Knowledge Center

Sourcing physical security service providers has gotten more and less technical. While there is much time spent on cost comparison, technical acceptability, technology offerings and efficiency schemes, one of the most commonly overlooked aspects is a professional transition plan.


Learn More About Best Practices for Managing a Service Transition

Outsourcing industrial physical security services has long been recognized as an effective cost management strategy for prime contractors. Labor is expensive; so service contracts tend to be large targets for procurement professionals to focus on for cost savings efforts. While a competitive marketplace is healthy for all parties, an over reliance on LPTA (Lowest Price Technically Acceptable) bidding can introduce risk in the supply chain and overall significantly impact the buyer’s contract performance.


Learn More About Outsourcing Industrial Security Successfully

Failing to adequately train armed security personnel may have significant consequences for an organization and/or their security supplier. During a ten-year study (East Carolina University) on civil litigation filed against police agencies that allege a failure to train, it was found that law enforcement agencies prevailed slightly less than 70% of the time and 55% of the claims were from non-lethal encounters. Private security does not have the same specific legal protections afforded to law enforcement agencies or their personnel. Most security companies fail to provide suitable firearms training and rely only on the operating state’s minimum standards as their legal defense. It’s imperative that private security lead the way in the development of professional armed training programs while adhering to and exceeding the prescribed minimums determined by each state.


Learn More About Best Practices for Armed Training Programs

Social and political demonstrations targeted at private company facilities can be disrupting and costly. While it’s important for security professionals to be prepared to address against these organized and ill intended disturbances, first amendment audits typically only involve one or several people overtly photographing and/or filming a government or private business facilities with the intention of instigating an unfavorable interaction with security personnel. The video results are then posted to the web and often are widely viewed leading to reputation and personal damages.


Learn More About First Amendment Audits

Creating a safe working environment for employees and contractors is part of the standard duty of care. This legal obligation to ensure a standard of reasonable care while performing any acts that could foreseeably harm others is often complicated when motor vehicles are required as part of job duties. Unfortunately, motor vehicle accidents in these environments happen and when they do proper investigation is paramount.


Learn More About Best Practices in Accident Investigation

At the root level the whole purpose of a Security Operations Center (SOC), is to collect, process, and distribute information to those who need it. Implementation of a SOC within an organization can bring much needed value if designed, equipped/staffed, and implemented well.


Learn More About SOC Best Practices

It’s clear that in the information age there is a struggle over ownership of information and what should be done for the greater good. Social media and alternative news outlets coupled with insiders who feel compelled to ‘spill the truth’ have created a new version of the classic espionage tale.


Learn More About Insider Threats