Background
Services
Coverage
Contact

Consulting

Security Consultancy and Assessment

A security assessment is to ensure that necessary security controls are integrated into the design and implementation of a project. Any security gaps between a project design and approved corporate security policies can be outlined for the management reallocates resources achieving the valuable rewards.

Supply Chain Security

C-TPAT (Customs-Trade Partnership Against Terrorism) is a voluntary compliance program for companies to improve the security of their corporate supply chains. It includes procedures writing, risk analysis, self-assessment management, business partner on-site assessments and C-TPAT training.

Litigation Supports

  • Interviewing capability

  • Evidentiary chain of custody work

  • Reference and Credential checks

  • Background checking on individuals and entities

  • Media searches

Security system design and installation

With an on-site assessment, we can provide guidance for the design, installation, and maintenance of the security system.

Intellectual Property Protection (Brand Protection and Anti-Privacy)

Brand is an intangible asset for a corporate. Intellectual property (IP) is an essential element on brand protection. Under intellectual property law, owners are granted certain exclusive rights to a variety of intangible assets. Common types of intellectual property include copyrights, trademarks, patents, industrial design rights and trade secrets in some jurisdictions.

Investigation

Physical Surveillance /Cyber Surveillance

Physical Surveillance is very useful to maintain social control, recognize and monitor threats, and prevent/investigate criminal activity.

The vast majority of Cyber surveillance involves the monitoring of data and traffic on the Internet. It sift through the vast amount of intercepted Internet traffic and identify and report to human investigators traffic considered interesting by using certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or chat with suspicious individuals or groups

Due Diligence

Due Diligence is involving either the performance of an investigation of a business or person prior to signing of a contract, or the performance of an act with a certain standard of care. It can be a legal obligation, but the term will more commonly apply to voluntary investigations. Due Diligence helps the investor or Joint Venture Partners to understand the background of the companies or persons.

Pre-employment vetting

Background checks are often requested by employers on job candidates, especially on candidates seeking a position that requires high security or a position of trust, such as in a school, hospital, financial institution, airport, and government. It is the process of looking up and compiling criminal records, commercial records and financial records (in certain instances such as employment screening) of an individual.

Computer forensics

There are many reasons to employ the techniques of computer forensics:

  • In legal cases, computer forensic techniques are frequently used to analyze computer systems belonging to defendants (in criminal cases) or litigants (in civil cases).

  • To recover data in the event of a hardware or software failure.

  • To analyze a computer system after a break-in, for example, to determine how the attacker gained access and what the attacker did.

  • To gather evidence against an employee that an organization wishes to terminate.

  • To gain information about how computer systems work for the purpose of debugging, performance optimization, or reverse-engineering.