Vigilance provides expert advisory across the full spectrum of private security — from red team assessment and protocol development to physical security installation, personnel vetting, and executive protection — applied to private and institutional needs.
Vigilance is a specialist advisory practice offering structured security counsel to private and institutional clients. Our practitioners bring direct operational experience to assessments, protocol development, systems advisory, and training — applied with the seriousness that consequential security work requires.
There is no such thing as perfect security. What is achievable is a well-matched combination of intuition, systematization, and current methods and technology calibrated to a given context, threat environment, and organization. That combination can make all the difference — and it is what we work to identify and build with our clients.
We look beyond surface-level compliance to identify the vulnerabilities that actually matter. Our assessments are honest, our scopes are defined before any work begins, and our deliverables are written to be used — not filed.
All work is scoped by written commission after an initial assessment of your requirements, threat environment, and operating context. Pricing is subject to scope, practitioner availability, and demand.
Adversarial review of your physical, procedural, and organizational security. We test your defenses as a motivated adversary would, identify exploitable gaps, and deliver ranked findings.
Many protocols are ambiguous under pressure or written by people unfamiliar with how adversaries operate. We write security procedures that are clear, realistic, and executable by the people using them.
We advise on access control, surveillance architecture, perimeter hardening, and alarm infrastructure — ensuring systems are specified correctly, installed by qualified vendors, and configured for your actual threat environment.
The most sophisticated physical security system fails when the wrong person sits behind it. We advise on vetting frameworks for security personnel, executives, and contractors — and assist in identifying candidates who meet a genuine standard.
Protection begins before a visible threat materializes. We advise on travel risk, threat assessment, advance work, and the selection and management of protective personnel.
Information is the most underprotected asset in most organizations. We review how your organization handles sensitive communications and critical information — identifying exposure points before they are exploited.
Plans only function if the people responsible have rehearsed them under realistic conditions. We develop and facilitate training programs, tabletop exercises, and scenario-based rehearsals tailored to your threat environment and personnel. The objective is not to pass an audit — it is to be genuinely ready.
Independent advisory on the adoption of AI tools in security operations, and on the specification and sourcing of operational technology — including drone systems for surveillance, perimeter monitoring, and operational applications. We advise on vendor evaluation and procurement; we do not sell or represent any system or supplier.
Scope & Pricing. All engagements are bespoke and priced by scope, practitioner availability, and time. We do not publish a fee schedule. Engagements are available across a range of scales — clients are assessed on the nature and seriousness of their requirements, not the size of their budget. Begin with a short, candid introduction describing your situation and objectives.
We ask the right questions before offering answers, scope work honestly, and deliver outputs concrete enough to act on. We do not produce reports designed to look impressive. We produce assessments designed to reduce risk.
We tell clients what we find, including findings that are uncomfortable. Security advisory that avoids difficult conclusions is liability management theater.
Every engagement begins with a written scope defining objectives, deliverables, access requirements, and timelines. Ambiguity is how security engagements fail.
Deliverables are written for practitioners and decision-makers. Findings are ranked by priority. Recommendations are specific.
All engagements are handled with strict professional confidentiality. Client relationships are not disclosed without consent. All practitioners operate under written confidentiality obligations.
We work exclusively on lawful matters and decline any engagement that conflicts with applicable law or professional standards. We say no when the fit is not right.
Threats change. Security posture evolves. We are available for follow-on engagements, protocol updates, and ongoing advisory — not just a one-time report.
A short email describing your organization, the nature of your concern, and your approximate timeline. General description is sufficient at first contact.
If there is a credible fit, we produce a written scope defining objectives, deliverables, access requirements, confidentiality terms, timeline, and fee. No work begins without a written scope.
Send a brief email describing your organization, the nature of your security concern, and your timeline. Sensitive details are not required at first contact.
Please include "Vigilance Inquiry" in the subject line.
All engagements reviewed for legal compliance, scope viability, and practitioner fit before acceptance.
We do not accept engagements that would require or facilitate unlawful activity.
Client information and the existence of client relationships are confidential by default.
Pricing is demand and availability-adjusted. All fees are defined in writing before work begins.
If your matter is urgent, state that clearly in the subject line.
All services are advisory in nature unless otherwise specified in a written agreement. All engagements are conducted in accordance with applicable laws and regulatory requirements. We do not act as an agent, employer, or contracting party unless explicitly stated in writing. No specific outcomes or results are guaranteed; recommendations are based on professional judgment and available information. Specialists or contractors identified through our network operate as independent professionals unless otherwise specified. Information shared in the course of inquiry or engagement is handled with professional discretion in accordance with applicable privacy and data protection laws.