Skip to the main content.
About our VOSB Designation

vosb_large

Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

Theseus Team

6 min read

AI in the GSOC: How Enterprise Security Teams Are Using “Agentic” Video Analytics to Work Smarter

There's no doubt that it was the talk of the town in New Orleans at GSX 2025. Forward-thinking enterprise security teams are using AI-powered video analytics inside their VMS and GSOC to automatically detect, validate, and triage events, then...

Read More

7 min read

Paddle Exit vs. Push Bar (Panic Bar): Security Differences, Pros & Cons

Security and safety: they're major concerns, yet they often fall a bit further down the to-do list than we like to admit. So, let's see what could...

Read More

5 min read

The Sidewalk Emergency Exit You Probably Missed—And How to Keep It Clear with Smart Security

Yes, modern video analytics can detect a vehicle blocking a sidewalk-level emergency exit and automatically trigger a nearby IP speaker with a live...

Read More

2 min read

From Nuclear-Grade Quality to Next-Gen Security: The Theseus Continuum

How Norm Moreau’s lifetime of rigor powers Eric Moreau’s modern security practice Theseus Professional Services was never just a company—it’s a...

Read More

4 min read

The Overlooked Priority in Construction Projects: Phasing Security Systems

In complex environments like hospitals, government buildings, and large institutional campuses, construction is a constant reality. Whether it's a...

Read More

4 min read

Assessing the Edge: How Physical Security Consultants Evaluate Perimeter Risks

Special thanks to our friends at Chesapeake and Midlantic Marketing for inspiring this article and highlighting real-world examples of effective...

Read More

4 min read

Understanding and Mitigating Internal and External Threats in High-Risk Environments

Security threats to an organization often come from the outside—unauthorized visitors, contractors, or opportunistic criminals. However, some of the...

Read More

1 min read

Is Your Security Strategy Truly Secure—or Just Keeping Honest People Honest?

Too often, organizations invest in security measures without first understanding the full scope of their risks. A fence might deter casual...

Read More

3 min read

Enhancing Security Through Visitor Communication and Management

Whether in healthcare, corporate, education, or industrial security environments—visitor communication plays a crucial role in the overall safety...

Read More

3 min read

Building Better Security Operations: Lessons from Healthcare for Every Industry

Security operations are built on people, presence, and process. Whether you're securing a hospital, a university, a shopping mall, or a corporate...

Read More