We service our clients best, when we serve our employees first.

  • 40 Shrewsbury Ave
  • Red Bank, NJ 07701
  • 1.800.874.6434

USI Security Tips

How Your Business Can Benefit From an On-Site Evaluation

November 01, 2019

The best way to ensure that your building, assets, and employees are safe is by having a professional security officer perform an on-site evaluation. This on-site security assessment is a formal examination of your facilities overall security program. This in-depth look allows security experts to identify any potential weaknesses and find opportunities to make security operations more efficient. Although our on-site evaluations are custom-tailored for each specific project, a typical USI evaluation will include the following:


Depositphotos_76066841_l-2015-min (1)


Risk Identification and Analysis

For this part of the on-site evaluation, the security officer will inspect your business and security operations for potential security risks. Even if your company has previously completed a risk analysis, it is important to reassess your security concerns. The team who originally conducted the risk assessment may not have adequate training, and since security risks can change overtime risk identification and analysis should be done at least once a year.

Threat and Vulnerability Assessment

The goal of this assessment is to determine if there are any key vulnerable assets or sensitive processes that require additional protection. These assets can include employees, visitors, contractors, equipment, computer systems, and confidential business and employee information. Security officers will look for any weaknesses in asset protection that could be exploited and come up with an action plan to bolster your security operations.

Review of Site and Facility Security

A review of your site and facility security is also performed to assess your buildings physical security. Security officers will check a wide variety of security measures such as whether or not you have appropriate perimeter protection, physical barriers to limit vehicle access to the building, penetration resistance, security hinges, proper hardware, break/blast-resistant glass, perimeter alarms, and security cameras.

Examination of How Your Business Runs

In order to provide optimal coverage, USI security professionals will ask a series of questions to determine how exactly your facility/business operates. This discussion will give the security officer some insight into how your management policies are impacting your security operations.

Analysis of Crime Data

An analysis of local crime data is performed to determine if there are any neighborhood operations, building tenants, or location risk factors present that could contribute to increased security threats. This analysis usually includes loss history, police calls for service, crime statistics, and crime forecast reports.

USI Security | Security Officer Staffing

For the past 27 years, USI has created safe, secure environments for commercial and government employees and customers by investing in our people, innovation and relationships. As engaged owner-operators, our investment begins with recruitment and screening to ensure we have the right people and continues through our policies and practices that enable USI to properly prepare and retain the best personnel. Our security officers receive extensive on-site training specific to their assignment. This way they familiarize themselves with all of the specific duties and responsibilities required before even setting foot on your premises.

USI is engaged in supporting your security and business by developing customized security solutions that support your objectives while cost-effectively minimizing risk. Clients receive continuous support from a highly responsive team of professionals including owners, management, field supervisors and officers. Our commitment to quality includes field inspections and audits, as well as investments in innovative solutions for continuous training and compliance.

New Call-to-action

Recent Posts

Security Risk Assessment