A POI is an individual that is of interest to the company, whether it is a former employee, a trespasser, or someone overly posting online. Instead of creating a POI management program, clients can utilize ESOC’s software where analysts can make a dedicated POI workspace specifically for the client that will be monitored daily. POI reports can also be leveraged to obtain baseline information on the individual including identifying criminal records, social media profiles, emails, phone numbers, family members, and addresses. Additionally, license plate recognition tracking can also be leveraged to know exactly where a POI is in real-time.
Physical security teams such as executive protection outfits and corporate campus security have an additional challenge that they are often untrained for and ill-equipped to handle and that is POI data management. We have seen countless physical security teams store important intelligence data in spreadsheets. This type of storage effectively hides this data from the view, and unanalyzed. This limits their view of emerging threats with critical pre-incident indicators. The shortcoming leads to unutilized data that would help construct a comprehensive view of threats and effective collaboration that could be the difference between a missed signal and mitigated threat.
ESOC’s Protective Intelligence Platform allows this process to be outsourced to fulltime ESOC analysts that can leverage the platform to its full extent and provide a protective intelligence perimeter to enhance your physical security. The data management, workflows, external data integration, and expert analysts facilitate critical intelligence collection and fast analysis.
Contract Security Operations Center SupportAlternative Security Operations Center / “Hot Site Readiness”Travel Destination Risk AssessmentsGlobal Security Resources & Asset ManagementRegional Intelligence ReportsTravel Security Planning AssessmentsSecure Journey & Travel Itinerary ManagementRemote Security Advance, Route Analysis, and Venue ReportKidnap & Ransom Evaluations/Pre-Travel Action24-Hour On-Travel Support, Coordination, and Monitoring (On-Travel Active Care)Worldwide News Alerts and Regional Incident MonitoringDaily Travel Intelligence & Threat BriefingTravel Vendor Vetting and Pre-Trip CoordinationRegional Security Asset / "Hot Contact" ManagementSocial Media, Monitoring, Analysis and ReportsPerson-of-Interest (POI) Management, Tracking, and ReportsDarknet Deep Dive Research for Backgrounds, Intelligence, and Due DiligenceSpecial Event Social Media Monitoring and AlertsSpecial Event Risk AssessmentsResearch & Booking Assistance - Travel, Dining, Entertainment, Events, etc.Private Jet, Helicopter, and Yacht ChartersForeign Language Interpreter Support Travel Crisis Management & Emergency EvacuationsPrivate Surgeon and Medical Doctor ConciergeOverseas Medical Support, Care Coordination & MedevacTravel Communications Planning and PreparationTravel Security Technology Procurement- Secure Phones, Clean Devices, IT Products, GPS Trackers, and Personal Duress DevicesForeign Travel Rapid Security Response CoordinationExecutive Travel Business and International Customs BriefingsRegional Location, Legal, Political, and Cultural Awareness BriefingsForeign Travel Safety and Security Awareness Training Professional Security Drivers and Executive Ground Transportation Executive Protection, Protective Surveillance, and Counter Surveillance Agents Technical Surveillance Counter Measures (TSCM) SupportMaritime Security Support and Consulting Corporate/Executive Travel Security Program Policies and Procedures Development Executive Office Security and Vulnerability AssessmentExecutive/Family Member Threat and Vulnerability Assessments On-Call Attorney Support and Custom Fiduciary Legal ConsultationExecutive/Family Staff Background and Reference Checks Executive/Family Vendor Due Diligence and Vetting Complete Cyber Security Support, Stress Testing, and IT Solution