Physical, technical & operational reviews
Our independent physical, technical and operational security reviews are utilised by a wide range of sectors, either to satisfy audit and regulatory requirements or to respond to changes in the threat or business environment. These reviews provide clients with a detailed assessment of their existing security provisions compared to their stated security requirements and imposed compliance standards or mandated regulations. They are accompanied by recommendations where necessary.
Whilst our reviews are technical or systems-focused, we also provide advisory services to help our clients generate optimal operational value from their existing systems. We identify where systems are potentially over-engineered and operationally inefficient, or where they are not generating maximum functional value.
Our industry-leading experience in a wide range of systems and products means that we are well placed to offer recommendations that ensure clients are getting a return on their investment as well as a smooth-running and efficient operation.
Our expertise covers a wide range of technical systems, including:
- Access control and CCTV
- Credentials (access cards, tokens, biometrics, and encryption)
- Intruder detection systems
- Biometric devices, hard tokens, ID badges
- Security lighting
- Full control room architecture
Design
- 2D CAD design & CAD automation
- Automated access control design
- BIM
- Blast design & explosion consequence analysis
- CCTV Design
- Cloud advice & guidance
- Cloud based access control design
- Cloud based CCTV design
- Cloud design standards
- Cloud readiness & migration
- Cloud solution advisory
- Cloud video storage design
- Command & control room design
- Connected & smart building services
- Counter-terrorism & threat assesment
- Data centre design
- Design standards development
- Forced entry protection
- Hostile vehicle mitigation (HVM) & vehicle dynamics assesment (VDA)
- Intrusion & hold-up alarm system design
- Location services design
- Mail room design & internal detonation
- Marauding terrorist attack (MTA)
- Physical, technical & operational reviews
- Planning Advice
- Radio communication system design
- SABRE & Security Needs Assessments
- Secured by design
- Security policy & procedure development
- Security system integration
- Security threat & risk assessments
- System evaluation
- Threat, Vulnerability & Risk Assessments
Build
- Application engineering
- Cloud based evidence management
- Cloud data application services
- Cloud security deployments
- Credential migrations
- Credential review
- Global system migrations
- Location services deployment
- Mobile credential supply & deployment
- Project/programme management
- QCIC automation tools
- System upgrade conversion
- Technical project/delivery management
Run
- “Follow the Sun” system support
- Application maintenance & application patching
- Bespoke business administration reporting
- Bespoke dashboard & reporting
- Cloud system administration
- Embedded teams
- Global system administration support
- Hardening & cyber testing
- Mobile credential management
- System administration
- Virtual integrator led services