
The right protection for your institution
We do not force a standard package onto nonstandard realities. Our protection environments represent progressively sophisticated architectures, each designed to match the actual needs and capabilities of different institutions.
Assessment-Led
Every environment recommendation begins with understanding your institution.
Progressive Capability
Each tier builds on the last, adding sophistication without abandoning fundamentals.
Operational Fit
The right environment matches both your security needs and operational reality.
Foundational
Modern baseline protection
A serious modern baseline replacing shared-code culture, weak visibility, and informal access assumptions. This is where real security begins.
The Foundational environment establishes the critical infrastructure needed for any serious security posture. It replaces the outdated model of shared codes, informal trust, and fragmented systems with a coordinated, auditable baseline that most institutions currently lack.
Core Capabilities
- Identity-based access control at key entry points
- Elimination of shared-code culture as the norm
- Entry auditability and basic access logging
- Baseline visibility at critical entry and operational points
- Basic alerting and event logic
- Documented credential workflow
- Documented exception handling path
Ideal For
Institutions ready to move beyond symbolic security and establish a real protection foundation. Often the right starting point for smaller synagogues or those beginning their security modernization journey.
Operational Reality
Congregants will experience a more structured entry process, but one designed to feel natural and welcoming. Staff and leadership gain clarity about who has access and when.
Managed
Structured operational control
A more structured environment with role-based access, stronger workflows, better administrative control, and improved operating discipline.
The Managed environment builds upon Foundational with enhanced control structures that match the complexity of active synagogues. It introduces role-based logic, stronger administrative oversight, and workflows designed for institutions with varying access needs throughout the week.
Core Capabilities
- Role-based access permissions by function
- Enhanced visitor handling and registration
- Stronger credential management workflows
- Administrative control dashboard
- Improved monitoring and alert refinement
- Operating procedure documentation
- Staff and volunteer access coordination
Ideal For
Active synagogues with weekday programming, schools, events, volunteers, and more complex access patterns. Institutions that need stronger administrative control without sacrificing usability.
Operational Reality
Different groups—staff, clergy, volunteers, regular members, guests—experience appropriately tailored access. Administrative burden is reduced through better workflows, not increased.
Intelligent
Integrated adaptive protection
A fully integrated environment with stronger zoning, software coordination, operating-mode logic, and tighter support structure.
The Intelligent environment represents mature security operations. It introduces zone-based logic, operating modes that adapt to different times and events, and tighter integration between systems. This is where protection becomes truly adaptive to institutional life.
Core Capabilities
- Zone-based security logic and controls
- Software coordination across systems
- Operating mode adaptability (weekday, Shabbat, events, etc.)
- Advanced monitoring and pattern recognition
- Full Central Command integration
- Seasonal and event-based configuration
- Enhanced incident response coordination
Ideal For
Complex institutions with schools, multiple buildings, high-traffic operations, or elevated security requirements. Institutions ready for a fully coordinated security ecosystem.
Operational Reality
The security environment adapts to the rhythm of institutional life rather than requiring the institution to adapt to it. Different modes for different moments.
Hardened
Elevated threat response
Enhanced protection architecture for institutions facing elevated threat profiles or requiring additional resilience measures.
The Hardened environment is designed for institutions that face elevated threat realities or have determined they require additional protection measures beyond standard operations. This tier involves more intensive architectural considerations and enhanced response capabilities.
Core Capabilities
- Enhanced perimeter and entry controls
- Elevated monitoring and alert sensitivity
- Strengthened access verification
- Advanced intrusion detection
- Coordination with external security resources
- Enhanced governance and escalation protocols
- Specialized training and readiness programs
Ideal For
Institutions with specific threat concerns, high-profile events, or leadership determinations requiring elevated protection. Deployed selectively based on assessment.
Operational Reality
Additional security measures become visible but are implemented thoughtfully to maintain institutional dignity. Heightened readiness without creating an atmosphere of fear.
Resilient
Continuity and recovery
Maximum protection posture with emphasis on continuity, recovery, and sustained operations under adverse conditions.
The Resilient environment represents the highest tier of protection architecture. It is designed for institutions requiring sustained operational capability even under adverse conditions, with emphasis on continuity, recovery, and coordination with broader response frameworks.
Core Capabilities
- Redundant systems and failover capabilities
- Sustained operations planning
- Crisis communication infrastructure
- Recovery and continuity protocols
- Deep integration with response ecosystems
- Advanced scenario planning and exercises
- Executive protection considerations where relevant
Ideal For
Flagship institutions, campus environments, or those with specific requirements for sustained operations under challenging conditions. Offered selectively and only when fully supportable.
Operational Reality
The institution gains confidence that protection continues even when systems are challenged. Emphasis on recovery and continuity, not just prevention.
Institution-specific enhancements
Overlays are additional capability layers that can be added to any environment. Not all institutions need the same extras, and we design around your actual life rather than forcing a rigid package.
School / Youth Overlay
Enhanced protection for institutions with schools, youth programs, or childcare operations.
- Child-specific access controls
- Enhanced monitoring during program hours
- Emergency protocols for youth populations
High Holiday / Large Event Overlay
Temporary scaling for High Holidays, large gatherings, and special events.
- Surge access management
- Enhanced perimeter awareness
- Event-specific operating modes
Sensitive Area Overlay
Additional controls for specific spaces requiring enhanced protection.
- Administrative offices
- Financial areas
- Sacred object storage
Perimeter / Parking Overlay
Extended protection beyond the building envelope.
- Parking area monitoring
- Approach visibility
- Perimeter awareness
Central Command Depth Overlay
Enhanced Command integration for institutions requiring deeper support.
- Increased support availability
- Enhanced monitoring depth
- More frequent operational reviews