Gaps in your security program leave your campus vulnerable. Our process fills those gaps.

Our security program system has been designed to support and enhance communication, protection capabilities, and culture integration. The below are just some examples of how we do this.

Phase 1:

OBSERVATION AND EVALUATION

Onsite evaluation of facility conditions and interviews with key stakeholders (administration, teachers, staff, students, congregation members, etc.) to understand existing security procedures, concerns, and requirements

Phase 2:

DESIGN AND RECOMMENDATION

Create a multifaceted and community specific recommendation of security solutions

Phase 3:

SELECTION

Present proposed solutions relative to prioritization, established budget, and foster an understanding of the implications for decisions

Phase 4:

IMPLEMENTATION

Onsite evaluation of facility conditions and interviews with key stakeholders (administration, teachers, staff, students, congregation members, etc.) to understand existing security procedures, concerns, and requirements

Phase 5:

ONGOING MAINTENANCE

Reassess and revise security solutions based on key learnings and best practices from other client institutions