security

Security for Events and Individuals

Selected by the US Secret Service as the software to transition planning for National Special Security Events from paper to digital, TACCS™ provides unique capabilities for planning and coordinating security at events of all sizes. Whether monitoring the safety of key executives or preparing for an international conference, TACCS™ visualizes the placement of personnel and other resources at each stage of the event, tracks and optimizes the costs, incorporates last minute changes, and exchanges information with the entire security team, the client and local authorities to comprehensively respond to incidents of all kinds. Its patented AI threat analytics quickly identify unexpected and suspicious behaviors so a response can be implemented before something adverse happens, and its ability to incorporate SOPs seamlessly into its workflows provides always-on support for the security team.

The TACCS™ operations center can preload event data remotely to incorporate floor and street plans, resource locations and information, and past event data for use in preparing and evaluating the security environment for the upcoming event.  Once the security plan has been created, it is easy to share through TACCS™, either on site or earlier, with key elements of the security team to finalize the plan and walk-through possible incidents and alternative responses. TACCS™ communicates with the security team on the floor using web browser technology, so no new app need be downloaded.  The on-floor interfaces are intuitive, and security team members will be able to quickly use their own devices to access TACCS™ after a brief familiarization session.  The TACCS™ role-based access controls determine access to the software and how information is shared, so the security team has complete custody and control of its data and any relevant client data used by TACCS™.   Because all of the operations are implemented through the software, hours and rates are automatically calculated as staffing changes, and the process is auditable post-event for validation both to the client and any supporting security teams.