Physical security assessments

Physical Security Assessments

Physical Security Assessments are an excellent way to evaluate your existing security. They are a good first step towards making security improvements. 

During a Security Assessment, all aspects of your security program are examined. Weaknesses identified and suggestions for security improvements made. Identification of where costs can be reduced or security operations can be streamlined will be documented..

Eclectic Security use a tested process to conduct physical security assessments. The assessment process is constantly evolving. This allows us to take advantage of lessons learned from previous assessments. We are constantly  keeping abreast with the latest security best practices.

The Security Assessment uses a process that allows us to develop a comprehensive understanding of a businesses operating conditions.

Our consultants facilitate the assessment every step of the way. They keep the project on track  and make sure that all important elements are examined.

 

Included in a typical assessment:

The Security Assessment is tailored for each project, but typically includes the following:

  • Risk identification and analysis.
  • Threat and vulnerability assessment.
  • Review of site and facility security.
  • Analysis of crime data.
  • Review of compliance
  • Review of facility operating procedures
  • Review of physical, electronic and architectural security systems, together with the relevant policies and procedures.
  • Review of security management and personnel.
  • Development of recommendations for security improvements.
  • Preparation of written Security Assessment Report

 

The Security Assessment Process Stage 1

What can you expect when we conduct a Security Assessment at your facility?

We will use the information gathered from a number of documents provided by yourselves. These can include plans of the site and copies of any existing security policies and procedures. We use this  to help us understand what your current security arrangements and processes are.

We may conduct interviews with individuals. This may include senior managers, department heads and people who are involved in security roles. 

We will conduct detailed inspections of certain areas of the facility which we identify as potential security issues. 

A night time visit is always conducted to observe lighting conditions and how your facility operates at night. This helps us get a complete picture of the facility and its security both during the day and at night. 

 

The Security Assessment Process Stage 2

During this process, we identify your critical assets. We will analyse potential threats, review loss history, evaluate existing security measures, and identify potential weaknesses and areas for improvements.

After both stages,  we begin to write the Security Assessment Report. While preparing the report, we often uncover things that require further investigation and study. Certain cases may require a return visit to conduct additional interviews. We may examine particular areas of concern in more depth.

When the draft Security Assessment Report is completed, you will receive a copy which we will review with you.

A final report is then compiled and sent to you. We can also make a formal presentation of the Security Assessment Report to your senior management team if required.

Once the formal report has been signed off by the relevant person, we are available to assist you with any implementations contained within our report. This can include assistance with security system upgrades, sourcing of other services, products and vendors.

 

Eclectic Security Infiltration Team (ESIT) https://www.eclecticsecurity.co.uk/physical-security-red-team/ 

Menu