Intelligence & Security Services

An Eye for What Matters

Today’s organizations face ever-evolving risks that threaten the safety and security of their people, brands, and profits. The Lowers team provides intelligence and security services designed to root out potential threats, mitigate the risks, and proactively protect what matters.

Services Areas

Competitive Business Intelligence

A proper understanding of the local cultural and commercial context is essential for maximizing commercial opportunities and minimizing business risks. This includes factors such as professional reputations, government relationships, regulatory controls, and business profiles. By considering these elements, companies can navigate challenges more effectively and seize growth opportunities. Lowers can help you achieve this by providing:

  • Competitor intelligence
  • Information on sponsors, partners, agents, customers and vendors
  • Intellectual property control
  • Pre-transaction intelligence
  • Contest for corporate control
  • Patent and trademark protection
  • Intelligence on grey market and counterfeit goods

Private Investigations and Surveillance

Private investigations are sometimes necessary in litigation or before and after business acquisitions or mergers. Furthermore, they can help uncover unethical actions by business partners or reveal critical truths needed for informed decision-making. By observing the subject in their natural, day-to-day environment, we can often uncover important details and behaviors. At Lowers, we have a keen eye for the details that truly matter.

Private Investigation:

  • Gathering information from various databases is essential. These include criminal records, marriage and divorce records, mortgage records, higher education certifications, and business affiliations, among others.
  • Locate individuals
  • Social media/character investigations
  • Process service

Surveillance:

  • Covert information gathering
  • Corporate investigation
  • Insurance claims
  • Workers compensation claims
  • Associations (friends, colleagues, etc.)
  • Lifestyle assessment
  • Counter surveillance

Asset Tracing and Recovery

In anticipation of civil litigation or dissolution of marriage proceedings, or in instances where the execution of a judgement is necessary, Lowers can assist in locating assets all over the world.

  • Identify asset ownership, to include real property and business interests
  • Identify associated debts
  • Bankruptcy proceedings
  • Complaints, judgments, and liens
  • Adverse media and internet findings

Cyber Security & Risk Assessments

As the information revolution progresses, securing the technological environment becomes increasingly critical. Lowers is at the forefront of helping clients navigate the challenges of cyberspace and computer piracy. our experience investigating high-tech incidents has proven that computers have long memories.

Cybercrime is an evolving risk that requires a comprehensive approach. Protecting systems, networks, and programs from threats is only part of the solution. Equally important is having an effective response plan to recover from the financial and reputational damage caused by a cyber-attack.

At Lowers, we use an “end-to-end” approach to Cyber Risk, which includes financial forensics, risk mitigation, and preventative solutions. We proactively address today’s most dangerous cybersecurity threats, whether it’s for prevention, remediation, or loss recovery. Our clients include insurance companies and enterprise organizations operating in high-risk, highly regulated environments.

Protecting your business and its people from the inherent risks of doing business in the digital age requires a clear understanding of your risk exposure. Lowers performs risk assessments by conducting an impact analysis tailored to your business model and industry. We use sophisticated software tools and proven methodologies to pinpoint areas where you are most vulnerable to digital exploitation. These efforts culminate in a blueprint for understanding your loss probability and the operational changes required to mitigate risks.

IT Security Audits & Compliance:

An IT audit is crucial for staying competitive in your industry. Our team can assist in preparing for and responding to IT audits, whether they are conducted by internal or external auditors. With extensive experience, our international auditing team performs reviews and audits in partnership with external parties, using a wide range of IT frameworks and standards.

The penalties for non-compliance with regulatory standards are significant. Not only do they impact finances, but they also pose serious risks to brand reputation. Our cybersecurity experts assess your operations to determine how well you comply with applicable standards. To mitigate these risks, we work closely with you to implement necessary protocols. We can help you navigate the complex landscape of IT security governance standards, identify your technology and security needs, and ensure your operational readiness.

Workplace Security

Workplaces are well-advised to adequately equip their environments with an appropriate level of physical security measures. The nature and scope of those measures will vary depending on the size, volume of daily traffic, and nature of the business. Physical security may include:

  • On-site security personnel
  • Identity verification (ID badges, biometric scanners)
  • Surveillance devices (security cameras, motion detectors, drones, undercover personnel)
  • Artificial intelligence solutions (active face recognition; recognition of brandished firearms, etc.)
  • Detection tools (metal detectors, sniffing dogs)
  • Defenses (shelters-in-place, emergency exit plans, weaponry, radios)

Physical and terrorist threats to companies, executives and other personnel are a regrettable fact of life in an uncertain world.

Tiger Kidnap

Tiger kidnapping is an increasingly common and distressing threat facing businesses across the specie industry. It is a risk you cannot afford to ignore. As a leader in international risk mitigation and loss prevention, the Lowers team has the proven experience to help protect your employees, brand, and profits from the dangers of this dramatic crime.

  • Assess your risks of tiger kidnap
  • Review tiger kidnap policies and procedures
  • Validate necessary controls
  • Provide attestation of internal controls
  • Raise awareness among employees
  • Evaluate and implement training
  • Maintain your brand reputation

Active Shooter Training Programs

A comprehensive training plan will encompass everything from learning to identify and report warning signs, to sharing info about available employee support resources, to knowing what to do in an active shooter situation. Training needs to be geared to all levels and stakeholders in the organization, from employees, to volunteers, to customers, to visitors.

As you prepare employees for other emergencies, such as fires or tornadoes, through practice drills, you should also train them to respond effectively to an active shooter or workplace violence. This preparation should include helping them recognize the sound of gunshots, understand how to evacuate quickly, identify safe hiding spots, and learn how to barricade themselves. They should know how to behave when law enforcement arrives to ensure a coordinated response. Employees should also receive training on how to act against a shooter as a last resort. Ultimately, the more they practice, the less likely they are to freeze if the unthinkable happens.

Our Team

Jon D. Groussman J.D.

President,
Lowers & Associates Consulting

Neil Watson

Managing Director - UK Operations
Lowers Risk Group

Mike Hyman

VP, US Operations,
Lowers & Associates

Andrew Ballard

SVP, Business Development,
Lowers Risk Group

Request Information

Our forensics professionals are here to help you. To get started, reach out to us with an explanation of the services you are requesting as well as the best way to reach you. To send us your request via email, use the form below.

Subscribe Today

Get our latest posts delivered to your inbox: