Enterprise Security Services & Operational Security Planning
At Harvard Protection Services, our model is focused on carefully evaluating all components of an enterprise in order to design and implement a customized operational security plan. Our “as is” reviews examine policies and procedures, existing security staffing, emergency communications, and physical security elements. Our protective intelligence analysis evaluates all possible sources of threats – both internal and external. Threat and information sharing with law enforcement and public safety partners are emphasized as a necessity for proactive security planning. Harvard’s thorough enterprise assessment provides clients with customized findings, analyses, and action items to inform such critical operations as guard force staffing requirements, site security measures, emergency preparedness, and business continuity protocols.
Our Operational Philosophy
- Comprehensive Facility Assessments: Using proven standards to assess, benchmark, and recommend strategic solutions for enterprise force protection; and operational security management for facilities, key assets and critical infrastructure
- Proactive Incident Command and Control: Proactively employing appropriate incident command policies, procedures, and technical platforms to de-conflict roles and responsibilities during a crisis or emergency situation. Providing the assurance that operational security and emergency preparedness are complementary processes to ensure maximum protection across each client’s enterprise.
- Protective Intelligence Analysis: Applying analytic, investigative and behavioral tools to connect information and link data that may be suggestive of a threat or risk. Conducting case studies and operations research to identify trends and patterns that are associated with high risk behaviors, violence, and other security vulnerabilities. Establishing protective intelligence vigilance to proactively mitigate risks.
- Operational Security Planning: Designing client and enterprise specific operational security requirements that are informed by the enterprise evaluation process. Merging critical components to facilitate the continuity of operations, and subsequently, business. Developing and implementing comprehensive, preventative operational security plans that are proactive versus reactive, thereby reducing the vulnerabilities that challenge an enterprise.