BUSINESS/CORPORATE
Threat, Risk, & Vulnerability Assessments
-
Assess the security of your company’s physical and cyber infrastructure for vulnerabilities that could be exploited by criminals, foreign governments, disgruntled employees and other internal and external threats.
-
Conduct insider threat risk assessment, review current policies and procedures, make security recommendations, and train staff.
Corporate Due Diligence
-
Supply chain or third-party due diligence involves efforts undertaken to investigate potential or existing business partner that are essential suppliers to your business. Third parties include suppliers, distributors, agents, advisors, and consultants. This type of due diligence applies both up and down the supply chain. Any third-party business partner or supplier is a potential corruption or fraud risk to your business.
-
Background investigations for Mergers & Acquisitions
Background Investigations
-
Comprehensive background investigations on potential partners, clients, customers, tenants and other business entities, including criminal and financial checks
-
Pre-Employment background investigations, screening and interviewing, to include reference checks
Surveillance
-
24/7 discreet surveillance with state of the art digital evidence
Electronic Evidence Collection
-
Collection of digital evidence from desktops, laptops and mobile phones. Digital and Cyber forensics, data loss recovery & investigation
Technical Surveillance Countermeasures (TSCM)
-
Checking your business for illegally placed technical surveillance devices, (e.g., “bug sweeps” and “debugging”). We use sophisticated & state of the art technical equipment in order to check your offices, conference rooms, boats, planes and cars from “bugs” placed by competitors, criminals or foreign actors.
Business Traveler Preparation
-
Protection of corporate proprietary information and intellectual property from the realities of economic espionage during both domestic and foreign travel for business or pleasure
Training
-
Active shooter and other Emergency Planning, Insider/Outsider Threat Awareness, Employee Security training, Active & Passive Security Measures
Event Security
-
All safety and security aspects of the venue
-
Security strategies
-
Risk assessment
-
Threat & vulnerability protection
Contract Compliance
-
Intellectual property usage, trademarks, activity checks, mystery shopping, and monitoring of non-compete agreements
Judgement Recovery
-
Comprehensive financial and asset investigations in order to recover lost or stolen assets or secure legal attachments through liens, levies or garnishments.
Turn-Key Security Solutions
-
Comprehensive security plans for new business locations or redesign of current space in physical security, information security, personal security and crime prevention