Security Services Division
Oasis Capital has carefully sought out opportunities to invest in niche security businesses where high levels of skill, specialist knowledge and sophisticated equipment are required. Most of our companies are leaders in their field and have been established for many years. Our companies look after the interests of many well known multinationals, major law or accounting practices, international advisors and high net worth investors.
Established in 1982, and with a client list of major law firms, accountants, financial institutions, corporations and private individuals. Keypoint is ranked among the UK’s leading independent investigation firms providing the complete spectrum of corporate governance and investigation services.
Keypoint Discovery provides compliance screening, due diligence, vetting checks and pre-employment screening primarily for financial services companies. Keypoint has provided checks for over 30 years for all levels of employment, from customer service assistants to hedge fund managers.
Audit Com UK is a leading European TSCM (counter survelllance) company. It was established in 1988 by a leading TSCM equipment manufacturer, and it services major corporate and other clients worldwide. Audit Com staff are drawn mostly from Security Services and UK Special Forces backgrounds.
TSS London provides all forms of surveillance, including conventional, rural and electronic surveillance. We have dedicated teams available at short notice for operation throughout Europe. TSS operatives are selected from the police and military services and are supported by state of the art equipment and technology.
PILGRIM TECHNICAL SECURITY
Pilgrim Technical Security Services Ltd (PTSS) provides high level IT security services and consulting to it's clients. It also designs and manages remote servers in UK and overseas for clients involved in very sensitive projects and other work. We conduct network penetration testing (ethical hacking).
Digital Vault is a fragmented, globally distributed, high volume data storage system encrypted to the highest possible level. Resource access is provided to clients who need to store, retrieve, process or work with extremely sensitive data. Data is fully anonymised and automated data life countdown and deletion is available.