Security Consultancy

  • Risk Assessment – This captures the areas of vulnerability and the type of perceived risks in those areas
  • Operational Requirement 1 – From the Risk Assessment an Operational Requirement 1 will provide what solutions are required to mitigate against the risk i.e. CCTV, AACS, IDS, PIDS, HVM, etc.
  • Operational Requirement 2 – the Operational Requirement 2 will then detail the systems equipment and positions i.e. camera to view the front entrance and provide identification of person entering that area.
  • Design – The Design/Performance Specification will then be produced to provide full compliance of the OR2
  • CCTV Design – DORI, an international standard used for determining how far a camera is able to see an object with different levels of accuracy.
  • AACS Design – Facial Recognition, Biometrics, Bluetooth (mobile phone), Tokens, Cards, Speedstiles
  • Fire Alarm system design – Cause and effect strategy
  • Intruder Detection System design –
  • DPIA – A data protection impact assessment will be necessary, we use the ICO guidance and template produced by the Biometrics and surveillance Camera Commissioner

What We Can Do


How We Work

  • To ensure the safety and security of an organization’s assets, people, and information.
  • Analise and assess security systems and measures in place
  • To identify vulnerabilities and recommend measures to mitigate risks
  • Helping organisations maintain a strong security posture in an ever-evolving threat landscape.
how we work 1
how we work 2


Assessment and Analysis:

  • Conduct a thorough assessment of the organization’s security infrastructure, policies, and procedures.
  • Analyze potential risks and vulnerabilities, considering physical security, information security, personnel security, and other relevant factors.

Threat Modeling:

  • Identify potential threats and risks that the organisation may face. This includes assessing both internal and external threats.

Security Audits:

  • Perform security audits to evaluate the effectiveness of existing security measures.
  • Review access controls, surveillance systems, alarm systems, and other security components.

Policy Review and Development:

  • Review existing security policies and procedures and recommend improvements or develop new ones.
  • Ensure that policies align with industry best practices and regulatory requirements.

Security Training and Awareness:

  • Provide training to employees on security best practices and procedures.
  • Raise awareness about potential security threats and the importance of maintaining a secure environment.

Security Technology Integration:

  • Recommend and implement security technologies such as CCTV, AACS, intruder detection systems, and more.
  • Ensure that these technologies are properly configured and integrated into the organisation’s overall security strategy.

Incident Response Planning:

  • Develop incident response plans to guide the organisation in the event of a security breach.
  • Test and refine these plans regularly to ensure they are effective and up to date.

Regulatory Compliance:

  • Ensure that the organisation complies with relevant security regulations and standards.
  • Stay informed about changes in regulations and update security measures accordingly.

Client Communication:

  • Communicate findings and recommendations to the client in a clear and understandable manner.
  • Provide ongoing support and consultation to address any security concerns.

Continuous Improvement:

    • Stay up to date on the latest security threats, technologies, and best practices.
    • Continuously reassess and improve security measures based on evolving risks and organizational changes.


Risk Assessment

Risk Assesment

CCTV DORI design


What our clients say