Our Infrastructure Security service protects our clients’ perimeter, network, platforms, servers, databases, endpoints etc

This section describes the core underlying principles of STARRDAM’s protective security methodology. This methodology defines a holistic approach to the protection of important or sensitive assets.

In order to achieve success, an adversary will attempt to identify and then exploit any perceived weakness within your protective security measures. Having an effective, proportionate security solution will mitigate the ease with which an adversary can formulate and then carry out an attack plan.

STARRDAM’s principles of Deter, Detect and Delay, Mitigate and Respond, supported by a security plan, will help to frustrate and disrupt an adversary’s attack timeline (from planning through to execution of an attack):

cs3
csz
  • Deter: stop or displace the attack
  • Detect: verify an attack, initiate the response
  • Delay: prevent the attack from reaching the asset (including measures to minimize the consequences of an attack)
  • Mitigate: minimize the consequences of an attack against your site
  • Respond: actions to prevent the goal of the attack are completed

protective security operative intelligence at Starrdam Security Management has developed into a physical security professional that has extensive knowledge of asset ranking, threat risk assessment, physical and electronic security systems, security planning, and physical protective duties.

Starrdam Security Management operatives are all trained to the highest standards and provide physical intelligence, threat mitigation, executive personal protection, employee personal protection measures, and surveillance and protection systems to our client base. With our proven ability to provide protective services at short notice anywhere in Lagos and Nigeria, with operatives based in Lagos and Abuja. Starrdam Security Management offers an unparalleled protective security service, for clients’ requirements ranging from low-key and discreet protective security to high-profile overt protection.