Robert "R.J." Hope, CPP, ABCP
Department Manager, Global Security Services
Email Robert "R.J."
P: 816-349-6754
F: 816-822-3424

Measuring, Monitoring, Implementing<br>Physical Security Strategies

Measuring, Monitoring, Implementing
Physical Security Strategies

To survive in the global economy, you must identify the real threats to your business, the risk they pose and your vulnerability to them. You have to consider whether the threats are posed by home-grown terrorists, extreme fundamentalists, employees and/or contractors targeting your business.

Your senior leadership needs to have confidence that security measures are in place to protect employees, preserve critical assets and enable continued growth.

The Burns & McDonnell team of security professionals helps you apply proven methodologies to identify threats, evaluate your risks and mitigate these risks through sound security principles.

Our application of "protection in depth" strategies of deter, detect, deny and respond develops concentric layers of physical security to protect from all types of threats.

Monitoring Security Efforts

Burns & McDonnell security consultants can design security operations centers (SOCs) that professionally monitor all your security initiatives. These SOCs include operational procedures that include orders for subcontracted personnel. SOCs also are vital for recordkeeping related to any security incident in or around your facility, allowing you to use historical data to continuously track and update your programs. Radio frequency identification, or RFID, may also be implemented to track people and assets in order to prevent loss.

Our professionally trained, certified and up-to-date team of security consultants is prepared to offer solutions customized to your security needs, based on your threats, risks and vulnerabilities.

  • Crime Prevention Through Environmental Design, or CPTED, for perimeter and exterior protection
  • Integrated security systems for access control and closed-circuit television, or CCTV, for monitoring access points
  • Intrusion detection systems that alert you of a compromise
  • Policies and procedures that identify roles and responsibilities