Security Review
& POLICY ASSESSMENTS
Timely and periodic assessments are essential to reviewing how well an institution’s operations and programs are complying with policy and procedure.
Industries We Serve







Risk Assessment
Identify risks including for escapes, introduction of contraband, and unauthorized entry

Security Analysis & Policy
Review and develop security policies
and procedures

Operational Efficiency
Streamline screening processes and
improve operational effectiveness

Technology Assessment
Technology assessments, briefings, and recommendations

Reduced Liability
Proactively address threats and challenges

Technology Solutions
Leverage technology for efficiency and competitive advantage
A performance-based approach used to evaluate practices, procedures, and policy compliance, the
Vulnerability Assessment tests include:
- Physical Assessment Systems (PAS) to prevent or limit opportunity for a threat to occur
- Generation of Path Sequence Programs (PSD’s) – performance testing
- Estimates of Adversary Sequence Interruption (EASI’s) – scenario development, and determination of
risk for worst-case scenarios
Used to evaluate an institution’s perimeter and areas that are accessible to that perimeter, the Security Analysis is designed to evaluate practices, procedures, and testing of the perimeter and areas that interact with the perimeter including:
- PIDS
- Outside perimeter patrol & towers
- Vehicle gates
- Loading docks
- External and internal lighting
- Staff and inmate searches
- CCTV
This assessment encompasses compliance with policy, procedure, and practice. The areas to be inspected include:
- Mailroom
- Front Lobby
- Intake
- Sallyport
- Gatehouse
- Armory
- Control Center
- Work Release
- Outside Housing
- Maintenance
- Food Service

Download Brochure
Start Improving Your Security Systems Today
Connect with us to learn more or request a quote.