Physical security assessments
Security Assessments are an excellent way to evaluate your existing security program and a great first step to take prior to making security improvements at your facility or when trying to solve a specific security problem.
During a Security Assessment, all aspects of your security program are examined, any weaknesses are identified, and suggestions for security improvements are made. In addition, opportunities where costs can be reduced or where security operations can be made more efficient are identified.
Eclectic Security use a process to conduct a physical security assessment which has been tested and is used not only in the UK but globally to produce unique and tailored reports upon completion. This assessment process is constantly evolving, allowing us to take advantage of lessons learned from previous assessments, and to keep up with the latest security best practices.
The Security Assessment uses a structured, formal analysis process that allows us to develop a deep understanding of your business, operating conditions, corporate culture, and unique security risks and threats.
While client involvement is crucial to success, our consultants facilitate the assessment every step of the way, keeping the project on track, and making sure that all important elements are examined.
Included in a typical assessment
The Security Assessment is custom tailored for each project, but typically includes the following tasks:
Risk identification and analysis
Threat and vulnerability assessment
Review of site and facility security
Analysis of crime data.
Review of degree of compliance
Review of facility operating procedures
Review of physical security systems
Review of electronic security systems
Review of architectural security
Review of security policies and procedures
Review of security management
Review of security personnel
Evaluation of present security program and identification of any weaknesses and vulnerabilities
Development of recommendations for security improvements
Identification of short-term and long-term costs
Prioritisation of recommendations and development of implementation plan
Preparation of written Security Assessment Report
The Security Assessment Process Stage 1
So, what can you expect when we conduct a Security Assessment at your facility?
Prior our team arriving on site, we will request a number of documents for our use during the assessment. Typically these include plans of the site, copies of any existing security policies and procedures and anything else which may be needed to conduct a full assessment. We only request what you should already have; if there is something on our request that is not available or that you feel you would rather not share with our team it is not a problem.
We may wish to conduct interviews with individuals and will work with you to identify these people.The goal is to get a good cross-representation of all the major operating and support departments within your organisation. Typically, this would include members of senior management, department heads, and people who occupy roles which are directly related to security, such as receptionist’s, security officers etc. Each typical interview session lasts between 20 and 40 minutes.
When we first arrive on site, we will start by conducting an in-depth interview with the person who presently serves as “security manager” for the facility. This may be an actual security manager or may be the facilities manager or other person who manages security. This interview session covers a lot of details, and typically takes 1 to 2 hours. After this interview, we will ask this person to give us a brief guided tour of the facility.
We then begin conducting individual interview sessions with each of the employees identified for interview as mentioned. Depending on the size of the organisation, this process could take one, two, or more days.
At the conclusion of the interviews, we will conduct detailed inspections of certain areas of the facility and site. We may also spend extended periods of time observing certain areas of your facility, such as the main reception, the loading bays etc
We always do a return visit at night . We use this time to observe lighting conditions and how your facility operates at night. This visit also helps us get a general feel for the facility and local neighbourhood during the hours of darkness which can be considerably different to the daytime..
At the conclusion of our visit to your site, we will meet with you to give you an update on our progress and to discuss the next steps in the process.
The Security Assessment Process Stage 2
Now begins our formal Security Assessment process. During this process, we identify your critical assets, analyse potential threats, review loss history, study crime forecasts for your site, evaluate existing security measures, and identify potential weaknesses and areas for improvements. At the conclusion of this process, we begin to write the Security Assessment Report. It normally takes between one and two weeks from the time we complete our site visit to the time when we complete our draft report.
While preparing the report, we often uncover things that require further investigation and study. Certain cases may require a return visit to conduct additional interviews or to examine particular areas of concern in more depth.
When the draft Security Assessment Report is completed, we will send a copy for review. After you have had an opportunity to digest the document, we will meet with you in person to review the report in detail and respond to any questions you may have.
After we have obtained your input, we will prepare a final Security Assessment Report that incorporates your comments. If desired, we can make a formal presentation of the Security Assessment Report to your senior management team or others.
At the conclusion of the assessment process, we remain available to assist you with implementation of the recommendations contained within our report. This can include, providing security presentations to staff, assistance with security system upgrades, sourcing of other services, products and vendors.
Eclectic Security Infiltration Team (ESIT)https://www.eclecticsecurity.co.uk/physical-security-red-team/