At LMS, we are fully dedicated to assisting our clients in managing their security service providers.

By improving service efficiency and deploying security resources effectively we ensure that our clients receive
the best service with the goal of achieving 100% service delivery in their area of operations.

With an ever-evolving security landscape, traditional
security provider’s long-term static planning can quickly become obsolete.

At LMS we are constantly analysing and adapting our strategy
to the current security landscape and operational environment.

We remain independent and receive no profit, incentives or benefits from the service providers deployed.

LMS aims to provide our clients with a bird’s eye view of their operations by giving them full situational awareness of their area of operations. Our dedicated team oversees, guides and assesses all service providers including technicians, security members, drone operators, K-9 units, and tactical response teams. Our focus is not limited to service providers; we also ensure we understand the limitations and weaknesses of the area by conducting comprehensive assessments and mapping.

We ensure that our clients get the most out of their service providers while condensing their management down to one
point of contact allowing them to dedicate more resources and time to their core business operations.


What we do

LMS was founded with a passion to secure infrastructure and optimize goods delivery ultimately having
a positive effect on the South African economy. Understanding that security is only one part of the
eco-system and that the whole eco-system needs to be understood, LMS’s focus is to ensure the environment is looked at in its entirety, to create an absolute situational awareness enabling proactive decisions to be made. The client needs to be confident in the security solution and see the results, not only in the reduction of security incidents but in the decrease in security losses.

“We look at security differently”


Review of existing security complement and the environment


Daily performance measurement of service providers in line with defined KPIs


Identify inefficiencies and introduce methods to eliminate them


Ensure we have a complete understanding of the area


Promoting effective decision making


How we do it

Engage client and determine outcome required

  • What are the current losses?
  • What needs protecting and/or securing?

Review current security resources deployed

Conduct comprehensive risk assessments

Meet with security personnel; high level and in-field management

  • It is critical we understand what happens on the ground

Spend time in the field to gain a comprehensive understanding of the operational environment

Deployment planning and communication with security service providers

  • Review and/or draft SLA with each service provider
  • Define KPIs and implement a means of measuring performance

Daily review and assessment of deployment considering the operational environment

  • Including daily performance monitoring of each service provider


Incident investigations

  • Security Incident Occurs
  • LMS gathers all information from the relevant security personnel; recall meetings, interviews, and discussions
  • LMS conducts a thorough investigation taking the environment and all factors into consideration
  • Corrective action requested
    May include deployment changes / new resources introduced / resource withdrawals and/or additions
  • Continuous assessment to prevent recurrences


Security management principles

100% accountability

 Responsibility for the deployment of security service providers

Impartial Management

Receiving no profit or incentive benefits from the service providers deployed

Audit and verification

Adherence to the planned deployment resulting in client only paying for actual resources used

Less Incidents

Raising the service level, ultimately resulting in less incidents caused by criminal activity

Daily Monitoring

Monitoring of deployment and service delivery enabling informed decisions to be made

Immediate Response

Addressing Implications of non-compliance immediately encouraging higher service levels

Invoice Pre-vetting

Auditing invoices, on behalf of the client, to ensure billing aligns with actual deployment and service delivery

Emergency Fund

Placing any excess budget in a fund for additional deployments, technology, intel, or emergency situations