Planning, training and supervising , both directly and indirectly, all organizations responsible for handling all risks and threats in the organization’s area of operations.

Planning – A security strategy from a business perspective.

Low-Cost Security Operations:
  • Identification of assets vital for business continuity.
  • Identification of current and future threats and risks.
  • Assessment of the security and protection level appropriate to each business.
  • Strict and detailed planning of security at minimal cost.
Efficient Organization Structure
  • Operational re-organization to improve work efficiency, reduce procedures and achieve budgetary savings.
  • Creative solutions and proper utilization of existing manpower (not from security) to increase the sense of security with minimal investment.
  • Improvement of work interfaces, interactions and redistribution of tasks and responsibilities between the security department and the other departments in the business.
  • Support, guidance and security management training for security department operations.
Cost-Effective Technology Solution
  • Characterization of a high-quality technological security program with a limited budget, including alternative solutions.
  • Writing of technical specifications, and a detailed quantitative table including financial costs.
  • Assistance in choosing reliable technology systems with low maintenance costs.
  • Assistance in building a tender as well as supporting and guiding the business in contractor negotiations.

Up-To-Date Professional Knowledge

  • Developing or improving the training infrastructure and security information management of the business.
  • Reformulating and updating routine and emergency security procedures.
  • Creating field and exercise files, lesson plans and professional presentations.
  • Characterization and development of work procedures, operational procedures and technical procedures.
  • Creating aids for training and/or for the security department, shift management, control room management and more.

Training – Training the organization towards a comprehensive security approach.

Professional Recruitment
  • Creating a detailed and accurate professional profile, including a description of the position and its roles and duties.
  • Designing an effective, short and financially viable recruitment and selection course.
  • Assistance in the detection process through interviews, examinations and tests, providing focus and quality results.

 

Customized Security Courses
  • Training for all security professions from the managerial level to the professional level, including senior management of the business.
  • Onsite courses that include lectures, simulations and live exercises at the security positions and posts as part of the training course without disrupting ongoing operations of the business.
  • Lectures, seminars, study days and conferences for all the business’s employees.
On-the-Job Training Implementation
  • Implementing procedures, improving processes and strengthening security operations.
  • Optimizing the company’s investment in its security program and maximizing its benefits.
  • Measuring the success of changes implemented in the security structure.
  • Changing patterns of action and adapting them during the implementation process.
  • Integrating implementation processes with the organizational business processes.
Advanced Refresher Training
  • Onsite competency training for all security positions, in minimum time and with minimum impact on the normal course of work.
  • Diverse training programs to preserve professional standards and to increase security knowledge and improve the professional capabilities.
  • Action-oriented training that improves daily operations.

Measurable and quality supervision.

Naturalistic Observation
  • Overt or covert supervision of the security system.
  • Specific examination of security system events and actions.
  • Collection of current and useful information about the business and its operational environment.
  • Investigation and follow-up of processes and/or individuals to identify anomalies.
Customized Audits
  • Qualitative and quantitative examination of the security system to ensure adequate performance in relation to designated tasks.
  • Checking the qualifications and performance of departments and its staff.
  • Testing how guidelines and procedures are implemented.
  • Identifying systemic failures and tracking implemented corrections and improvements.
  • Providing reviews to prevent false impressions and to provide reassurance.
Complex Drills
  • Holding comprehensive periodic emergency drills that include security forces, internal and external personnel, guests etc.
  • Realistic simulations of complex tactical exercises.
  • Surprise exercises to examine the security system’s response during likely scenarios.
  • Table top exercises to improve emergency incident response, decision-making under pressure, priorities and work interfaces between management personnel.
Targeted Surveys
  • Improving effectiveness and reducing costs through an organizational-security survey of businesses in the process of change, growth, or reduction.
  • Identifying weak points in the business to assess its risk and threat exposure by performing a quantifiable risk survey.
  • Operational testing of the security system to identify a low operational level, and proposal of solutions for improvement.