Slide background

much more!

... Than Just Security

DISCREET – EFFECTIVE – EFFICIENT

Slide background

High Risk Static Guarding

Event Security

Computer and mobile phone Forensics

Slide background

Dynamic, Fast Moving, Flexible and Responsive

much more!

... Security at it's very best ...

First Class Security Consultancy

Slide background

Capability to work within the UK and Internationally

Covert Surveillance Capability

First Class Security Consultancy

Slide background

UK and Internationally

Asset Protection

First Class Security Consultancy

Slide background

UK and Internationally

Asset Protection

First Class Security Consultancy

logo-ring

Do you require Iron Hill Global services?

DISCREET – EFFECTIVE – EFFICIENT

OUR SERVICES       CONTACT US TODAY

Frequently Asked Questions

So what is data recovery?

The classical definition is that data recovery is the process of retrieving the data from

Damaged disk drives, media, computers, peripherals or operating systems or recovering

Lost or deleted data from media

What can computer forensics actually recover?

Often, forensics are invoked to recover: hidden files; damaged or corrupted files; deleted files;

Password protected files; encrypted files; email and web mail correspondence;

Evidence of web browsing; internet chat data;

Are you licensed by the SIA (Security Industry Authority) ?

All our security officers are licensed by the SIA. This license means they meet the SIA’s exacting standards and have been trained in: –

Security Industry, and roles and responsibilities of Security Officers, including Health and Safety at Work, the Law, Customer Care and Social Skills, and Security and Emergency Systems Communication Skills and Conflict Management.

All our officers are SIA (Security Industry Authority) licensed, which means they have been rigorously screened and tested to the SIA’s standards.

Do you offer training in countries other than the UK?

Yes, IHG offer all forms of security training internationally our aim is to provide local nationals with the skills and knowledge to operate within the security environment as efficient and effective members. We are able to custom make training packages to suit all requirements of our clients.

What is countersurvelliance?

Countersurveillance refers to measures undertaken to prevent surveillance, including covert surveillance. Countersurveillance may include electronic methods such as bug sweeping, the process of detecting surveillance devices, including covert listening devices, visual surveillance devices as well as Counterveillance software to thwart unwanted attempts by cyber crooks to access computing and mobile devices for various nefarious reasons (e.g. theft of financial, personal or corporate data). More often than not, countersurveillance will employ a set of actions (countermeasures) that, when followed, reduce the risk of surveillance. Countersurveillance should not be confused with surveillance (inverse surveillance), as the latter does not necessarily aim to prevent or reduce surveillance.

What is Surveillance?

Surveillance includes various methods to obtain information, to make connections, and to establish a person’s location.  Surveillance implies the monitoring of the activities of an individual or persons, a place or an object.  Depending on the item to be placed under surveillance, the surveillance team can use one or a combination of methods including: static surveillance, foot surveillance, mobile surveillance or technical surveillance.  Typically, technical surveillance involves the use of GPS-based tracking devices, telephone taps, email interception, mobile phone monitoring and reviewing of your SMS stream to include social media sites. Technical surveillance may also utalise optics such as binoculars, spotting scopes, night vision equipment, infrared cameras and wireless and remote images transmission technology.

Will anyone ever know an investigation is or has been undertaken?

No one will ever know unless you tell him or her.

Will I be breaking the law or asking you to on my behalf?

No. We always work within current UK legislation.

How is the information reported?

We will, in most circumstances provide an end of an investigation full report. This is sent to you in a manner you are happy to receive it. In some circumstances clients only wish for a verbal report. During the course of an investigation clients may wish to have telephone updates and this is accommodated wherever possible. Any video evidence obtained is present on a DVD or if requested, via an electronic file.

What are the duties of the Residential Security Team?

Whether the property is currently occupied or not the presence of a Residential Security Team is a vital element in the protection of our your personal and private interests.

In recent years there have been many cases of residential failings and breaches of security leading to criminal activities ranging from burglary to espionage and unprovoked attacks.

Here are few examples of the roles of the Residential security Team:

Monitoring access to residence.
Monitoring mail, deliveries.
Maintaining existing security systems.
Providing a presence to unwanted visitors.
Monitor, maintain both inside and outer grounds.
CCTV monitoring.
Foot Patrols.
Continuous threat detection.

Are the RST Team static guards?

No All IHG RST Teams are highly trained close protection officers who have a wealth of experience both nationally and internationally.

About Our Company

  • support@ironhillglobal.com
  •  02071291131
  •  Unit C10 Ashmount Business Park Swansea SA6 8QR
  • View large map

Professional Security Services

We are dynamic, fast moving, flexible and responsive to the needs of our clients and the environments in which they operate. We provide each client with bespoke professional and personable service, which guarantees complete and absolute confidentiality and discretion at all times.