Security Design

Security Visioning & Master Planning

Comprehensive Security Audits

Standards & Criteria Development

Architectural Security Planning

Crime Prevention Planning (CPTED)

Multi-Hazard Risk Mitigation & Management

Forced Entry & Ballistics Hardening

Security Program Development

Third Party Review & Bench-marking

Continuity of Operations Planning

Emergency & Disaster Planning

Information Transport Systems Design

Technology Visioning & Master Planning

Intercom & Emergency Communications

Virtualization

Data Center Design

WiFi Planning & Design

Digital Antenna Systems

Grounding & Bonding Systems

Network Architecture Design

Gigabit Passive Optical Networks

Outside Plant Design

M2H Protection (M2H) offers a unique capability with their security services by providing professionals that are not only certified in security management but also experienced in all aspects of security system design.  This unique capability allows our staff to provide in-depth consulting capabilities like risk and threat assessments and anti-terrorism analysis and planning services to comprehensive technical systems analysis and security systems design.  Each of these services is offered through security specialists that have in-depth knowledge and experience in a broad array of situations from high security military and federal applications to more public and private facilities; including museum, healthcare, higher education and institutional facilities.  This unique capability ultimately provides better services to our clients.  These services are generally broken down into two core components “Security Consulting” and “Technical Security Design”

Technology Enhanced Spaces
Content Delivery & Streaming
Technology Reviews
Scheduling Systems
Mass Notification Systems
Public Address Systems

Security Operation Centers

Emergency Operations Centers

Distributed Campus AV Systems

Digital Signage

Audio Visual Visioning & Master Planning

Our Capabilities

IT-Telecom, Data & Audio Visual

Security Consulting

Security Specialists

Project Management

Third Party Representation

Facility Operations Staff

Security Auditors

Cyber Security Analyst

IT-Telecom Engineers

Technical Staffing

Onsite Assessment Staffing

Program Development & Support

Special Systems Commissioning


a Service Disabled Veteran Owned Small Business (SDVOSB)
Maryland Small Business Reserve, Disabled Veteran Preference Program
Virginia Small, Woman, and Minority Owned (SWaM) Business

MWAA Local Small Disadvantaged Business Enterprise (LDBE)

Audio Visual

Facilities Support

M2H Protection services in technology stem from our history and expertise in developing complex data transmission systems.  Our services are focused on building and campus information transport systems (ITS).  Our ITS consulting practice is focused on the industry best practices and standards that ensure our designs, when implemented function to their full potential and life cycle.  M2H Protection also develops IT solutions for complex, enterprise and resilient dependent systems.  These solutions support high bandwidth and high availability critical demands.  Our Audio Visual Systems services include specialized systems focused on command & control, emergency operations, critical communications, smart classroom and distributed AV systems.  Audio Visual solutions are often professional level audio visual components meant to support emergency operations and high availability environments.  

Our Services

Info & Cyber Security

Perimeter Intrusion Systems      
Access Control Systems
Video Surveillance Systems
Intrusion Detection Systems      
Architectural Security Consultation    
Testing & Commissioning            
Screening and Detection Systems
Command & Control Rooms       
System Vulnerability Analysis     
Security Systems Integration      
High Security (Vaults, SCIFs)   

Telecommunications

Security

Vulnerability & Penetration Testing

Intrusion Systems Analysis

Information Assurance

Post Incident Forensics

Information Security Policy

SCIF Planning & Design

Electronic Eavesdropping Analysis

InfoSec Analysis

Information Security Policy

Forensic Analysis

Information Systems Planning