top of page
Survival Response LLC Logo

THREAT  ASSESSMENTS & SECURITY CONSULTING

Security Assessments

Security Assessments are also vital to creating a new security program, especially if your organization does not have an existing security plan. Conducting a Security Assessment is by far one of the best ways you can evaluate your existing security. It is also the first step to take before enhancing your current location or when faced with a new security challenge.

A comprehensive Security Assessment reviews all aspects of your security program. This examination will identify any vulnerabilities and provide specific recommendations for improvements. Frequently, opportunities to reduce costs and improve efficiency emerge.

We provide Security Assessments to a wide range of different organizations, such as corporate locations, religious organizations, educational facilities, and government sites. Each Security Assessment uses a structured analysis approach. Doing so allows us to thoroughly understand your business, operating conditions, culture, and unique security risks specific to your organization. Our systemized approach keeps each Assessment on track while analyzing all critical elements. Client involvement during the process is crucial.

Back to SERVICES PAGE >>

Each Security Assessment is customized for each project. Standard tasks usually included:

  • Risk Identification and analysis

  • Threat and vulnerability assessment

  • Physical Review of the site and existing security elements

  • A thorough review of area crime data to include calls for service, crime statistics, and loss history

  • Review of CPTED (Crime Prevention Through Environmental Design) compliance for the site and facility

  • Review of compliance for industry-specific security requirements such as HIPPA (Health Insurance Portability and Accountability Act), C-TPAT (Customs-Trade Partnership Against Terrorism), and any other security requirement imposed by a regulatory agency specific to your organization.

  • Review of facility operating procedures

  • Review of physical security systems

  • Review of electronic security systems

  • Review of architectural security

  • Review of security policies and procedures

  • Review of security management

  • Review of security personnel

  • Evaluation of present security program and identification of any weaknesses and vulnerabilities

  • Development of recommendations for security improvements

  • Identification of short-term and long-term costs

  • Prioritization of recommendations and development of implementation plan

  • Preparation of written Security Assessment Report

bottom of page