Our security solutions are focused on safeguarding your employees, property, information and assets by managing and mitigating security risks. This is the essence of corporate security in today’s unsettled times.
Highly trained security officers dedicated to keeping your organization safe.
Since 2000, we have provided physical security tailored to ensuring the protection of our clients and their assets. Our physical security experience ranges from deploying officers onto various corporate and field sites, protecting executives, dignitaries and VIP’s, and use of our rovers across the country. Our armed and unarmed officers are the backbone of our company. Through the leadership of our state directors, the background and experience of our personnel, and the training they receive, our personnel have set us a part in the security industry.
Physical Security Services
- Corporate Security
- Security and Site Assessments
- Critical Incidents
- VIP and Executive Protection
- Armed and Unarmed Security
- Roving Patrols
- Roving Security Officer
- Site Compliance Officer
- Perimeter patrols
- Site-hop patrols
- Significant asset protect
- Workplace Violence Education
- K-9 Services
At our corporate buildings we strive to partner with the tenants to put forward a friendly face that can also serve as a buffer between you and facility problems. Whether it is establishing patrols of the building, escorting vendors who are on site, or working with law enforcement during an incident, TriCorps will provide your employees with a peace of mind.
Security and Site Assessments
Site assessments consist of a review of your access controls, video surveillance capabilities, facility layout, and current security policies and procedures. Upon completion of the inspections, TriCorps will provide a comprehensive review of your current security status, and if needed, offer recommendations for improvements.
We have responded to numerous incidents throughout the United States, including several natural disasters such as Hurricanes Katrina, Ivan, and Ike. Whether it be a natural disaster or an intentional act, TriCorps can rapidly respond with a comprehensive plan and force tailored for your situation.
Throughout the years, we have conducted countless large scale operations that have reduced our clients’ exposure in sensitive situations. With an understanding that critical incidents require rapid response and experienced problem solving, TriCorps has helped numerous corporations and government agencies recover from times of crisis.
Screening your employees is an important part of the employment process. TriCorps can perform screenings of individuals seeking employment, volunteers, or outside vendors that will be working closely with your company. Our comprehensive screenings include all available search databases, such as criminal records, warrants, tax liens, and bankruptcies.
Whether it is an important meeting, a leak to the press, or some internal strife, counterintelligence measures can be needed. TriCorps can run electronic and debugging sweeps of your meeting rooms, offices, or facilities. Have the peace of confidence that your information is safe.
Counterintelligence measures can be crucial for highly sensitive meetings, avoiding information leaks to the media, and mitigating risks that arise from internal dissatisfaction. TriCorps can run electronic and debugging sweeps of your meeting rooms, offices, or facilities. These services provide a peace of mind and confidence that your information is secure.
When other measures don’t work, it’s sometimes necessary to take covert action. By utilizing covert cameras, private investigators or both, TriCorps can help with obtaining information and evidence as needed.
While no business expects their personnel to steal from them, employee theft is becoming more and more common. TriCorps can provide surveillance, conduct interviews, perform audits to prevent and/or identify internal theft and misconduct.
Whether you need financial, electronic, or cyber audits, TriCorps Security has the personnel to perform these services.
VIP and Executive Protection
With many years of experience protecting elected officials and executives of Fortune 500 companies, we take active interest in providing discreet personal protection. Be it political or diplomatic figures, corporate executives, professional athletes or celebrities, TriCorps Security will provide an elite protection team locally or internationally.
Armed and Unarmed Security
Depending on your needs, we provide unarmed officers, armed officers, or commissioned armed officers. All personnel are trained and licensed to meet the requirements of the state in which they are providing services. Unlike most security firms, our personnel are hired as employees, ensuring we’re able to provide a consistent standard across the country.
By using a roving patrol, clients with many sites in a regional area ensure that the visibility of a Roving Patrol wards off potential theft. We’ve successfully deployed roving patrols across the nation in rural to urban environments. Our rovers can perform a wide range of tasks that will ensure your sites are secured in cases where physical site security isn’t necessary or is cost prohibitive.
Roles we’ve deployed in the field include, but are not limited to:
Workplace Violence Education
These classes place a focus on active shooters, workplace violence, de-escalation techniques, and can even use hands-on training. TriCorps experts have presented hands-on training to both large and small groups. Our trainer’sextensive knowledge and skills allows us to tailor our presentation to meet the needs of your team.
We specialize in the detection and identification of illegal and illicit contraband by using fully certified service dogs and drug recognition experts. We’ve applied these assets in commercial, educational, industrial, law enforcement, residential, and special event settings.
TriCorps has developed a robust electronic security program to stop crime in its tracks.
TriCorps provides turn-key commercial and residential security solutions to meet our client’s needs, including high-definition cameras, access control systems, intrusion detection systems and GPS trackers. Additionally, all services are monitored in TriCorps’ state-of-the-art Command Monitoring Center. This hardened facility is staffed 24/7/365 by trained professional operators and technical specialists. TriCorps’ Command Monitoring Center is equipped with advanced equipment and technology.
TriCorps Command Monitoring Center
- Staffed 24/7/365
- Intrusion Alarm Monitoring
- Video Verification
- Video-Based Alarm Monitoring
- Virtual Guard Tours
- Virtual Escorts
- Audio Intervention (Talk-Down)
- Remote Access Control
- Unattended Delivery Notifications
- GPS Panic Alarms
Security System Integration
TriCorps’ staff of experienced, licensed technicians offer customized, turn-key electronic security solutions, both commercial and residential:
- High Definition Cameras
- Advanced Video Analytics
- Security Management Systems
- Access Control Systems
- Intrusion Detection Systems
- Laser Scan Detectors
- Solar-based Camera and Access Control Solutions
- Visitor Management Solutions
- Remote Gate Access
Electronic Security Services
- Remote Gate Access
- Intelligence Services
- Cyber Intel Monitoring
- Social Media Monitoring
- Geo-Fence Monitoring
- Executive Travel Services
- Deliverable Intel Reports
- Global Actionable Alerts
- Client PIR Alerts
- Intelligence Briefings
- Special Intelligence Requests
- Background Checks
Remote Gate Access
If you have sites that require controlled access and/or monitoring, our team of installers can customize gate access for your location’s requirements. We offer solar or AC power options for gate openers, cameras and access control. When combined with the Command Center, we offer multiple options to control ingress and egress to your properties, including the ability for you to access live or stored video from any web-enable device.
Drawing on tactical and strategic experience and coordinated from the TriCorps’ Command Center, we produce Actionable Intelligence, mitigating the risks posed by trans-continental crime, domestic terrorism, and disruptive activism. This includes guidance to combat supply chain crime, eco-terrorism, narco-terrorism, “home-grown” jihad, violent racists, destructive anarchists, and other threats targeting critical infrastructures and key resources.Int
Cyber Intel Monitoring
Cyber Threat Intelligence Reports evaluates tactics, techniques, and procedures of cyber threats and cyber actors to provide the client with detailed analysis of the cyber threats facing them. Our reporting analysis all the available data, even pulling from the Dark Web to identify the client’s exposure.
Social Media Monitoring
Our comprehensive model for monitoring and analyzing online sentiment provides you with an in-depth review of pertinent online communications. Online sentiment is classified in three categories: Positive, Neutral, and Negative and Pulse Indicators classify communications that indicate campaigns or calls to action against the client.
Geo-fencing technology allows our software to track social and physical activity within a certain distance from an incident, place of interest, or asset the client has requested be targeted.
Executive Travel Services
Our Executive Travel Alerts provide a customized real-time and advance intelligence service which provides safety and security of mind for travel and international events. Triggered by a notification from a client, our group sets up 24/7 tactical intelligence coverage based off the itinerary and location parameters provided. This service includes intelligence briefings before the scheduled travel, real-time intelligence alerts, incident mapping, and coordination with local security assets when necessary
Deliverable Intel Reports
A powerful blend of law-enforcement experts and technologists proactively working to keep your digital assets secure.
In order to help organizations defend themselves from a growing amount of cyber threats, we have blended the talents of our law enforcement and technology experts to provide organizations with cybersecurity solutions that are unmatched in the industry. Through our employee training, testing, internal and external assessments we can identify the gaps within your organization and create strategic plans to get your company on the right track. Through our governance consulting, forensics and investigations, and remediation planning we can ensure that when a security incident does occur, we can equip your organization with the tools needed to recover successfully.
- Employee Training
- The history of hacking and cyber crime
- Who are the digital criminals?
- What are their attack vectors?
- What are the consequences?
- How to protect yourselves personally?
- How best to protect the organization?
- What the tools are that anyone can use to help them be safer online?
- External Assessments
- Internal Assessments
- Forensics and Incident Management
- Governance Consulting
- Network Vulnerability Monitoring
- Remediation Planning
- Employee Testing
- Information Security Officer Coaching
We offer cybersecurity training that can be delivered to allof your employees. Courses can be customized to your organization so that they are focused on your industry specifically, and to the level of participants in the training. Our course delivers information and education meant keep your organization safe from security attacks. Your staff will learn the following:
We offer our training in both instructor led and eLearning formats. Instructor led can be delivered in two, three or four-hour sessions. Instructor led training can be done at the client’s facilities, or at TriCorps. The eLearning module is a four-hour program that is broken up into chapters that can be taken in smaller pieces at a time
Consists of Penetration Testing, Firewall and Security Device operation and configuration review, System Change Management appraisal, Public Facing Access evaluation, and more. The most common, Penetration Testing, is an examination of your network perimeter that will look for security weaknesses that an attacker could potentially exploit to gain access to internal systems and data. This service is typically done without involvement of your IT or security people and without letting them know the exact timing of the assessment.
The results are delivered in a detailed report and an executive level presentation so that a remediation plan can be developed.
Internal Assessments consists of reviewing, assessing, and reporting on aspects within your digital domain such as Access controls, Malware, Physical Security, Wireless and Mobile, Change Management, Patch/Update Management, Remote Access, Backups and Disaster Recovery, and more. These can be customized and configured to focus more or less on specific aspects of your security, or can follow our default system.
We provide two flavors of audits, a formal process that is normally required by a board of directors, or an assessment which is much like an audit but is performed in collaboration with your IT staff. In either case, the results are delivered in a detailed report and an executive level presentation given to the group of your choice.
Forensics and Incident Management
At times, you may need help reacting to a breach or a potential internal employee issue that has already occurred. In those unfortunate instances, we offer services that uncover and identify where, how, and via whom the breach occurred. We can also help coordinate the various skills needed to recover from an incident in the most efficient and safe way. This includes both attacks from the outside, or internal employee issues that might arise from stolen data or vandalized software systems. Forensics include indexing and exploring laptops and desktop computers, and exploring email archives and server logs in order to uncover possible criminal activities.
We also have the capabilities to do interviews with employees, or ex-employees in order to gain information about potential breaches. This includes lie detection services when appropriate. All of our forensic and incident management services adhere to chain of evidence standards for possible legal action that could arise.
It is often wise to have a third party do this type of work because you can never be sure about who might be involved in internal issues or outside attacks. There is also potential legal benefits to having a professional company handling internal employee issues on your behalf.
Our cybersecurity governance experts will evaluate your current state, and then help you put in place an improved set of processes, rules and systems to correctly make decisions that will protect your company from unwanted cyber threat. This includes helping you develop practices, procedures, protocols, conduct, and clarification around your written governance plan. In order to stabilize your online risks to a level that is acceptable, the proper amount of governance must be in place and be followed. This is a general area of weakness today in many organizations.
Network Vulnerability Monitoring
TriCorps also offers a new critical service that constantly checks your network perimeter to validate that no new weaknesses have been identified, changes or oversights have occurred, or patches have failed to be applied. Any of these would immediately leave you vulnerable to attack or breach. If scanning uncovers any weakness or change, we immediately alert your staff that a problem exists and give them our recommendation as to how to go about closing and securing the vulnerability. This service is subscription based so that clients only pay a small fee monthly for this protection.
This service often follows the completion of an audit or assessment. We can assist you in devising a detailed plan that ensures that all problems or exceptions uncovered in our assessments are addressed quickly, effectively, correctly, and thoroughly. We can also help you develop a plan based on an informal review that can be done in collaboration with your team, or through an audit that was done by another firm. As part of this remediation, we can verify that the stated action items for improvement are indeed completed so that your board, or executive can bring closure to the audit/assessment.
This form of testing includes our staff attempting to manipulate your employees into providing us information or access to your network. We can use a number of various attack vectors depending on how our clients want to configure the testing. Potential vectors include phishing emails, spear phishing emails, reprogrammed/booby-trapped USB drives, and social engineering tactics both over the phone, or onsite. These techniques model the most popular ways that digital criminals use to infiltrate your systems. Only by testing your staff and showing them where they are vulnerable to coercion will they learn to be more careful. This testing is normally done randomly over a specific window of time with the results being shared with leadership along the way. The testing can be customized to test a specific group, or can be random across the organization. Our clients choose how many points of testing they would like done, and what types of vectors they want tested in each round. Results are provided on a scorecard so that proper actions can be taken.
Information Security Officer Coaching
TriCorps has years of experience with identifying and onboarding qualified security personnel. We work with your HR staff to provide the specific expertise they may not have in hiring for these cybersecurity positions. We can also help with the onboarding of security staff members during their first 100 days so that they quickly get up to speed on the governance polices and security risk goals.
We can also provide coaching services to help mature a team member who is new to cybersecurity and just needs some help learning the skills needed to be a professional in this field.