Physical security assessments

Physical Security Assessments

Physical Security Assessments are an excellent way to evaluate your existing security. They are a good first step towards making security improvements or solving a security problem. 

During a Security Assessment, all aspects of your security program are examined, with weaknesses identified and suggestions for security improvements made. In addition, identification of where costs can be reduced or security operations can be made more efficient will be documented..

Eclectic Security uses a globally tested process to conduct a physical security assessment to produce unique and tailored reports. This assessment process is constantly evolving, allowing us to take advantage of lessons learned from previous assessments, and to keep up with the latest security best practices.

The Security Assessment uses a process that allows us to develop a comprehensive  understanding of your business, operating conditions, corporate culture, and unique security risks and threats.

Our consultants facilitate the assessment every step of the way, keeping the project on track, and making sure that all important elements are examined.

 

Included in a typical assessment:

The Security Assessment is tailored for each project, but typically includes the following:

  • Risk identification and analysis.
  • Threat and vulnerability assessment.
  • Review of site and facility security.
  • Analysis of crime data.
  • Review of compliance
  • Review of facility operating procedures
  • Review of physical, electronic and architectural security systems, together with the relevant policies and procedures.
  • Review of security management and personnel.
  • Development of recommendations for security improvements.
  • Preparation of written Security Assessment Report

 

The Security Assessment Process Stage 1

What can you expect when we conduct a Security Assessment at your facility?

We will use the information gathered from a number of documents provided by yourselves, such as plans of the site and copies of any existing security policies and procedures which will be used to understand what the current security arrangements and processes are.

We may conduct interviews with individuals such as senior managers, department heads and people who are involved in roles related to security 

We will conduct detailed inspections of certain areas of the facility which we identified as potential security issues. 

We always do a second visit at night to observe lighting conditions and how your facility operates at night. This helps us get a complete picture of the facility and its security both during the day and at night. 

 

The Security Assessment Process Stage 2

This is the  formal Security Assessment process. During this process, we identify your critical assets, analyse potential threats, review loss history,, evaluate existing security measures, and identify potential weaknesses and areas for improvements.

After both stages,  we begin to write the Security Assessment Report. While preparing the report, we often uncover things that require further investigation and study. Certain cases may require a return visit to conduct additional interviews or to examine particular areas of concern in more depth.

When the draft Security Assessment Report is completed, you will receive a copy   which we will review with you.

A final report is then compiled and sent to you. We can also make a formal presentation of the Security Assessment Report to your senior management team if required.

Once the formal report has been signed off by the relevant person, we are available to assist you with any implementations contained within our report. This can include assistance with security system upgrades, sourcing of other services, products and vendors.

 

Eclectic Security Infiltration Team (ESIT)https://www.eclecticsecurity.co.uk/physical-security-red-team/

Menu