Services and Consultancy
THREAT ANALYSIS
The fundament of proactive security is the threat analysis. The threat analysis provides answers for the three essential questions in security:
What should be protected?
Who has interest in the protected assets?
How does the adversary operate to achieve his goal?
PROACTIVE SECURITY POLICY
Threats can manifest through three access gates within an organization. This is shown in the so-called three-gate model. The Proactive Security Policy is based on the three-gate model and the Threat Analysis.
SECURITY PLANS
Based on the criteria of the Proactive Security Policy, security plans are developed. OrcaSecure develops these plans using six tactical security processes: Access control, Supervision, Alarm verification, Incident management, Pre- & in-employment screening and Services
STANDARD OPERATING PROCEDURE
The Standard Operating Procedure (SOP) is the guide for the operation. The SOP defines the responsibilities and (decision) powers of the employee and how to execute threat assessments. OrcaSecure helps organizations with the development of SOPs