S.O.D SOLUTIONS

S.O.D Solutions specializes in analyzing, planning, and creating customized innovative solutions  for our clients.
The implementation is made by a skilled training team to streamline & improve functionality.

OUR VISION

Our aim is to equip our clients with the essential skill-set needed for their professional thrive. To make an impact, we must turn our insights into actionable tools and solutions. We deliver it by combining creativity, innovation, and decades of operational experience.
Drawing on the most effective practices and techniques from the fields of intelligence and operations, we deliver a professional and educational experience that enriches our client’s abilities.
We believe in proactive approaches to problem-solving.
Our service extends beyond initial training, providing ongoing consulting and educational opportunities.

OUR TEAM

Our team is comprised of veterans from Israel’s security agencies with decades of experience in intelligence and covert security operations. We leverage the knowledge and methodologies of the world’s top security agencies and offer our clients unmatched expertise.
We specialize in developing tailored creative solutions for our client’s unique needs and objectives. Utilizing our deep understanding of attacker techniques and viewpoints, we help our clients identify their vulnerabilities and find practical solutions to improve overall performance.
In addition, we offer customized training programs for both government and private sectors in all our areas of expertise.



OUR SERVICES

Business Intelligence Services, Special Investigations and VIP special protection

  • Covert operations – methods & skills
  • Special investigations
  • Tactical surveillance
  • Red Team assessment and Training
  • Background check
  • Business and Competitive intelligence
  • Complex legal and financial investigations
  • Employee reliability
  • due diligence report (customers, colleagues, Candidates ect.)
  • VIP Covert security operations:
    • field preliminary searches and overview
    • Undercover security observation
    • Undercover security escorting
    • Surveillance route detection
    • Analysis and writing of a Tailored security plan
    • Advanced cyber tools for detecting threats around an individual and their assets as well as Utilizing these tools to perform forensic investigations to solve abnormal events and terror activity and Extraction of intelligence from network data

OUR SERVICES


Detailed information on background checks

We conducts background checks on individuals, companies, and assets.

  • An individual’s background check includes:

    • Executive summary
    • Personal information
    • Work history
    • Education
    • Family and close friends
    • Global company search
    • Assets
    • Legal history
    • Social media appearances
    • General web-search
    • Red flags
    • Annex – other relevant issues
  • A company background check includes:

    • Executive summary
    • Market Review
    • Company Information
    • Company Structure
    • Co-Founders
    • Funding
    • Business Plan and Strategy
    • HR
    • Competitions
    • Social Media Presence
    • Red flags
    • Annex – other relevant issues

    Asset’s report:

    • Allocation of assets
    • Legal information
    • Financial information
    • Asset history

LECTURES AND TRAINING

Business Intelligence and security operations (both covert and overt) tutorials and training programs. Before our training program we conduct a thorough analysis to ensure we meet our client’s specific needs and preferences.
The main fields of training:

  • Covert operations – methods & skills (A-Z)
  • Tailoredd operational training
  • Security personnel training (both overt and covert)
  • Cyber security
  • Training for UAV pilots (Drones)
  • Business intelligence (Including OSINT)
  • Culturall awareness – security teams, company employess, personal staff
  • Security managers course:
    • “the attacker” M.O.
    • Threats prevention in the digital world 
    • Questioning
    • SOC & field cooperation