SlideShare a Scribd company logo
1 of 10
THEFT PROTECTION
        “When your security matters”

       Itay Gil, CEO and Founder of PROTECT




“Estimates now range in the $80-billion for cargo and
       warehouse related theft” B. Brandman
THEFT PROTECTION


THEFT PROTECTION
 Shopping Centers
 “In 2010, U.S. retailers lost about $40 billion in stolen goods” CNN Money




Super Markets
“Anti-Shoplifting Efforts Pay Off” americantheftprevention.com




                                                      “No theft should be tolerated”
THEFT PROTECTION


THEFT PROTECTION
 Warehouses
 “many logistics firms are losing six and even seven figures to internal theft” Brandman




Goods transported by Trucks
“There is over 3.5 million truck drivers in the U.S” truckinfo.net




                                                              Parking Lot Car Theft (Video)
THEFT PROTECTION


Our Approach to THEFT PROTECTION

 Solutions

 The Basics:

 - Site Survey

 - Understanding that most of all thefts are an INSIDE JOB

 - Investigation to find the Employee responsible

 - Discovering a possible Network of employees covering one another

 - Investing in technology will only help reduce total theft occurred

 - Awareness that CCTV systems information will be circulating among employees
THEFT PROTECTION


Our Approach to THEFT PROTECTION

 Solutions

 In-depth:

 - The Human Approach is the number one solution for this problem

 - We Conduct background checks, Loyalty and Polygraph tests

 - Create a Stress Condition on all employees with access to goods, knowing that
 at any time any employee could be submitted to an evaluation.

 - We Train security staff on Suspicious Behavior and Body Language to report
 to security managers.
THEFT PROTECTION


About PROTECT

      • Itay Gil, CEO and Founder
      • Established in 1997
      • Extensive experience in
        Integrated Security Training
      • Domestic and International Markets
      • Team of Experts
      • Fields of Expertise
      • Custom Made Solutions
      • Consulting for Intelligence Gathering Technologies
THEFT PROTECTION


SERVICES & SOLUTIONS

          • COUNTER-TERRORISM Training
          • SEAPORTS Data Managements and Security
          • HOMELAND Security and Logistics
          • CROSS BORDER Immigration Monitoring
          •           INTELLIGENCE Data Gathering and Management
          •           SWAT and RIOT CONTROL Secured Communications
          • PERIMETER Control
          • IN FLIGHT Communication and Safety
          • ROADS Transportation Security, Safety and Monitoring
          • Public Safety and Monitoring
          • Chemical & Biological Threats & Precautions
THEFT PROTECTION

VALUE               - Strategic Training             - SWAT Teams
                    - Tactical Training              - Police Forces
                    - Counter Terrorism              - Intelligence
                    - Prevention                     - Surveillance
 CLIENTS



              ISRAEL :         STATE       POLICE       ARMY          MOSSAD       SHABAK

Police Departments and Special Forces in the following countries:



 USA          AUSTRALIA         FRANCE          SPAIN         GREECE         JAPAN        THAILAND

               Also Individuals, Corporations and Special Services all around the world
Itay Gil, CEO
gil@protect-usa.com


                      Protect
                      Israeli Security Solutions
                      Teddy Kollek Stadium
                      David Ayalon Street
                      Jerusalem, Israel
                      +972 2 678-3748
Itay Gil, CEO
gil@protect-usa.com


                      Protect
                      Israeli Security Solutions
                      Teddy Kollek Stadium
                      David Ayalon Street
                      Jerusalem, Israel
                      +972 2 678-3748

More Related Content

Viewers also liked

Viewers also liked (6)

SOD 4th Annual v2.12.15 500p
SOD 4th Annual v2.12.15 500pSOD 4th Annual v2.12.15 500p
SOD 4th Annual v2.12.15 500p
 
Dreamweaver
DreamweaverDreamweaver
Dreamweaver
 
Comercio electronico
Comercio electronicoComercio electronico
Comercio electronico
 
evolucion de la web
evolucion de la webevolucion de la web
evolucion de la web
 
Sigmund Freud
Sigmund FreudSigmund Freud
Sigmund Freud
 
Candace1
Candace1Candace1
Candace1
 

Similar to Protect theft protection july19th12 v1

Security For Free
Security For FreeSecurity For Free
Security For Freegwarden
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...James Mulhern
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Sandeep Kumar
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elementsahmed_vr
 
Syntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesSyntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesPanagiotis Kalantzis
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionShawn Tuma
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cade Zvavanjanja
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsThreatConnect
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales PlayIftikhar Ali Iqbal
 
Fortress Group
Fortress GroupFortress Group
Fortress Groupguest43977
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?Thomas Malmberg
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...IBM Security
 

Similar to Protect theft protection july19th12 v1 (20)

Security For Free
Security For FreeSecurity For Free
Security For Free
 
מכון היצוא - Milipol 2011 תערוכת
מכון היצוא - Milipol 2011 תערוכתמכון היצוא - Milipol 2011 תערוכת
מכון היצוא - Milipol 2011 תערוכת
 
What is Information Security and why you should care ...
What is Information Security and why you should care ...What is Information Security and why you should care ...
What is Information Security and why you should care ...
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Corporate security pdf
Corporate security pdfCorporate security pdf
Corporate security pdf
 
Tim Nolan
Tim NolanTim Nolan
Tim Nolan
 
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
Defentect - A Sensor Based CBRNE Threat Detection System to Detect Terror THr...
 
Information Security - The Missing Elements
Information Security - The Missing ElementsInformation Security - The Missing Elements
Information Security - The Missing Elements
 
Syntax IT ISGRC Products & Services
Syntax IT ISGRC Products & ServicesSyntax IT ISGRC Products & Services
Syntax IT ISGRC Products & Services
 
Cybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data EncryptionCybersecurity for Your Law Firm: Data Security and Data Encryption
Cybersecurity for Your Law Firm: Data Security and Data Encryption
 
Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1Cyber Security 2016 Cade Zvavanjanja1
Cyber Security 2016 Cade Zvavanjanja1
 
Lecture 1 9 sam 100-
Lecture 1   9 sam 100-Lecture 1   9 sam 100-
Lecture 1 9 sam 100-
 
International Armour Co.
International Armour Co.International Armour Co.
International Armour Co.
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn(2016_01_20)_IS_Management_Basics_LinkedIn
(2016_01_20)_IS_Management_Basics_LinkedIn
 
Operationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent ActorsOperationalizing Threat Intelligence to Battle Persistent Actors
Operationalizing Threat Intelligence to Battle Persistent Actors
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales Play
 
Fortress Group
Fortress GroupFortress Group
Fortress Group
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 

Recently uploaded

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 

Recently uploaded (20)

Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 

Protect theft protection july19th12 v1

  • 1. THEFT PROTECTION “When your security matters” Itay Gil, CEO and Founder of PROTECT “Estimates now range in the $80-billion for cargo and warehouse related theft” B. Brandman
  • 2. THEFT PROTECTION THEFT PROTECTION Shopping Centers “In 2010, U.S. retailers lost about $40 billion in stolen goods” CNN Money Super Markets “Anti-Shoplifting Efforts Pay Off” americantheftprevention.com “No theft should be tolerated”
  • 3. THEFT PROTECTION THEFT PROTECTION Warehouses “many logistics firms are losing six and even seven figures to internal theft” Brandman Goods transported by Trucks “There is over 3.5 million truck drivers in the U.S” truckinfo.net Parking Lot Car Theft (Video)
  • 4. THEFT PROTECTION Our Approach to THEFT PROTECTION Solutions The Basics: - Site Survey - Understanding that most of all thefts are an INSIDE JOB - Investigation to find the Employee responsible - Discovering a possible Network of employees covering one another - Investing in technology will only help reduce total theft occurred - Awareness that CCTV systems information will be circulating among employees
  • 5. THEFT PROTECTION Our Approach to THEFT PROTECTION Solutions In-depth: - The Human Approach is the number one solution for this problem - We Conduct background checks, Loyalty and Polygraph tests - Create a Stress Condition on all employees with access to goods, knowing that at any time any employee could be submitted to an evaluation. - We Train security staff on Suspicious Behavior and Body Language to report to security managers.
  • 6. THEFT PROTECTION About PROTECT • Itay Gil, CEO and Founder • Established in 1997 • Extensive experience in Integrated Security Training • Domestic and International Markets • Team of Experts • Fields of Expertise • Custom Made Solutions • Consulting for Intelligence Gathering Technologies
  • 7. THEFT PROTECTION SERVICES & SOLUTIONS • COUNTER-TERRORISM Training • SEAPORTS Data Managements and Security • HOMELAND Security and Logistics • CROSS BORDER Immigration Monitoring • INTELLIGENCE Data Gathering and Management • SWAT and RIOT CONTROL Secured Communications • PERIMETER Control • IN FLIGHT Communication and Safety • ROADS Transportation Security, Safety and Monitoring • Public Safety and Monitoring • Chemical & Biological Threats & Precautions
  • 8. THEFT PROTECTION VALUE - Strategic Training - SWAT Teams - Tactical Training - Police Forces - Counter Terrorism - Intelligence - Prevention - Surveillance CLIENTS ISRAEL : STATE POLICE ARMY MOSSAD SHABAK Police Departments and Special Forces in the following countries: USA AUSTRALIA FRANCE SPAIN GREECE JAPAN THAILAND Also Individuals, Corporations and Special Services all around the world
  • 9. Itay Gil, CEO gil@protect-usa.com Protect Israeli Security Solutions Teddy Kollek Stadium David Ayalon Street Jerusalem, Israel +972 2 678-3748
  • 10. Itay Gil, CEO gil@protect-usa.com Protect Israeli Security Solutions Teddy Kollek Stadium David Ayalon Street Jerusalem, Israel +972 2 678-3748