Frequently Asked Questions

Answers To Your Questions About Physical Security From The Experts At BPS.

Security Assessments

Refer to blog article, Security Risk Assessment VS. Security Audit – Is there a Difference?

Data collection and planning are the first steps, this usually takes 2-3 weeks. Field work depending on the size of a single facility can be 2-4 days. Draft reports are typically issued within 2-3 weeks of completing the field work.

Typically 6-8 weeks.

Security System Design

“Independent” means no conflict of interest and not beholden to a limited solution set. While there is a fee for a consultant, recommendations will fit your needs and budget, not what the vendor is pushing at the time. Vendors are perceived to be “free,” but they build their costs in as “engineering fees.”

No this is false. Vendor proposals typically carry design and engineering charges, so to preserve the independence and objectivity, it may be better to allocate those design funds to an independent professional.

Yes, it is very likely that engaging an independent professional can lower the cost of your project. In the most extreme case in our company history, we were able to save a client over $300,000 on a single project

Regulatory Compliance

We have been told that if our auditors are happy, the clients will never have a problem satisfying the regulators.

Notices of violations can be very expensive and damaging to a company’s reputation. BPS is experienced with regulatory audits and in one case helped a company to avoid a multi-million dollar exposure for non-compliance. See our CFATS Audit

Security Planning

When serving in this strategic role, BPS is often engaged by companies who are growing fast and do not have an internal security professional. By utilizing BPS to create the global physical security program, it becomes a lot easier to recruit a security director who can come in and operate inside a mature program rather than have to try and operate and develop at the same time.

BPS builds on existing organizational policies and protocols (e.g., workplace violence prevention and cyber security) to establish a physical security policy, security management system, guidelines, procedures, job aids, training, performance metrics and audit tools to enable a company to establish and continuously improve their physical security and risk management programs.

It usually takes a full twelve month cycle to develop and deploy all of the necessary tools and training to get a good security program started.

Security Training

Many companies operate with a part-time security coordinator who is typically wearing multiple hats. One of the major gaps we close is training part-time security coordinators and building their competency to be effective physical security leaders.

BPS is in the business of helping our clients prevent security incidents. A security aware workforce is a vital element to incident prevention. Security awareness has to go beyond a hollow “see something say something” motto.

Workplace Violence Prevention

No. That is training from one end of the workplace violence continuum. It is equally, if not more, important to train your staff to recognize and report persons of concern that may be exhibiting common pre-violence behaviors.

No. Workplace violence training should be repeated and varied to ensure employees do not switch off from seeing the same content over and over. There should also be a means to deliver short and effective training to employees that may not have access to a computer.

Need more information? The physical security experts at BPS are ready to find solutions to your unique security needs. Contact us today.