Security Management. By having a Pathfinder consultant on location, you will have a dedicated and experienced person looking after all your security needs... Due DiligenceDue Diligence is the detailed investigations of the affairs of a company... Surveillance and TechnicalOur operational procedures are strictly intended to counter any security risks launched against our clients... InvestigationsOur legitimate access to a number of databases allows us to make enquiries and draw information critical to your case... InvestigationsOur legitimate access to a number of databases allows us to make enquiries and draw information critical to your case... InvestigationsOur legitimate access to a number of databases allows us to make enquiries and draw information critical to your case... InvestigationsOur legitimate access to a number of databases allows us to make enquiries and draw information critical to your case... InvestigationsOur legitimate access to a number of databases allows us to make enquiries and draw information critical to your case...

RISK

MANAGEMENT

This misnomer is often wrongly identified to be services in allied fields but in fact plays a vital role in the assessment of potential failure or success for any potential project or new business venture, especially in volatile environments.

It is a highly specialised function and only the most skilled and experienced personnel are tasked with this function. Security Audit/Risk Management is the forensic process of identifying significant risks for the achievement of the company's strategic and operational objectives, evaluating the potential consequences and implementing the most effective way of monitoring and controlling them. This involves understanding the organisation and identifying the people and assets at risk. Establishing the probability of loss and frequency of events as well as the impact of these events, help in providing an evaluation and rating.

Pathfinder identifies the options available to prevent or mitigate risk and losses through physical intelligence led, procedural, logical, or related security processes.