Security
Consultancy and Assessment
A
security assessment is to ensure that necessary security controls are
integrated into the design and implementation of a project. Any
security gaps between a project design and approved corporate
security policies can be outlined for the management reallocates
resources achieving the valuable rewards.
Supply
Chain Security
C-TPAT
(Customs-Trade Partnership Against Terrorism)
is a voluntary compliance program for companies to improve the
security of their corporate supply chains. It includes procedures
writing, risk analysis, self-assessment management, business partner
on-site assessments and C-TPAT training.
Litigation
Supports
-
Interviewing
capability
-
Evidentiary chain of custody
work
-
Reference and Credential checks
-
Background checking on
individuals and entities
-
Media searches
Security
system design and installation
With
an on-site assessment, we can provide guidance
for the design, installation, and maintenance of the security system.
Intellectual
Property Protection (Brand Protection and Anti-Privacy)
Brand
is an intangible asset for a corporate. Intellectual
property
(IP)
is an essential element on brand protection. Under intellectual
property law, owners are granted certain exclusive rights to a
variety of intangible assets. Common types of intellectual property
include copyrights, trademarks, patents, industrial design rights and
trade secrets in some jurisdictions.
|
Physical
Surveillance /Cyber Surveillance
Physical Surveillance
is very useful to maintain social control, recognize and monitor
threats, and prevent/investigate criminal activity.
The
vast majority of Cyber
surveillance involves the monitoring of data and traffic on the
Internet. It sift through the vast amount of intercepted Internet
traffic and identify and report to human investigators traffic
considered interesting by using certain "trigger" words or
phrases, visiting certain types of web sites, or communicating via
email or chat with suspicious individuals or groups
Due
Diligence
Due
Diligence
is involving either the performance of an investigation of a business
or person prior to signing of a contract, or the performance of an
act with a certain standard of care. It can be a legal obligation,
but the term will more commonly apply to voluntary investigations. Due
Diligence helps the investor or Joint Venture Partners to understand
the background of the companies or persons.
Pre-employment
vetting
Background
checks are often requested by employers on job candidates, especially
on candidates seeking a position that requires high security or a
position of trust, such as in a school, hospital, financial
institution, airport, and government. It is the process of looking up
and compiling criminal records, commercial records and financial
records (in certain instances such as employment screening) of an
individual.
Computer
forensics
There
are many reasons to employ the techniques of computer forensics:
-
In legal cases, computer
forensic techniques are frequently used to analyze computer systems
belonging to defendants (in criminal cases) or litigants (in civil
cases).
-
To recover data in the event
of a hardware or software failure.
-
To analyze a computer system
after a break-in, for example, to determine how the attacker gained
access and what the attacker did.
-
To gather evidence against an
employee that an organization wishes to terminate.
-
To gain information about how
computer systems work for the purpose of debugging, performance
optimization, or reverse-engineering.
|