BUSINESS / OVERVIEW

BUSINESS / overview / GLS258NAW4EU6COMZ3X9VDTQR7B5HKF1
Read CEO Pendland's Latest Whitepaper for Executives
Get Started ↖

Minimize Operational Risk and Maximize Customer Trust with Atrisk

Since inception, Atrisk has enabled employers (organizations) to understand the utility of their workforce. Transforming each employee into a valued and valuable component of the security, reputation, and profitability of their organization. Employee Terminal is the software/operating system used to interface with employee tools and services. Software Frontend, Human Backend. Accessible, comprehensive, fully integrated safety/security suite that works automatically in the background of an organization from day one. Employee Terminal is actively managed and its services are operated by the dedicated Advisor to the organization. Atrisk supports the seamless optimization and integration with any existing safety/security training and policies. For example, utilizing LIDAR mapping of locations to optimize evacuation routes and to let employees visualize their optimal path to fire extinguishers, first aid kits, etc. Integration and human-first training ensures that the framework is both approachable and adaptable, preventing the common pitfalls of rigidity and uselessness seen in traditional solutions.

Atrisk provides the actively managed suite of internal services and tools used by employees to respond properly to every incident, always know what to do, protect people and property, etc.

The human-first approach to safety and security leverages the inherent capabilities of every workforce. Rather than traditional security solutions which rely on external hardware or personnel that make customers feel like criminals, and instead of framing safety/security as an entirely independent function, equip every employee with accessible, highly effective training and tools, improving capabilities and confidence in a way that feels approachable and empowering. An advantage of this framework is that it's naturally proactive, rather than reactive. With traditional solutions, for example surveillance cameras, they are designed to be useful after the incident has already occurred, and are accompanied by privacy implications. Atrisk equips employees to mitigate or entirely prevent incidents with safety-first action and situational awareness. This does not transform employees into security personnel; rather, it equips them with the information and insight to maintain their own safety, in itself mitigating possible damages, protecting people and property, in that order. Atrisk creates a sense of duty and responsibility across the workforce that palpably sits right below the surface of everyday tasks.

01
02
03
04
SCROLL
TO EXPLORE
EMPLOYEES ARE THE
FIRST LINE OF BUSINESS
SOFTWARE FRONTEND
HUMAN BACKEND
TURN EMPLOYEES
INTO EXPERTS
OVERVIEW
[ INTRO ]
GET STARTED

The invisible alternative
to traditional security

Get safe, trusted,
protected employees

Your workforce is the
security system

Respond Properly
Protect Property

Minimize Risk
Maximize Trust

OVERVIEW
Employee Terminal ]
GET STARTED

The all-in-one safety/security
training and service suite

Automatic integration
via access controls

Integrate seamlessly with any existing policies and procedures, enabling a painless transition with an immediate enhancement to security integrity and resilience. This integration extends the capabilities of your workforce, allowing them to access vital information and support without disrupting their workflow. It’s not just about having resources; it’s about making them accessible and effective within environments your employees already navigate.

Software Frontend
Human Backend

Employee Terminal is the gateway to turning every employee into a more confident, safe, trusted, and productive participant in your organization’s safety and security. With the all-in-one suite, employees are equipped with tools and knowledge to handle critical situations, creating a culture of readiness and responsiveness. This empowerment goes beyond traditional training, embedding a sense of duty and awareness into the everyday workplace.

Interface for employee
training and services

Make employees feel like special agents, with duty and honor; the Employee Terminal serves as the center for continuous exposure to safety and security, including the on-board library of Training Materials, Trend Reports, and more. Depending on their Clearance Level, employees have round-the-clock access to the tools and services; this in part ensures that your workforce not only knows the latest information but is also ready to respond with a plan instinctively.

OVERVIEW
LIDAR Emergency Planning ]
GET STARTED

Workplace LIDAR for planning
and preparedness training

Interactive 3D
safety mapping

Transform your approach to emergency/incident preparedness. Utilizing LIDAR technology, your Dedicated Developer creates annotated and navigable 360° models of facilities, emphasizing critical safety features including emergency exits, fire extinguishers, first aid supplies, assembly points, etc. These maps are not only detailed but also interactive, allowing employees to explore their environment virtually to better understand their roles in emergency scenarios. This level of detail ensures that all employees are familiar with the location layout and safety protocols, enabling more efficient, effective, and organized responses to future workplace emergencies.

Recognize and respond
properly to every incident

This revolutionizes how employees perceive their surroundings in critical situations. LIDAR scans are initially collected by any employee that works at the location, in under five minutes, collected data is then sent for modeling, annotation, and integration. This allows employees to visualize the escape routes and safety equipment locations from their desks, offices, workstations, etc. Atrisk LIDAR modeling gives employees an X-ray view of their location, for engaging and enjoyable visualization of their safest exit routes and their spatial relationship to the fire extinguishers, medical supplies, fire alarms, and more within their location.

Explore with AR, VR,
and holograms

This technology provides a dynamic space for employees to engage and interact with their work environment in ways that are both educational and highly engaging. These models are also made to be AR, VR, and Hologram-ready, for an even more immersive planning experience. AR and VR versions of the models can be accessed and interacted with using a modern smartphone, or with specialized viewing devices. Whether displayed as augmented reality on a phone, experienced as a virtual reality simulation, projected as a hologram, or viewed on a desktop, laptop, tablet, or phone, these models offer an engaging way to train for and visualize responses.

OVERVIEW
HERO Platform ]
GET STARTED

Emergency services, incident
reporting, live capture, etc.

Become a HERO,
use emergency services

The HERO Platform is your emergency command center, offering employees the power to act swiftly and effectively during emergencies. From dialing emergency services to reporting incidents, this platform provides a unified interface that simplifies critical communication. Its intuitive design ensures that employees, regardless of their technical skill, can navigate and utilize features under pressure, making safety a collective and accessible responsibility.

Capture evidence
for investigations

Improved response and documentation with Emergency Capture, allowing employees to livestream incidents directly to the cloud. This real-time cloud backup functionality is crucial during emergencies as it ensures footage is always being continuously uploaded, even if the recording device loses connection or is compromised. By safeguarding this real-time data, the platform provides a reliable "Digital Witness" that can be instrumental in investigations, capturing critical moments for security, legal, insurance. and other purposes.

Ultimate response
and recovery

With the ability for every employee to automatically capture and upload incidents to the cloud, the HERO Platform acts as a vital tool for securing visual evidence. This capability is essential for accurately documenting incidents, identifying perpetrators, and providing undeniable proof for legal and insurance claims. It ensures that all recorded footage is preserved, providing a transparent and accountable record of events as they unfold.

OVERVIEW
Training Materials ]
GET STARTED

Browse training documents,
recordings, versions,
etc.

Foundations for
self-assured employees

Training Materials form the backbone of the security strategy, providing a robust library of resources designed to educate and inform. From detailed document guides to interactive simulations, these materials are crafted to ensure that every employee is well-versed in the latest safety protocols. The broad spectrum of formats, from audio to digital, ensures that learning is adaptable and accessible to all, regardless of their preferred learning style or technological proficiency.

Always know what to do,
before it happens to you

Practical, flexible, and accessible information is central to all effective responses by employees, and Training Materials are developed with this in mind. Including Scenario Blueprints, featuring social engineering Transcript Simulations, these materials offer employees a first-person POV into navigating criminal encounters and various emergencies, including medical. This not only improves engagement, but also builds confidence, enabling employees to act decisively and appropriately when faced with real-life challenges.

Updates for
evolving threats

As emerging threats evolve, so must our understanding of what they are and how to respond to them. This is, in part, why Advisors work to make sure that existing Training Materials are continually upgraded to reflect the latest safety and security trends. This commitment to current content helps employees stay informed about emerging threats and new compliance requirements, fostering an environment of ongoing vigilance and proactive adaptation.

OVERVIEW
Individual Briefings ]
GET STARTED

Talk through your personal
questions and concerns

Personal consultation
for every employee

Individual Briefings offer a unique opportunity for employees to engage in one-on-one, private, and safe conversations, tailored to address their concerns and questions. This direct, pseudo-personal interaction ensures that every employee feels heard and supported, fostering a deeper understanding of safety protocols and enhancing personal responsibility within the security framework.

Building confidence
through dialogue

At the core of Individual Briefings is the promotion of open communication and questions. These sessions are designed to encourage honest dialogue, where employees can freely discuss their safety and security questions without fear of judgment. This approach not only clarifies individual roles in crisis situations but also builds the confidence necessary for employees to act decisively and effectively when needed.

Sustained training
and engagement

Individual Briefings are more than just informational sessions, they are a cornerstone of the Atrisk framework of continuous development and engagement in workplace safety/security. By requesting these briefings, employees stay updated on the latest strategies and changes in the safety/security landscape, maintaining a high level of readiness and adaptability across the entire organization.

OVERVIEW
Asterion ]
GET STARTED

Simplified AI assistant for
rudimentary questions

Security assistance
at your command

Asterion [Assistant] is designed for simplicity and efficiency, offering employees immediate access to answers for their safety and security questions. This AI-driven assistant is always ready to provide detailed, easy-to-understand explanations on a wide array of topics, from questions about how to handle medical incidents to navigating potential security threats; Asterion is the always-available, go-to resource for quick, simplified information.

Accessible, actionable
understanding

Asterion [Assistant] is fine-tuned to deliver responses that are not only accurate but also tailored to the user's understanding and context. This customization ensures that every interaction with Asterion is relevant, insightful, and actionable. By adapting to the user’s level of knowledge and specific queries, Asterion enhances learning and application of safety protocols for rudimentary questions.

Internal classroom
for shared learning

Asterion [Assistant] is more than a query tool, it is an ideal entry-point for employees with only passing knowledge of safety and security. It fits easily into their daily operations, providing a seamless interface for these employees to interact with as part of their routine. This integration helps in building a technologically empowered workforce that leverages AI efficiency to maintain high safety standards, ensuring that best practices are just a question away.

OVERVIEW
Asterisk ]
GET STARTED

Entirely unfiltered AI assistant for
high-risk scenario exploration

Unfiltered insights for
complex scenarios

Asterisk [Unfiltered] offers a unique, unfiltered perspective on high-risk safety and security scenarios, providing employees, with the set required Clearance Level, detailed explorations of potential threats. Asterisk [Unfiltered] is designed to handle the most sensitive and complex inquiries with precision and depth, offering insights that go beyond conventional advice. Asterisk empowers employees to understand and prepare for the nuances of critical situations, allowing for an unfiltered approach to safety/security.

Deep analysis for
informed decisions

With the capability to delve into intricate details of any scenario, Asterisk [Unfiltered] serves as a crucial tool for approved employees facing ambiguous or high-stakes situations. This assistant provides thorough analyses and scenario evaluations, enabling employees to make more informed decisions based on a comprehensive and unfiltered understanding of the advanced risks involved.

Platform for advanced
problem solving

Asterisk [Unfiltered] is not only an assistant; it provides a unfiltered space for high-risk problem solving. By engaging with complex queries and providing detailed, uncensored responses, Asterisk challenges employees to think critically and strategize effectively. This level of interaction fosters a proactive mindset among cleared employees, equipping them with the knowledge and skills to handle threats with clear eyes.

OVERVIEW
Aiko ]
GET STARTED

Friendly AI companion for
anxiety and stress
relief

Your supportive
digital companion

Aiko [Companion] offers a friendly and supportive AI companion, specifically designed to assist employees with managing stress and anxiety in the workplace. As a compassionate companion, Aiko offers comforting interactions and personalized support, helping employees navigate the emotional aspects of their job. This emotional support is crucial in maintaining a healthy, productive work environment where employees feel valued and understood.

Always there to
listen and assist

Aiko [Companion] is always available to listen, providing a non-judgmental space for employees to express their feelings and concerns. This constant availability ensures that employees have a reliable outlet for their stress, anytime they need it. Aiko's interactions are designed to be empathetic and uplifting, fostering a sense of realistic safety and well-being among employees.

Improving productivity
and wellness

By addressing the emotional and mental health needs of employees, Aiko [Companion] plays a vital role in enhancing overall workplace morale. Its presence helps reduce burnout and increase engagement by ensuring that employees feel supported both professionally and personally. Aiko’s comforting dialogue and stress-relief strategies contribute to a more harmonious and supportive work environment, promoting employee satisfaction and retention.

OVERVIEW
Trend Reports ]
GET STARTED

Learn about current/emerging
crime trends, methods, etc.

Stay ahead with
insight and intelligence

Trend Reports are essential within the Atrisk framework, providing detailed analyses of current and emerging crime trends and safety threats. These reports are crafted to help employees and management stay informed about the evolving security landscape. By understanding these trends, your workforce can preemptively adjust strategies and enhance their preparedness for potential threats, keeping one step ahead in safeguarding the organization.

Recognize and respond
to new crime trends

Equipped with insights from Trend Reports, employees adopt a more proactive and informed approach to their daily security-related decisions. These documents analyze not only crime patterns but also anticipate shifts in methods and tactics used by potential threats. By staying informed about these changes, your team can develop more effective defenses and response protocols, ensuring that safety measures are not just reactive but also anticipatory.

Empowering decisions
with data

Trend Reports serve as an important decision-making tool by providing data-driven insights that influence safety and security strategies across the served organization. This empowerment through knowledge fosters a culture of security that is dynamic and responsive. With Trend Reports, your team doesn’t just react to security challenges—they anticipate and prepare for them, ensuring workforce resilience and adaptability in fast-changing circumstances.

OVERVIEW
Scenario Blueprints ]
GET STARTED

Prepare for important scenarios
with guides, simulations, etc.

Practical, passive,
precise preparation

Scenario Blueprints provide a strategic and tactical edge by preparing employees for specific safety and security incidents with detailed, step-by-step guides. These blueprints are designed to simulate real-world situations, offering clear, actionable strategies for a wide range of scenarios. By practicing these guided simulations, employees not only understand what to do but also gain confidence in their ability to handle complex situations effectively.

Real-world
understanding

The effectiveness of training often hinges on practical application. Scenario Blueprints bridge the gap between theoretical knowledge and practical skills through transcript-based simulations that mimic real-life interactions and emergencies. This learning tool allows employees to compare their own responses, for example a social engineering attempt, sharpening their instincts and improving their understanding and decision-making under pressure.

Continuous
scenario evolution

As the threat landscape changes, so do the requirements for effective preparedness. Advisors check that Scenario Blueprints are regularly updated to incorporate new information and emerging risks, ensuring that employees are  always equipped with the most current and relevant strategies. This approach to scenario planning means that your workforce is not just prepared for today’s challenges but also understands and is adaptable to tomorrow’s uncertainties.

OVERVIEW
Compliance Postings ]
GET STARTED

Material information required by
OSHA, DOJ, DOL, EEOC, etc.

Streamlined compliance,
enhanced awareness

Compliance Postings serve as a constant reminder and guide for maintaining basic workplace safety standards and legal requirements. By providing clear, concise, and accessible postings on essential regulations from OSHA, DOJ, DOL, EEOC, and more, ensuring that employees and management have the required information about their duties and rights. These postings help foster a culture of compliance that protects the organization and empowers its workforce.

Accessible information,
empowered decisions

Compliance Postings and developed to be more than just mandatory notices; they reinforce the Atrisk framework while also providing the required understanding and engagement with workplace laws and safety regulations. Available in various formats, including digital and print, these resources are tailored to meet the diverse needs of your workforce, ensuring that important information is both accessible and actionable.

Integration with
daily operations

The strategic placement and integration of Compliance Postings within the workplace ensure that these important resources are more than just background noise. Making compliance part of the daily conversation it helps embed these standards into the everyday operations, promoting a continuous and proactive approach to workplace safety and the required legal adherence. This integration not only aids in compliance but also enhances the overall safety culture within the organization.

OVERVIEW
Website Monitors ]
GET STARTED

Centralized web performance
metrics, reports, status,
etc.

Optimal performance,
uninterrupted service

Website Monitors are integral to maintaining the high performance and continuous operation of your online presence. By providing metrics on web performance, including response times and uptime, these tools ensure that your digital operations remain efficient and accessible to both employees and customers. This seamless operation is crucial for sustaining user satisfaction and actual business operations, for example a 'contact us' or 'locations' page.

Analytics for digital
health management

The features of Website Monitors allow employees to be aware of potential issues by informing them to fluctuations in performance and downtimes. Centralized analytics and reports lead to better informed and deployed fixes, minimizing disruptions and maintaining a stable online environment. With these tools, your team can address issues before they impact users, protecting the operational integrity of web services.

Downtime reports
for technical teams

Website Monitors not only help your digital operations stay operational, but also provide valuable insights into their performance over time. These accessible insights are useful for strategic decision-making, allowing your organization to optimize web resources effectively. By understanding trends in web usage and performance, you can make informed decisions that protect user experience and lead to more informed digital operations.

OVERVIEW
Personal Analyses ]
GET STARTED

Describe your circumstances
for analysis, guidance, etc.

Tailored guidance
for unique needs

Personal Analyses provide individualized safety and security guidance, tailored to the circumstances and roles of each employee. By evaluating individual job descriptions, associated risks, and personal situations, Advisors deliver analyses that are not only insightful but also highly applicable. This approach ensures that every employee is equipped with knowledge and strategies to specific environments and responsibilities.

Informing personal
safety decisions

The core of Personal Analyses is data-driven insight. With detailed examinations of potential workplace differences and personal risk factors, offering employees actionable advice and strategies for mitigating threats. This empowers individuals to make informed decisions about their safety, enhancing their confidence and ability to react effectively and properly in make-or-break scenarios.

Meaningful support
and follow-up

Commitment to employee safety extends beyond the initial analysis. With options for follow-up briefings and ongoing consultations, employees receive continuous support in their safety journey. This iterative process not only helps in refining strategies over time but also ensures that employees remain informed and prepared as their functions or workplace environments change.

OVERVIEW
Incident Repository ]
GET STARTED

Submit reports or explanations
to your Advisor for tracking

Consistent and unified
documentation

The Incident Repository is a key component of the Atrisk infrastructure, designed to document and track all incidents. This centralized system ensures that every detail, from minor discrepancies to major emergencies, should be recorded and accessible for review. By creating consistent and thorough records, the repository aids in the immediate and accurate response to incidents, while also providing a database for future reference and analysis.

Respond to incidents
with historical data

With the Incident Repository, your organization benefits from a historical archive of all submitted safety and security events. This accumulation of data allows for trend analysis and pattern recognition, enabling your security team to enhance response strategies based on past incidents. Understanding these patterns is essential for predicting and mitigating future incidents, and making employee responses to incidents even more proactive and informed.

Streamlined advisor
comms and reporting

The Incident Repository also plays a vital role in improving communication between employees and their Atrisk Advisor. By providing Advisors with comprehensive incident reports and AIR Codes, they can offer more targeted advice and support. This feature ensures that each incident is not just a record but a learning opportunity, promoting continuous improvement in safety protocols and personal preparedness.

OVERVIEW
Existing Integration ]
GET STARTED

Upload preexisting resources for
optimization
and integration

Seamless integration
with existing resources

Existing Integration allows for the seamless incorporation of any preexisting safety and security materials into the framework and infrastructure. This process is designed to ensure that all available resources are optimized and aligned with current safety standards and strategies, enhancing their usability and effectiveness. By integrating existing resources, it also helps to maintain continuity and familiarity, reducing the learning curve for existing employees while also maintaining the integrity of the safety/security framework.

Improving effectiveness
through optimization

During the integration process, the Advisor evaluates and optimizes any existing training materials to enhance their effectiveness and to integrate them into the ecosystem. The evaluation looks at the accuracy, usability, and relevance of the materials, ensuring they meet the rigorous standards required for impactful safety training and response. This meticulous approach not only preserves valuable existing investments but also ensures that they are adapted to meet current and future circumstances.

Distributed access and
continuous improvement

Existing Integration provides organized and efficient access to all training materials through the Terminal, ensuring that employees have consistent and easy access to essential information. This organization aids in the smooth functioning of safety protocols and supports continuous improvement by allowing for updates and additions to the materials. This streamlined access and process facilitates a familiar yet dynamic environment that adapts to new challenges and opportunities for improvement.

Share
Subscribe
Start your review of Armada
Return Home
Search items
Compliance Identifiers
Verified LEI
VS 2549002K5Q8WU...
Managing LOU
VS 5493001KJTIIGC8Y...
S&P Global ID
VS 671947
IDO200
VS 671947
SIC Code
VS 7382
Wikidata ID
VS Q124343310
OpenCorporates ID
VS 7481692
NASDAQ Reserved
Stock Symbol
VS ATSK
Business Registrar &
Registry Identifier
VS RA000602 7481692
Regulatory Oversight
Committee (ROC)
VS Good Standing
NAICS Code
VS 56162
External Documentation

Atrisk logo (converted from light-on-dark)

Atrisk headquarters at 300 Delaware Ave

Trade name

Atrisk
ISNI 0000000513675143

Company
type

Private
NASDAQ Reserved
LEI 2549002K5Q8WUKP21B56

Traded as

Nasdaq: ATSK (Reserved)
^IXIC component (Reserved)
COMP component (Reserved)
S&P Global 8058644

Industry

SIC 7382
Security | Defense | Intelligence |
Managed services | Information
technology

Founded

United States

Founder

Nicolas Pendland

Headquarters

300 Delaware Ave,
Wilmington, Delaware
19801, United States

Areas served

United States | United Kingdom |
Middle East | Eastern Europe

Key people

Nicolas Pendland (CEO)
Jackson Dorchester (CLO)
Lovette Dobson (ELC)

Products

NAICS 56162
Software | Consulting | Infrastructure |
Artificial intelligence | Cryptocurrency
payments

Revenue

US$ Unknown (2023)

Net income

US$ Unknown (2023)

Divisions

Atrisk Employers
Atrisk Institutions
Atrisk Payments
Atrisk Fulfillment
Atrisk Intelligence
Atrisk Infrastructure

Website

atrisk.us
atrisk.co

Footnotes / references

[1][2][3][4][5]
[6][7][8][9][10]
[11][12][13][14][15]

Atrisk Corporation (Atrisk)[16][17] (/ˈætˈrɪsk/ 🔊 ) is an ultra-private[1][2] American security company
headquartered in Wilmington, Delaware,[4][5] and founded by Nicolas Pendland.[3][4] The company is
registered as a Delaware Corp,[8][9] the structure used by 66% of the Fortune 500[18] because of its
corporate secrecy and being considered a domestic corporate haven.[a][19] The company operates
within the United States, United Kingdom, Middle East, Eastern Europe, and is publicly known to
serve corporate and institutional clients,[20] focusing on at-risk, enterprise employers.[6][21] The
company started by offering "Compliance Postings," which involved legally redeveloping and
redesigning the federally-required notices of the United States Government[22][23] and other
regulatory agencies, including the Occupational Safety and Health Administration (OSHA),[24]
Department of Defense (DOD), Department of Justice (DOJ), Department of Labor (DOL),[25][26]
Equal Employment Opportunity Commission (EEOC),[27] among others. And most recently, "Atrisk
Payments," division of the company,[15] developed the cryptocurrency payment processor known as
AtriskPay,[28] which currently only supports Bitcoin (BTC)[29] and transacting with the company itself.

Employee safety and security

Training Materials, "Materials," within the context of ‎Employers & Institutions: Products & Motives,
serve as the safety/security framework of the company. These Materials are available in multiple
formats, including documents, audio files, and digital-use versions, and are designed to provide
instruction on safety/security matters. The purpose is to inform and educate employees within the
client organization, and their content attempts to encompass a spectrum of safety/security subjects.

The presentation of their information was designed to be "clear and accessible," intending for the
information to be easily understood by a diverse audience. A frequently noted characteristic of the
Materials is "adaptability," meaning they are designed to be relevant in numerous scenarios and in
reaction to changing "security circumstances." This could decrease the need for content retractions
or redistributions. Their topic variety attempts to address both general and specific safety/security
concerns, depending on the operational danger to the employer. Their distribution is facilitated
through the Platform and "situation-specific" partner content delivery networks (CDN).[6][30]

Individual Briefings, "Briefings," are one-on-one conversations between the Atrisk Advisor and an
employee. These meetings are scheduled and conducted via the Platform, and focus on providing
personal safety/security guidance. The text-based communication format is intended to encourage
an "honest dialogue," so employees may express any safety/security questions to their Advisor.

This structure is also intended to allow for "open communication," and thereby the employees are
encouraged to openly discuss their personal safety/security questions or concerns without "fear of
judgment or misunderstanding." As reported, Advisors conduct these Briefings with the focus being
"constructiveness" and based on each employee's circumstances and understanding. The Briefings
incorporate real-time, two-way communication, allowing employees to receive immediate responses
and answers to their questions or concerns. This interactive style is paired with Personal Analyses,
which could enhance the overall usefulness of the safety/security information provided.[6][30]

Scenario Blueprints, "Blueprints," are step-by-step instructional guides designed to assist
employees in handling various safety/security scenarios. They offer the framework to support
employees during realistic security incidents. The topic selection includes how to "recognize and
respond" properly to the forms of social engineering, including phishing attacks and impersonation,
in both digital and physical environments. Additionally, Blueprints provide strategies for identifying
medical emergencies and outline their best practices for managing these sensitive situations.

The scope of scenarios addressed within these Blueprints is intentionally broad, with the purpose of
preparing employees for critical situations they may encounter. A prominent feature is the inclusion
of "transcript simulations," which attempt to replicate or recreate real-life scenarios. The transcript
simulations demonstrate various social engineering techniques, including baiting, pretexting, and
quid pro quo. Through understanding the transcript simulations, employees should gain practical
knowledge about the tactics or methods used in the featured social engineering scenarios, which
thereby should improve their ability to "recognize and respond" properly. Seemingly especially for
these Blueprints, the ease of access and availability to employees is highly emphasized, they are
provided as a large percentage of Training Materials. However, even though their accessibility is
stressed, employers may still choose to suppress or restrict access via Access Controls.[6][30]

Government collaboration

Trend Reports, "Reports," are documents that analyze "current and emerging" safety/security
trends that may impact operations. They include subjects such as changing FBI crime patterns,
potential political instability, and emerging crime trends and "methods," to anticipate unexpected
increases in incidents. An important part of Reports is their examination of "emerging" methods
and techniques, as there would especially be within the fields of social engineering and fraud.

Their purpose is to provide employers/employees with insights into any developing threats to aid them in implementing "pragmatic strategies" for
preparing for and preventing incidents that could compromise their "physical or financial security," while maintaining privacy and accessibility.[6][30]

Compliance Postings, "Postings," are documents that address regulatory requirements in the workplace. These include required or recommended
content from the previously mentioned U.S. Government regulatory bodies, including the Occupational Safety and Health Administration (OSHA),[32]
Department of Defense (DOD), Department of Justice (DOJ), Equal Employment Opportunity Commission (EEOC), and Department of Labor (DOL),[33]
[26] among others.[34] The distribution and display of the information, whether "Compliance Postings" or not, is legally required.

Atrisk is responsible for accurately redeveloping and recreating Postings, ensuring they meet legal recognition standards. The recreated Postings are
then categorized as "required materials" within the Training Materials browser, inside of the Platform, to provide employers/employees with "organized
and efficient" access to compliance resources, offering them in various formats, including print, digital, audio, and "digital-use," to improve their ease of
access and to accommodate different content consumption preferences. Postings operate by fulfilling regulatory obligations regarding required
information dissemination and reinforcing other services or teachings, such as Individual Briefings or Personal Analyses, by providing third-party,
standardized, and authoritative information on similar protocols. They are also included directly within the Training Materials on the Platform. Their
relevance is optimized by aligning them with specific needs, such as varying state requirements. Postings thus provide a "consistent and compliant"
approach for employers/employees to meet regulatory posting obligations while improving employee awareness of legally required or recommended
safety/security guidelines, workers' rights, and other necessary topics.[6][30]

Technical partnerships

Asterion, "Atrisk/OpenAI," is the simplified (compared to Asterisk Uncensored) AI assistant developed by Atrisk under OpenAI, tailored for employee use.
Its primary role is to offer "detailed and immediate" explanations for questions about a variety of safety/security topics. The Asterion knowledge base is a
blend of the Atrisk principles from Training Materials and the data provided by OpenAI, which allows it to cover a range of topics. These topics are known
to include, but are not limited to, medical emergencies, fraud prevention, phishing or impersonation, social engineering, customer-involved incidents, and
threats of harm. Asterion was trained (machine learning) to generate specialized transcript simulations and expand on specific safety/security questions.

The user interface was designed for simplicity and "ease of use," with an intent of allowing users to interact with Asterion without the need for "technical
experience" or any "prompt engineering knowledge." It should handle "many–most" safety/security questions and topics. Asterion was also seemingly
developed to support a high number of concurrent users as it does accommodate usage up to the total number of registered employees within the
organization, for use in various "applications or initiatives" that an employer could, possibly upon the guidance of the Advisor, implement.[6][30]

Existing Integration, "Integration," "Upload," involves the review, potential redesign, and technical incorporation of any "existing training resources" into
the Platform. At the beginning of the "Integration process," employers/employees upload any resources using the file-explorer interface. These uploads
can include a variety of file types, such as documents and audio formats, similar to Training Materials. The reported goal of Integration is to effectively
"utilize and enhance" any preexisting training resources that the employer may already possess.

The Integration process involves evaluation of the submitted files, this evaluation examines the accuracy of the actual information, the "usability" of the
resources, and their "compatibility" with the Atrisk safety/security framework. After this evaluation, there often will be the redesign phase, which focuses
on standardizing and optimizing the resources to increase effectiveness. The redesign phase also attempts to retain any original messaging identified in
the resources and ensuring they align with any requirements, and the before mentioned safety/security framework. After any optimizations are finished,
they are then finally integrated into the Platform, and their partner Content Delivery Networks (CDN). They are organized into corresponding Training
Material sections to maintain "continuity" and accessibility.[6][30]

Data and analysis

Server Monitors, "Monitors," provide employers/employees with information regarding the web performance and status (uptime) of the domain (DNS) and
pages of their website. This monitoring focuses on web parameters such as response time, status metrics, and downtime reports, which are important for
maintaining an "optimal user experience." A primary function of the Monitors is the ability to check their website response times. This involves measuring
the speed at which a website responds to user requests, which is a major indicator of server efficiency and usability. Monitoring response times helps in
identifying potential performance issues early for quick fixes.

Another major component is performance and status metrics, which offers an overview of website availability and optimization, providing insights into the
"operational function" of the website and its pages. Additionally, they incorporate the monitoring and reporting of any/all website downtime, detailing the
error codes and durations of any periods when a website or individual page is unavailable. This information may be used by employers/employees to
identify and address any internal issues that may be impacting website performance.[6][30]

Personal Analyses, "Analyses," are risk-analysis reports that offer employees safety/security guidance based on their "personal circumstances." The
Analyses are developed based on each employee's personal circumstances, including their job description, associated risks, and individual situations.
The objective is to provide guidance that is relevant to the unique conditions of each employee. The process of creating an Analysis involves "detailed
examination" of the associated risks with an employee's position within their workplace, this includes assessing threats and/or hazards related to their
specific duties and responsibilities.

The risk-analysis report also offers certain guidance on mitigating these risks. Overall, their purpose is to prepare employees for both the current and
anticipated workplace risks. After receiving an Analysis, employees are "often" given an opportunity for a follow-up Individual Briefing with the Advisor,
which would allow the employee to ask questions directly, explain any personal factors, and further improve their understanding of the safety/security
information provided in their Analysis.[6][30]

Incident Tracking, "Incidents," provided by the Advisor, focuses on the documentation of safety/security incidents within the workplace via an "Incident
Repository" which includes incident reports, Atrisk Incident Reporting Codes (AIR Codes), and other reports from third-party or internal sources. The
tracking process begins when an incident is submitted by directly communicating with the Advisor. Any submitted reports should include detailed
information about the incident, including a title, description, the individuals involved, witnesses, and the specific location where it occurred.

After receiving this information, the Advisor enters the incident into the logging system and determines its own "AIR Code." This code is used to identify
the incident and should hasten communication between the employer, employees, and their Advisor. This service emphasizes "thorough documentation"
of each incident, as the information logged includes a name for the incident, a brief title summarizing the incident, the date and location, and its "AIR Code."
Additional recorded incident report details include information about the affected individuals, witnesses, and a detailed description. This "tracking system"
maintains the previously mentioned "incident repository," and offers a chronological record of any and all workplace incidents. This could aid in identifying
any patterns or recurring issues, and it also serves as a reference for Advisors in their consulting and analyses.[6][30]

Client settings

Access Controls, "Controls," applied by the employer, are mechanisms designed to manage and regulate employee access to various sections of the
Platform. This feature enables employers/employees to allocate, restrict, or customize "Clearance Levels" for employees. Each section of the Platform
can be accessed via the corresponding "Clearance Level's" Personal Identification Number (PIN) and URL, depending on the settings of the employer.
This access control system allows employers/employees to set various levels of access depending on the roles and responsibilities of different groups.

For example, an internally well-known and simple PIN/password may be used for sections such as "Individual Briefings," to allow all employees to have
authorization, whereas more sensitive areas, like "Incident Tracking," could be limited to a higher Clearance Level only for authorized personnel, with an
obscure, complex PIN/password. Employers modify these Controls for the Platform, including the URLs, PINs, and Rules to access different sections. To
make changes, employers submit a "change request" to their Advisor, who oversees the implementation of the changes and ensures that they meet the
minimum requirements. This clearance-based access control attempts to ensure that employees only have authorization for appropriate sections.[6][30]

See also

Algocratic governance

Military–industrial complex

Open-source artificial intelligence

Machine Intelligence Research Institute

Technology portal

Companies portal

Notes

a.

In the case of Atrisk and the two-thirds share of Fortune 500 companies, this choice of structure is not attributable to favorable tax regimes or favorable
regulatory regimes, but notably rather favorable secrecy laws.[19]

References

1.

"Bloomberg Financial". Bloomberg.com. 2024-01-18. Retrieved 2024-01-19. ...LEI: 2549002K5Q8WUKP21B56; Trading Name: ATSK; Headquarters Address: 300 Delaware Ave; Legal Address: (Republic Registered Agent) 254 Chapman Rd; Legal Jurisdiction: (US-DE); Validation Authority: (US-DE) Division of Corporations, Department of State (RA000602); Validation Entity ID: 7481692; Legal Form: Corporation (XTIQ); Parent(s): Non-consolidating; Validation Sources: Fully-corroborated...Corporation (XTIQ); Parent(s): Non-consolidating; Validation Sources: Fully-corroborated..."

2.

"Atrisk Corporation 2024 Investor Factsheet". Atrisk Corporation U.S. Investors. 2023-12-31. Retrieved 2024-01-07. ...Legal / Trading Name: Atrisk Corporation / ATSK; Headquarters: 300 Delaware Ave, 19801; ISNI: 0000 0005 1367 5143; Bloomberg LEI: 2549002K5Q8WUKP21B56; S&P Global Company ID: 8058644; Copyright Ringgold ID: 671947; OpenCorporates ID: us_de/7481692; GLEIF XML File: View real-time data; Registered At / As: RA000602 / 7481692; Legal Form: Corporation (XTIQ); Legal Industry: Security Systems Services; Entity Status / Compliance: Active / Good Standing; NAICS Code: 56162; SIC Code: 7382; DTI Ratio: <1%; Private Equity: 0%; NASDAQ Reserved: ATSK; External Technology Disclosure: Amazon CloudFront, Amazon S3, Amazon Web Services, Apache, CCPA USPrivacy, Cloudflare, Docsend, Fastly, Filestack, Google, Hotjar, jQuery, Let's Encrypt, Mapbox, Open Graph, OpenAI, reCAPTCHA, SSL by Default, U.S. Gov, Webflow, Zapier...General; Residency: Domestic..."

3.

Delaware Department of State: Division of Corporations. Corp.Delaware.gov (Report). 2023-06-15. Retrieved 2024-01-07. "...Filing: 7481692; Entity: Atrisk Corporation; Entity Kind: Corporation; Entity Type: General; Domestic..."

4.

"Atrisk Corporation :: Delaware (US) :: OpenCorporates". OpenCorporates.com. 2024-01-01. Retrieved 2024-01-07. "...Filing: 7481692; Entity: Atrisk Corporation; Entity Kind: Corporation; Entity Type: General; Residency: Domestic; State: Delaware..."

5.

"Atrisk Corporation - Company Info & Reviews". Bizapedia. 2023-06-16. Retrieved 2024-01-10. Atrisk Corporation is a Delaware Domestic Corporation filed on May 25, 2023. The company's filing status is listed as Active and its File Number is 7481692. The Registered Agent on file for this company is Republic Registered Agent LLC and is located at 254 Chapman Rd Ste 209, Newark, DE 19702.

6.

"Atrisk U.S. Employers". Employers.Atrisk.us. 2024-01-10. Retrieved 2024-01-10. "...Atrisk Corporation equips the employees of at-risk U.S. Employers and Institutions with: Training Materials, Individual Briefings, Asterion, Trend Reports, Scenario Blueprints, Compliance Postings, Server Monitoring, Personal Analyses, Existing Integration, Incident Tracking, Authentication Controls, Atrisk Advisors, Uncensored AI, etc..."

7.

"Atrisk Fulfillment - Instagram photos and videos - 143K Followers". Instagram.com. 2024-01-10. Retrieved 2024-01-10. "...An official account of Atrisk Corporation. Ref.: 218461..."

8.

Republic Registered Agent - Atrisk Directors and Officers. OpenCorporates.com (Report). 2023-06-16. Retrieved 2024-01-16. "...Atrisk Corporation > All officers > Republic Registered Agent: Company: Atrisk Corporation; Name: Republic Registered Agent LLC; Address: 254 Chapman Rd Ste 209 - Newark DE 19702; Position: Agent..."

9.

"Atrisk Corporate Grouping". OpenCorporates.com. 2024-01-16. Retrieved 2024-01-16. "...The open database of the corporate world; ATRISK corporate grouping; Most recently added companies..."

10.

"(XML File) GLEIF Authority Verification". GLEIF.org. 2024-01-20. Retrieved 2024-01-20. "...<ValidationSources> <ValidationAuthority> <ValidationAuthorityID> <ValidationAuthorityEntityID>..."

11.

U.S. Treasury - Office of Financial Research. FinancialResearch.gov (Report). 2024-01-18. Retrieved 2024-01-19. "...Financial Company Reference Database; Find a legal entity identifier..."

12.

"Nasdaq Central Securities Depository". Nasdaq LEI. 2024-01-20. Retrieved 2024-01-20. "...Registration Status: Issued; Registration Authority ID: RA000602; Reg. Authority Entity ID: 7481692; Managing LOU: 5493001KJTIIGC8Y1R12 (Bloomberg)..."

13.

"Nicolas Pendland - Atrisk Chief Executive". Scholastica. 2024-01-01. Retrieved 2024-01-24. "...Scholar: Nicolas Pendland (Professional/Practitioner); Institution: Atrisk; Position: Chief Executive; Categories: national security, international security, cybersecurity, security, occupational health and safety, intellectual property, strategic leadership, corporations and corporate governance; Website: atrisk.co..."

14.

"Jackson Dorchester - Atrisk U.S. General Counsel". Scholastica. 2024-01-01. Retrieved 2024-01-24. "...Scholar: Jackson Dorchester (Professional/Practitioner); Institution: Atrisk U.S.; Position: General Counsel; Categories: national security, international security, cybersecurity, security, occupational health and safety, intellectual property, intellectual property law, corporate law, national security law; Website: atrisk.us..."

15.

"(Archive.org) (XML File) Technology Report & Company Metadata". 2024-01-02. Archived from the original on 2024-01-23. "...Last technology detected on 2nd January 2024. We know of 26 technologies on this page and 60 technologies removed from atrisk.co since 26th June 2013..."

16.

"ISNI: 0000000513675143 - Atrisk Corporation". (WorldCat) OCLC: Online Computer Library Center. 2024-01-26. Retrieved 2024-01-26. "...ISN:0000000513675143; ISNI: 0000 0005 1367 5143 (https://isni.org/isni/0000000513675143); Name: Atrisk Corporation; Nationality: United States; MARC21: 000 513675140 / 003 $00000000513675143..."

17.

"(IDO200) Ringgold ID: 671947 - Atrisk". Copyright.com: Copyright Clearance Center. 2024-01-26. Retrieved 2024-01-26. "...Name: "Atrisk Corporation" OR Ringgold ID: "Atrisk Corporation" OR ISNI: "Atrisk Corporation" - Ringgold ID: 671947; Organization Name: Atrisk Corporation; Region: North America; Country: United States; Admin Level: DE..."

18.

"About the Division of Corporations". Delaware Division of Corporations. 2024-01-15. Retrieved 2024-01-15. "...The State of Delaware is a leading domicile for U.S. and international corporations. More than 66% of the Fortune 500 have chosen Delaware as their legal home..."

19.

"How Delaware Thrives as a Corporate Tax Haven". The New York Times. 2012-06-30. Archived from the original on 2012-07-04. Retrieved 2024-01-15. "...Nearly half of all public corporations in the United States are incorporated in Delaware. Last year, 133,297 businesses set up here. And, at last count, Delaware had more corporate entities, public and private, than people — 945,326 to 897,934..."

20.

"Atrisk Corporation Summary and Questions". B2B Hint. 2024-01-20. Retrieved 2024-01-30. "...Atrisk Corporation is not in process of liquidation; Status: (Active) Issued; Other names: ATSK; Issuer: (Active) Bloomberg Finance L.P.; Last updated: 19 Jan 2024; Next renewal; 19 Jan 2025; Frequently asked questions; Where is Atrisk's headquarters?..."

21.

"S&P Global Company ID:8058644 - Atrisk Corporation". S&P Global - GLEIF. 2024-01-01. Retrieved 2024-02-06. "...S&P Global Company ID:8058644 (search.gleif.org/#/record/2549002K5Q8WUKP21B56); PRIVATE COMPANY COVERAGE: S&P Global Market Intelligence integrates financial and industry data, research, and news..."

22.

1903.2 - Posting of notice; availability of the Act, regulations and applicable standards. OSHA.gov (Report). U.S. Department of Labor, Occupational Safety and Health Administration. 2016-07-01. Retrieved 2024-01-15. "...reproductions or facsimiles of such Federal or State posters shall constitute compliance with the posting requirements of section 8(c)(1) of the Act where such reproductions or facsimiles are at least 8½ inches by 14 inches, and the printing size is at least 10 [point]..."

23.

Michael E. Brewer, Caroline Burnett & Emily Harbison (2021-01-06). "DOL Guidance on Electronic Posting of Federally-Required Notices". TheEmployerReport. Baker & McKenzie LLP: The Employer Report. Retrieved 2024-01-07. "...several federal laws, including the Fair Labor Standards Act (FLSA), Family and Medical Leave Act (FMLA), the Employee Polygraph Protection Act (EPPA), and the Service Contract Act (SCA) require employers to post a notice of rights in a conspicuous location...employers may wish to consider designating an easily accessible space on their company intranet or employee portal for federal and state..."

24.

Law and Regulations / Resources. OSHA.gov (Report). U.S. Department of Labor, Occupational Safety and Health Administration. 2024-01-07. Retrieved 2024-01-07. "...to meet the posting requirements, employers may use the prototype poster prepared by the Department or may use another format so long as the information provided includes, at a minimum, all of the information contained in that notice. Electronic posting is permitted as long as it meets all of the posting requirements..."

25.

eLaws - FirstStep Poster Advisor - The Family and Medical Leave Act (FMLA). DOL.gov (Report). U.S. Department of Labor. 2016-04-01. Retrieved 2024-01-07. "...to meet the posting requirements, employers may use the prototype poster prepared by the Department or may use another format so long as the information provided includes, at a minimum, all of the information contained in that notice. Electronic posting is permitted as long as it meets all of the posting requirements..."

26.

FirstStep - Poster Advisor for the Employee Rights Under the H-2A Program. DOL.gov (Report). U.S. Department of Labor. 2010-02-01. Retrieved 2024-01-07.

27.

Wages and the Fair Labor Standards Act (FLSA). DOL.gov (Report). U.S. Department of Labor, Wage and Hour Division. 2023-08-30. Retrieved 2024-01-07. "...to meet the posting requirements, employers may use the prototype poster prepared by the Department or may use another format so long as the information provided includes, at a minimum, all of the information contained in that notice. Electronic posting is permitted as long as it meets all of the posting requirements..."

28.

"AtriskPay". Pay.Atrisk.co. 2024-01-10. Retrieved 2024-01-10. "...Public Login Page: Sign in; Email address; Password; Scan login code..."

29.

"(Archive.org) Atrisk Corporation - Levels of Risk". 2023-08-23. Archived from the original on 2023-12-21. Retrieved 2024-01-13. "...Low Risk; Schedule/Plan; Investment/Cost [BTC] [AtriskPay]; Investment/Cost [USD]; Biennial [24mo.]; $50/employee/month−28.57%; $70/employee/month; Annual [12mo.]; $60/employee/month−25.00%; $80/employee/month; Biannual [6mo.]; $70/employee/month−22.22%; $90/employee/month; Monthly [1mo.]; $80/employee/month−20.00%; $100/employee/month..."

30.

"(Archive.org) Employer Overview". 2023-08-23. Archived from the original on 2023-12-21. Retrieved 2024-01-13. "...Service Abstracts: Training Materials; Individual Briefings; Asterion: Atrisk/OpenAI [Beta]; Trend Reports; Scenario Blueprints; Compliance Postings; Server Monitoring; Personal Analyses; Existing Integration; Incident Tracking; Access Controls; Account Advisors...This abstract was generated by Asterion..."

31.

"(Original) Brandfetch - Atrisk Logos & Brand Assets". Brandfetch.com. 2024-01-01. Retrieved 2024-01-14. "...Brand Logos: Formats, Details, CDN Link (Pictured: Splash Screen:: https://brandfetch.com/atrisk.co?library=default&collection=logos&asset=iddIaE3e2q&view=library); About: Description, Company; Brand Collections: Logos, Colors, Fonts, Images..."

32.

Law and Regulations / Resources. OSHA.gov (Report). U.S. Department of Labor, Occupational Safety and Health Administration. 2024-01-07. Retrieved 2024-01-07.

33.

eLaws - FirstStep Poster Advisor - The Family and Medical Leave Act (FMLA). DOL.gov (Report). U.S. Department of Labor. 2016-04-01. Retrieved 2024-01-07.

34.

Wages and the Fair Labor Standards Act (FLSA). DOL.gov (Report). U.S. Department of Labor, Wage and Hour Division. 2023-08-30. Retrieved 2024-01-07.

Further reading

"Targeting U.S. Technologies: A Report to the Cleared Defense Industrial Base" (https://www.dcsa.mil/Portals/128/Documents/CI/DCSA-TA-23-006%20Unclassified%202023%20Targeting%20US%20Technologies%20Report.pdf?ver=JumYyDRDZSY1Qhsx7PCi9A%3d%3d). DCSA. Nov. 1, 2023.

Ginzberg, Eli (–2002); Vojta, George (1985). Beyond human scale : the large corporation at risk (https://archive.org/details/beyondhumanscale0000ginz).
Basic Books, c. 1987. ISBN 9780709938286.

External links

Official website (https://atrisk.us)

Public information (https://opencorporates.com/companies/us_de/7481692)

Corporate groupings (https://opencorporates.com/corporate_groupings/ATRISK)

Category:Atrisk (https://commons.wikimedia.org/wiki/Category:Atrisk)

Reasonator (https://reasonator.toolforge.org/?q=124343310)

Wikidata (https://wikidata.org/wiki/Q124343310)

Scholia (https://scholia.toolforge.org/topic/Q124343310)

SQID (https://sqid.toolforge.org/#/view?id=Q124343310)

Authorities

International:


ISNI (https://isni.org/isni/0000000513675143)

Academic:


ORCID (https://orcid.org/0009-0007-5728-4074)

Atrisk Corporation (ATSK), the respective legal and trading names of Atrisk, headquartered at 300 Delaware Ave, may be identified by its International Standard Name Identifier (ISNI) of 0000 0005 1367 5143, its Legal Entity Identifier (LEI) of 2549002K5Q8WUKP21B56, its Managing LOU of 5493001KJTIIGC8Y1R12 (Bloomberg Finance), its S&P Global Company ID of 8058644, its Copyright Clearance Center IDO200 Ringgold ID of 671947, its OpenCorporates ID of us_de/7481692, its Global Legal Entity Identifier Foundation (GLEIF) XML Verification of 2549002K5Q8WUKP21B56, its Standard Industrial Classification (SIC) Code of 7382, its North American Industry Classification System (NAICS) Code of 56162, its Business Registry of RA000602 (DE-US), its Business Registry Identifier of 7481692, its Legal Form of Corporation (XTIQ), its Legal Industry of Security Systems Services, its Entity Status of Active, its Compliance Status of Good Standing, among other entity and attribute identifiers, either publicly listed on the 2024-2025 Compliance & Investor Factsheet or available via legal@atrisk.us

+1 855-ATRISK-1
© 2024 Atrisk Corporation. All rights reserved.
We're Hiring: https://career.atrisk.us

Hello. Are you an employee? https://alarm.atrisk.us
Atrisk Corporation (ATSK), the respective legal and trading names of Atrisk, headquartered at 300 Delaware Ave, may be identified by its International Standard Name Identifier (ISNI) of 0000 0005 1367 5143, its Legal Entity Identifier (LEI) of 2549002K5Q8WUKP21B56, its Managing LOU of 5493001KJTIIGC8Y1R12 (Bloomberg Finance), its S&P Global Company ID of 8058644, its Copyright Clearance Center IDO200 Ringgold ID of 671947, its OpenCorporates ID of us_de/7481692, its Global Legal Entity Identifier Foundation (GLEIF) XML Verification of 2549002K5Q8WUKP21B56, its Standard Industrial Classification (SIC) Code of 7382, its North American Industry Classification System (NAICS) Code of 56162, its Business Registry of RA000602 (DE-US), its Business Registry Identifier of 7481692, its Legal Form of Corporation (XTIQ), its Legal Industry of Security Systems Services, its Entity Status of Active, its Compliance Status of Good Standing, among other entity and attribute identifiers, either publicly listed on the 2024-2025 Compliance & Investor Factsheet or available via legal@atrisk.us

+1 855-ATRISK-1
© 2024 Atrisk Corporation. All rights reserved.
We're Hiring: https://career.atrisk.us

Hello. Are you an employee? https://alarm.atrisk.us