Security Design & Consulting

Page 1

securit y design & consulting Sports. Government. Education. Aviation. Commercial. Cultural. Our experts – in counterterrorism, cybersecurity, counter theft, electronic security and physical security – customize solutions for any project, anywhere. We identify threats, vulnerabilities, and risks, then develop seamless security and technology plans. Our goal? To reduce risk without distracting from your primary business.

HOW WE IDENTIFY THE PROBLEM Threat, Vulnerability & Risk Assessment (TVRA) Our TVRAs establish your baseline threat profile and security posture. We use detailed analysis; customized, cutting-edge modeling; and virtual reality simulations to craft proactive and predictive protection for critical assets, infrastructure and personnel. Our cybersecurity TVRAs evaluate and test your systems against an array of threat-vulnerability scenarios.

Security System Audits A thorough review of your security standards and procedures gives you an objective view of your current equipment, design and procedures. Security Benchmarking Studies Our subject-matter experts review your security measures to establish a baseline, then use empirical methods to benchmark your program against similar client types.

HOW WE SOLVE THE PROBLEM We offer detailed recommendations and ground-up design for electronic, physical and operational security solutions. These measures work in parallel, so integration is key. With wide-ranging expertise on board, we can provide comprehensive, layered security solutions. Physical Security Design From security doors and windows to hostile vehicle mitigation barriers, access-control hardware and secure MEP design, we protect people and property from harm by denying unauthorized access to facilities, equipment and resources. Our detailed recommendations and comprehensive designs run the gamut of physical security measures.

Electronic Security Design Our performance-based design service delivers customized security frameworks, while our detailed security design provides fully specified and integrated hardware, devices, software and sensors. Operational Security Design We zoom in on the critical human element of security to maximize the effectiveness of facilities and policies. • Security Training • Bomb Blast Modeling • Escape & Evacuation Modeling • Operations Center Design & Performance • Security Systems Owner Representation • Executive Protection Program Review • Technical Surveillance Countermeasures • Virtual Reality for Security Design • Tiered Security Protocol Development

www.thorntontomasetti.com


securit y design & consulting

REDUCING RISK WITH SECURITY DESIGN & CONSULTING We work with you to mitigate vulnerabilities and limit consequences by crafting comprehensive, layered and fully integrated plans that maximize effectiveness and value. We start by identifying potential threats, then filter that information through our diverse expertise – and reach out beyond our core team for insight from across Thornton Tomasetti. The result? Effective security solutions tailored to your needs, priorities and budget.

DIVERSIFIED EXPERTISE & RESOURCES FOR BETTER SOLUTIONS E

K

S

OUR TEAM’S TEAM’S EXPERTISE EXPERTISE

R I T YY R I S CU

• Staff Certification: • R&D ASDA, ASIS, •Escape & Evacuation (CPP, PSP, PCI), RSES • Proprietary Blast-Analysis • Experience in Military, Software Law Enforcement, • Security Risk Management Cybersecurity & AEC Industry • VR Security Planning • Security Clearances & Visualization

TVRAs TVRAs & Security Security System System Audits Audits & Benchmarking Studies Studies

HOW WE WE SOLVE SOLVE THE THE PROBLEM PROBLEM

•Applied Science •Applied Science •Construction •Construction Engineering Engineering •Façade Engineering •Façade Engineering •Forensics •Forensics •Property Loss •Protective ConsultingDesign & Security •Protective Design •Renewal & Security • •Resilience Renewal • Structural •Structural Engineering Engineering • •Sustainability Sustainability • Transportation •Transportation

Physical Electronic Operational Physical Electronic Security Security Security Design Security Security Design Design Security Design Design

CUSTOMIZED CUSTOMIZED

ED

UC E D RI S

APPROPRIATE APPROPRIATE & & PROPORTIONAL PROPORTIONAL

For the latest on our security design and consulting capabilities

visit thorntontomasetti.com/security

K

HOLISTIC HOLISTIC

R

COMPREHENSIVE COMPREHENSIVE LAYERED LAYERED & INTEGRATED INTEGRATED SOLUTIONS SOLUTIONS

S O U RCES

MODELING MODELING

RE

COLLABORATION COLLABORATION ANALYSIS ANALYSIS

SC I P LI N A IDI R LT

Y

ON-SITE ON-SITE REVIEW REVIEW

MU

HOW WE WE IDENTIFY IDENTIFY THE THE PROBLEM PROBLEM


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.