Security Engineering

Continuous Consulting

Securitas Risk Management and Consultancy prepares comprehensive technical specifications for the security systems it designs. This provides the process with continuity.

The electronic security systems extend the limits of the human capability and capacity, decreases the number of human errors, and increases the deterrence of the system.

The basic purpose of the security engineering activities is to provide the optimum system required by a Security Structure in line with its specific risks at the most reasonable cost, to make sure that this system is installed correctly, and once realized, to ensure that it is used in the most efficient way.

The security technology manufacturers worldwide minimize the traditional limitations of the electronic security systems with their intense R&D activities, especially in the last 20 years where the IP-based systems have been in the market. Securitas Risk Management and Consultancy follows the technological trends both in Turkey and the world, mostly at first hand.

Securitas Risk Management and Consultancy’s field experience, obtained through its Continuous Security Consulting services, allows it to better understand the strengths and weakness of the existing technology. This knowledge makes it possible to select the specific equipment required for the specific location during the design process of the electronic security system, and to correctly integrate it into other systems.

Beginning the Project

The Securitas Risk Yönetimi ve Danışmanlık projects have a 2-stage process which includes pre- and post-tender activities. Stage A includes the pre-tender process, and Stage B the post-tender process.

Stage A – System design and preparation of tender documents

Data Analysis

In the first stage of the project process, information is gathered on the project itself and on subjects such as its environmental factors, investor profile, and user profile. This collected data is evaluated in the Analysis of Risks in the next stage.

 

Risk Analysis

The risk analysis is the basis of the system to be designed, because all factors that affect the system design such as selection of correct equipment, equipment placement, even the revision suggestions in architectural design, are based on the data obtained during the Risk Analysis.

 

Concept Design and Customer’s Approval

In the light of the collected data and completed risk analysis, the security concept of the project is determined. Basically, the security concept includes the basic principles and assumptions of the security system. In this context, the plans and predictions regarding matters such as vehicle traffic, pedestrian traffic, entrance checks, peripheral checks, necessary electronic and physical systems, security human resources, and the procedures to be required, are assessed. The designed security concept is presented to the customer before it is transferred into the project design, and the system design is started following the customer’s approval.

 

Design

The agreement reached with the customer on the concept is also considered as the first step of the design process. Following the agreement, the Security Project Drawings, Equipment Lists, Bill of Quantities, and Technical Specifications for Security are prepared, and delivered to the customer as a tender kit.

Stage B – Post-Tender and Implementation Process

Bid Evaluation,

The leading electronic security companies in Turkey apply for the implementation of a system designed by Securitas Risk Management and Consultancy. The bids received during the tender process carried out by the customer, are analyzed by Securitas Risk Management and Consultancy according to the following criteria;

 

Suitability with the project

Suitability of the Bill of Quantities

Compliance with the specifications

Price levels

Afterwards, a comparative Bid Evaluation Report is presented to the customer.

 

Process Support

Most of the time, the contractor needs support with the implementation of the designed system. In general, Securitas Risk Management and Consultancy provides support for correct implementation during the infrastructure, installation process, and fine tuning of software and hardware.

 

Acceptance Tests

Once the installation is completed, Securitas Risk Management and Consultancy performs acceptance tests to see if the system has been implemented as designed. The system is accepted by the customer only after the completion and approval of the final acceptance test, and only then starts the warranty period of the system.

Bizimle iletişime geçebilir, işletmenize özel çözümler hakkında detaylı bilgi alabilirsiniz.

Tıklayın