Vulnerability, susceptibility and criticality assessment.
Security Audit-Critically assess the adequacy or otherwise of the existing security cover.
Security Survey- study overall security requirement vis-à-vis the threat perception and suggest implementable solutions for effecting optimum security cover. The recommendation would include installation/ up-gradation of technology for:
-Intrusion detection
-Video surveillance &video analytics
-Access control
-Guard-force supervision
-Anti sabotage check (persons as well as vehicle)
-Communication.
Designing/up-gradation of physical security infrastructure – gates,perimeter barriers, doors, window, locks, security lights etc.
Designing/Up-gradation of Access Control procedures
Laying down/ strengthening of procedures for proper accounting of incoming/ outgoing material quality and quantity check.
Cash and valuables protection.
Executive protection.
Assessment of Security manpower and equipment.
Comprehensive measure, procedures (SOPs) for all security functions.
Design and develop physical as well as electronic security solution-phased scalable and modular under must, should and could category.
Development of emergency response mechanism to threats from all vectors.
Project management0- implementation of security recommendations.
Security policy management.
Integration of security solution at the design stage of premises.