TechniTrend
we' ve got you covered !

Information is a business critical asset because it drives growth and forms the backbone of our company. But the security of that asset is often overlooked, which is why over 80% of security breaches come from within the organisation as a result of poor policy, procedures and staff awareness training.

Solution

Our security methodology which is shown in a box diagram below always commences with analysis of the threat to any particular business, facility, organisation or location.

Only once the threats have been clearly identified can a security strategy and plan be put together to effectively counter them.

The security strategy and policy clearly defines how a site is to be protected in the broadest possible terms and the plan details, the type, nature, siting and organisation of equipment, guards, manpower, surveillance and building control that will actually achieve the security objectives.

The specification details the clear performance and requirement and type of products that are to be supplied as part of the open competitive bid for the security construction of the project.

The evaluation of contractors' Tenders and the award of the contract are also a vital part of the process to ensure that the most effective and competent contractor is awarded the contract at a cost-effective price. Our consultants will also manage the client's contract through to completion and the most important aspect of commissioning and handover. We will also design specific training courses for the client's staff in how to become effective security managers and security supervisors and provide detailed specific security procedures for the site.