Laserfiche WebLink
<br /> <br /> <br />sales@tncg.com CONSULTING MADE PERSONAL PAGE 25 OF 57 <br /> <br />In addition to the Human Factor (People, organizational structure, <br />policies/procedures, emergency preparedness, etc.), the assessment <br />will include the current state assessment of physical security measures <br />and electronic security systems, monitoring, and video surveillance. <br />TNCG will review these current state systems and capacities related to <br />industry standards, best practices, and the threat environment. <br />The Consultant's proposed services include a pre-assessment, <br />stakeholder interviews, identification of overall security goals and <br />objectives, on-site field assessment for the facilities identified in the RFP, <br />threat assessment, and final deliverable, a comprehensive security <br />assessment and feasibility report with findings, recommendations, <br />priorities (based on risk reduction), probable cost estimates and cost- <br />benefit analysis based on risk reduction in response to threats. <br />These professional services will be performed for a stipulated sum fee <br />based on the project scope and the technology systems and services <br />outlined below. <br />Process and Project Organization <br />TNCG believes we have created a unique, holistic <br />approach to security and risk mitigation <br />professional services. We believe three key <br />areas have a direct impact on the quality and <br />success of a security program. The three areas <br />are Technology, Human Factor, and Physical <br />Security. Each of these areas is interrelated, <br />and addressing only one of these areas does <br />not create a complete solution. We continually <br />stay updated with the evolving security needs for critical infrastructure, <br />mass transit, technology, and current Department of Homeland Security <br />(DHS) standards. <br />Security Technology has improved dramatically to help security and law <br />enforcement professionals observe and secure more areas and spaces <br />efficiently and effectively. The ability to leverage existing technology <br />infrastructure has dramatically improved security at more effective <br />costs.