Aggleton & Associates approach to your project depends on your organization, environment, operations, corporate culture, and image. In all cases, A&A applies a proven methodology: we analyze your security needs and operational constraints before attempting to develop solutions. The first step in the process is to identify assets (people, information, equipment, production, intellectual property) and the threats against them.
We meet with client representatives to develop an in-depth understanding of your operations, security concerns, and constraints. Existing security programs (staff, systems, and procedures) are reviewed and a vulnerability assessment is made. Once the collected data is analyzed, we are ready to make recommendations, supported by capital and recurring cost estimates, to mitigate vulnerabilities and reduce liability.
Deliverables include concise reports and presentations that are objective, focused, and professional. If solutions include the application of security technology, we use the approved recommendations as the basis for the development of security systems design and construction documents.
Our industry experience assists you in the selection of qualified contractors and in administering the implementation.
“I had, ” said Sherlock Holmes, “come to an erroneous conclusion, which shows, my dear Watson, how dangerous it always is to reason from insufficient data.”
– Excerpt from The Adventure of the Speckled Band by Sir Arthur Conan Doyle