top of page

Services

THREAT ANALYSIS

The basis of proactive security is threat analysis. The threat analysis answers the three essential questions:

What needs to be protected?

Who is interested in that?

How does a perpetrator go about achieving his goal?

SECURITY POLICY

Threats can manifest themselves within an organization through three gates. This is shown in the so-called three-port model.

The Integrated Proactive Security Policy is developed based on the three-port model and the Threat Analysis.

SECURITY PLAN

Underlying security plans are developed based on the frameworks set in the Integrated Proactive Security Policy.

OrcaSecure develops these plans using six tactical security processes:

Access control, Supervision, Alarm verification, Incident management, Pre- & in-employment screening and Services

STANDARD OPERATING PROCEDURE

The Standard Operating Procedure (SOP) is the charter for the operation. The SOP sets out the employee's responsibilities and (decision-making) powers. OrcaSecure helps organizations with the development of SOPs

bottom of page