Security events management
Security surveys, risk assessment.
Security Surveys and Risk Assessments Establishing/upgrading security systems
Gap Analysis
Physical and Logical security convergence/integration
Security Plans – Protection Measures and Drills
Security training and instruction services
Security Awareness
Advising on security technology systems
Anti-terror instructions and trainings
Logistics and Supply Chain security
Loss prevention
IT Security and Physical security of IT surroundings
Threats and risks report.
Proposal for system solutions combining the operational needs with the security in the firm and other overlapping areas such as safety etc.
Examination of the existing resource allocation and the required
Resources needed for optimal risk management (cost versus benefit).
Provide solutions for building an effective control and supervision
Mechanism, recommended means – technological and others, working procedures, including systems for assimilating implementation and control procedures.
Preparation of a working plan for securing the facility as well as
Operating procedures for using the technical systems.
Characterizing the security needs for the building planners.
Accompanying the planning including preparation technical and electronic specifications and integrating them into the building's systems.
Characterizing the technical requirements for the security program,
Preparing the material for bid and rating the bidders.
Supervision during installation and run-in to receiving and acceptance.
Information Security – physical, logical and the human factor.
Mapping the organization's assets in the aspect of information categorization and level of risk.
A review of possible or exiting failures in the organization's information security.
Create a scale of priorities for handling the issues found.
Implement strengthening (failure correction) in the organization's systems.
Define procedures, policy and guidelines for the organization's information security.
Prepare an information security handbook and procedures according to the ISO 17799 standard for information security.
Ongoing monitoring of all information and knowledge security aspects.
Competitive intelligence and prevention of industrial.
Assessment and analysis of the data collected.
Setting, together with the customer, the objectives of the data gathering.
Planning the examination and setting a method for achieving the goal and the necessary information.
Supervising implementation
Defense of patents and information assets
Focusing on protecting the intelligent property in the organization and providing suitable basis for developing a new product as a patent.
Defining tools for registration and maintenance.
Supervision and field control on misuse/illegal use by competitive elements.
Employees, suppliers and customers integrity checks and supervision
Improving the quality and accuracy of the screening process of employees and trusted suppliers.
Complementary security check to human resource procedures existing for senior and junior job holders exposed to information and processes of high financial value.
Security checks for strategic suppliers with access to sensitive information and expensive assets of the organization.
Security and safety assurance during events.
Building risk surveys and characterizing the security and safety needs in the event.
Writing security/safety plans for the event including cooperation with the authorities and appropriate licensing for the event.
Characterize technological means for carrying out the event.
Training security personnel and attendants for the event.
Supervision of the event from the beginning to end.
Disaster and emergency mitigation management program.
Preparing the organization for coping with events such as:
Explosion, release or A.M of chemicals or similar events on the organization's facilities.
Threat or actual planting of explosives on the organization's facilities.
Extortion event directed at the organization.
Terrorist attack, bombing, shooting, hostages, taking control of a company site.
An event of financial that may cause damage to the organization.
Criminal event that threatens human life or the organization’s property.
A state of war that harms the organization’s functioning.
Natural disasters such as earthquake.
Prolonged communication failure due to sabotage or break.
Threats to contaminate or otherwise sabotage a product of the firm.
Actual contamination of a product (either incidental or intended).
Problems involving suppliers.
Training of employees and strategic suppliers
Physical security: Facility security, V.I.P. bodyguards, competitive
Intelligence, security and prevention of devaluation of the organization’s assets, personal security and preventive behavior.
Information Security: Training of strategic suppliers of the organization,
Who have interface to the organization’s information/products (customers).
Philosophy & Approach
Throughout our work we use approaches and methodologies that are based on several underlining principals:
Clear definition of what is essential vs. what is not.
Understanding that enterprise resources are limited and must be managed and optimized with regards to the desired risk profile.
Human capital is the base of all security endeavors.
Cumulative knowledge, experience and know-how are crucial for achieving best results.
Good security is based on detection, prevention, good preparation and the optimal response to events derived from both external threats and internal weaknesses.
Partnering and accompanying internal and external processes with relevant personnel
On-site examination, trainings and drills
Accompanying security personnel on duties
Examination of compliance with procedures during routine and emergencies.
Examination of compliance with procedures regarding information sharing between the various entities.
Assessment of staff familiarity with the various types of equipment and their effective operation.
Our Team
Our instructors are industry experts and top-level veterans of the Israeli Security. They actively participate in committees and meetings, at national and regional levels, regarding various security issues, crisis analysis and war games.
A.M experts in all kinds of security boundaries, specializing in qualifying & training security officers and security grads for the different tasks.
During their long service, the team established and conducted security operations in Israel and internationally, for private and national entities, and security of embassies and other institutions and critical infrastructure. A.M professionals have ample experience and knowledge in peripheral security of terminals and surrounding perimeter, gained from operations both in Israel and internationally.
Advantages of the company:
Expertise and specialization in hi-tech and low- tech companies
Expertise in both public and private organizations
A professional approach based on the economic aspects of industrial espionage and its prevention
Accumulated unique experience that answers a wide range of needs of customers.
Flexibility in approaching different types of clients’ needs while considering the human factor, working environment and technical systems.