Security Audit / Information at your fingertips

Obligation free security audits and security assements for Thailand

Defence International Security Services has a team of expert assessors qualified to conduct security appreciations on your business. We also have a team of specialist assessors trained in Close Protection who can conduct full Threat and Risk assessments on you, your family, and your dwelling. These assessments are followed by a formal report detailing any suggestions for solving your security needs. These suggestions always endeavor to produce the most cost-effective, practical methods available

This is a free service and has no attached obligation.


Every client has individual security-related concerns. Our experts work closely with you to pinpoint security risks, set your program goals, and help you understand the variety of security solutions that can be used to mitigate your security risks. Based on this intensive assessment process, our experts design an integrated physical and electronic security solutions optimized for your needs and budget. We offer…

  • A comprehensive, objective review and analysis of properties
  • Analysis of current security measures
  • Key staff interviews
  • Facilities activities analysis
  • Threat and risk analysis
  • Integrated security analysis
  • Recommendations and implementation priorities
  • Doorways security plan
  • Standard Operating Procedures for security operations
  • Closed-circuit camera plan
  • Standards and procedures

Defence International Security Services work with you on a continuing basis to make sure that your security system always matches your changing security needs.

Security Audits & Reviews

Security reviews and audits are an essential task for all organizations. Our qualified staff undertake a comprehensive and independent review of your security policies, structures, and processes to ensure they are effective in dealing with the relevant level of threat. We help you to compile an up-to-date security strategy that is realistic and practical. We can look at your requirements for…

  • CCTV
  • Access Control
  • Intruder Alarms
  • Manned Guarding

Supply Chain Audits & Focused Audits

We support you in identifying simple steps you can take to ensure that your supply chain is intact. We clarify if your partners are buying from the right vendors, or selling your products in the correct territories. We also review all procedures to ascertain how your products are managed, and provide you with robust strategies that maintain your supply chain. We deal with issues such as…

  • Counterfeit Products
  • Gray Market imports
  • Unauthorized products

Contract Compliance Audits

We help you take a focused look at the way your partners and vendors are dealing with your product. These audits normally take no more than a few days, and can be carried out in most parts of the world. We can provide a quick response to a request for these audits and produce a full report within ten working days. We check…

  • Purchase of material from Authorized Channels
  • Selling within Assigned Territories
  • Inflated Purchase Orders with Large discounts
  • End of Quarter Purchasing

Compare your company against this check list…

  • When was the last time your partner / vendor had an audit?
  • Do your partner / vendor seem to be making purchases at the end of the quarter / year?
  • How do your partner / vendor store your product?
  • Is it easy to see how your partner / vendor is performing?
  • Are you sure that your partner / vendor is complying with the contract you have with them?

Risk Assessment

Security Risk Assessments

Security risk analysis, otherwise known as risk assessment, is fundamental to the security of any organization. It is essential in ensuring that controls and expenditure are fully commensurate with the risks to which the organization is exposed. Security in any system should be commensurate with its risks. However, the process to determine which security controls are suitable and cost effective is often a complex and sometimes a subjective matter. One of the prime functions of security risk analysis is to put this process on a more objective basis.

Our risk assessment identifies all your security issues. An effective security policy starts with evaluation of your organization for any weaknesses in your current security systems, or potential risks for any new sites. Our security risk assessment can…

  • Evaluate your security in your organization
  • Analyze potential risks
  • Identify any weaknesses in your current security systems and procedures
  • Provide a detailed set of practical recommendations

Personnel security risk assessment

Personnel security risk assessment focuses on employees, their access to the organization’s assets, the risks they could pose to the organization and the sufficiency of countermeasures. It is the foundation of the personnel security-management process. It is also crucial in helping security and human resource managers communicate to senior managers the risks to which the organization is exposed.

Risk assessment is the core competence of information security management.

Information security-management decisions are entirely driven by specific decisions made as an outcome of a risk assessment concerning identified risks and specific information assets. Risk assessment enables expenditure on controls to be balanced against the business harm likely to result from security failures. Risk assessment is the core competence of information security management. Every control (‘control’ = ‘risk countermeasure’) decision you make must be proportional to the actual risk your organization faces.

Security Consultancy for Businesses

We have experts in Crime Prevention through Environmental Design principles who look at your premises and make recommendations that can reduce the opportunity for crime and criminal behavior. We help redefine your present spaces or assist in new build design; we can work closely with your own design team and architects to reduce the opportunities for crime.

In the present climate companies are making cutbacks; this normally means fewer staff are doing the same amount of work. As a Facility Manager with diverse areas of responsibility and many time pressures, why not use our dedicated staff to help you with your security needs. We help you construct your policies and advise on the solutions, suitable and suitable for your company’s requirements. Compare your company against this checklist…

  • Have you checked your alarm contract in the last twelve months?
  • Have you made sure that your security providers have kept you updated with the service they provide for you?
  • Have you needed to make security changes or are in the process of making changes?
  • When was the last time you checked your security was fit for purpose?


Other Security Services

Process Serving & Trace Enquiries

We conduct these services throughout the Thailand and overseas working with associates giving us a wider coverage.

Service of Process is the stage when legal documents such as summonses, complaints, subpoenas, writs and other court documents are delivered to the individual to whom the legal document is directed. An individual who is not a party to the case must serve Service of Process.

Process Serving can be a sensitive issue; we use a diverse team of various ages and backgrounds to fit your needs and requirements. Tracing, using an extensive list of Open Source Data and a Network of Officers we can make discreet enquiries when tracing people. Where we are successful, we confirm our conclusions with photographic evidence and establish contact with the person if instructed to do so.

Background Screening & Employment Verification

Employing honest, qualified people, is critical to any company’s success. Many organizations are not equipped to do background checks themselves and, consequently, there is a danger that the candidate with false certification, or with a criminal record, could be tempted to gamble on a check not being carried out.

We undertake these checks on your behalf. A reliable background checking system is an essential and a cost-effective method for checking all potential employees, not just at the point of entry to an organization, but throughout the period of employment. This is a highly effective way of combating employee fraud and giving peace of mind that the people you recruit are who they say they are.

Training Courses

We have developed expertise in many areas of conflict management and risk assessment. We have extensive experience in the design and delivery of training courses for both large and small companies. In the current climate, the need for conflict management training for employees has never been greater.