SPG Solutions

Our solutions bring together collaborative expertise, state-of-the art technologies and a unique understanding of our clients’ complex security needs

The following are among the solutions we provide to clients.

Security risk reviews and assessments

Security Risk Reviews and Assessments require thinking beyond expected physical measures like safe rooms, reinforced doors, or boundary walls. Our team conducts comprehensive reviews across every facet of a client’s world — including lifestyle and public profile, personal security practices, physical environments, operational protocols, SOP development, and crisis preparedness.

These assessments identify potential vulnerabilities before they become threats, ensuring strategies are layered, proactive, and tailored to each client’s unique circumstances.

Whether assessing residences or family offices, locally or internationally, our team ensures that physical infrastructure and risk-mitigation strategies form part of the broader security picture.

Assessment of online exposure

What can a hostile actor see about you — and how might they use that information?

Our Black Mirror assessments reverse the lens, viewing your digital footprint as a threat actor would. We identify sensitive personal, business, and technical information that can be accessed online and could compromise your safety, reputation, or operations.

  • Adversary View: We map exposure across open sources, identifying what malicious actors could target or weaponise.
  • Vulnerability Audit: From metadata to geolocation to legacy leaks, we surface what others miss.
  • Actionable Defence: You receive a detailed personal risk profile and clear mitigation plan — reducing exposure now and strengthening resilience for the future.

Proactive online threat monitoring

Often, the early warning signs of threat are found online. Intent to cause harm to you, your family, your assets, your business, or reputation can surface in social forums or in chatter on the deep and dark web.

The challenge is not just identifying adverse sentiment. It requires an ability to see what others don’t — to discern patterns through the fog of disinformation and misinformation, identifying those threats that pose credible risk and require further investigation or remedial action.

  • Continuous Monitoring: Our analysts monitor the surface, deep, and dark web 24/7 to detect threats early, mitigating risks to physical security, reputations, and assets.
  • Targeted Investigations: We identify client-specific threats and, where necessary, we conduct investigations into persons of interest and collaborate with local and global law enforcement and counterintelligence agencies.
  • Tailored Reporting: we develop bespoke reports that provide a curated view of findings and their potential impact, aligned with client risk profile, public exposure, and lifestyle.

Physical security solutions

Protection is personal. With client context as the driver, we align every detail — from personnel selection to deployment protocols — with our client’s lifestyle, risk profile, and preferences.

Our hand-picked Field Operatives — with backgrounds including elite military, intelligence, law enforcement and top-tier protection — are selected for a critical balance of security intelligence (SQ) and emotional intelligence (EQ), adapting seamlessly to your world, whether behind the scenes or visibly present.

Among the services provided are:

  • Individualised Close Protection: Individually matched to each client for factors like required skillsets, presence, and fit.
  • Versatile Deployment: Flexible assignment, including protection while travelling, public and corporate events, security driving, property guarding, site security and contractor supervision.
  • Advanced Planning and Threat Assessment for Global Travel: Advance reconnaissance, route and location scoping, protocols for emergencies, extraction and evacuation, as well as protection of aviation and maritime assets.
  • Fully Integrated with Our Security Capabilities: Our Field Operatives do not operate in isolation. They are backed by our full array of security capabilities – connected in real-time to our 24/7 Security Operations Centre – and they play a critical role in frontline intelligence gathering.
  • Provision of Residential Security Teams (RST) with dedicated in-house patrol and response capabilities, alongside Embedded Security Agents.

24/7 GSOC monitoring – centralised security operations

Security has many moving parts. Even specific solutions, like residential alarms, must consider how systems are monitored, how incident response is managed, and who clients turn to for advice and assistance.

Our Global Security Operations Centre (GSOC), staffed by intelligence analysts operating from our Sydney-based offices, is designed to address these challenges. It’s the central hub for intelligence gathering, coordination and communication across all aspects of client security, and 24/7 response to all client enquiries – available with a single phone call.

  • Real-time monitoring of assets and security systems
  • Always-on, single point of contact for client assistance
  • Consolidated, holistic view across all security
  • Immediate connection with operatives in the field
  • Command centre for coordinating emergency and crisis response
  • 24/7 intelligence gathering and threat assessment
  • Geopolitical analysis, country-specific reporting, and operational planning for global travel

Security technology and cyber solutions

Integrated systems bring convenience — and complexity. Interconnected security systems, information networks and devices create new points of vulnerability that can be exploited by malign actors to cause you harm — both online and in the physical world.

Viewed through a security lense, questions that need to be addressed include the source of technologies and system components, the protection of personal information — what is gathered and who is monitoring it — and the integrity of cyber systems and communication networks.

Our solutions include:

  • Independent Cyber & Technology Risk Assessments: Objective, arms-length review of all aspects of cyber and technology systems — how they integrate across personal and executive domains, potential vectors of vulnerability and recommended remedial actions.
  • Human Design Factors: Considers how systems will fit into our clients’ lifestyles, providing a nuanced balance of security outcomes and preservation of client patterns of life.
  • Advanced System Thinking: Detailed attention to situational design – including which way CCTV cameras are facing, how they are monitored and by whom, layering of access controls, and use of AI and machine learning to increase system capabilities.
  • Cyber Incident Response: Immediate guidance on remedial actions in the event of a breach, with coordination across IT and third parties. We work alongside IT and network suppliers to harden system security.

Intelligence-based vetting of new hires

When hiring new staff, particularly in trusted roles, our experience shows that traditional background checks will often miss critical indicators of risk. There is a need for deep vetting that looks beyond employment and local law enforcement checks to activity on social forums, on the deep and dark web, and across international jurisdictions.  

We go beyond routine checks to examine areas including:

  • Online Presence: Reviewing open-source intelligence, social media, public forums and unmonitored platforms on the deep and dark web.
  • Ideological Extremism: Aligned with our continuous monitoring of the geopolitical threat landscape; uncovering signs of radical political or extremist beliefs.
  • Malicious Behaviour: Identifying patterns of fraud or criminal activity, including both national and international police checks.
  • Dark Web Activity: Monitoring for involvement in compromised data or illicit dealings on dark web platforms.
  • Forensic Profiles: Where appropriate, extending our analysts’ findings with case reviews or candidate interviews with forensic psychologists.

Security systems and automation

Technology advances bring new challenges. The vast range of products and vendors complicates selection, and inter-connected systems can open potential gateways for malicious intrusion — if breached, they can pose real-world security threats.

Our approach to automation helps clients navigate these choices. Because we are not tied to specific technology solutions, we provide a broader understanding of requirements, alignment with real needs, and system-wide security integrity.

We design and implement complete security systems that integrate alarms, CCTV, access control, automation, GSOC infrastructure, and site control rooms into a single cohesive framework — delivering robust protection and seamless functionality.

  • New Systems and Upgrades to Existing: For residential, commercial, property developments, as well as maritime and aviation applications, we help provide a rational basis for decision making.
  • People-first Design: The overarching consideration is how spaces will be used and how to optimise people’s comfort and security within them.
  • Seamless Interoperability: Across residential, home and family offices, buildings or properties — or  moving between residences, maritime and aviation locations, at home or abroad.
  • Master Solution Design: For multiple instances — across property locations, for staff rotating through premises, or for a series of constructions — we can provide a solution blueprint than can be implemented consistently across new developments.

SPG Secure personal duress app

In cases of emergency or unfolding incidents, clients need a discreet and effective way to summon assistance as quickly as possible. SPG Secure is our custom-designed app, built to provide help at the touch of a button – both locally and abroad.

Fully integrated into our 24/7 Global Security Operation Centre, the app helps us close the gap between incident and response — allowing us to monitor incidents in real time and coordinate response with our field operatives as well as emergency services’ first responders.

  • Sends an immediate distress signal to our operations control centre
  • Notifies us of your exact location and automatically streams video and audio from your phone
  • Automatically notifies emergency contacts and your security team so that we can resolve the situation as quickly as possible