How It Works

A structured path from assessment to protection

Our engagement should feel deliberate, disciplined, and understandable. We move through clear stages because real protection requires real process—not rushed installation or vague promises.

01
02
03
04
05
06
01
Phase 01

Discovery and Institutional Understanding

Learning your institution

We begin by learning the institution: leadership structure, community profile, current pain points, existing systems, risk posture, and the realities of daily and seasonal life.

What This Includes

  • Leadership and governance structure
  • Community profile and demographics
  • Current security systems and pain points
  • Risk posture and known concerns
  • Daily, weekly, and seasonal rhythms
  • Budget and resource realities

The Outcome

A clear picture of your institution as it actually operates, not assumptions based on templates.

02
Phase 02

Assessment and Profiling

Understanding vulnerabilities and dynamics

We assess the site, access points, vulnerabilities, traffic patterns, operating rhythms, behavioral norms, and institutional psychology. This is where we determine what type of security structure is both necessary and sustainable.

What This Includes

  • Site walkthrough and physical assessment
  • Access point and entry analysis
  • Traffic flow and movement patterns
  • Vulnerability identification
  • Behavioral and cultural assessment
  • Governance readiness evaluation

The Outcome

A comprehensive institutional profile that captures not just the building, but the life within it.

03
Phase 03

Architecture and Roadmap

Designing your protection environment

We develop a synagogue-specific security architecture, including access design, monitoring logic, policy framework, governance recommendations, operating modes, and implementation priorities.

What This Includes

  • Protection environment recommendation
  • Access control design and credential strategy
  • Monitoring and alert architecture
  • Policy and governance framework
  • Operating mode definitions
  • Implementation roadmap and priorities

The Outcome

A clear, buyable recommendation tailored to your institution's actual needs and capabilities.

04
Phase 04

Implementation and Enrollment

Deploying your system

We coordinate the rollout of the system, including technology deployment, credentialing, enrollments, configuration, testing, and transition planning.

What This Includes

  • Hardware and software deployment
  • Credential creation and enrollment
  • System configuration and integration
  • Testing and validation
  • Exception pathway setup
  • Documentation and handoff preparation

The Outcome

A fully deployed, configured, and tested protection environment ready for operation.

05
Phase 05

Training and Go-Live

Preparing your people

Leadership, staff, clergy, volunteers, and operational contacts are trained on the relevant procedures, systems, and decision pathways. The environment moves into live operation in a structured way.

What This Includes

  • Leadership briefings and orientation
  • Staff operating procedure training
  • Clergy-specific protocol review
  • Volunteer and greeter guidance
  • Access and exception handling practice
  • Structured go-live transition

The Outcome

A prepared institution with clear ownership, procedures, and confidence to operate the system.

06
Phase 06

Ongoing Support and Central Command

Continuing partnership

After go-live, the institution is supported through Central Command, issue handling, alert support, access changes, periodic review, seasonal reconfiguration, and continuous refinement.

What This Includes

  • Credential and enrollment support
  • Access change coordination
  • Issue triage and resolution
  • Alert review and guidance
  • Periodic operational review
  • Seasonal mode adjustments

The Outcome

An ongoing operating partnership, not abandonment after installation.

What to Expect

Working with Gevulot

Customers should never feel they are entering a clever experiment. The process must feel structured, calm, and professional.

Deliberate and Disciplined

Our process moves through clear stages because serious security requires serious process.

Transparent and Understandable

You will always know where you are in the process and what comes next.

Respectful of Your Time

We are efficient with discovery and assessment, while being thorough where it matters.

Adaptable to Your Reality

The process flexes to accommodate your institution's schedule, constraints, and pace.

The Customer Experience

The synagogue should experience the system as structured, supported, and more secure—not chaotic or alien.

  • Leadership feels that security has moved from vague concern to managed reality
  • Staff knows whom to contact and how credentials are handled
  • Volunteers have clearer guidance
  • Congregants experience an institution that feels safer without losing warmth

Ready to begin?

The first step is always an assessment. No obligation, no pressure—just a serious conversation about your institution's protection needs.