• Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map

Phone:985-875-0119

Consultants@sds-web.net
Security Design Solutions LLC Security Design Solutions LLC Security Design Solutions LLC Security Design Solutions LLC

Protect your business from loss and liability!
SERVING CLIENTS SINCE 1998

  • Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map

Archive


Entries by Michael K

Home Author Michael Khairallah

About Michael Khairallah

Michael is a physical security systems consultant providing services to clients throughout the United States. Michael entered the security industry in 1980 as a Manufacturer’s Representative for Cardkey Systems then founded Card Access Systems where he served as President and CEO for 17 years. He became an Independent Physical Security Systems Consultant in 1998 and provides all the elements of risk assessment and mitigation for his clients.

1

How to do a Physical Security Assessment

Jul 19, 2024

If you are considering a physical security assessment, please visit this website to preview my new book.  In the book you will find a step by step guide to conducting your assessment, establishing solutions and implementing your plan.  If you are working with a security professional to do your survey, using this book will help […]

2

I Need Help!

Jan 15, 2021

Private security generally takes a proactive approach, the objectives are to deter, detect and delay unwanted human activity.  But sometimes the perpetrator avoids or overcomes all measures to prevent their actions and now security must respond to a potential incident that is already underway. The worst case is when the perpetrator has confronted a protected […]

3

Reopening Securely

May 22, 2020

Everyone is anxious to get back to work and in the excitement of reopening, security can be overlooked.  Actually, security must be your first consideration for several important reasons.  Attention is lax; everyone is focused on restarting their job, renewing acquaintances and remembering where they left off months ago. Security procedures may have been forgotten, […]

4

You Should be Alarmed

Jan 19, 2018

You should be alarmed … and monitored!  Forgive my play on words to get your attention but the concern is real, a facility not properly alarmed and monitored diminishes the value of other security mitigations.  For example, without alarms how would security forces know to respond to a break in or an unsecured door, or […]

5

When is a Security Assessment Required

Nov 8, 2017

This month’s discussion was prompted by a post on Linkedin that referenced an article titled “How Often Should You do a Risk Analysis?”  The author makes some good points such as: Clients wait 3 – 5 years (a lifetime in security) between reviews Risk is not static, it changes without forewarning Circumstances change making your […]

6

Access Control

Oct 17, 2017

Who, goes where, when … that is access control in a nutshell.  In this post we will discuss why we need access control, some of the variations in how it is applied and some suggested techniques on applying these systems.   Why Do We Need Access Control All security systems start with a controlled perimeter.  […]

7

Are Your Perimeters Secure

Sep 16, 2017

With all the attention being paid to electronic gadgets these days we sometimes lose sight of the basic elements that establish security, perimeters.  What is a perimeter; in security we define it as:   … A contiguous set of barricades such as walls, doors and natural features (like a rock face or the side of […]

8

Do you really need a Threat Assessment

Aug 15, 2017

Let’s first define a threat assessment, the textbook definition is:   “A threat assessment determines the credibility and seriousness of a potential threat, as well as the likelihood that it will be carried out at some point in the future”.   Many people simply lump together the elements of a threat assessment with a vulnerability […]

9

Litigation Support

Jun 4, 2017

A security consultant can help attorneys resolve difficult cases through a variety of solutions.  A consultant can interpret video recordings for frame by frame analysis, examine service records to confirm that security equipment has been properly maintained; these and other resources are available to the attorney when seeking the services of a security consultant. The […]

Find us on Facebook

Contact Us

We're currently offline. Send us an email and we'll get back to you, asap.

Send Message
Contact SDS for your assessment today Contact

Contact SDS for your system implementation today.

Louisiana Security Consultant LA-Consultants@sds-web.net
U.S. Security Consultant US-Consultants@sds-web.net
International Security Consultant International-Consultants@sds-web.net

Telephone 985-875-0119

© 2025 · Security Design Solutions LLC

  • Home
  • Security Assessments
  • Regulatory Compliance
  • Security System Designs
    • Implementation Process
  • Protocols and Training
  • About Us
  • Contact Us
  • Links
    • Service Agreement
  • Blog
  • Site Map