Est. 2026
— GMT | UTC
Private Security Advisory

Security advisory.
Drawn from operational practice.

A private security advisory practice. Assessment, protocol development, and considered counsel for private and institutional needs. Specialist work and physical installation are referred to the network when scoped that way.

Red Team Assessment Protocol Development Physical Security Advisory Personnel Vetting Executive Protection OPSEC Review Armed Security Advisory Training & Exercises Installation Oversight Threat Assessment Red Team Assessment Protocol Development Physical Security Advisory Personnel Vetting Executive Protection OPSEC Review Armed Security Advisory Training & Exercises Installation Oversight Threat Assessment
About

Judgment Before Method.

Vigilance is a small boutique advisory practice offering bespoke security counsel to private and institutional clients. Practitioners bring direct operational experience to the questions at hand — applied with the discipline that the work requires. Engagements are accepted nationwide and internationally.

There is no such thing as perfect security. What is achievable is a well-matched combination of instinct, intuition, systematization, and current methods and technology calibrated to a given context, threat environment, and organization. That combination is what the practice works toward.

The practice identifies vulnerabilities that matter, not compliance theater. Scopes are defined before any work begins. Outputs are written to be used.

Procurement

Equipment supply
by inquiry.

Procurement is offered alongside the advisory practice for clients who need supply of specified equipment. Categories and details by inquiry.

Buyers

The practice is actively engaging with buyers of professional and operational equipment. Inquiries from agencies, organizations, and qualified individuals are welcome. Sourcing structured by specification, volume, and timeline.

Vendors

Manufacturers, distributors, and craft producers — reach out with your product. American-made and allied-manufactured equipment of professional grade is of particular interest. Working relationships maintained across operational categories.

Services

Full-Spectrum Security Advisory

The practice is available to institutions, departments, companies, and individuals. All work is scoped by written commission after an initial assessment of your requirements, threat environment, and operating context. Pricing is subject to scope, practitioner availability, and demand.

Assessment

Red Team Assessment

Adversarial review of physical, procedural, and organizational security. The practice probes the defenses, identifies exploitable gaps, and delivers ranked findings to the principal.

  • Physical penetration and access control testing
  • Social engineering and human factor assessment
  • Procedural gap analysis and protocol review
  • Prioritized risk register with remediation guidance
Documentation

Security Protocol Development

Protocols often fail under pressure — too long, too ambiguous, or written for the file cabinet rather than the moment. The practice writes procedures that are short enough to remember and clear enough to execute.

  • Standing operating procedure development
  • Incident response and escalation frameworks
  • Crisis communication and lockdown protocols
  • Protocol testing and tabletop exercise support
Infrastructure

Physical Security Installation Advisory

Advisory on access control, surveillance, perimeter hardening, and alarm infrastructure. Specification and configuration counsel; installation is conducted by qualified vendors.

  • Access control specification and vendor oversight
  • Surveillance system placement and coverage review
  • Perimeter assessment and hardening recommendations
  • Integration review: systems that work together
Personnel

Personnel Vetting & Staffing Advisory

The best physical security fails when the wrong person sits behind it. Advisory on vetting frameworks for security personnel, executives, and contractors. Identification of candidates is conducted through the network.

  • Vetting framework design and screening standards
  • Candidate assessment and reference evaluation
  • Armed security staffing advisory and sourcing support
  • Vetting, screening, and fitness-for-duty guidance
Protection

Executive & Principal Protection Advisory

Protection begins before a visible threat materializes. Advisory on travel risk, threat assessment, advance work, and the selection of protective personnel.

  • Threat environment and risk assessment
  • Travel security planning and advance guidance
  • Protective detail structure and staffing advisory
  • Vendor and provider selection support
Information

Operational Security & OPSEC Review

Review of how the organization handles sensitive communications and critical information. Exposure points identified; remediation paths offered.

  • Information handling audit and classification review
  • Insider threat scenario modeling
  • Communications security assessment
  • Social engineering vulnerability analysis
Training

Training Plans & Tabletop Exercises

Plans only function if the people responsible have rehearsed them under realistic conditions. The practice designs training plans, develops tabletop exercises, and structures scenario-based rehearsals fitted to your threat environment. Delivery of certified training is referred to qualified instructors; the practice does not provide it directly.

  • Scenario development based on credible threat profiles
  • Tabletop exercises for leadership and operational teams
  • After-action review and protocol refinement
  • Emergency response and mass casualty preparedness
  • Hostile environment awareness for traveling executives and staff
  • Security staff training plan design
Technology

AI, Operational Technology & Systems Advisory

Independent advisory on AI tools in security operations and on the specification of operational technology, including drone systems for surveillance and perimeter monitoring. The practice advises on vendor evaluation; it does not sell or represent any system or supplier.

  • AI tools integration for security and operational workflows
  • Drone systems advisory — surveillance, perimeter, and field applications
  • Security technology specification and procurement process support
  • Operational technology risk review and integration assessment

Scope & Pricing. All engagements are bespoke and priced by scope, practitioner availability, and time. We do not publish a fee schedule. Engagements are available across a range of scales — clients are assessed on the nature and seriousness of their requirements, not the size of their budget. Begin with a short, candid introduction describing your situation and objectives.

Practice maintains networks for supply, procurement, and outfitting where engagements require it.

Approach

Field Experience.
Structured Deliverables.

The practice asks the right questions before offering answers, scopes work honestly, and delivers outputs concrete enough to act on. Reports designed to look impressive are not the product. Assessments designed to reduce risk are.

01 — Candor

Candid Assessment

Clients are told what the practice finds, including findings that are uncomfortable. Security advisory that avoids difficult conclusions is liability management theater.

02 — Scope

Written Scope

Every engagement begins with a written scope defining objectives, deliverables, access requirements, and timelines. Ambiguity is how security engagements fail.

03 — Delivery

Written for Use

Deliverables are written for practitioners and decision-makers. Findings are ranked by priority. Recommendations are specific.

04 — Discretion

Professional Confidentiality

Engagements are handled with strict confidentiality. Client relationships are not disclosed without consent.

05 — Fit

Selective Engagement

The practice works only on lawful matters and declines engagements that conflict with applicable law or professional standards.

06 — Continuity

Long-Term Availability

Available for follow-on engagements, protocol updates, and ongoing advisory beyond initial scope.

Process
Step One

Initial Contact

A short email describing the organization, the nature of the concern, and approximate timeline. General description is sufficient at first contact.

  • Reviewed for fit, legality, and practitioner availability
  • We respond with a frank assessment and proposed next step
  • All initial contact treated with professional discretion
Step Two

Scoping & Written Commission

If there is a credible fit, a written scope follows — objectives, deliverables, access requirements, confidentiality terms, timeline, and fee. No work begins without it.

  • Deliverable definitions — what you receive and when
  • Access and cooperation requirements
  • Confidentiality terms governing the engagement
  • Fee structure tied to scope and practitioner time
Contact

Begin a Confidential Inquiry

Complete the form. Sensitive details are not required at first contact — a general description is sufficient.

  • Type of organization and approximate scale
  • Nature of concern — general description is sufficient
  • Geographic context and timeline

If your matter is urgent, state that clearly in the subject line.

Contact
Consult
Procurement
For procurement inquiries, list items, quantity, indicative budget, and target unit price.

All services are advisory in nature unless otherwise specified in a written agreement. All engagements are conducted in accordance with applicable laws and regulatory requirements. We do not act as an agent, employer, or contracting party unless explicitly stated in writing. No specific outcomes or results are guaranteed; recommendations are based on professional judgment and available information. Specialists or contractors identified through our network operate as independent professionals unless otherwise specified. Information shared in the course of inquiry or engagement is handled with professional discretion in accordance with applicable privacy and data protection laws.

Vigilance International