140 likes | 347 Views
DEVELOPING THE SECURITY SYSTEM. RISK ANALYSIS. Objects. FIELD SURVEY. GATHERING INFORMATION. Adversary. EVALUATION. Environment. SYSTEM DEVELOPMENT. Steps required in order to develop a comprehensive security system. IMPLEMENTATION SUPERVISION. ON GOING SUPPORT.
E N D
DEVELOPING THE SECURITY SYSTEM RISK ANALYSIS Objects FIELD SURVEY GATHERING INFORMATION Adversary EVALUATION Environment SYSTEM DEVELOPMENT Steps required in order to develop a comprehensive security system IMPLEMENTATION SUPERVISION ON GOING SUPPORT
APPROCH & CONCEPT 1. Concentration of Efforts 2. Optimal balance of security elements 3. Elements of Deterrence 4. Creation of “Security Circles” 5. Attention to cost versus benefit
Gathering information Personal Technical And Physical means Procedures Quality assurance INTEGRATEDSECURITY SYSTEM
Gathering information Personal Technical And Physical means Procedures Quality assurance INTEGRATEDSECURITY SYSTEM Reflects the optimal balance between the five basic elements of security
INTEGRATEDSECURITY SYSTEM Click on mouse to advance to next slide • Gathering Information –Is a basic task that enables us to provide a suitable security concept and system that will optimally answer our client’s needs. • Technical Means –Equipment and systems are constantly being upgraded and developed. We aspire to use state-of-the-art equipment and systems in order to ensure that our client’s system will last for many years. In other words, the more sophisticated the system that we will provide, the less future investment will be required. • Personnel –A good system without skilled people to operate and to maintain it will not accomplish the tasks for which it was designed. We will ensure training our client staff. • Procedures –A good system without usage procedures, guidelines and rules for the employees will defeat the purpose for which the system was designed. We will develop those procedures. • Quality Assurance –Ensuring that all elements of the system are working together as one system is a fundamental issue.
INTEGRATEDSECURITY SYSTEM The Optimal Security System Click on mouse to advance to next slide • The ultimate security system will include all five elements. Our main target is to achieve an optimal balance between those five elements. This achievement ensures that our client will obtain the most effective system for his money. • Our idea is to achieve this balance specifically in relation to the cost. Thus, our client will acquire the most effective system for his output.
Controls, Supervision, Drills Technical means Procedures Personal SECURITY CIRCLES Creating security circles with the mentioned security elements around the facility
SECURITY CIRCLES will eliminate getting to and penetrating the core of facility AND Adversary
SECURITY CIRCLES SISCunique Expertise and Experience Leading to capture or retreat! Adversary
SISC, The Security ExpertSample of system’s expertise • Security Control Command Center • Perimeter and Site Systems • Border surveillance and Passages Control • CCTV (Close Circuit TV) Systems • Thermal & Radar Imaging and Detection • Access Control Systems: • LPR (License Plate Recognition) • Hand and finger Biometric identification • Face recognition • Smart Card • Communication and Public Address systems • Non Conventional Treats • Network Data Communication Systems
SISC, The Security ExpertSpecial Perimeter Expertise • Developed unique experience in perimeter protection systems • Designing and supervising perimeter security concept • Using state of the art systems and devices • Supervision of over 450 km of perimeter security system installations (led by IDF) • Designing perimeter system of the Olympic Village, Athens 2004 • System included electronic fence detection system integrated with CCTV cameras system
SISC, The Security ExpertSpecial Perimeter Expertise End of slide show Please click here with Your mouse here to end • Developing the security concept of army camps, air force bases, towns, villages and settlements • Systems used were electronic perimeter fence detection systems & Electrical Shocking fencing systems • Special perimeter systems using long-range detection systems such as: • Thermal detection systems • Radar systems • Video Motion Detection (VMD) systems • Acoustic detection systems • Seismic systems • Borders Passages & Entrances to facilities – LPR, Biometric, Smart card systems, etc. • All systems were integrated and managed by integrated Command & Control security management system and supported by CCTV (Closed Circuit TV) for verifications