Our process has been used to perform hundreds of assessments over the past 35 years. Our depth and breadth of experience combined with best practices and the latest security standards, allows us to develop a more balanced assessment.
Threats, Risks & Vulnerabilities
- Identify, assess and prioritize threats
- Measure and quantify vulnerabilities
- Site specific risk analysis
- Recommended countermeasures
Physical Security Technology
- Access Control Systems & Intrusion Detection
- IP Video Recording Systems, Video Cameras
- Video Analog to IP Conversion
- Perimeter Protection & Gate Access
Data Collection & Stakeholder Interviews
TRUSYS works with key stakeholders to gather all information necessary to ensure a thorough understanding of your site, operations, procedures and potential risks.
Risk, Threat & Vulnerability Assessments
After reviewing and prioritizing risks and threats, we provide an analysis of the likelihood of specific threats, as well as an evaluation of the vulnerability of each site.
Physical Security Assessments
Through detailed site inspections, we evaluate the security infrastructure, hardware, governing policies, program and operating procedures of the site.
Security Technology Assessments
This assessment identifies the appropriate technologies needed to protect the human and physical environment of the site.
Security Assessment Report & Improvement Plan
Our report identifies critical assets and threats and evaluates existing security measures to identify potential weaknesses and areas for improvement. The report also includes compliance recommendations per CPTED, C-TPAT, FISMA, CFATS, OSHA, NFPA, FEMA, and ASIS regulations.