Physical Security Vulnerability Assessment Tool
Designed to assist all types of businesses, critical infrastructures, local, state and federal government agencies in assessing facility vulnerabilities and generating comprehensive reports based on key security areas, Vulnerability Assessment Security Survey Tool (VASST) is the first security risk self-assessment tool on the market. Unlike other cumbersome assessment methods on the market that require on-site professional analysis, VASST utilizes semi-automated software that is easy to use and provides the highest amount of support to those utilizing the tool.
VASST is broken down into three primary parts; an interview, a survey, and a report. The tool is unique because it incorporates these three different instruments into one complete package.
To improve the assessment process, VASST has been designed to allow both professionals and non-professionals alike to complete accurate vulnerability assessments. Advantages to this tool are:
1. VASST will save you time because the tool will only question interviewees on pertinent data, i.e. if you donít have a security force, then VASST will no longer ask you questions regarding security officers
2. Survey questions are generated based on the responses in the interview, similar to the above
3. VASST will validate responses in both the interview and survey to provide the most accurate vulnerability assessment
4. The report is automatically generated with a Corrective Action Plan to assist each facility with making improvements to their vulnerabilities
5. VASST can be compared to like and unlike facilities for corporate or governmental data-sharing using SAFE
VASST utilizes physical Security Assessment File Exchange (SAFE), the most interchangeable and flexible security data file format available. Developed by Aegis Bleu, LLC and Spartan Internet Consulting Corporation, SAFE provides the security and risk assessment industry with a standardized file format for the exchange of infrastructure security data. By utilizing the SAFE format, security professionals are leveraging information that can be easily used for side-by-side comparisons, regional analysis, or company-wide vulnerability analysis.