Skip to the main content.
About our VOSB Designation


Veteran Owned Small Business (VOSB) is a company diversity registration designated under the Veteran Benefits, Health Care, and Information Technology Act of 2006 (Public Law 109-461). Registration ensures that companies qualify for preferential procurement for federal contracts if they are owned and controlled by Veterans.

This certification is non-industry specific and requires that the firm meets the small business requirements established by the Small Business Administration (SBA). Additionally, it requires that the company is at least 51% owned, operated and controlled by a veteran.

3 min read

Robots and Drones: Transforming Data Center and Campus Security in Remote Areas

Ensuring safety and security at locations like data centers and health care campuses goes beyond traditional methods and calls for innovative solutions. This is particularly crucial for the remote areas of expansive campuses, where security personnel may encounter delayed response times and unpredictable situations. This is where drones and robots equipped with cameras that are connected to the security operations center are transforming how campuses manage security alerts. Watch this clip on the topic from Eric Moreau's on-demand webinar linked at the bottom of this article.

Elevated Situational Awareness: Enhanced Officer Safety

One of the primary advantages of leveraging drones and robots for remote security alerts is the enhancement of situational awareness for responding officers. Picture a scenario in a poorly lit parking lot or a secluded building at the outskirts of the campus. Instead of officers approaching an unfamiliar situation with limited information, a drone can be swiftly deployed prior to the officer arriving.

Drones equipped with high-definition cameras offer a crucial aerial viewpoint. The live feeds from these drones provide security teams with a real-time comprehension of:

  • Number of individuals involved: Are there multiple suspects or individuals in distress?
  • Potential threats: Are there signs of weapons or risky behavior?
  • Surrounding terrain: Are there escape routes or potential hazards to be mindful of?

Video courtesy of Sunflower Labs

Robots on the Ground

While drones offer a bird's eye view, ground-based robots provide an additional layer of security and are particularly valuable in indoor settings. These robots can traverse through large buildings or across long distances immediately upon receiving an alert, transmitting video and audio back to security teams. This equips officers with invaluable insights before they even step into the area.

The integrated use of robots and drones provides several key advantages:

  • Reduced Risk: With a clearer understanding of the situation, officers can approach with heightened caution and make well-informed decisions, reducing their risk of harm.
  • Efficient Response: By pinpointing the precise nature and location of a threat, officers can react with suitable resources and strategies, ensuring a quicker, more effective response.
  • Deterrent Effect: The visible presence of drones and robots can discourage potential criminal activities, serving as a potent preventive measure.


Beyond the Alert: Added Benefits

In addition to responding to immediate security alerts, drones and robots offer avenues for proactive campus safety:

  • Routine Patrols: Robots can supplement human patrols, especially in remote areas.
  • Perimeter Checks (Guard Tours): Drones can conduct scheduled perimeter inspections, enhancing overall security.
  • Monitoring of Large Events: With drones providing aerial oversight, security teams can oversee crowds and identify potential issues at an early stage.

The Future of Data Center and Campus Security

While the incorporation of drones and robots requires meticulous planning and training, the advantages for enhancing officer safety and the overall well-being of the campus community are indisputable. As these technologies advance, we can anticipate even more sophisticated and seamless integration into campus security protocols, creating a safer environment for students, faculty, and staff.

Check out Eric's on-demand webinar about our data center ring of security philosophy >>





We understand the challenges that security professionals face in securing their facilities and creating a safe environment within their budget. We also recognize the difficulty in finding the right resources and expert advice to achieve this mission.

That's why we're excited to announce the release of our considerations guide, designed specifically to help security professionals conduct their own in-house security risk assessment.

This comprehensive guide aims to assist you in identifying any missing or inadequate physical security measures that may compromise the safety and security of your assets, people, property, and critical business functions. While we highly recommend consulting with a third-party expert like Theseus Professional Services in certain cases, this guide will empower you to take a proactive approach to assess and address security risks within your organization.

The findings of a security risk assessment play a vital role in measuring and communicating the level of risk to your organization. By following the guidelines outlined in this guide, you can enhance the overall security of your facility while staying within your budget.

We believe that knowledge is power, and we're committed to providing you with valuable resources to help you achieve your security goals. Download our considerations guide today and take control of your facility's security.

  • Process Evaluation
  • Threats
  • Vulnerability Assessment Highlights
  • Electronic Security Systems Considerations
  • Site Considerations
  • Building Entrances and Exits
  • Common Functional Areas
  • Building Envelope
  • Utilities and Building Services
  • Building Systems

Download here >>



A Clear View

You may be one of millions that caught this scene from The Masters last week. If so, did you think of this as an inspirational moment for your...

Read More

Integrating Disparate Low Voltage and Electronic Security Systems

The trend towards integration of disparate security systems to create a unified solution has gained significant traction over the years. This...

Read More

Explained: Piggybacking versus Tailgating

When it comes to securing sensitive areas of a building, the terms "piggybacking" and "tailgating" often come up. Although they might seem similar at...

Read More