Command Security brochure

12
Y'"9

description

 

Transcript of Command Security brochure

Page 1: Command Security brochure

Y'"9

Page 2: Command Security brochure
Page 3: Command Security brochure

Gommand Perlormance

. Thi kind o1 pcrlirrrartt L|.rL ronrts liorr meticulous preparation.

r TlrL llril ol lr,rtirrrrnrc thar nsrrlts lronr flawless execution.

. Tlre I f(l ol 1r.r'tirrrrrnrc rhrr exceeds your expectations.

Command Performance lr \ tlrr prrlirlrrarrrc )ou (an .\prrlrlrrn loLr |.rrt!tr \\rth a(nrrrir(l Sr(rr t) 1l)r )r)rLr \&Lrit) llrrds.

Page 4: Command Security brochure

I(

*'

Page 5: Command Security brochure

Meticulous Preparation

+ Flawless Execution = Glient SatiSlaCtiOn

Businesses today fi.e urprecedented

chall€ng€s to ensuring the protec-

rion of yaluable corporate resurces,

indudinS f.€ilities, imelectual prop-

erty, and most importandy, p€ople.

Now more then ever it ls Gitical to

pafln€I with a secudty fum that willprovid€ the hiShest quality services

that arc €ustomized to me€t your

hdividual requilements.

Cornm.nd S€cuity is oDe of ftclarg€.t independeDt security service

Ihms in th€ United Srares, servinS

clients across th€ €ountry in a wide

"when it came rime to develop a securiry program

at sidmal, we were coofident that the management

leam ar Command Secuity would bring the experi-

ence and skills necessary to really make a difference.

our conlidence has been well placed. tt

Janti Arm.d.Sidm.t hbol.tolils,Irc.

veiery of iDdusries. Our size

allows us ro be nimble and stay

dose to our dienE, givtrg us lhe

rbility to Bpond quiclly to me€t

sFcinc die needs.

we understand that ii€ qualiry ofour se ice dep€nds on aunctirgud retaininS employees of drc

highest cariber. Recruils go thrcugh

an inteffive s.reeninS procEs ro

ensu€ that they meet our siturgent

prcfesional requirements.

Page 6: Command Security brochure

We understand the quality of our servicedepends on the {Utrlity Ol OUl pGOple.

Irior to assignment, ou personnel

go through a comprehensirr train-

in8 program, including the use ofstate-of-the-an multimedia rechnol,

ogt \4t also oller conrinuous rrain-

in8 for p€rsmd and managen,

indudinS site'speciffc training pro

grams to €nhance performuce in

specialized iob functions.

To select lhe right pe$omel from

our stalf to match individual client

ne€ds. we utilize ou prcpriei..ycomputerized schedding sysrem,

COMGUAR.D!. COMGUARD'stores

deiailed informadon on €ach ofour€mploy€es and di€nt lcarioDs,

which enables our manageN to

automarically match seuiry omcer

qualiffcadons and avrilabiliry io sit€

requLements. With COMGUARD',

our clients get customiad sMiryproSms utilizinS the peMmelbest suited fo. specinc tasks-

In addirion to auromating &e shed-uling fuction and reducing ove.-

rime lbDugh morc emcient .taJffng,

COMGUARD' facilitates accurate

paFol and billing functions.

COMGUARD' generates valuable

reports to help our ilients more elliciently muage the securiry fuctionDd benelit the bottom line.

Page 7: Command Security brochure
Page 8: Command Security brochure

\

t

Page 9: Command Security brochure

Our size allorvs us t<r be nimble and to stay

o,,r ratrr8ers hale exLlnsi\c upc.irD(. i lrw etrfdcemrnt, glarlsen (.\ and conrracr pe6onnrL

n,a agrnrrnr. This e\p(rirncccnrrrs thrt our emplolees arc

(kN\ \up..vi\Ld in dre lield, rDaiD

tiinrnS thr hiSh$r lelels o, il( rrr($rDd di{iILio( we are on lil r()

(\1,(Dd Lmnred,ate\ r(,. x.ryrn(t/

!irnarn)d\ rDd to put,Nr $raLth (){

erptrrtcc o ure for our clrrnt'

c(nrrirxl Srcuriry is (,nn),ued r(l

xalIrg ind cxceednrg Ll,cnr rxf.c(ari(nr\, rnd we speDd considerable

rinr( in(l..r18I (i).rnnuri(aling

$uh { )ur (li.nG and geu,ng ind

close to our clients.

gilnr8 fr:cdha(k. Our rnrnage(

meet rvirh (li(dG litr a lo nallvaluarion ever) n!trllh ard prcpare.eSu

lar reporh rhJt enrble senior

marageni" t(, nrern're our

Our {rc(e$ in achnvinS thi! Soal i!denonsth(t(t by (trrr high client

rerenrntrr rar(..,ur \rrIg gro$rh

and th. dirt^n) oltl,e Lliens and

induslnes \e u\( FDm finaD(ial

serlices () rrrll, iionr avrarion ser!

ices Io .onstru(ri()tr, lrcDr univesi

ries to mJnohlrunng, ConnnaDd

Se.uritI n ni(eriDg Lliert necd\ [)rrhe highest qu!lu) \cNi(cs

" tr h.r' been n1 p[-asurt to havc a prolissron.rl asso

(i r{)n \\'ith Conlnlard Slturit) lbr the past iereral

yrars. I haie lirund rhr pinnership to bc itrl benefi

cr.rl,.rnd Commancl's nrinigerrrent kanr ro bc profes

si()nil rnd rcsponsi!c ro rlrcir clienr's necrls.tt

Page 10: Command Security brochure

Now more than ever

it is critical to partner with a firm

that provides high qUality

Conrrrind so(unry is a i,,ll wvrLe

sc(orir) llnn, provrd!rg (li( (\ wirh

a ((,rrprcheDsne ran8e ol s.nkr\(un{rni^{l 1() nreer tudi!kfurlnceds. ()u te.urn) ttan,s sea less

\ i,,(.srJre \trh ,l,e dai\ (,PrErnnB

ol ,n,r (l,cnG. *orknr8 antrrn(l rlx.

(l((k Dd e\e.) day oI the Ncck as

()ur \r(rnr) olli.cB harr i \trp.rnr\!,,rk,ng kno\ledgc ol r()dr) \n)phi\rn rd \c(urit) t\rrnNConrf,ind srLurir) panneN $ llllc.dint {,curll) techD(n(,9) ((rDf intr.\ r{, rl{ld resr aDd,n,dcnrll rhe

Lattst strtt ol the art equrpnurt

. Plr rr ,rh\ ]IronDrl

.\(h(l, lrillir.oDuol

.\',r,,,,rrh,l,p&cL

.lrrrL r!\ r() tucdrn\

customized services.

AnxDg rlx c(t iftr)enl \e atu (nr

renrl) ulilrin! a J Dew idinlifi(arbn !)!Ienr (ill(l I\TILLICHEC(

drar nnnx\liJle\ .oDtirms thi(n,gh

nitin)al D\lI ntr$orl c ralidn)

,)f an nrdi\ ldual\ (]rn16 li(nse

Thi! !re (n iilvanc(d r.chnologl hr

our skrlled ('1li(.rs ir alorher erurple oltltr sa) Cotrnnand Se.u.r)(,inrbinr\ ntrictr1,tr,\ prepararnnr

\!irh lla\\lcs (\(urbn ro deh\er

colrmdd Performance dre kind

ol perlannrinr rl,ar (oDrmrau

exceed\ Lliorr rxp.(raooDs

Page 11: Command Security brochure
Page 12: Command Security brochure

-F\LiS