Security policy & procedure development
Security technology systems and physical infrastructure are only ever as effective as the people responsible for operating and managing them. We help our clients develop policies and procedures that ensure that technology, infrastructure, and operations are harmonised to deliver effective security to any business type. This service can include:
Strategy & policy development
We help our clients define how they wish security to be delivered across their business and what it is that they will (and will not) provide to the business.
Development of standardised documentation (e.g. standard operational procedures, audit tools, playbooks, and reports).
This documentation can be focused on staff, contractors and other stakeholders to ensure that consistent security requirements are understood, put into practice and reported against.
We recognise that many businesses do not have the resources to employ dedicated security managers and that if they do, these individuals or teams are frequently faced with substantial capacity constraints. We are able to provide short-term capacity and capability support for clients during periods of specific demand without needing to permanently increase the size of their security team.
Design
- 2D CAD design & CAD automation
- Automated access control design
- BIM
- Blast design & explosion consequence analysis
- CCTV Design
- Cloud advice & guidance
- Cloud based access control design
- Cloud based CCTV design
- Cloud design standards
- Cloud readiness & migration
- Cloud solution advisory
- Cloud video storage design
- Command & control room design
- Connected & smart building services
- Counter-terrorism & threat assesment
- Data centre design
- Design standards development
- Forced entry protection
- Hostile vehicle mitigation (HVM) & vehicle dynamics assesment (VDA)
- Intrusion & hold-up alarm system design
- Location services design
- Mail room design & internal detonation
- Marauding terrorist attack (MTA)
- Physical, technical & operational reviews
- Planning Advice
- Radio communication system design
- SABRE & Security Needs Assessments
- Secured by design
- Security policy & procedure development
- Security system integration
- Security threat & risk assessments
- System evaluation
- Threat, Vulnerability & Risk Assessments
Build
- Application engineering
- Cloud based evidence management
- Cloud data application services
- Cloud security deployments
- Credential migrations
- Credential review
- Global system migrations
- Location services deployment
- Mobile credential supply & deployment
- Project/programme management
- QCIC automation tools
- System upgrade conversion
- Technical project/delivery management
Run
- “Follow the Sun” system support
- Application maintenance & application patching
- Bespoke business administration reporting
- Bespoke dashboard & reporting
- Cloud system administration
- Embedded teams
- Global system administration support
- Hardening & cyber testing
- Mobile credential management
- System administration
- Virtual integrator led services