We bring you the insights needed to understand risk and manage security programs, assets, and clients.
The team, partners, and those organizations that do business together with are often the largest potential threats to organizations. Simple background or criminal checks often don’t uncover all potential issues. We conduct a quick yet exhaustive open-source analysis of possible threats and risk factors involved with an applicant, a potential partner, team member or hostile person. These scans should become part of regular risk management practices before and after hiring, entering business relationships, or when protecting the team or others from potentially dangerous persons of interest.
When a Deeper dive into a person, entity, or threat group is needed, we have you covered. With Deep Recons, we explore any flags and issues more thoroughly and can contact associates to collect more insight into potential background or threat issues. The reports can involve phone calls, reference checks, and follow up with known associates or information sources. This report typically contains more information about a subject, company or group to help clients fully understand the nature of the risks involved.
A comprehensive report on an organization’s attack surface across multiple edges and vectors. This results in a report covering prioritized threats and potential weaknesses. Think of this report as a Recon into your organization’s weakest points and areas of concern based on threat, business environment, and organizational analysis. This can be performed with your organization in mind or your clients.
Transportation Assessments, Violent Extremist Organization (VEO) profiles, Destination Threat Overviews, Contingency Plans, Evasion Corridors, Emergency Action Plans (EAPs), and many more.