Physical security assessments

Physical Security Assessments

Physical Security Assessments are an excellent way to evaluate your existing security. They are a good first step towards making security improvements or solving a security problem. 

During a Security Assessment, all aspects of your security program are examined. Weaknesses are identified and suggestions for security improvements made. Identification of where costs can be reduced or security operations can be made more efficient will be documented..

Eclectic Security use a tested process to conduct physical security assessments. The assessment process is constantly evolving, allowing us to take advantage of lessons learned from previous assessments. We are constantly  keeping abreast with the latest security best practices.

The Security Assessment uses a process that allows us to develop a comprehensive  understanding of your businesses operating conditions,  culture and unique security risks and threats.

Our consultants facilitate the assessment every step of the way. They keep the project on track, and make sure that all important elements are examined.


Included in a typical assessment:

The Security Assessment is tailored for each project, but typically includes the following:

  • Risk identification and analysis.
  • Threat and vulnerability assessment.
  • Review of site and facility security.
  • Analysis of crime data.
  • Review of compliance
  • Review of facility operating procedures
  • Review of physical, electronic and architectural security systems, together with the relevant policies and procedures.
  • Review of security management and personnel.
  • Development of recommendations for security improvements.
  • Preparation of written Security Assessment Report


The Security Assessment Process Stage 1

What can you expect when we conduct a Security Assessment at your facility?

We will use the information gathered from a number of documents provided by yourselves. These can include plans of the site and copies of any existing security policies and procedures. These are used to help us understand what your current security arrangements and processes are.

We may conduct interviews with individuals such as senior managers, department heads and people who are involved in roles related to security 

We will conduct detailed inspections of certain areas of the facility which we identify as potential security issues. 

A night time visit is always conducted to observe lighting conditions and how your facility operates at night. This helps us get a complete picture of the facility and its security both during the day and at night. 


The Security Assessment Process Stage 2

During this process, we identify your critical assets, analyse potential threats, review loss history, evaluate existing security measures, and identify potential weaknesses and areas for improvements.

After both stages,  we begin to write the Security Assessment Report. While preparing the report, we often uncover things that require further investigation and study. Certain cases may require a return visit to conduct additional interviews or to examine particular areas of concern in more depth.

When the draft Security Assessment Report is completed, you will receive a copy   which we will review with you.

A final report is then compiled and sent to you. We can also make a formal presentation of the Security Assessment Report to your senior management team if required.

Once the formal report has been signed off by the relevant person, we are available to assist you with any implementations contained within our report. This can include assistance with security system upgrades, sourcing of other services, products and vendors.


Eclectic Security Infiltration Team (ESIT)