[blank_spacer height=”13″ width=”1/1″ el_position=”first last”]

Transforming Organization and Personal Security

From small businesses to Fortune 500 companies, private schools to large public districts, security has never been more critical than it is today. Between natural disasters and unexpected acts of violence, organizations now more than ever need a proactive approach to identify vulnerabilities and mitigate damage.

HPI provides all aspects of security infrastructure for both businesses and schools, offering assessment, planning, implementation and training. Services include:

  • Vulnerability Assessments
  • Threat Assessment
  • Response Planning
  • Premise Liability Case Support

With security specialists trained by federal, state and local law enforcement, Hawk Professional Investigations offers the experience and expertise you need to be prepare for emergencies.


[blank_spacer height=”30″ width=”1/1″ el_position=”first last”]


Call us for a
Free Consultation


HPI_Web_Icon_Form_YellowSubmit a Case

Have an investigator
contact you


[blank_spacer height=”30″ width=”1/1″ el_position=”first last”] [blank_spacer height=”30px” width=”1/1″ el_position=”first last”]

Campus security has emerged as one of the most significant issues in American society. Violent incidents resulting in injury or death occurred more than once a week, on average, in the first half of 2018.

While some generic ideas have been proposed by government agencies, security planning is not a one-size-fits-all project. Campus layout, construction characteristics, student population profile, ingress and egress, staff capabilities, existing security infrastructure, and local regulations all play a critical role in effective solutions. A customized school assessment and school response plan developed around the unique attributes of your campus could be the difference between dramatically different outcomes.

The HPI Security Consulting Team provides the experience of former federal and state counter-terrorism and SWAT law enforcement personnel to assess vulnerabilities and build a practical plan to prevent and address threats.

Successful emergency response requires a proactive approach to identify risks and vulnerabilities so exposure can be minimized and potential damage mitigated.

The first step in emergency response planning is a vulnerability assessment. It is the foundation of effective contingency planning and provides a road map for security strategies and implementation.

HPI’s vulnerability assessment considers the full spectrum of threats including natural, criminal, terrorist, accidental, and others, taking into account both physical and procedural parameters. Each threat is analyzed and prioritized, leading to realistic recommendations easier implementation decisions.

While the specifics vary for each client, the assessment may include:

  • Access security systems
  • Video surveillance cameras, locations, storage, security, and system integrity
  • Building or campus access points and structural barriers
  • Infrastructure including power, water, communications, and data
  • Hiring procedures including applications forms, background investigations, and polygraph testing
  • Termination policies and procedures
  • Key assets such as vehicles, equipment, accessibility, and emergency personnel
  • Alert and notification protocols
  • Reporting protocols and documentation
  • Review or development of Safety Plan, including existing procedures for evacuation, shelter-in-place, and other contingencies

Once the vulnerability assessment is completed, HPI will work closely with you to implement approved recommendations such as revised communication protocols, threat reporting, hiring, and employee termination, as well as the replacement or enhancement of existing equipment and security infrastructure.

The results of the assessment, as well the security recommendations, are handled with the utmost confidentiality and professionalism.

[blank_spacer height=”30px” width=”1/1″ el_position=”first last”]
Empty tab. Edit page to add content here.