CAPABILITY STATEMENT

Landmark Physical Security Services, LLC is a small, independently minority & veteran owned and operated consulting firm, headquartered in Edgewood, Maryland. Landmark Physical Security Services, LLC focuses on providing state-of-the-art and comprehensive protection solutions for government, non-government (NGOs) and commercial clients. We can also mobilize the right people, skills and technologies to help organizations improve their physical security posture. As a Small Disadvantaged Business (SDB), with MDOT MBE and Veteran-Owned certifications, Landmark Physical Security Services, LLC is committed to creating innovative, flexible solutions for government and commercial clients.

CPP.png
VOSB_edited.jpg
MDOT_edited_edited.jpg

STRATEGY FOR THE PROTECTION OF ASSETS

Landmark Physical Security Services, LLC uses a 5 (five) step Composite Risk Assessment Process to determine the minimum level of protection needed to safeguard resources adequately and economically.

This process provides a systematic approach to acquiring and analyzing the information necessary to guide decision makers in the protection of assets and operations and the allocation of security resources.

 

This process integrates risk analysis techniques designed to help clients–whether corporate leadership, security managers, analysts, or technicians to perform their planning, implementation, and evaluation of risk-based security strategies for existing or for future business endeavors.

 

Landmark Physical Security Services, LLC frames risk analyses and vulnerability assessments from an all hazards approach–natural, man-made, and technological–and the full range of inclusive incidents.  From these vulnerability assessments, Landmark can develop a Design Basis Threat (DBT) to protect the type, composition, and capabilities of potential adversaries/hazards.

The DBT outlines the set of adversary/hazard characteristics for which the operators and organizations together have protection responsibility and accountability.

HAZARD/THREAT MITIGATION & CONTROL

 

Elimination: Eliminating the hazardous/threatening condition-physically removing it, is the most effective hazard control.

 

Substitution: The second most effective hazard control, involves replacing something that produces a hazardous/threatening condition (similar to elimination) with something that does not produce such a hazard.

 

Engineered controls: The third most effective means of controlling hazards/threats is engineered controls. These controls do not eliminate hazards, but rather isolates assets from hazardous/threatening conditions.

 

Administrative controls: Administrative controls are changes to the way (policies, practices and procedures) things are done. Administrative controls do not remove hazards/threats, but limits or prevent assets’ exposure to hazardous/threatening conditions.

ASSESSMENT PROCESS

During the assessment, all aspects of your protection program are examined, any weaknesses are identified, and suggestions for security improvements are made. In addition, opportunities where costs can be reduced or where security/emergency operations can be made more efficient are also identified.

 

The Protection Assessment process used by is constantly evolving, allowing us to take advantage of lessons learned from previous assessments, and to keep up with the latest security best practices.

 

The Protection Assessment is custom tailored for each project, but typically includes the following tasks:

  • Risk identification and analysis

  • Threat and vulnerability assessment

  • Review of site and facility security management

  • Review preparedness, mitigation, response, and recovery plans

  • Data Analysis

  • Site Survey/Inspection

  • Review Compliance with recognized principals

  • Review of degree of compliance with requirements that are specific to your industry

  • Review of facility operating procedures

  • Review of physical security systems

  • Review of electronic security systems

  • Review of architectural security

  • Review of policies and procedures

  • Develop, design, evaluate response exercises