​Security events  management

Security surveys, risk assessment.

Security Surveys and Risk Assessments Establishing/upgrading security systems

Gap Analysis

Physical and Logical security convergence/integration

Security Plans – Protection Measures and Drills

Security training and instruction services

Security Awareness

Advising on security technology systems

Anti-terror instructions and trainings

Logistics and Supply Chain security

Loss prevention

IT Security and Physical security of IT surroundings


Threats and risks report.

Proposal for system solutions combining the operational needs with the security in the firm and other overlapping areas such as safety etc.

Examination of the existing resource allocation and the required

Resources needed for optimal risk management (cost versus benefit).

Provide solutions for building an effective control and supervision

Mechanism, recommended means – technological and others, working procedures, including systems for assimilating implementation and control procedures.

Preparation of a working plan for securing the facility as well as

Operating procedures for using the technical systems.

Characterizing the security needs for the building planners.

Accompanying the planning including preparation technical and electronic specifications and integrating them into the building's systems.

Characterizing the technical requirements for the security program,

Preparing the material for bid and rating the bidders.

Supervision during installation and run-in to receiving and acceptance.


Information Security – physical, logical and the human factor.

Mapping the organization's assets in the aspect of information categorization and level of risk.

A review of possible or exiting failures in the organization's information security.

Create a scale of priorities for handling the issues found.

Implement strengthening (failure correction) in the organization's systems.

Define procedures, policy and guidelines for the organization's information security.

Prepare an information security handbook and procedures according                  to the ISO 17799 standard for information security.

Ongoing monitoring of all information and knowledge security aspects.

Competitive intelligence and prevention of industrial.

Assessment and analysis of the data collected.

Setting, together with the customer, the objectives of the data      gathering.

Planning the examination and setting a method for achieving the goal and the necessary information.

Supervising implementation


Defense of patents and information assets

Focusing on protecting the intelligent property in the organization and providing suitable basis for developing a new product as a patent.

Defining tools for registration and maintenance.

Supervision and field control on misuse/illegal use by competitive elements.


Employees, suppliers and customers integrity checks and supervision

Improving the quality and accuracy of the screening process of employees and trusted suppliers.

Complementary security check to human resource procedures existing    for senior and junior job holders exposed to information and processes of high financial value.

Security checks for strategic suppliers with access to sensitive   information and expensive assets of the organization.


Security and safety assurance during events.

Building risk surveys and characterizing the security and safety needs in the event.

Writing security/safety plans for the event including cooperation with the authorities and appropriate licensing for the event.

Characterize technological means for carrying out the event.

Training security personnel and attendants for the event.

Supervision of the event from the beginning to end.


Disaster and emergency mitigation management program.

Preparing the organization for coping with events such as:

Explosion, release or A.M of chemicals or similar events on the organization's facilities.

Threat or actual planting of explosives on the organization's facilities.

Extortion event directed at the organization.

Terrorist attack, bombing, shooting, hostages, taking control of a company site.

An event of financial that may cause damage to the     organization.

Criminal event that threatens human life or the organization’s property.

A state of war that harms the organization’s functioning.

Natural disasters such as earthquake.

Prolonged communication failure due to sabotage or break.

Threats to contaminate or otherwise sabotage a product of the firm.

Actual contamination of a product (either incidental or intended).

Problems involving suppliers.


Training of employees and strategic suppliers

Physical security: Facility security, V.I.P. bodyguards, competitive

Intelligence, security and prevention of devaluation of the organization’s assets, personal security and preventive behavior.

Information Security: Training of strategic suppliers of the organization,

Who have interface to the organization’s information/products (customers).


Philosophy & Approach

Throughout our work we use approaches and methodologies that are based on several underlining principals:

Clear definition of what is essential vs. what is not.

Understanding that enterprise resources are limited and must be managed and optimized with regards to the desired risk profile.

Human capital is the base of all security endeavors.

Cumulative knowledge, experience and know-how are crucial for achieving best results.


Good security is based on detection, prevention, good preparation and the optimal response to events derived from both external threats and internal weaknesses.

Partnering and accompanying internal and external processes with relevant personnel


On-site examination, trainings and drills

Accompanying security personnel on duties

Examination of compliance with procedures during routine and emergencies.

Examination of compliance with procedures regarding information sharing between the various entities.

Assessment of staff familiarity with the various types of equipment and their effective operation.


Our Team

Our instructors are industry experts and top-level veterans of the Israeli Security. They actively participate in committees and meetings, at national and regional levels, regarding various security issues, crisis analysis and war games.

A.M experts in all kinds of security boundaries, specializing in qualifying & training security officers and security grads for the different tasks.

During their long service, the team established and conducted security operations in Israel and internationally, for private and national entities, and security of embassies and other institutions and critical infrastructure. A.M professionals have ample experience and knowledge in peripheral security of terminals and surrounding perimeter, gained from operations both in Israel and internationally.


Advantages of the company:

Expertise and specialization in hi-tech and low- tech companies

Expertise in both public and private organizations

A professional approach based on the economic aspects of industrial espionage and its prevention

Accumulated unique experience that answers a wide range of needs of customers.

Flexibility in approaching different types of clients’ needs while considering the human factor, working environment and technical systems.