SlideShare ist ein Scribd-Unternehmen logo
1 von 10
THEFT PROTECTION
        “When your security matters”

       Itay Gil, CEO and Founder of PROTECT




“Estimates now range in the $80-billion for cargo and
       warehouse related theft” B. Brandman
THEFT PROTECTION


THEFT PROTECTION
 Shopping Centers
 “In 2010, U.S. retailers lost about $40 billion in stolen goods” CNN Money




Super Markets
“Anti-Shoplifting Efforts Pay Off” americantheftprevention.com




                                                      “No theft should be tolerated”
THEFT PROTECTION


THEFT PROTECTION
 Warehouses
 “many logistics firms are losing six and even seven figures to internal theft” Brandman




Goods transported by Trucks
“There is over 3.5 million truck drivers in the U.S” truckinfo.net




                                                              Parking Lot Car Theft (Video)
THEFT PROTECTION


Our Approach to THEFT PROTECTION

 Solutions

 The Basics:

 - Site Survey

 - Understanding that most of all thefts are an INSIDE JOB

 - Investigation to find the Employee responsible

 - Discovering a possible Network of employees covering one another

 - Investing in technology will only help reduce total theft occurred

 - Awareness that CCTV systems information will be circulating among employees
THEFT PROTECTION


Our Approach to THEFT PROTECTION

 Solutions

 In-depth:

 - The Human Approach is the number one solution for this problem

 - We Conduct background checks, Loyalty and Polygraph tests

 - Create a Stress Condition on all employees with access to goods, knowing that
 at any time any employee could be submitted to an evaluation.

 - We Train security staff on Suspicious Behavior and Body Language to report
 to security managers.
THEFT PROTECTION


About PROTECT

      • Itay Gil, CEO and Founder
      • Established in 1997
      • Extensive experience in
        Integrated Security Training
      • Domestic and International Markets
      • Team of Experts
      • Fields of Expertise
      • Custom Made Solutions
      • Consulting for Intelligence Gathering Technologies
THEFT PROTECTION


SERVICES & SOLUTIONS

          • COUNTER-TERRORISM Training
          • SEAPORTS Data Managements and Security
          • HOMELAND Security and Logistics
          • CROSS BORDER Immigration Monitoring
          •           INTELLIGENCE Data Gathering and Management
          •           SWAT and RIOT CONTROL Secured Communications
          • PERIMETER Control
          • IN FLIGHT Communication and Safety
          • ROADS Transportation Security, Safety and Monitoring
          • Public Safety and Monitoring
          • Chemical & Biological Threats & Precautions
THEFT PROTECTION

VALUE               - Strategic Training             - SWAT Teams
                    - Tactical Training              - Police Forces
                    - Counter Terrorism              - Intelligence
                    - Prevention                     - Surveillance
 CLIENTS



              ISRAEL :         STATE       POLICE       ARMY          MOSSAD       SHABAK

Police Departments and Special Forces in the following countries:



 USA          AUSTRALIA         FRANCE          SPAIN         GREECE         JAPAN        THAILAND

               Also Individuals, Corporations and Special Services all around the world
Itay Gil, CEO
gil@protect-usa.com


                      Protect
                      Israeli Security Solutions
                      Teddy Kollek Stadium
                      David Ayalon Street
                      Jerusalem, Israel
                      +972 2 678-3748
Itay Gil, CEO
gil@protect-usa.com


                      Protect
                      Israeli Security Solutions
                      Teddy Kollek Stadium
                      David Ayalon Street
                      Jerusalem, Israel
                      +972 2 678-3748

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (6)

SOD 4th Annual v2.12.15 500p
SOD 4th Annual v2.12.15 500pSOD 4th Annual v2.12.15 500p
SOD 4th Annual v2.12.15 500p
 
Dreamweaver
DreamweaverDreamweaver
Dreamweaver
 
Comercio electronico
Comercio electronicoComercio electronico
Comercio electronico
 
evolucion de la web
evolucion de la webevolucion de la web
evolucion de la web
 
Sigmund Freud
Sigmund FreudSigmund Freud
Sigmund Freud
 
Candace1
Candace1Candace1
Candace1
 

Ähnlich wie Protect theft protection july19th12 v1

Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Sandeep Kumar
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elementsahmed_vr
 
Syntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesSyntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesPanagiotis Kalantzis
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cade Zvavanjanja
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsThreatConnect
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales PlayIftikhar Ali Iqbal
 
Fortress Group
Fortress GroupFortress Group
Fortress Groupguest43977
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?Thomas Malmberg
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 

Ähnlich wie Protect theft protection july19th12 v1 (20)

Security For Free
Security For FreeSecurity For Free
Security For Free
 
מכון היצוא - Milipol 2011 תערוכת
מכון היצוא - Milipol 2011 תערוכתמכון היצוא - Milipol 2011 תערוכת
מכון היצוא - Milipol 2011 תערוכת
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Corporate security pdf
Corporate security pdfCorporate security pdf
Corporate security pdf
 
Tim Nolan
Tim NolanTim Nolan
Tim Nolan
 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elements
 
Syntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesSyntax IT ISGRC Products & Services
Syntax IT ISGRC Products & Services
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
 
Lecture 1 9 sam 100-
Lecture 1   9 sam 100-Lecture 1   9 sam 100-
Lecture 1 9 sam 100-
 
International Armour Co.
International Armour Co.International Armour Co.
International Armour Co.
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales Play
 
Fortress Group
Fortress GroupFortress Group
Fortress Group
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 

Kürzlich hochgeladen

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Kürzlich hochgeladen (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

Protect theft protection july19th12 v1

  • 1. THEFT PROTECTION “When your security matters” Itay Gil, CEO and Founder of PROTECT “Estimates now range in the $80-billion for cargo and warehouse related theft” B. Brandman
  • 2. THEFT PROTECTION THEFT PROTECTION Shopping Centers “In 2010, U.S. retailers lost about $40 billion in stolen goods” CNN Money Super Markets “Anti-Shoplifting Efforts Pay Off” americantheftprevention.com “No theft should be tolerated”
  • 3. THEFT PROTECTION THEFT PROTECTION Warehouses “many logistics firms are losing six and even seven figures to internal theft” Brandman Goods transported by Trucks “There is over 3.5 million truck drivers in the U.S” truckinfo.net Parking Lot Car Theft (Video)
  • 4. THEFT PROTECTION Our Approach to THEFT PROTECTION Solutions The Basics: - Site Survey - Understanding that most of all thefts are an INSIDE JOB - Investigation to find the Employee responsible - Discovering a possible Network of employees covering one another - Investing in technology will only help reduce total theft occurred - Awareness that CCTV systems information will be circulating among employees
  • 5. THEFT PROTECTION Our Approach to THEFT PROTECTION Solutions In-depth: - The Human Approach is the number one solution for this problem - We Conduct background checks, Loyalty and Polygraph tests - Create a Stress Condition on all employees with access to goods, knowing that at any time any employee could be submitted to an evaluation. - We Train security staff on Suspicious Behavior and Body Language to report to security managers.
  • 6. THEFT PROTECTION About PROTECT • Itay Gil, CEO and Founder • Established in 1997 • Extensive experience in Integrated Security Training • Domestic and International Markets • Team of Experts • Fields of Expertise • Custom Made Solutions • Consulting for Intelligence Gathering Technologies
  • 7. THEFT PROTECTION SERVICES & SOLUTIONS • COUNTER-TERRORISM Training • SEAPORTS Data Managements and Security • HOMELAND Security and Logistics • CROSS BORDER Immigration Monitoring • INTELLIGENCE Data Gathering and Management • SWAT and RIOT CONTROL Secured Communications • PERIMETER Control • IN FLIGHT Communication and Safety • ROADS Transportation Security, Safety and Monitoring • Public Safety and Monitoring • Chemical & Biological Threats & Precautions
  • 8. THEFT PROTECTION VALUE - Strategic Training - SWAT Teams - Tactical Training - Police Forces - Counter Terrorism - Intelligence - Prevention - Surveillance CLIENTS ISRAEL : STATE POLICE ARMY MOSSAD SHABAK Police Departments and Special Forces in the following countries: USA AUSTRALIA FRANCE SPAIN GREECE JAPAN THAILAND Also Individuals, Corporations and Special Services all around the world
  • 9. Itay Gil, CEO gil@protect-usa.com Protect Israeli Security Solutions Teddy Kollek Stadium David Ayalon Street Jerusalem, Israel +972 2 678-3748
  • 10. Itay Gil, CEO gil@protect-usa.com Protect Israeli Security Solutions Teddy Kollek Stadium David Ayalon Street Jerusalem, Israel +972 2 678-3748