We provide integrated multi-domain support for physical and cyber risk, and lead the field in converged risk services. From protective services, to security and contingency planning, security exercises, preventative measures, and crisis management solutions for complex environments.
We are a leading provider of close protection and other protective services in London and across the UK with over 25 years’ experience. Our personnel are highly experienced. Many come from specialist backgrounds in the military and law enforcement combined with extensive experience in the private sector. They are all first aid and paediatric qualified. Our licensed male and female personnel work discreetly with CEOs, high net worth families and other people at risk.
We have extensive experience in the protection and transport of high values items.
We provide support to law firms, insolvency practitioners and in-house counsel to gather, review and present information and evidence in a way that clarifies matters and is admissible in court. Our extensive international network allows us to move quickly and gain accurate local information.
Digital Forensics can best be defined as the collaboration of investigative principles and lateral thinking whilst maintaining a forensic analysis philosophy. This is in order to gather, preserve, interpret and ultimately present digital evidence from any digital computing storage device or network, in a manner suitable for submission into any legal process.
Our consultants have years of experience conducting digital investigations within the public and military justice systems, utilising these skills domestically and internationally.
Our investigators are widely experienced. Many come from police or military police backgrounds, some as senior investigating officers. Our extensive international networks enable us to conduct fast-paced investigations which are often vital in tracing witnesses and assets. We ensure our evidence is admissible in court.
Remember that it is critical to move quickly when you suspect that something is wrong. Call us for initial consultation with no obligation.
Most, if not all organisations rely on IT in some way and the need to secure their information and its availability is paramount. Ensuring this is a function of good Cyber Hygiene as well as sound design. If the human factor fails, the system is vulnerable.
The EU General Data Protection Regulation has fundamentally transformed how businesses handle personal data. Any company that does not follow these new norms faces severe fines, potentially up to €20 million or 4% of annual global revenue, depending on the severity and circumstances of the violation. In other words, GDPR compliance is not optional.
The GDPR sets out seven key principles:
We provide bespoke specialist security systems for clients with exacting requirements. We are experienced in deploying overt, discreet and covert systems to provided layered protection.
By working closely with clients to fully understand the threats they face we can complete our informed risk assessment that underpins the system design. This enables them to withstand potentially complex assaults by determined adversaries.
Our clients include operators of Critical National Infrastructure to banks and High Net Worth Individuals.
Many of our bespoke systems have been integrated into existing systems to address a specific threat. We also provide quick response deployable systems to provide interim security while a permanent system is being planned and deployed.
We are experienced in deploying systems where no mains power is available using combinations of solar, battery and wind power.
Our specialist training is a growing part of the Optimal Risk Group services offering to enhance performance in the risk and security management sector. We have developed a range of specialist training courses with subject matter experts to equip organisations and operators with the knowledge, skills and best practice to ensure top level performance. Many of our qualifications are accredited on the RQF, in other instances we work closely with clients to develop bespoke courses to address their particular circumstances.
Clicking below will take you to our separate site where access will only be granted to those working in roles within Law Enforcement, Military or Government Agencies.
Ranging from threats to assets and personnel, to complex threats like espionage or sabotage, our security services and training can protect, defend, and prepare your organisation for the plethora of high-risk, and high-impact scenarios that could compromise your operations or reputation. Start a conversation today!