Skip to the main content.
About our VOSB Designation

vosb_large

Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

2 min read

Layered Defense

If you are like most in the security industry,  you are familiar with the idea of having an intrusion detection system with a lock on a door, but layered defense takes the idea much further. The principle behind a layered defense is that it’s much harder for a potential intruder to defeat multiple barriers as opposed to just one. Plus, the idea of delay allows time for a local response to occur before the intruder get to the most sensitive parts of the building or campus.

Here are the primary layers, broken down:

  1. Perimeter Security: This is the outermost layer and includes things like fences, walls, or natural barriers like hedges.

  2. Territorial Reinforcement: This involves creating a clear distinction between public and private property, which can act as a psychological deterrent. This could be as simple as signage, landscaping, or pathways that guide visitors along certain routes.

  3. Building Exterior: Before someone even gets to a door or window, there are other obstacles and deterrents that can be put in place. This includes security cameras, motion-activated lighting, or even guard dogs.

  4. Access Control: This is what most people think of when considering physical security. It involves locks, card readers, biometric systems, and more.

  5. Internal Security: Even if someone gains access to the building, there can be additional layers inside, such as secure doors to certain wings or rooms, safes, or even security personnel.

  6. Operational Procedures: Beyond the physical barriers, there are procedures and protocols that can enhance security. This includes things like requiring ID checks, escorting visitors, preventing piggybacking or tailgating, or having regular security audits.

A key concept behind layered defense is that no single layer is perfect; each has vulnerabilities. However, by having multiple layers, the weaknesses of one layer can be compensated for by the strengths of another and delay and deterrence are increased.

Pro tip: Landscaping can be used as a security tool! For instance, thorny bushes beneath windows can act as a deterrent against someone trying to access them. Similarly, trees and shrubs can be trimmed to ensure they don't provide cover for someone trying to sneak in. Landscaping can also be used to direct foot traffic along desired paths.

Incorporating a comprehensive, layered approach ensures that there are multiple obstacles in the way of potential threats, thereby increasing the overall security of a location. Our team ensures that the ideal security solution is designed and implemented by your contractor(s). This starts with a comprehensive security risk assessment.

 

FREE: PHYSICAL SECURITY RISK ASSESSMENT CONSIDERATIONS GUIDE

IN-HOUSE SECURITY RISK ASSESSMENT CONSIDERATIONS magazine cover

We understand the challenges that security professionals face in securing their facilities and creating a safe environment within their budget. We also recognize the difficulty in finding the right resources and expert advice to achieve this mission.

That's why we're excited to announce the release of our considerations guide, designed specifically to help security professionals conduct their own in-house security risk assessment.

This comprehensive guide aims to assist you in identifying any missing or inadequate physical security measures that may compromise the safety and security of your assets, people, property, and critical business functions. While we highly recommend consulting with a third-party expert like Theseus Professional Services in certain cases, this guide will empower you to take a proactive approach to assess and address security risks within your organization.

The findings of a security risk assessment play a vital role in measuring and communicating the level of risk to your organization. By following the guidelines outlined in this guide, you can enhance the overall security of your facility while staying within your budget.

We believe that knowledge is power, and we're committed to providing you with valuable resources to help you achieve your security goals. Download our considerations guide today and take control of your facility's security.

  • Process Evaluation
  • Threats
  • Vulnerability Assessment Highlights
  • Electronic Security Systems Considerations
  • Site Considerations
  • Building Entrances and Exits
  • Common Functional Areas
  • Building Envelope
  • Utilities and Building Services
  • Building Systems

Download here >>

IN-HOUSE SECURITY RISK ASSESSMENT CONSIDERATIONS magazine cover

 

 

 

Robots and Drones: Transforming Data Center and Campus Security in Remote Areas

Ensuring safety and security at locations like data centers and health care campuses goes beyond traditional methods and calls for innovative...

Read More

1 min read

Access Control for Data Centers, Healthcare Facilities, and Beyond

Access control is a vital component in ensuring the security of facilities and personnel, whether it is an entire building or specific areas within...

Read More

1 min read

The 5 Ds of Perimeter Security and Why They Matter to Data Centers and Other Critical Properties

There are fences surrounding more properties than you can count in your community alone, strategically working in conjunction with various electronic...

Read More