Design standards development
Our design-standards development service is targeted at clients with large, dynamic, globally disbursed real-estate portfolios. We support these clients by creating architectural and system design standards to maximise the efficiency of the designing, commissioning and programming of their system. This, in turn, facilitates the streamlining of procurement activities, project management, and operational delivery.
We recognise the burden carried by corporate security departments that work across multiple, varied capital projects such as reconfigurations of existing office space, office fit-outs and the design and construction of new offices.
QCIC works with clients to define corporate standards for design, product selection, system programming and installation. This generates greater consistency and standardisation across our clients’ businesses. It also means they are able to make more effective use of limited resources, budget more accurately, manage more efficient maintenance regimes and embed a common understanding across internal stakeholders and risk partners. These services deliver substantial time-saving and free up corporate security professionals, enabling them to focus on the delivery of safe and secure business environments.
Design standards should suit the immediate needs and requirements of the organisation, and should typically aim to meet the following criteria:
Tier 1 – Operational Strategy
Identify the strategic approach for the deployment of security systems within the client’s real-estate portfolio.
Tier 2 – Risk Classification
An overarching document that underpins the threat, risk and vulnerability assessment. This document should identify and determine the impact of any local security and environmental threats and advise key stakeholders of the most suitable mitigation strategy as well as any required security enhancements in excess of the standard baseline requirement.
Tier 3 – Operational Function
Identify each relative security configuration alongside its subsequent function and purpose.
Tier 4 – Component Specification and Rule Setting
Identify baseline field component specifications alongside any specific installation and design considerations that each should specifically warrant. Rules and parameters relevant to the operational functions of security systems should be defined.
Tier 5 – Application Referencing
Identify and establish a baseline methodology for collation and referencing of security field components operating within any of the client’s security systems or subsystems.
The maintenance of the security baseline standard should be an ever-evolving and ongoing process and will require support from all key stakeholders within the organisation.
Design
- 2D CAD design & CAD automation
- Automated access control design
- BIM
- Blast design & explosion consequence analysis
- CCTV Design
- Cloud advice & guidance
- Cloud based access control design
- Cloud based CCTV design
- Cloud design standards
- Cloud readiness & migration
- Cloud solution advisory
- Cloud video storage design
- Command & control room design
- Connected & smart building services
- Counter-terrorism & threat assesment
- Data centre design
- Design standards development
- Forced entry protection
- Hostile vehicle mitigation (HVM) & vehicle dynamics assesment (VDA)
- Intrusion & hold-up alarm system design
- Location services design
- Mail room design & internal detonation
- Marauding terrorist attack (MTA)
- Physical, technical & operational reviews
- Planning Advice
- Radio communication system design
- SABRE & Security Needs Assessments
- Secured by design
- Security policy & procedure development
- Security system integration
- Security threat & risk assessments
- System evaluation
- Threat, Vulnerability & Risk Assessments
Build
- Application engineering
- Cloud based evidence management
- Cloud data application services
- Cloud security deployments
- Credential migrations
- Credential review
- Global system migrations
- Location services deployment
- Mobile credential supply & deployment
- Project/programme management
- QCIC automation tools
- System upgrade conversion
- Technical project/delivery management
Run
- “Follow the Sun” system support
- Application maintenance & application patching
- Bespoke business administration reporting
- Bespoke dashboard & reporting
- Cloud system administration
- Embedded teams
- Global system administration support
- Hardening & cyber testing
- Mobile credential management
- System administration
- Virtual integrator led services