Protecting and Optimizing your Security Systems
Your physical security system may be successfully controlling access to your facilities, and the surveillance cameras give you visibility to the movement of people and vehicles.
But is the system itself fully protected from outside cyber threats? Can you easily get business insight from its data? Are all the systems integrated as a unified whole?
Minuteman’s Technical Services Group (TSG) is a small team of industry specialists with a rare combination of three skills: deep familiarity with security system software, cybersecurity, and coding expertise.

Cybersecurity Audits
TSG’s cybersecurity services reduce your physical and information risks, and allow you to sensibly budget for future security initiatives.
Minuteman PatchGuard. Cyber hygiene for physical security systems, focusing on vulnerabilities and patch management. Includes server/workstation vulnerability/patch scan, network scan, firmware check for access control systems and cameras, etc.
Network Security. Probing for vulnerabilities on your security system’s network, including wired and wireless network scans. This can be specific to security systems, the entire network, at one or many locations. We check all endpoints, including servers, workstations, IOT, HVAC, and so on.
Incident Response
Incident Response planning and playbook development; incident communication and coordination consulting; training and simulated incident drills; and table-top exercises.
Risk Assessments
Information security risk assessments against accepted industry standards, like HECVAT, NIST CSF, CIS Critical Controls, HITRUST, IAHSS.
Penetration Tests
Thorough pen testing, including social engineering, physical penetration tests, black-box, and white-box.
Log Aggregation and Analyses
Installation and configuration of Security Incident and Event Management (SIEM), Physical Security Incident Management (PSIM), and log aggregation assistance using Elastic, Splunk, Greylog, or similar tools.
Data Services
Your security data holds valuable business insights – but is that knowledge isolated in different repositories? TSG can perform database work to provide behavioral analytics, refine door schedules, and harmonize data sets.
Incident Trends Analysis. Collect data on past security incidents like theft and vandalism to identify patterns over time.
Access Control Insights. Analyze access logs to see who enters and exits the premises, highlighting unusual access patterns or unauthorized attempts.

Response Time Analysis
Track and analyze how quickly security personnel respond to alarms or incidents, to identify areas for improvement in emergency protocols.
Employee and Visitor Behavior Patterns
Collect and analyze data on employee or visitor movement to optimize security presence and improve safety measures.
Security Equipment Performance
Monitor and analyze the performance of security systems to ensure optimal operation and timely maintenance. Specific use cases include misconfigured alarm triggers, camera functionality and settings, firmware consistency, and patch currency.
Database Work
Importing, filtering, and transforming data. This custom service can include cleaning data, fixing errors, building processes to automate rote data tasks, mapping data for improved visual reference, custom reporting, creation of dashboards, trend analysis, and system event information analysis.

Application Engineering
As new security software is introduced or upgraded at your facilities, the connection with separate systems is often attenuated or unacceptably incomplete. TSG improves the data connections between systems, restoring full functionality.
Synchronization between Human Resources Information Systems (HRIS) and access control software platforms is a common use case for custom Application Engineering. Newly hired employees can automatically be assigned the correct facility access times, based on their categorization in the HRIS. A bidirectional sync sharply reduces the risk of human error when terminating an employee, thus closing a security vulnerability.
Training Services
TSG’s comprehensive custom training program goes far beyond basic manufacturer guidance to ensure your security operations team achieves maximum proficiency. Through technical systems and troubleshooting training, your staff will master operations while minimizing system downtime. Expert instruction in access control and visitor management enables strict security with smooth facility access.
Specific lockdown training and simulated exercises empowers your team with critical emergency response capabilities, ensuring swift action during critical situations. Role-specific training creates a coordinated security approach, while cybersecurity awareness programs protect against both physical and digital threats. This multi-faceted approach prepares your security team to handle any challenge while maintaining operational excellence.

Certifications
TSG staff have earned the following certifications.
- Certified Chief Information Security Officer (CCISO)
- Computer Hacking Forensic Investigator (CHFI)
- Certified Information Systems Security Professional (CISSP)
- Certified Network Defense Architect (CNDA)
- Certified Information Systems Auditor (CISA)
- Certified Ethical Hacker (CEH)
- Penetration Test Plus (PenTest+)
- Certified Incident Handler (CIH)
- ITIL Foundations
- EC-Council Certified Security Analyst (ECSA)
- Certified Threat Intelligence Analyst (CTIA)
- Certified SOC Analyst (CSA)
- Wireshark Certified Network Analyst (WCNA)
- Certified Data Privacy Solutions Engineer (CDPSE)
Ready to get started?
Get in touch with us today to discover how we can support you, or to schedule a discussion.