securit y design & consulting Sports. Government. Education. Aviation. Commercial. Cultural. Our experts – in counterterrorism, cybersecurity, counter theft, electronic security and physical security – customize solutions for any project, anywhere. We identify threats, vulnerabilities, and risks, then develop seamless security and technology plans. Our goal? To reduce risk without distracting from your primary business.
HOW WE IDENTIFY THE PROBLEM Threat, Vulnerability & Risk Assessment (TVRA) Our TVRAs establish your baseline threat profile and security posture. We use detailed analysis; customized, cutting-edge modeling; and virtual reality simulations to craft proactive and predictive protection for critical assets, infrastructure and personnel. Our cybersecurity TVRAs evaluate and test your systems against an array of threat-vulnerability scenarios.
Security System Audits A thorough review of your security standards and procedures gives you an objective view of your current equipment, design and procedures. Security Benchmarking Studies Our subject-matter experts review your security measures to establish a baseline, then use empirical methods to benchmark your program against similar client types.
HOW WE SOLVE THE PROBLEM We offer detailed recommendations and ground-up design for electronic, physical and operational security solutions. These measures work in parallel, so integration is key. With wide-ranging expertise on board, we can provide comprehensive, layered security solutions. Physical Security Design From security doors and windows to hostile vehicle mitigation barriers, access-control hardware and secure MEP design, we protect people and property from harm by denying unauthorized access to facilities, equipment and resources. Our detailed recommendations and comprehensive designs run the gamut of physical security measures.
Electronic Security Design Our performance-based design service delivers customized security frameworks, while our detailed security design provides fully specified and integrated hardware, devices, software and sensors. Operational Security Design We zoom in on the critical human element of security to maximize the effectiveness of facilities and policies. • Security Training • Bomb Blast Modeling • Escape & Evacuation Modeling • Operations Center Design & Performance • Security Systems Owner Representation • Executive Protection Program Review • Technical Surveillance Countermeasures • Virtual Reality for Security Design • Tiered Security Protocol Development
www.thorntontomasetti.com