A private security advisory practice. Assessment, protocol development, and considered counsel for private and institutional needs. Specialist work and physical installation are referred to the network when scoped that way.
Vigilance is a small boutique advisory practice offering bespoke security counsel to private and institutional clients. Practitioners bring direct operational experience to the questions at hand — applied with the discipline that the work requires. Engagements are accepted nationwide and internationally.
There is no such thing as perfect security. What is achievable is a well-matched combination of instinct, intuition, systematization, and current methods and technology calibrated to a given context, threat environment, and organization. That combination is what the practice works toward.
The practice identifies vulnerabilities that matter, not compliance theater. Scopes are defined before any work begins. Outputs are written to be used.
Procurement is offered alongside the advisory practice for clients who need supply of specified equipment. Categories and details by inquiry.
The practice is actively engaging with buyers of professional and operational equipment. Inquiries from agencies, organizations, and qualified individuals are welcome. Sourcing structured by specification, volume, and timeline.
Manufacturers, distributors, and craft producers — reach out with your product. American-made and allied-manufactured equipment of professional grade is of particular interest. Working relationships maintained across operational categories.
The practice is available to institutions, departments, companies, and individuals. All work is scoped by written commission after an initial assessment of your requirements, threat environment, and operating context. Pricing is subject to scope, practitioner availability, and demand.
Adversarial review of physical, procedural, and organizational security. The practice probes the defenses, identifies exploitable gaps, and delivers ranked findings to the principal.
Protocols often fail under pressure — too long, too ambiguous, or written for the file cabinet rather than the moment. The practice writes procedures that are short enough to remember and clear enough to execute.
Advisory on access control, surveillance, perimeter hardening, and alarm infrastructure. Specification and configuration counsel; installation is conducted by qualified vendors.
The best physical security fails when the wrong person sits behind it. Advisory on vetting frameworks for security personnel, executives, and contractors. Identification of candidates is conducted through the network.
Protection begins before a visible threat materializes. Advisory on travel risk, threat assessment, advance work, and the selection of protective personnel.
Review of how the organization handles sensitive communications and critical information. Exposure points identified; remediation paths offered.
Plans only function if the people responsible have rehearsed them under realistic conditions. The practice designs training plans, develops tabletop exercises, and structures scenario-based rehearsals fitted to your threat environment. Delivery of certified training is referred to qualified instructors; the practice does not provide it directly.
Independent advisory on AI tools in security operations and on the specification of operational technology, including drone systems for surveillance and perimeter monitoring. The practice advises on vendor evaluation; it does not sell or represent any system or supplier.
Scope & Pricing. All engagements are bespoke and priced by scope, practitioner availability, and time. We do not publish a fee schedule. Engagements are available across a range of scales — clients are assessed on the nature and seriousness of their requirements, not the size of their budget. Begin with a short, candid introduction describing your situation and objectives.
Practice maintains networks for supply, procurement, and outfitting where engagements require it.
The practice asks the right questions before offering answers, scopes work honestly, and delivers outputs concrete enough to act on. Reports designed to look impressive are not the product. Assessments designed to reduce risk are.
Clients are told what the practice finds, including findings that are uncomfortable. Security advisory that avoids difficult conclusions is liability management theater.
Every engagement begins with a written scope defining objectives, deliverables, access requirements, and timelines. Ambiguity is how security engagements fail.
Deliverables are written for practitioners and decision-makers. Findings are ranked by priority. Recommendations are specific.
Engagements are handled with strict confidentiality. Client relationships are not disclosed without consent.
The practice works only on lawful matters and declines engagements that conflict with applicable law or professional standards.
Available for follow-on engagements, protocol updates, and ongoing advisory beyond initial scope.
A short email describing the organization, the nature of the concern, and approximate timeline. General description is sufficient at first contact.
If there is a credible fit, a written scope follows — objectives, deliverables, access requirements, confidentiality terms, timeline, and fee. No work begins without it.
Complete the form. Sensitive details are not required at first contact — a general description is sufficient.
If your matter is urgent, state that clearly in the subject line.
All services are advisory in nature unless otherwise specified in a written agreement. All engagements are conducted in accordance with applicable laws and regulatory requirements. We do not act as an agent, employer, or contracting party unless explicitly stated in writing. No specific outcomes or results are guaranteed; recommendations are based on professional judgment and available information. Specialists or contractors identified through our network operate as independent professionals unless otherwise specified. Information shared in the course of inquiry or engagement is handled with professional discretion in accordance with applicable privacy and data protection laws.