We are experts in conducting security vulnerability assessments and threat analyses. We prepare design analysis, plans and specifications, cost estimates, and construction documents in accordance with the DoD’s AT/FP, UFC, and ICD design criteria, as well as Special Operations Forces security requirements. We have expertise in identifying the strengths, weaknesses, vulnerabilities, and deficiencies or security and response policies, procedures, and technical systems to determine the overall resiliency of security programs.
Our expertise includes planning and design practices, such as monitoring and surveillance equipment, bullet-resistant barriers, blast protection, security access points, man-traps, redundant utility systems, and construction barriers; as well as design and installation of technologies to strengthen and reinforce structural members and building envelopes.
We conduct vulnerability assessments and threat analyses for critical communications and operations centers, power plants, power distribution grids, and other critical infrastructure. We develop AT/FP designs for both new and renovations of single-story and multi-story facilities and industrial assets. We design and install blast and bullet resistant windows, doors, blast walls, bollards, and ballistic and blast barriers to protect both personnel and critical assets.
ZAPATA has the expertise to help defend your cyber-infrastructure. We offer services in cyber-facility design, securing, and hardening of industrial control systems. With proper network segmentation, we reduce your risk of compromise.
We provide guidance and support services for your small and micro-business to become compliant with NIST 800-171. Let our security specialists guide you through the 14 Security Requirement Families and assist you in developing your System Security Plan and Plans of Action & Milestones.
Whether you are a Federal Government contractor or Subcontractor to one, DFARS 252.204-7012 likely applies to you. Let us help you meet NIST 800-171 while also determining your cyber risk so that you may make informed business decisions.