| ph. sec. & vulnerability ass. |

.
 

Force-multiplier
Access a full team and expand your resources for less than the cost of a new hire. 


Shore up your security efforts
Security tasks falling by the wayside? Cover your bases across multiple functions, such as social media monitoring, mail-screening, threat analysis, vendor procurement 


Experience & network
Tap into our deep bench of global partners and decades of  operations and advisory expertise


Test the fences
Full scale threat, vulnerability, pen testing, and physical security assessments to identify gaps in your armor, both in the real world and the digital one


.
 

The primary objective of [ar3] amas IBC's Physical Security Assessment (PSA) is to observe and analyze areas of potential and/or actual vulnerability, to define causes, and to recommend means to reduce or eliminate exposure. Our method ensures that the assessment will be developed around the client's individual and specific needs and allows for the most comprehensive analysis available on the market.

The assessment includes a review of: access control systems and procedures; ingress/egress procedures, intrusion detection systems; application of electronic control systems; employee and visitor identification procedures; IT procedures; employee/vendor background investigations; and general personnel policies and procedures.

[ar3] amas IBC specializes in an array of security services such as:

Office Security Assessment

Information Systems Evaluation

Personal Protection Consulting

Crisis Management & Threat Mitigation

Threat monitoring & intelligence

Comprehensive security assessments are smart policy for any business, big or small. Understanding your businesses' vulnerabilities – all within the context of your particular industry – is essential risk management. [ar3] amas IBC's decades of experience providing such assessments has led to a proprietary system that measures risks for our clients from all angles.

Our process involves an extensive system designed to assess, analyze, report and test areas of potential or actual vulnerability. It can be scaled and implemented within small businesses, middle-market companies, and large corporations. Although the following reflects a framework of the method, given that no two assessments are identical, it should only be regarded as a guide.

Initial Meeting

Introduction to client's corporate structure, services, and identity

Identification of key personnel

Creation of a cross-functional Assessment Team (usually comprised of senior-level personnel within pertinent groups, divisions or business units)

Pre-Assessment Meeting/Survey

Determination of the scope of the Assessment

Discussion of perceived threats and historical incidents

Classification of industry-wide threats

Identification of key assets (i.e. personnel, facilities, material)

Discussion of process for reporting and gathering information

Establishment of timeline for entire process

Identification of deliverables

Identification of required tools and documentation (i.e. protocols and procedures)

Clearance obtained for our personnel

Comprehensive Onsite Assessment

Implementation of the agreed-upon plan including physical assessments of facilities during both daytime and evening hours

Review of current protocols and procedures and a determination of the level of compliance throughout the organization

Comprehensive interviews with identified key personnel

Aggressive testing of current security precautions and barriers through various prearranged means

Evaluation of emergency planning and mitigation procedures and policies

Analysis of business continuity plans

Evaluation of security training and education procedures

Data Analysis and Initial Report Generation

Professional analysis of collected data

Design and development of report outlining observations and recommendations

Preliminary Briefing

General and specific observations of vulnerabilities throughout the organization

Specific recommendations highlighting areas of critical concern as well as areas in need of improvement

Discussion of the needs for further evaluation or testing

Presentation of Findings and Recommendations

All findings and recommendations will be reported in a manner which fits the needs of the organization

Presentation of all updated, rewritten or modified policies and procedures

Recommendations for the implementation of training or awareness programs

Testing of Implemented Recommendations

Prearranged audits to determine if the improvements have been implemented correctly

Findings report and further recommendations

Recurring evaluations and/or audits on a predetermined schedule

.


spheres & programs


Outsourced Chief Security Officer Program
Sparing our clients from financial losses and reputation problems resulting from corporate malfeasance had they implemented more robust security precautions.


The Comprehensive Physical Security & Vulnerability Assessment
Observing and analyzing areas of potential and/or actual vulnerability, defining causes, and recommending means to reduce or eliminate exposure.


Cyber Security
Helped thousands of clients restore the integrity of their operations following incidents of fraud or other corporate misconduct.


Ops
Government level services for the private sector
Our private held security, consulting and training agency provides multi sectors tailor-made services for each by using years of experience in the government security, intelligence, police and army from its HQ in Tel Aviv.