Skip to the main content.
About our VOSB Designation


Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

2 min read

Protecting Manholes: Securing Fiber Optic Communication Paths to Buildings and Data Centers



The integrity of fiber optic communication paths is paramount for the seamless operation and security of buildings and data centers. While much emphasis is placed on vertical perimeter protection—using fences, walls, and other barriers to keep unauthorized individuals out—there is an equally critical need to focus on the horizontal axis. This involves safeguarding against breaches through manholes that access subsurface infrastructure. These access points are crucial as they protect critical infrastructure vaults, connecting data centers to power, internet, and other essential utilities.

Utility Access Door on Sidewalk - VerticalGiven the vulnerabilities associated with manholes, it is imperative to consider advanced monitoring solutions. Specially engineered monitoring devices are designed for immediate detection of any unauthorized access attempts. These devices must operate efficiently in unprotected, ground-level environments that are subject to various challenges, including water exposure, temperature fluctuations, and complex mounting requirements. By implementing such monitoring systems, organizations can significantly enhance their security posture, ensuring that any breach attempts are swiftly identified and addressed before they can cause disruption.

To effectively address these security concerns, organizations and security managers should seek expert guidance from Theseus Professional Services. Our team specializes in providing comprehensive security consulting that covers all aspects of perimeter protection, including the often-overlooked horizontal breaches through manholes. With our expertise, we can help design and implement robust monitoring solutions tailored to your specific needs, ensuring the highest level of protection for your critical infrastructure.

Contact Theseus Professional Services today to fortify your defenses and safeguard your fiber optic communication paths against potential threats. Our commitment to security and innovation ensures that your operations remain uninterrupted and secure, allowing you to focus on what matters most—your business.

To gain further insights into this important topic, watch the short clip below about protecting underground infrastructure from our on-demand webinar. Eric Moreau provides valuable expertise and practical tips on how to navigate the complexities of maintaining security. You can access the entire webinar by following the link provided below.


 Access the entire on-demand webinar here >>




IN-HOUSE SECURITY RISK ASSESSMENT CONSIDERATIONS magazine coverSecurity professionals are constantly looking for innovative ways to secure their facility and provide a safe environment within their budget. And, they are also constantly looking for resources to help them achieve that mission while expert advice is hard to come by. 

Fortunately, we have released a considerations guide that will help security professionals perform their own in-house security risk assessment. 

What's Inside?

This guide is intended to assist you with performing an in-house physical security risk assessment. In many cases, assistance from a third-party expert, like Theseus Professional Services, is required.

Identification of missing or inadequate physical security measures that safeguard assets (people, property, and information) and critical business functions is of paramount importance. The findings of a security risk assessment are used to measure and communicate the level of risk to the organization.

  • Process Evaluation
  • Threats
  • Vulnerability Assessment Highlights
  • Electronic Security Systems Considerations
  • Site Considerations
  • Building Entrances and Exits
  • Common Functional Areas
  • Building Envelope
  • Utilities and Building Services
  • Building Systems

Download here >>