Research Triangle Park

Security Assessment of RTP

Protus3 News, Security Program Development

Risk Management Associates, Inc. will be conducting a security assessment of Research Triangle Park. The Research Triangle Foundation has developed and is in the process of implementing a new master development plan for the Research Triangle Park (RTP) community. As a critical component of that plan, the foundation needs to conduct a security assessment that will provide the stakeholders with …

Lone Star College

Lessons from Lone Star College System

Tasha Dyson, CFE News, Security Program Development, Workplace Violence

On January 22, 2013, gunshots were heard on the North Harris campus of Lone Star College System. It was later learned that an altercation between two individuals (one of whom may have been a student) had escalated to gun violence. The shooters were injured along with an innocent bystander. Incidents such as this immediately bring to mind topics such as …

Security Consulting

RMA Awarded Project for RockTenn

Protus3 News

RMA has been awarded a project to audit the security staffing requirements of the Fernandina Beach Facility and the Seminole Mill Facility. This audit will develop findings and recommendations for staffing needs at each facility. RockTenn is one of North America’s leading producers of corrugated and consumer packaging and recycling solutions. Based in Norcross, Ga., RockTenn employs approximately 26,000 people …

college students

Security Threat Assessments for Education

Protus3 Security Program Development

In an ideal world, our schools, colleges, and universities would be immune from the threats and challenges that affect other businesses and institutions. Unfortunately, we do not live in an ideal world. Academic institutions are cross-sections of society and bear the same responsibilities for the safety and security of their populations and infrastructure. This cross-section brings with it all the …


Probability and Criticality

William F. Booth, CPP Security Assessment, Security Master Planning, Security Planning, Security Program Development, Security Survey, Security Threat Assessment

When evaluating what security concern to address first, where do you begin? Consider the probability and criticality of an event, and assign values based on standard criteria. Probability 5 Almost certain. Barring major changes in circumstances, this event will occur or will occur frequently compared to other events. Or, historically, an event of this type has already occurred. 4 Very …

Jerry Blanchard

Jerry Blanchard Attends IAHSS Annual General Meeting

Protus3 News, Security Program Development, Training

Jerry Blanchard attended the IAHSS 45th Annual General Membership Meeting and Seminar Program in Myrtle Beach. Speakers and topics included: Felix Nater – Creating a Center of Influence in Combating Workplace Violence Susan McLaughlin – Globally Harmonized System (GHS) Jack Poole – Mass Notification Systems and Application for Risk Reduction Brandon Kehl – Security Offsite: Responsibilities & Approaches for Home …

fire exit

Be Aware

Protus3 News, Workplace Violence

Without knowing the complete picture about the incident at Clackamas Shopping Center in Oregon, what can we learn? It’s a reminder of the importance of being aware of your surroundings. People shouldn’t live in fear but instead think in terms of being prepared. Two things we should all consider anywhere we visit are: “where can I take shelter?” and “how …

Department of Revenue lobby

Department of Revenue Lobby Design

Protus3 News

RMA will partner with Smith Sinnett Architecture to design additional security measures at the North Carolina Department of Revenue building in Raleigh. RMA will provide a brief security review of the lobby area within the North Carolina Department of Revenue building and design services for new secured personnel portals that will be used to separate the public lobby space from …

apple bmw

Security Threat – Consider the Extremes

Russell W. Gilmore, CISSP, CISM, EnCE Crisis Management Planning, Product Diversion and Counterfeiting, Product Theft, Security Assessment, Security Planning, Security Policy and Procedure Development, Security Program Development, Security Survey, Security Threat Assessment, Theft

When we assess the security of our customers, employees, facilities and products, we usually look at the obvious problems. Depending on the environment, we expect what is considered the “normal” security threat. In a retail store environment, we may consider security measures that will keep the customers and employees safe, such as taking measures to keep someone from getting hurt …

Security Design

The Death of Picture Perfect™

Jerry T. Blanchard, Jr., CPP Security Program Development

Picture Perfect™, one of the most powerful, proven and widely deployed security management systems in the world is being absorbed by the competition. We all saw it coming, with the acquisition of GE Security by United Technologies Corporation (UTC), and now the “end of support” looming toward the end of 2015. It sounds like a long time, but to transition …