The Fortress Group of Companies Ltd.

Address: 12 - Site 17
R.R. 2
Cochrane, AB T4C 1A2
CA

Mailling Address: 12 - Site 17
R.R. 2
Cochrane, AB T4C 1A2
CA

Phone: (403) 708-9471

Email: Click Here

Map it: Click Here

Website: http://www.thefortressgroup.com/bastion

Bastion Security

Bastion Security Teams are designed for global deployment in
high-risk situations and/or remote sites where external
assistance in response to threats is effectively non-existent,
whether it be due to poor response time of local police or
security forces, or a lack of police or security forces. The
modular structure of the Security teams allows seamless
integration with existing security measures. If there are no
existing security measures, Bastion Security will advise on the
most effective security measures, ranging from short-term
deployment of the required security teams to full-scale long-term
operations. The services are scalable by nature to allow
quick-response to rapidly changing threat levels and a fluid
situation.

Security operations utilize an intelligence-led approach to
predict under which conditions potential threats will manifest
themselves and against which targets, allowing effective
deployment of Security Teams. High Risk security operations can
only be effective when the Protection Teams have adequate time to
formulate plans to counter the expected and probable threats.
Mutual support by Bastion Security Teams increases the
effectiveness of the main protection force by providing advance
warning of unexpected or random threats and provides a quick
reaction to enhance protection in the event of surprise or random
threats.

Company Details

Year Established: 1997

Company Information

Douglas Konzuk
Title: Director of Operations
Area of Responsibility: Management Executive
Telephone: (403) 708-9471
Email: Click Here

Services

Physical Asset Security

Personal Protection Operations in which the primary objective is to provide close protection of a threatened individual in times and locations of high risk. Secondary objectives concern themselves with the safety and security of the individuals, groups or organizations which are associated with the targetted individual, such as family, friends, business associates and innocents who are at risk or would be affected as a result of any threats manifesting themselves against their target. The duration and scope of personal protection tasks is highly dependent on the threat level and can range from uninterrupted 24 / 7 protection as long as necessary, to specific times or locations such as transport, threatened events or while in high-risk or remote locations.

Security Intelligence The primary objective of Security Intelligence Teams is the identification of threats, both current and potential, as well as the prediction of which targets these threats will manifest themselves against, when and how. The secondary objective is to deny information to any threats which are in the process of identifying and evaluating likely targets, or in the planning phases, to dramatically reduce the chances of success or outright dissuade them from manifesting themselves against their chosen target(s). Accurate and timely intelligence on current threats is essential to allow the Security Team sufficient time to plan for and counter these threats. Threat modelling aims to predict the conditions which must exist, or the extent that current conditions must change, to turn potential threats into current threats, allowing the Security Team sufficient time to adapt to a changing situation and source, ready, and ultimately incorporate necessary resources into the Security Team.

Intellectual Asset Security Intellectual assets are those information based assets which may have a mental, physical, verbal, electronic, or other form and may benefit unauthorized individuals or organizations, whether it is obtained through observation, duplication, interception, or other means. The primary objective of Intellectual Security Operations is to deny access to stored (short or long term) or transmitted information to those who are not authorized to access this information. The secondary objective is to ensure that those who are authorized do have access to the assets when required.