{"id":907,"date":"2022-03-08T14:40:42","date_gmt":"2022-03-08T14:40:42","guid":{"rendered":"https:\/\/www.klsecurity.com\/blog\/?p=907"},"modified":"2022-03-31T15:17:06","modified_gmt":"2022-03-31T15:17:06","slug":"kl-security-partnering-with-adamo-for-all-your-scif-needs","status":"publish","type":"post","link":"https:\/\/www.klsecurity.com\/blog\/kl-security-partnering-with-adamo-for-all-your-scif-needs\/","title":{"rendered":"KL Security Partnering With Adamo For All Your SCIF Needs"},"content":{"rendered":"\n<p><p>By: Colene King<\/p><br>\n\n\n<p>&nbsp;<\/p>\n<p>It\u2019s always refreshing to find a company that shares the same values as your own: a company that has a customer-focused culture and pays attention to exactly what the customer has in mind. KL Security is excited to announce that we have recently partnered with Adamo, a customer-focused company that is one of the world\u2019s leading experts in advancing the security and the construction of SCIFs.<\/p>\n<p>&nbsp;<\/p>\n<p>Adamo began in 1962 as a design and build general contractor. By 1982, they began designing and constructing classified spaces. By the 1990s, Adamo was focusing on the high-end security market. Adamo has designed and built more than 600 projects within their 60+ years of operation. Within each project, Adamo consistently strives for excellence and meets accreditation requirements.<\/p>\n<p>&nbsp;<\/p>\n<p><\/p>\n\n\n<p>The term \u201cSCIF\u201d stands for:<\/p>\n\n\n\n<p><strong>S<\/strong>ensitive<\/p>\n\n\n\n<p><strong>C<\/strong>ompartmented<\/p>\n\n\n\n<p><strong>I<\/strong>nformation<\/p>\n\n\n<p><strong>F<\/strong>acilities<\/p>\n<p>&nbsp;<\/p>\n<p>SCIFs are used as a site for sensitive and confidential information to be discussed or shared. They are utilized by government and private entities to protect information. A SCIF could be a secure room or data center that shields against electronic surveillance and prevents data leakage of sensitive information.<\/p>\n<p>&nbsp;<\/p>\n<p>There are several security concerns that need to be addressed when building a SCIF:<\/p>\n<p>&nbsp;<\/p>\n<p><\/p>\n\n\n<p> &#8211; Physical Security and Hardening<\/p>\n\n\n\n<p> &#8211; Acoustic Controls<\/p>\n\n\n\n<p> &#8211; Visual Controls<\/p>\n\n\n\n<p> &#8211; Alarms and Access Controls<\/p>\n\n\n<p>&#8211; Electronic and TEMPEST Security<\/p>\n<p>&nbsp;<\/p>\n<p>Each SCIF has to be built to very specific standards. These standards are all laid out in the ICD (Intelligence Community Directive) 705 Tech Spec manual. This manual is managed and maintained by ODNI (Office of the Director of National Intelligence). ODNI is in charge of managing, processing, and safeguarding information for the entire country. The purpose of the 705 policy is to create a set of mutually accepted standards that will safeguard national security information.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For a great explanation of the ICD 705 and ODNI, watch Adamo\u2019s video linked below:<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><\/p>\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"ICD 705 Overview\" width=\"660\" height=\"371\" src=\"https:\/\/www.youtube.com\/embed\/37mRtS14zAE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure><br>\n\n\n\n<p><p>KL Security is excited to be offering Adamo\u2019s line of Rapid SCIFs. This is a line of predesigned 20-foot ISO shipping containers that are ready to be built to the ICD 705 standards. These Rapid SCIFs allow the customer to skip over the lengthy design process and go straight to the design approval. Rapid SCIFs are the fastest and most cost-efficient option to build a secure space ensured to meet security requirements.<\/p><br><\/p>\n\n\n\n<p><p><strong>Check out Adamo\u2019s quick video below on why a Rapid SCIF could be your best option:<\/strong><\/p><br><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Why to Choose Rapid SCIF\" width=\"660\" height=\"371\" src=\"https:\/\/www.youtube.com\/embed\/o9969K6auKw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure><br>\n\n\n\n<p class=\"has-text-align-left has-medium-font-size\"><strong>Below are the 5 Rapid SCIF options KL Security will be offering:<\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/safeandvault.com\/products\/workstations-rapid-scif-X420\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone wp-image-915\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Workstation-1.png\" alt=\"Workstations\nAccommodates 1-4 workstations and include a work surface plus two (2) shielded Cat 6 network connections per workstation.\n\" width=\"908\" height=\"346\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Workstation-1.png 908w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Workstation-1-300x114.png 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Workstation-1-768x293.png 768w\" sizes=\"(max-width: 908px) 100vw, 908px\" \/><\/a>\n<figcaption><strong>Workstations<\/strong> &#8211; Accommodates 1-4 workstations and includes a work surface plus two (2) shielded Cat 6 network connections per workstation.<\/figcaption>\n<\/figure>\n<\/div>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n\n\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis:100%\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/safeandvault.com\/products\/high-density-workstations-rapid-scif-X520\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone wp-image-932\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/High-Density-Workstation.png\" alt=\"\" width=\"908\" height=\"346\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/High-Density-Workstation.png 908w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/High-Density-Workstation-300x114.png 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/High-Density-Workstation-768x293.png 768w\" sizes=\"(max-width: 908px) 100vw, 908px\" \/><\/a>\n<figcaption><strong>High-Density Workstations<\/strong> &#8211; Accommodates 5-8 workstations and includes a work surface plus two (2) shielded Cat 6 network connections per workstation.<\/figcaption>\n<\/figure>\n<\/div>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/safeandvault.com\/products\/server-room-rapid-scif-X320\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" width=\"908\" height=\"346\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Server-Room.png\" alt=\"\" class=\"wp-image-939\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Server-Room.png 908w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Server-Room-300x114.png 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Server-Room-768x293.png 768w\" sizes=\"(max-width: 908px) 100vw, 908px\" \/><\/a><figcaption><strong>Server Room<\/strong> &#8211; Built to hold up to four server racks (24\u201dx36\u201d), plus one (1) IT workstation with receptacle and 1 shielded Cat 6 network connection.<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/safeandvault.com\/products\/secure-meeting-conference-room-rapid-scif-X220\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" width=\"907\" height=\"346\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Conference-Room.png\" alt=\"\" class=\"wp-image-941\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Conference-Room.png 907w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Conference-Room-300x114.png 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Conference-Room-768x293.png 768w\" sizes=\"(max-width: 907px) 100vw, 907px\" \/><\/a><figcaption><strong>Conference Room<\/strong> &#8211; Serves as a meeting or briefing room to hold up to 8 people (no workstations). One dry-erase display wall included. Furnishings can be included for additional fee.<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/safeandvault.com\/products\/storage-container-rapid-scif-X120\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" width=\"908\" height=\"346\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Storage-Containers.png\" alt=\"\" class=\"wp-image-943\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Storage-Containers.png 908w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Storage-Containers-300x114.png 300w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Storage-Containers-768x293.png 768w\" sizes=\"(max-width: 908px) 100vw, 908px\" \/><\/a><figcaption><strong>Storage Containers<\/strong> &#8211; Serves as a secure storage room. Includes 6 electrical receptacles.<\/figcaption><\/figure>\n\n\n<p><\/p>\n<p class=\"has-normal-font-size\" style=\"text-align: left;\"><strong>Each of these 20-foot ISO shipping containers is built to ICD 705 standards.<\/strong><\/p>\n<p>&nbsp;<\/p>\n\n\n<p class=\"has-normal-font-size\">Included in each Rapid SCIF:<\/p>\n\n\n\n<p> &#8211; Intrusion Detection System<\/p>\n\n\n\n<p> &#8211; Access Control System<\/p>\n\n\n\n<p> &#8211; Video Surveillance (CCTV)<\/p>\n\n\n\n<p> &#8211; Cooling System<\/p>\n\n\n\n<p><p> &#8211; Unlimited Accreditation Consulting Support<\/p><br><\/p>\n\n\n\n<p class=\"has-text-align-center has-medium-font-size\"><br><p class=\"has-text-align-center has-medium-font-size\"><strong>To request full details for each Rapid SCIF, click the button below.<\/strong><\/p><\/p>\n\n\n\n<p><button style=\"position: relative; display: block; width: 100%; height: 100%; text-align: center; font-size: 1em;\" data-modal-id=\"nav_get_advice\" data-form-action-text=\"Let's Talk\">REQUEST INFORMATION<\/button><\/p>\n<br>\n\n\n\n<br><p>When beginning the design process for a SCIF, there are several requirements, regulations, and government directives that must be met. Upon recognizing the need for a SCIF, knowing where to begin and how to begin can seem daunting. Adamo\u2019s construction experience and KL Security\u2019s client service together pair to successfully guide the project every step of the way.<\/p><br>\n\n\n\n<p><p>Our partners are the core of our mutual success. Our foundation is built on strong relationships with our partners, leading by example, listening to the needs of clients, and getting the job done right every time.<\/p><br><\/p>\n\n\n\n<p><strong>ICD 705 Tech Specs:<\/strong><\/p>\n\n\n<p><a href=\"https:\/\/www.dni.gov\/files\/Governance\/IC-Tech-Specs-for-Const-and-Mgmt-of-SCIFs-v15.pdf\" target=\"_blank\" rel=\"noopener\">https:\/\/www.dni.gov\/files\/Governance\/IC-Tech-Specs-for-Const-and-Mgmt-of-SCIFs-v15.pdf<\/a><\/p>\n<p><\/p>\n\n\n<br><figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/www.adamosecurity.com\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" src=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Adamo-Logo-2.png\" alt=\"\" class=\"wp-image-956\" width=\"598\" height=\"232\" srcset=\"https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Adamo-Logo-2.png 598w, https:\/\/www.klsecurity.com\/blog\/wp-content\/uploads\/2022\/03\/Adamo-Logo-2-300x116.png 300w\" sizes=\"(max-width: 598px) 100vw, 598px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>By: Colene King &nbsp; It\u2019s always refreshing to find a company that shares the same values as your own: a company that has a customer-focused culture and pays attention to exactly what the customer has in mind. KL Security is excited to announce that we have recently partnered with Adamo, a customer-focused company that is &hellip; <a href=\"https:\/\/www.klsecurity.com\/blog\/kl-security-partnering-with-adamo-for-all-your-scif-needs\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">KL Security Partnering With Adamo For All Your SCIF Needs<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":966,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[242],"tags":[311,246,243,316,248,318,317,312,247,244,314,313,142,135,315],"_links":{"self":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/907"}],"collection":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/comments?post=907"}],"version-history":[{"count":79,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/907\/revisions"}],"predecessor-version":[{"id":1007,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/posts\/907\/revisions\/1007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media\/966"}],"wp:attachment":[{"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/media?parent=907"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/categories?post=907"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.klsecurity.com\/blog\/wp-json\/wp\/v2\/tags?post=907"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}