. Physical site assessment – CCTV, CPTED, alarms, access control, structural components, systems, lighting, etc
  3. Standard operating procedures assessment – a review of the typical protocols as they relate to security
  4. Contingency planning and emergency operations plan assessment
  5. Security program assessment – Post orders, officer implementation, supervision, quality control, etc
  6. Analysis and discuss of single point of failures and initial findings
  7. Guided discussion with department heads, site management, and corporate representatives
  8. Penetration testing designed to test security protocols
  9. Research and analysis of potential solutions to findings
  10. Deliverable draft written and supplied to the client for review and analysis

After identifying threats, AEGIS security consultants will recommend specific instructions to mitigate threats to the extent possible. We will assist through all levels of implementation if required.

AEGIS Security & Investigations specializes in high end, customer service focused security, investigative, training, and consulting solutions. Since our inception in 2007, our goal has been to meet and exceed our client’s expectations. We accomplish this by actively utilizing both internal and external active management techniques and focusing our services tuned to our clients’ hierarchy of needs, resulting in a high quality service our clients and employees appreciate and respect.

A rapid security assessment consists of an abbreviated and broader version of a more detailed security assessment. It’s designed to be an initial review if an assessment has never been completed or if a review is needed. This customized security assessment is based on crime prevention through environmental design principles with an emphasis on target hardening and root cause analysis as well as review of both the standard operating procedures and emergency action plans. Prior incidents are discussed while perceived and potential threat vectors are identified. At the conclusion of this session, a detailed outline categorized by criticality with options for considerations will be compiled to provide the basis for drafting proposed physical, SOP, and EAP improvements.

Upon request, a final deliverable includes a color coded summary that easily defines in multiple categories the current standing of the facility, policies, procedures, and staff. The coding is implied based on the following:

GREEN – The current security framework is generally acceptable by industry standards such as: effective and proper use of security techniques, secure facilities/access control, effective use of technology and physical security improvements, and well defined security and emergency plans.

 YELLOW – The current security framework has minor or elevated issues that could be detrimental to the limitation of liability, impede risk management, or affect contract stability. Examples may include: customer service issues, potential safety hazards, exploitable gaps in security operations, observational training deficiencies, improper use of equipment, and incomplete or deficient security plans.

RED – The current security framework has severe issues that could immediately affect liability, can be considered dangerous or negligent, or compromises safety or security of people or property. Examples may include: no formalized policies or procedures, no contingency planning, no or minimal training, excessive use of force, dereliction of duty, safety hazards, and clearly visible gaps in security operations.

Immediate value is benefited from a reduction in risk or liability, lost materials, excessive labor, maximizing efficiency and a possible reduction in general liability and workers compensation insurance premiums. Indirect value comes for preventing injury or property damage resulting from an incident that could be valued in the tens of millions of dollars.

Upon the conclusion, our firm is capable of facilitating additional processes required to complete the security program including sourcing, staffing, plan development, and managing improvements. Our cross functional analysis and end-to-end support differentiates from other firms by allowing us to manage the entire process from inception through full scale deployment and operation, all while supporting core business strategies of high ROI, open communication, and  efficiency.

  • High net-worth individuals
  • Celebrties, VIPs, and business executives
  • Government entities foreign and domestic
  • Corporate and satellite offices
  • Religious institutions and places of worship including Jewish temples, churches and mosques
  • Individuals experiencing a threat
  • Entertainment and production companies
AEGIS Security & Investigations: Our mission is to identify, meet, and exceed our clients’ security, investigation, training, and consulting expectations.
  • For Events: Describe the event: What kind of event, date, time, location, how many attendees, how many officers requested, attire requested, parking instructions.

    For Short/Long Term Security: Describe what services you are looking for (hours, days, type of security) and what need you have or issue you are trying to resolve with security.

    For Investigative Services: Describe your case/need and explain in detail what you are looking to find/accomplish.

    For Training: Describe what kind of training you are interested. Include the date/time/location/audience.

    For Consulting, Risk Assessments, and Threat Management: Describe in detail the nature of your need for support.

    For all other needs, describe in detail the service requested.
  • This field is for validation purposes and should be left unchanged.