System evaluation
QCIC’s system evaluation service offers clients the ability to fully analyse and document their current security solutions while identifying areas that require improvement, possible vulnerabilities or justifications for replacement.
Where system replacements are required, we assist with product selection by developing a migration strategy to a solution that meets the client’s requirements. QCIC is then able to utilise automation tools to help establish a standardised naming convention and apply it to all components of the client’s security system.
When it comes to security system configuration, our key focus is consistency and accuracy. QCIC’s world-class consultants conduct a full assessment of the client’s existing security systems.
Following the evaluation, a comprehensive report is compiled and issued to the client. This highlights areas of concern or where improvements could be made to the security system’s performance in order to streamline security operations.
Design
- 2D CAD design & CAD automation
- Automated access control design
- BIM
- Blast design & explosion consequence analysis
- CCTV Design
- Cloud advice & guidance
- Cloud based access control design
- Cloud based CCTV design
- Cloud design standards
- Cloud readiness & migration
- Cloud solution advisory
- Cloud video storage design
- Command & control room design
- Connected & smart building services
- Counter-terrorism & threat assesment
- Data centre design
- Design standards development
- Forced entry protection
- Hostile vehicle mitigation (HVM) & vehicle dynamics assesment (VDA)
- Intrusion & hold-up alarm system design
- Location services design
- Mail room design & internal detonation
- Marauding terrorist attack (MTA)
- Physical, technical & operational reviews
- Planning Advice
- Radio communication system design
- SABRE & Security Needs Assessments
- Secured by design
- Security policy & procedure development
- Security system integration
- Security threat & risk assessments
- System evaluation
- Threat, Vulnerability & Risk Assessments
Build
- Application engineering
- Cloud based evidence management
- Cloud data application services
- Cloud security deployments
- Credential migrations
- Credential review
- Global system migrations
- Location services deployment
- Mobile credential supply & deployment
- Project/programme management
- QCIC automation tools
- System upgrade conversion
- Technical project/delivery management
Run
- “Follow the Sun” system support
- Application maintenance & application patching
- Bespoke business administration reporting
- Bespoke dashboard & reporting
- Cloud system administration
- Embedded teams
- Global system administration support
- Hardening & cyber testing
- Mobile credential management
- System administration
- Virtual integrator led services