Secured by design
Secured by Design is a police initiative developed to ensure crime prevention measures are adopted throughout the design stages of buildings and sites to assist in reducing the opportunity for crime and the fear of crime. Secured by Design is owned by the Association of Chief Police Officers (ACPO) and has the support of the Home Office Crime Reduction & Community Safety Group and the Planning Section of The Office of the Deputy Prime Minister (ODPM).
There are many guidelines that address the specific needs of such projects as play areas, stadiums, schools, offices, etc. QCIC consultants have worked extensively with the UK Police to achieve Secured by Design approval for all of our projects where this approval has been required or desired. Where there is no requirement, our consultants continue to follow the principles of secure by design as best practice. This is at the forefront of our design solution methodology.
Design
- 2D CAD design & CAD automation
- Automated access control design
- BIM
- Blast design & explosion consequence analysis
- CCTV Design
- Cloud advice & guidance
- Cloud based access control design
- Cloud based CCTV design
- Cloud design standards
- Cloud readiness & migration
- Cloud solution advisory
- Cloud video storage design
- Command & control room design
- Connected & smart building services
- Counter-terrorism & threat assesment
- Data centre design
- Design standards development
- Forced entry protection
- Hostile vehicle mitigation (HVM) & vehicle dynamics assesment (VDA)
- Intrusion & hold-up alarm system design
- Location services design
- Mail room design & internal detonation
- Marauding terrorist attack (MTA)
- Physical, technical & operational reviews
- Planning Advice
- Radio communication system design
- SABRE & Security Needs Assessments
- Secured by design
- Security policy & procedure development
- Security system integration
- Security threat & risk assessments
- System evaluation
- Threat, Vulnerability & Risk Assessments
Build
- Application engineering
- Cloud based evidence management
- Cloud data application services
- Cloud security deployments
- Credential migrations
- Credential review
- Global system migrations
- Location services deployment
- Mobile credential supply & deployment
- Project/programme management
- QCIC automation tools
- System upgrade conversion
- Technical project/delivery management
Run
- “Follow the Sun” system support
- Application maintenance & application patching
- Bespoke business administration reporting
- Bespoke dashboard & reporting
- Cloud system administration
- Embedded teams
- Global system administration support
- Hardening & cyber testing
- Mobile credential management
- System administration
- Virtual integrator led services