top of page

Services and Consultancy

THREAT ANALYSIS

The foundation of proactive security is the threat analysis. The threat analysis provides answers for the three essential questions in security:

What should be protected?

Who has interest in the protected assets?

How does the adversary operate to achieve his goal?

PROACTIVE SECURITY POLICY

Threats can manifest through three access gates within an organization. This is shown in the so-called three-gate model. The Proactive Security Policy is based on the three-gate model and the Threat Analysis.

SECURITY PLANS

Based on the criteria of the Proactive Security Policy, security plans are developed. OrcaSecure develops these plans using six tactical security processes: Access control, Supervision, Alarm verification, Incident management, Pre- & in-employment screening and Services

STANDARD OPERATING PROCEDURE

The Standard Operating Procedure (SOP) is the guide for the operation. The SOP defines the responsibilities and (decision) powers of the employee and how to execute threat assessments. OrcaSecure helps organizations with the development of SOPs

bottom of page