Assessment Report
Get a Comprehensive Report with Unbiased Recommendations.
Sloan's Site Security Assessments offer a comprehensive analysis of your site's vulnerabilities and provide an unbiased recommendation for your physical security needs.
Executive Summary and Findings Report
We identify and explain vulnerabilities, risks, priorities, and justifications for making improvements. Vulnerability assessments can identify potential impact to your customers, supply-chain, your business, communities, and national security. Our process includes:
• Site visits, tours, and interviews
• In-depth review of industry and regulatory requirements
• In-depth review of policies, procedures, and operations
• Review of past, current, and emerging industry threats
Threat Vulnerability Assessment (TVA)
Our Threat Vulnerability Assessments (TVA) are designed to identify and mitigate potential risks to critical infrastructure, customers, operations, the community, and national security. By conducting comprehensive evaluations, we provide actionable insights to protect your assets against threats.
• Identifies security weaknesses and potential threats
• Assesses risks to personnel, operations, and community
• Provides recommendations for improving security
• Enhances preparedness against emerging threats
• Ensures compliance with standards and guidelines
Recommendations for Mitigating Risk
Our comprehensive risk mitigation recommendations cover both technical solutions and operational changes to enhance safety, security, and supply-chain resilience. We evaluate current technical solutions, presenting the pros and cons of each, while suggesting operational improvements that positively impact business safety.
• Access control, surveillance, detection, asset tracking
• Screening, security policies, and emergency planning
• Resilience, disaster recovery and contingency planning
Budget Development
for Solutions
We provide comprehensive budget development for security solution implementations, covering material costs, design-assistance hours, and installation. Our team tailors solutions to your budgetary constraints or offers phased implementation plans to ensure cost-effective deployment.
• Detailed estimates for material, labor, installation
• Custom solutions based on budget constraints
• Phased implementation to manage costs over time
• Design-assistance to optimize cost-efficiency
• Align security goals with financial resources
Regulatory Compliance
The assessment ensures your site follows important regulations and standards, lowering the risk of penalties for non-compliance.
Enhanced Security Planning
Get helpful information from our findings report that will help you make smart decisions about security investments and operational changes.
Tailored Security Solutions
Get unbiased recommendations tailored to your needs and threats, so you can put in place effective security measures for your site.
Contact Us
Request a Quote for a Security Assessment
Send us a message and we'll respond within 1 business day (No Obligation)
Security Assessment FAQs
Why do I need an assessment?
A Sloan perimeter security assessment can identify gaps or weaknesses in your current security setup. It provides an unbiased review of existing measures and offers recommendations for improvements, ensuring your site is well-protected against evolving threats and vulnerabilities.
What types of threats does the assessment address?
The assessment covers a wide range of threats, including physical security breaches, operational disruptions, supply-chain vulnerabilities, and emerging threats. We provide recommendations for access control, surveillance, emergency planning, and disaster recovery to mitigate these risks.
How can the assessment help my business comply with industry regulations?
Sloan's assessments include a thorough review of industry standards and regulatory requirements. We help ensure your site is compliant with applicable regulations, reducing the risk of penalties and enhancing your organization’s credibility.
What kind of report will I receive after the assessment?
You will receive a comprehensive report that includes an executive summary, detailed findings, identified vulnerabilities, and recommendations for improving security. The report is designed to be actionable, offering both technical and operational solutions.
How long does the assessment process take?
The duration varies depending on the complexity of the site and the scope of the assessment. Typically, the process takes a few days to a few weeks, including the on-site visit, data review, and preparation of the final findings report.
What are the key benefits of a Threat Vulnerability Assessment (TVA)?
A Threat Vulnerability Assessment (TVA) identifies security weaknesses, assesses risks to personnel, operations, and the community, and provides recommendations for mitigating threats. It helps improve preparedness, ensures regulatory compliance, and enhances your site’s overall security.
What is included in a Perimeter Security Assessment?
A Perimeter Security Assessment with Sloan includes a thorough site visit, analysis of security policies and procedures, evaluation of past and current threats, and a detailed findings report. Our team reviews industry regulations and offers actionable recommendations to improve security posture.
Videos
What Are The Biggest Security Design Mistakes?
Chief Sales Officer (CSO), Collin Sloan talks about the biggest mistakes he sees in perimeter security design and how that allows vulnerability to threats and safety concerns.