Shop Here for Security Consultants

Scan the listing below for consultancies offering in assistance in both physical campus and data security process and technology deployment.

Physical Security

AAA Risk Management
www.businesssecurityconsulting.com
Security and loss prevention consulting firm providing independent assessments of security needed to effectively protect assets. Firm specializes in identifying susceptibilities to loss from crime, fire, and accidents. Cost-effective solutions are offered.

Aon
www.aon.com
Organizations in the public sector are facing tighter budgets and rising demand for services. Aon brings problem-solving expertise and technological resources to public sector entities by providing both traditional and alternative insurance coverages and risk management services to governments and other public entities.

Archibus
www.archibus.com
Infrastructure and facilities management solutions and services.

Arup
www.arup.com
Global firm of designers, engineers, planners and business consultants providing a diverse range of professional services, including facility security consulting, to clients around the world. Firm has 9,000 staff working in 82 offices in more than 34 countries.

Clark Security Group
[email protected]
Services offered: security management, program development, risk assessments, security guidelines, guard issues, training, workplace violence issues, planning and forensic consulting. E-mail [email protected]

CA
www.ca.com
CA Security Management solutions enable you to proactively manage your entire security environment so you can focus on your business. Solutions include identity and access management, threat management, security information management, and more.

Cooler Security Consulting
www.coolercsc.com
Services include crowd control, parking and traffic security for events, and more. Over 15 years of experience in crowd control, loss prevention, safety, and security.

Elert & Associates
www.elert.com
Technology planning consultants with emphasis in multiple areas including IT security and public safety. [Campus Technology contributing columnists.]

Expert Security Consulting
www.expertsecurity.com
Total Loss Prevention (TLP) 24/7 services; full scope of services, from concept design and implementation, including: risk and vulnerability assessment, equipment specifications, security systems planning and design, vendor engagement, project management, system testing, investigations and litigation support, audits and training, and more.

Guardian Security Services
www.guardiansecurityinc.com
Founded in 1975 and serving the Chicagoland area. Provides customized, cost-effective security programs to college campuses and other enterprises and organizations. Offers services from a single security officer to multi-faceted security programs including investigative services, undercover operatives, and surveillance.

Inter/Action Associates
www.howtoprotect.com
Provides security management consulting services to a wide range of public and private sector organizations. Assists in the assessment of threats and vulnerabilities facing organizations, and the design of cohesive and cost-efficient counter measures.

The Inter-Sec Group
www.intersecgroup.com
Offers security consulting services, national security counterintelligence, anti-terrorism and counter-terrorism consulting, open source intelligence, deliverable training, executive protection, and more.

IT Consulting Group
www.itconsultinggroup.org
Offers school safety and security consulting including security planning and design; safety audits, planning, and training; A/V communications design; much more.

Kroll
www.kroll.com
Global services organization offering business continuity, consulting, crisis and emergency management, engineering, homeland solutions, hotline services, and training. Matches three critical elements of security—architectural, technical and operational—with realities of time, space, cost, and business continuity.

The Lake Forest Group
www.stadiumsecurity.com
Security planning and operations at stadiums, convention centers, and major entertainment venues. Offers security design, protective services, risk assessment, emergency preparedness, and more.

LJT & Associates
www.ljt.com
Targets the new Facility Security Officer (FSO) and offers seminars, on-site training, phone support, administrative support, inspection support, compliance support, complete FSO duties, security support training, FSO support training, JPAS & eQUIP training, and more.

Loss Management Consultants
www.securityoffice.com
Security consulting, asset protection, security systems consulting, crime and loss prevention, security officer services audit, crowd control, security procedures development, security awareness programs, security training, foreseability analysis.

Michael Crocker, CPP & Associates
www.mikecpp.com
Texas security consultant offering third-party audits of security guards and electronic security programs, security surveys and security vulnerability assessments (SVA), emergency contingency planning services, fire/life safety planning and approval services, and more.

Nater Associates
www.naterassociates.com
Offers critical vulnerability assessments, comprehensive review of the work site environments, implementation and/or evaluation of cyberspace security, mail room security, bomb response plans, emergency evacuation plans, physical security plans, and threat assessment and crisis management plans.

Newcomb & Boyd
www.newcomb-boyd.com
Designs effective security systems through an understanding of sophisticated computer and security technology, but also of risk assessment, facility hardening, and procedure and staffing models. Reliability, maintenance, and future growth are also critical planning considerations.

Pinkerton Consulting & Investigations
www.ci-pinkerton.com
Global organization specializing in security consulting and investigation. Services offered include strategic assessment planning, risk assessment, solution design, security implementation planning, project management, policies and procedures audit and/or design, and more.

Risk Assessment Services
www.crime-expert.com
Created and developed the national standards regarding safety, security, and preventative maintenance procedures in rental housing and apartment communities, manufactured housing communities, overnight lodging properties, as well as self-storage facilities.

Security Design Solutions
www.acadiacom.net/michaelk
Consulting firm dedicated to improving the safety and security of businesses, enterprises, and organizations by identifying and reducing physical security threats through the application of electronic security systems and procedures that give the client the ability to detect, deter, delay and respond to those threats.

Strategic Technology Group
www.strategictechnologygroup.com
Offers security automation specifications and design, hands-on project management, systems procurement, implementation and testing, personnel training, technology migrations, operational protocols and emergency procedures, situational awareness reviews, legacy systems and management audits and reviews, risk management and gap audits and remediation, baseline contingency audits and continuity planning, and more.

Wyatt Security Consultants
[email protected]
Services offered: strategic planning and security strategies, special event security planning and management crisis prevention, threat, risk and vulnerability assessments, employee and asset protection, executive protection, public and media relations.

Data Security

The Ancon Group
www.ancon.com
Offers IT security services: security planning, contingency & disaster recovery plans, alternate sites, etc.

Anitian Enterprise Security
www.anitian.com
Comprehensive security services and technology firm. Services include security assessments, compliance audit, etc.

Archibus
www.archibus.com
Offers infrastructure and facilities management solutions and services.

Canaudit
www.canaudit.com
Canaudit is focused on providing complete information control and security, and is the developer of the Canaudit Penetration Testing methodology and the integrated audit concept, now recognized as the industry standards for technical security auditing worldwide. The firm’s penetration process provides periodic system testing to identify network security flaws that hackers often compromise. Also offered: network audits, operating systems audits, investigation services, database audits, remote access audits, and risk assessments & reviews.

CA
www.ca.com
CA Security Management solutions enable you to proactively manage your entire security environment so you can focus on your business. Solutions include identity and access management, threat management, security information management, and more.

Delta Corporate Services
www.deltacorp.com
Helps client organizations assess, validate, and re-engineer business processes to meet the requirements of financial and regulatory compliance.

DynTek
www.dyntek.com
Protects information stored in enterprise databases and traveling across networks. Solutions for escalating security threats, resource and budget constraints, HIPAA, Sarbanes Oxley, GLBA, etc. Assesses current security environment and develops a capability to respond to and recover from disruptive security threats. S pecializes in securing network infrastructure, converged networks, enterprise applications, wireless networks, e-commerce infrastructure, and applications.

Elert & Associates
www.elert.com
Technology planning consultants with emphasis in multiple areas including IT security and public safety. [Campus Technology contributing columnists.]

Fortrex Technologies
www.fortrex.com
Fortrex helps organizations in regulated industries identify, assess, remediate and effectively manage operational risk. The firm provides consulting services that enable them to showcase their compliancy to applicable regulations and standards to auditors, clients, partners, and investors.

Information Systems Audit and Control Association
www.isaca.org
Global authority in IT governance, control, security, and assurance. The organization offers a wide range of products and services on the topic of security, including certifications, international training events, and more. In 2002 ISACA introduced the Certified Information Security Manager (CISM) certification, recognizing the special role played by those who manage an enterprise's information security program.

Information Technology Associates
www.itassociates.org
Consultancy provides IT and IT security services exclusively for higher education & non-profit organizations. offers strategic planning, assessment, IT management and more. [Campus Technology contributing columnists.]

Interhack
www.interhack.com
Elite forensic and information security teams deploy information assurance solutions across the US; helps clients define and enforce proper confidentiality, integrity, and availability in their infrastructures.

IT Consulting Group
www.itconsultinggroup.org
Offers school safety and security consulting including security planning and design; safety audits, planning, and training; A/V communications design; much more.

Janus Associates
www.janusassociates.com
Janus has been solving client IT security problems since 1988—offering information security services many years before 9/11, the internet, hacking, spam, and the advent of wireless technology and web services. Janus clients cover the entire spectrum of federal, state, and municipal entities, Fortune 500 companies, and non-profits.

MicroSolved
www.microsolved.com
MSI offers security governance, ethical hacking, security consulting, security management, training, awareness programs and more, to protect the largest government, public, and commercial networks in the world.

Netanium Network Security
www.nnsecurity.com
Netanium Network Security is a consulting and solutions provider for organizations of all sizes. As your security advisor, the firm assists with architecture and design, security and risk assessment, regulatory compliance, security policy and program development, product sourcing, implementation, ongoing maintenance, support, and training.

PathMaker Group
www.pathmaker.biz
PathMaker group provides targeted services to help enterprises through their identity management deployment. The firm covers all aspects of the identity management lifecycle and can help clients start from the very beginning or pick up at any stage to help them move forward.

Security Evolutions
www.securityevolutions.com
Provides Information Security (INFOSEC) technology consulting, training, and development offers educational curriculum, training delivery, and certification programs for information technology (IT) professionals, latest up-to-date security solutions and countermeasures to known threats, vulnerabilities, and exploits commonly found in today’s converged IP network infrastructures that support voice, video, and data communications. Provides defense-in-depth security strategies for large enterprises, governments, and organizations.

The SOX Group
www.soxgroup.com
Specializes in Sarbanes-Oxley section 404 (SOX 404) compliance and documentation, including process narratives, policies and procedures, testing, and remediation.

Strategic Technology Group
www.strategictechnologygroup.com
Offers security automation specifications and design, hands-on project management, systems procurement, implementation and testing, personnel training, technology migrations, operational protocols and emergency procedures, situational awareness reviews, legacy systems and management audits and reviews, risk management and gap audits and remediation, baseline contingency audits and continuity planning, and more.

Verizon Business (formerly NetSec)
www.verizonbusiness.com
Keeps large organizations ahead of the threat curve with the intelligence-driven capacity to assess risk, manage threats, help ensure compliance, and reduce complexity—all customized to specific business context. The firm claims to have insight into emerging internet security threats because it runs one of the world's largest IP networks and manages security for over 4,000 enterprises and government agencies around the world.

Vigilar
www.vigilar.com
Vigilar's security consulting services help reduce risk and mitigate threats to IT infrastructures through proven methodology, sound practices, advanced technology knowledge, and a continuous improvement framework. Also offers managed security services, security training (courses include Information Security, Check Point NGX, Cisco, Microsoft, Project Management, and PCI and Sarbanes-Oxley compliance). Solutions are built around the lifecycle of information security. Partnered with over 100 vendors.

Can’t find what you’re looking for here?

Head to the International Association of Professional Security Consultants (IASC) at www.iapsc.org

Featured

  • glowing blue nodes connected by thin lines in an abstract network on a dark gray to black gradient background

    Report: Generative AI Taking Over SD-WAN Management

    In a few years, nearly three quarters of network operators will use generative AI for SD-WAN management, according to a new report from research firm Gartner.

  • abstract pattern with interconnected blue nodes and lines forming neural network shapes, overlaid with semi-transparent bars and circular data points

    Data, AI Lead Educause Top 10 List for 2025

    Educause recently released its annual Top 10 list of the most important technology issues facing colleges and universities in the coming year, with a familiar trio leading the bunch: data, analytics, and AI. But the report presents these critical technologies through a new lens: restoring trust in higher education.

  • abstract image representing AI tools for reading and writing

    McGraw Hill Introduces 2 Gen AI Learning Tools

    Global education company McGraw Hill has added two new generative AI tools to help personalize learning experiences for both K–12 and higher ed students, according to a news release.

  • abstract image of fragmented, floating geometric shapes with holographic lock icons and encrypted code, set against a dark, glitchy background with intersecting circuits and swirling light trails

    Education Sector a Top Target for Mobile Malware Attacks

    Mobile and IoT/OT cyber threats continue to grow in number and complexity, becoming more targeted and sophisticated, according to a new report from Zscaler.