Solutions

Physical Security

PROTECT YOURSELF, YOUR BUSINESS, & YOUR ASSETS

THREAT, VULNERABILITY, AND RISK ASSESSMENT 

A TVRA  Assessment provides in-depth analysis of relevant threats, and examines the current security elements in place to identify vulnerabilities – providing a full picture of how an adversary might target the executive and/or organization to cause physical, reputational, or financial harm, and offers guidance for how best to mitigate the risks using Design Basis Threat scenarios that demonstrate the most likely and impactful scenarios for you or your business. 

SECURITY NEEDS ASSESSMENT 

An on-site assessment of the physical security of a location, such as a residence or office space. The Security Needs Assessment examines the current security systems and devices, reviews all procedural security components, such as security policies and standard operating procedures, and provides actionable recommendations to key stakeholders.

office security

TECHNICAL SECURITY COUNTERMEASURES (BUG SWEEP)

Highly trained former Secret Service and FBI agents will “sweep” your environment using the latest TSCM equipment to scan for implanted technology, such as miniature recording and transmitting devices and their software equivalents, and advise on how to proceed if any such devices are discovered. 

bug sweep

TRAVEL REPORTS 

Travel Reports address the relevant safety and security considerations you may encounter when traveling to an unfamiliar location – civil unrest, crime, environmental hazards, health and safety, terrorism, transportation, COVID-19 requirements, and US Embassy information, among other topics and resources to prepare for safe and secure travel.

Intelligence & Investigation

INTELLIGENCE FOR YOUR PEACE OF MIND

DUE DILIGENCE 

Non-financial due diligence on a person, company, or organization to determine whether there are any “red flags” that could cause financial, reputational, and/or legal harm to you or your business by having such an affiliation. 

 

PERSON OF INTEREST INVESTIGATIONS

An investigative report focused on specific individuals, Person of Interest Investigations examine individuals of interest, their motivations, and whether they may pose a threat of physical harm, exploitation, or embarrassment. 

person of interest investigations

 

CYBER ATTRIBUTION 

Gain an understanding of how and why a threat actor is targeting you, your family, or business, and learn how to counter the threat. Cyber Attribution investigations are designed to identify individuals who have acted, or may act, in a malicious manner against your business, employees, family members, or associates.

cyber attribution

 

ONLINE EXPOSURE REPORT

Online Exposure Reports focus identifying the security vulnerabilities that are unintentionally created by the accessibility of your information online – through social media, public records, and online activity – and provide targeted, actionable recommendations to limit your exposure and mitigate the risk of misuse of your personal information.

 

EVENT GUEST LIST REVIEW 

Event Guest List Reviews identify potential risks to you, or the success of your event. Using open source information, such as social media, blogs, forums, news and media outlets, combined with paid and proprietary databases for criminal history and sanctions, Red Five will scan and vet the list of attendees for any “red flags” with the potential to impact your event.

guest list review

 

Cyber Solutions

DIGITAL SECURITY FOR COMPLETE PROTECTION

CYBER RISK & NETWORK TECHNOLOGY ASSESSMENT 

Standard home network devices are often pre-configured for easy set up, however, they are also relatively easy for hackers to breach. The Cyber Risk & Network Technology Assessment examines your overall cybersecurity posture at your residence or home office. Red Five will provide specific mitigation measures to better secure your network, devices, and accounts. 

CYBER RISK & NETWORK TECHNOLOGY ASSESSMENT

WEBSCRUB 

Reducing your visibility on the web is one of the best ways to protect your data and keep it away from threat actors. Red Five’s WebScrub is an ongoing service to identify and remove Personally Identifiable Information (PII) from over 220+ data aggregators online. 

webscrub

 

DARKWATCH

An ongoing monitoring and alerting service that actively looks for the Client’s personally identifying information (PII) listed for sale on the dark web, or on discussion forums, imposter accounts, unauthorized domain name registration, and/or posting of doxing material. DarkWatch includes WebScrub to actively remove your PII from online data aggregators and provide a holistic solution for protecting your online data.

Red-alert

ONLINE THREAT MONITORING 

Early detection of threats posted on social media platforms is essential to preventing potential loss or damages to an individual, business, or event. Red Five uses our robust access to intelligence and monitoring tools to monitor, triage, and alert clients to any rhetoric posted online that may pose a physical, reputational, or financial threat. 

DIGITAL FORENSICS 

An examination of hardware and accounts to assess whether a device was compromised, identify what was taken, and report on forensic details. Digital Forensics is a process with endless applications, including: Post-Breach Digital Forensics Intellectual Property Theft Insider Threat Investigations Regulatory Compliance

digital forensics

Blockchain & Crypto

SECURE YOUR DIGITAL ASSETS

 

KNOW YOUR TRANSACTION 

In today’s world, merely identifying individuals and businesses isn’t enough. Know Your Transaction (KYT) is considered the future of Know Your Customer (KYC). KYT Reports examine crypto transactions for suspicious activities or ties to known bad actors so you can proceed with confidence in your business decisions and transactions. 

crypto transaction

 

CRYPTOCURRENCY INVESTIGATION 

Crypto transactions move quickly, making it difficult to identify where funds came from and where they went. Cryptocurrency Investigations trace on-chain wallet activity, follow the flow of funds, and identify wallet ownership. 

DIGITAL ASSET SECURITY AUDIT 

Digital Asset Security Audits provide live, on-line auditing and account hardening services with one of Red Five’s Chainalysis Reactor Certified experts to safeguard your digital wallets and assets against credential compromise, and limit potential damages from compromises of the exchange platform itself.

 

CRYPTO SCAM RECOVERY 

Capabilities of law enforcement are often limited in their ability to support victims of crypto scams immediately after account compromises, scams, or thefts. Red Five’s Chainalysis Reactor Certified experts will trace the flow of stolen funds and provide guidance for reporting to law enforcement and centralized exchanges. 

bitcoin investigation

WALLET ACTIVITY MONITORING 

Without warning, blockchain transactions can happen in an instant, allowing for funds to move quickly between accounts or individuals. For those monitoring digital assets, watching stolen funds, or trying to better understand connections between wallets through their transactions, every second counts. Wallet Activity Monitoring will alert you to movement of funds from exchange accounts and enable you to take the appropriate action.

Enterprise Operations

SOLUTIONS THAT SCALE WITH THE BUSINESS

IRS 132 APPENDIX 

Companies that fund security services for their key executives may be eligible to take advantage of certain tax benefits under Section 132 of the IRS Code. Red Five’s IRS 132 Appendix documents how the company’s security spend is commensurate with the assessed threats and vulnerabilities, per IRS Section 132 guidelines. 

INSIDER THREAT CONSULTING 

With the frequency of insider threat incidents and their associated costs rising each year, Insider Threat Programs and Incident Response Workflows continue to be a crucial necessity for every enterprise.Red Five will build and develop an Insider Threat Program and provide training that empowers your team to prevent and identify potential insider threats to your business, as well as Incident Response Workflows to minimize any negative impacts of such incidents.

BUSINESS CONTINUITY PLAN (BCP)
A well-defined BCP ensures the continuity of business-essential functions across a wide range of emergencies and events – whether natural, manmade, or technological in nature.Red Five’s continuity planning takes into consideration the activities of individual groups, departments, and operational units across the company to build a comprehensive plan that accounts for all mission-critical personnel, functions, and technologies to ensure minimal disruption to operations in an emergency scenario.

business continuity