Digital Investigations

Conducting internal and external investigations can be essential to your company’s information, integrity, and products. We approach this process both digitally (investigation of any electronic footprint related to the case) and physically (including technical exploration and surveillance).

Open Source Intelligence (OSINT)
We collect the wide stream of information accessible in publicly available and unclassified resources regarding a specific case and analyze it. The knowledge obtained can be used to prevent, deter, or uncover suspicious activities or security breaches. We perform vetting of applicants, brand protection, screening of digital footprint, and background checks.

Due Diligence
We gather information to equip your company with crucial knowledge before making significant business decisions. We perform investigations regarding cooperate takeover, security risks, security investigation of employees, security assessments of the company and employees, external partners, and external suppliers.

Close Protection
We ensure the safety of an individual in a given timeframe and/or location upon agreement. Our support can apply as well to travel security advice (planning and assessment), close protection via app., and close protection transport.

Specialized Guard Service
Specialized trained guards for protection of valuables and special events.

Surveillance
Our high-end fixed, mobile and perimeter surveillance technologies have a wide range of benefits for observing and monitoring internal and external infrastructures. Our in-depth knowledge and experience in the Mobile Surveillance arena provides detailed observation of societal behavior and control. Perimeter Surveillance guards against outer-limit breaches, unwanted intrusion, object detection and characteristical classification.

Access Control & Intrusion System
Protect your employees by providing a safe working environment. Control all access, restrict unauthorized access, and reduce the likelihood of thefts. Set up time schedules for employees, short-term access for visitors and external staff, or restrict certain areas. Control technical installations through the access control system or get system status back for alarm management.