Many security consulting firms focus solely on electronic security system solutions. Hughes Associates takes a holistic approach to security in which all security elements fit together in a harmonious, proactive, and cost effective whole. Hughes Associates security designs involve a "concentric layers of protection" approach. Its evaluations explore the interior and exterior built environment from a CPTED perspective. Also considered are site perimeter, access points, core asset distribution, physical security, electronic security, key control, guard force management, workplace violence, executive protection, policies, procedures, training and more. To work effectively, these diverse elements must function like one to form a comprehensive security program. This holistic approach to security explores facility design options first and only then looks at electronic security solutions to supplement a good security design.
Crime Prevention Through Environmental Design (CPTED)
Hughes Associates is an established leader in CPTED evaluations. CPTED is based on the principle that behavior, both normal and abnormal, is heavily influenced by the natural and built environments. Appropriate changes made to a company's environment can make staff members feel safe and secure while providing a powerful deterrent to intruders. Those same changes can also increase productivity and profitability. CPTED seeks natural alterations to the environment that help to control access, improve area surveillance, and convey a strong sense of ownership and control. Hughes Associates utilizes this powerful tool as a starting point in the development of a dynamic security program.
Security Needs Assessments
Hughes Associates' Security Needs Assessments examine current security conditions, existing security system's design, along with the strengths and weaknesses of the overall security program. The resulting report will summarize all findings and provide recommendations to enhance existing security principles and practices. Questionnaire formats are commonly used in this process to assess employee perceptions of security in their workplace. Survey findings are detailed and recommendations ranked according to priority and urgency. Associated cost estimates are provided where required. Hughes Associates also conducts validation and acceptance studies that address system and program designs, including the use of Crime Prevention Through Environmental Design (CPTED) techniques.
Emergency planning, crisis management, and business continuity planning are critical to the survival of any business. Hughes Associates has helped many corporations prepare seamless response strategies to safeguard life and property from a variety of potential threats. HAI's evaluation process increases company survivability and reduce vulnerability by reviewing and developing: emergency policies and practices, emergency equipment, partnerships, response teams, training, and program audits. Areas of focus include fire/life safety, flood, earthquake, pandemic, bomb threats, terrorism, workplace violence, and other areas of organizational risk.
Security Related Training
Hughes Associates specializes in developing a cost effective blend of security systems, technologies, plans, policies and procedures that help organizations deal effectively with current or anticipated threats. These initiatives have little value if staff behavior is not appropriate to the threat and fully integrated with existing countermeasures. Hughes Associates is a leader in developing effective customized training programs on a variety of topics including security awareness, workplace violence, security force development, emergency response programs and more. Quality training is the cornerstone of loss prevention and the creation of a safe and secure workplace.
Policy & Procedure Development
Hughes Associates evaluates existing security policies and procedures to guide the development of new improved documents that remain consistent with organizational mission, values, and objectives. Policy and procedural development includes an analysis of security programs from an administrative and operational perspective. Their evaluation explores physical and personnel security issues and operational practices. It can be used as a basis for evaluating the existing security program for consistency with organizational goals and best business practices.
The greatest risk to corporate assets often involves theft and asset diversion. Hughes Associates' security consultants can minimize that risk by evaluating current practices along with the effectiveness of operational policies and procedures that relate to the inventory control and management of assets. Consultants identify and address security system and program deficiencies to develop and promote sound security standards and practices. A detailed report describes audit results and recommendations for correction.
Security Master Planning
Hughes Associates' team of security professionals reduces the potential for waste and redundancy through the development of security master plans. This process evaluates short and long term planning requirements that relate to facility infrastructure, policies, procedures, security operations, and existing security systems. Once complete, this plan ensures that short-term plans and changes including security systems design and equipment acquisitions integrate fully with future long-term plans and growth requirements.
Company performance often rests on the shoulders of its executives and key knowledge workers. Losing their services can cripple day-to-day operations and profitability. The fast pace and rapid change of corporations involved in a global economy can multiply the risks faced by critical personnel. Workplace violence, international travel, and kidnapping are just a few of the threats that a company can encounter. Hughes Associates provides consulting resources to keep executives and at-risk individuals out of harm's way. This includes evaluations of corporate vulnerability, along with the development of training, policies, procedures, and countermeasures to mitigate these risks. Hughes Associates also investigates and analyzes specific threats and develops response options to effectively mitigate them.