Consultancy
The security assessment assesses:
  • Vulnerabilities (internal conditions) and factors of risk (external conditions) that affect the security of the objective
  • The way security specific tasks are fulfilled
  • Efficiency of the measures implemented in this field
  • The security needs of the objective
  • Organization of security aims at:
  • establishing principles and the security organization and administration for all security fields selected by the beneficiary (physical security, personnel security, information security/protection, IT security, commercial security)
  • Establishing security areas and the minimum standard for each area individually
  • elaborating specific documents (security plan, forms, procedures for authorization, for the access to the precincts / security areas, to documents etc.)
  • Design of an optimum security system:
  • Depending on the results of the assessment, on the security needs, on the intentions of the objective’s management and on the budget, we will design a security system corresponding to the mutually agreed criteria.
  • At the beneficiary’s request, a system for monitoring the results and efficiency of the measures adopted can be instituted.
  • Assessment of the objective physical security

  • Identification of the values that need to be protected and determination of their importance based on quantifiable criteria and indicators (for example, value of the risk generated, probability of occurrence etc.).
  • Assessment of the perimeter and area security system.
  • Assessment of the installations security system.
  • Assessment of the access security system to areas and locations.
  • Assessment of specific security measures (how they take action, response time, forces involved etc.).
  • Analysis of the security-related events within the objective.
  • Analysis of the collaboration with the authorized institutions (situations when intervention was requested, response time, results etc.).
  • Analysis of the infractions situation in the area.
  • Identification and assessment of security-related vulnerabilities (internal conditions that affect security).
  • Identification and assessment of security-related risk factors (external conditions that affect security).
  • Determining the quality of the services provided (how services are performed, the way specific tasks are fulfilled, efficiency of measures implemented etc.)
  • The general state of security (interoperability of the system components, degree of protection etc.).
  • Determining the actual security needs based on the information collected.
  • Assessment of the technical security system

  • Assessment of the access control and timekeeping system.
  • Assessment of the video system.
  • Assessment of the burglary-detection perimeter system.
  • Assessment of the fire-detection system.
  • Assessment of the operation conditions (bad operation conditions, maintenance periodicity etc.).
  • Determination of the actual needs of technical security (in terms of number and equipment arrangement, type, quality, maintenance works etc.).
  • Security organization and administration

  • Determination of the actual security needs of the objective.
  • Establishing principles and the security organization and administration for all security fields selected by the beneficiary (physical security, personnel security, information security/protection, IT security, commercial security).
  • Establishing security areas within the objective and the minimum standard for each area individually.
  • Elaboration of the specific procedures (access, visit, patrol, intervention, control, testing, how to take action in different situations etc.).
  • Elaboration of specific documents (security plan, forms, procedures for authorization, for the access to the precincts / security areas, to documents etc.).
  • Upon the beneficiary’s request, we can make an analysis of the budget assigned for security purposes.
  • DESIGNED by Daniel Enache