top of page

Services and Consultancy

THREAT ANALYSIS
 

The fundament of proactive security is the threat analysis. The threat analysis provides answers for the three essential questions in security:

What should be protected?

Who has interest in the protected assets?

How does the adversary operate to achieve his goal?

PROACTIVE SECURITY POLICY
 

Threats can manifest through three access gates within an organization. This is shown in the so-called three-gate model. The Proactive Security Policy is based on the three-gate model and the Threat Analysis.

SECURITY PLANS

 

Based on the criteria of the Proactive Security Policy, security plans are developed. OrcaSecure develops these plans using six tactical security processes: Access control, Supervision, Alarm verification, Incident management, Pre- & in-employment screening and Services

STANDARD OPERATING PROCEDURE
 

The Standard Operating Procedure (SOP) is the guide for the operation. The SOP defines the responsibilities and (decision) powers of the employee and how to execute threat assessments. OrcaSecure helps organizations with the development of SOPs

bottom of page