Skip to the main content.
About our VOSB Designation

vosb_large

Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

1 min read

Download Our FREE In-House Security Risk Assessment Considerations Guide

Security professionals are constantly looking for innovative ways to secure their facility and provide a safe environment within their budget. And, they are also constantly looking for resources to help them achieve that mission while expert advice is hard to come by. 

Fortunately, we have released a considerations guide that will help security professionals perform their own in-house security risk assessment. So now you can download it for free below.

This guide is intended to assist you with recognizing the critical aspects of and performing an in-house security risk assessment. In many cases, assistance from a third-party expert, like Theseus Professional Services, is required. Identification of missing or inadequate physical security measures that safeguard assets (people, property, and information) and critical business functions is of paramount concern. The findings of a security risk assessment are used to measure and communicate the level of risk to the organization.

 

Before jumping into your in-house security risk assessment exercise, it’s important to have a good background related to site surveys, risk assessments, and other consultation options available to your organization. When it comes to a risk assessment of your facility, sometimes an in-house assessment can be the perfect starting point before asking for third-party, expert consultation.

Considerations for access control, perimeter detection, intrusion detection, video surveillance, visitor management, and other technologies need to be considered based on the organization’s desired security posture, policies, and daily operational procedures.

REQUEST THE FREE DOWNLOAD LINK HERE >>

 

 

 

 

 

Robots and Drones: Transforming Data Center and Campus Security in Remote Areas

Ensuring safety and security at locations like data centers and health care campuses goes beyond traditional methods and calls for innovative...

Read More

1 min read

Access Control for Data Centers, Healthcare Facilities, and Beyond

Access control is a vital component in ensuring the security of facilities and personnel, whether it is an entire building or specific areas within...

Read More

1 min read

The 5 Ds of Perimeter Security and Why They Matter to Data Centers and Other Critical Properties

There are fences surrounding more properties than you can count in your community alone, strategically working in conjunction with various electronic...

Read More