VIA
VIA
  • Home
  • About
  • Services
  • Contact Us
  • More
    • Home
    • About
    • Services
    • Contact Us

  • Home
  • About
  • Services
  • Contact Us

inventory of services offered

Threat Assessment

Security Posture Analysis

Threat Intelligence

We examine your total threat-scape; catalog the types of potential threats that could affect your business, which threats are the most likely and which threats can cause the most damage.

Threat Intelligence

Security Posture Analysis

Threat Intelligence

Bad actors often “telegraph” their intentions before taking action. Detecting indications of ill-intent before the actor has the opportunity to act can prevent tragedies. By actively monitoring cyber and physical space we can separate signal from noise to get in front of threats before they become emergencies. 

Security Posture Analysis

Security Posture Analysis

Security Posture Analysis

Survey current security posture and protocols and recommend adjustments as needed.

Crisis Management

Communications Security Assessment

Security Posture Analysis

Before a crisis strikes, businesses should think about how a disaster would impact all facets of the business.  The steps you take after crisis occurs is equally important to the ones you take prior to the disaster occurring.  

Law Enforcement Liaison

Communications Security Assessment

Communications Security Assessment

You need to have a plan in place for how you will work with law enforcement BEFOREan emergency happens, waiting until after an emergency happens is too late. Our staff has extensive law enforcement experience and can work with local agencies to create a plan that will minimize business impact while providing the most effective response in the case of an emergency.

Communications Security Assessment

Communications Security Assessment

Communications Security Assessment

 Being able to communicate is critical for your team members to be able to effectively operate. We will assess your communications platforms for potential vulnerabilities, and then recommend ways to mitigate or minimize those vulnerabilities.  

Emergency Smart Phone Application

Emergency Smart Phone Application

Emergency Smart Phone Application

  We will provide an application plug-in which will allow for two-way emergency communications between event participants and venue staff, as well as collecting critical digital evidence for law enforcement.

Cyber-Physical Assessment

Emergency Smart Phone Application

Emergency Smart Phone Application

The Internet of Things (IOT) is rapidly integrating cyber-security with physical-security. We will survey the spectrum of connected devices that your venue already has in place; and then provide recommendations for ways to increase both the security of these devices and improve the physical security posture of your company by integrating IOT technology into your security architecture. 

Emergency Response Plan

Emergency Smart Phone Application

Crowd Management Planning

 When emergencies happen, you need to have a plan. We will evaluate your current operational process and develop responses for the major categories of emergencies that will maximize personnel safety while minimizing business impact. 

Crowd Management Planning

Insider Threat Assessment and Mitigation

Crowd Management Planning

  Crowds of people create inherent security vulnerabilities. Managing crowds properly can minimize risks and prevent problems from happening. We will survey your events, obtain estimates of crowd sizes, and create a plan which minimizes the amassing of people at various choke points within your event. For example, simply putting up security checkpoints with magnetometers to deter an active shooter may create a more vulnerable target of opportunity with the amassing of people waiting to get through the security cue.

Insider Threat Assessment and Mitigation

Insider Threat Assessment and Mitigation

Insider Threat Assessment and Mitigation

 Assessment and screening of employees, contractors, vendors, and other persons with sensitive or critical access for indications of concerning behaviors and characteristics. Because purely automated solutions present high false alarm rates, human analysts still need to vet these alerts and further investigate any potential points of concern. We will utilize the latest behavioral analytics-based threat detection tools to identify potential points of concern, and then further scrutinize these concerns. 

VIA - Vulnerability Intercept Assessment

Copyright © 2018 - All Rights Reserved.