Consultancy

Security Consultancy

The consultancy services offered by Dexiotis on security provide a tried and tested mechanism with a fresh and out-of-the-box outlook to ensure an effective and efficient solution to your concerns. Furthermore, through its broad and interdisciplinary experience in matters of security, Dexiotis can provide a tailor-made solution to your security needs and requirements. Our consultants are experienced professionals with wide knowledge on security aspects.

Evaluation of Organisational Security

The level and performance of security capabilities in place at an organisation is evaluated and compared against a list of criteria determined by its needs. The correct type and level of security ensures the main focus of an organisation (services, assembly line, manufacture, distribution, or other) is not easily compromised thus providing for the undisturbed continuation of its primary functions.

The effectiveness of the security personnel onsite in providing the agreed and necessary prevention and protection services and identifying potential disturbances compromising this responsibility is evaluated. Establishing the appreciation of the importance of this security service to the running of the organisation by both security and normal personnel is also analysed. Moreover, the facilities are audited to establish suitability for satisfying the security expectations and identification of any weaknesses. The overall aim being to identify all potential risks, threats and circumstances that could disturb or stop the protected primary activity of the organisation and provide effective solutions.

The process of security evaluating your organisation by Dexiotis includes:

• Use of appropriate predefined lists with potential risks and undesired circumstances.
• Simulating real threats to identify reactions and responses.
• Use of high resolution online reporting and activity control system to monitor security relevant activity of employees (input from employees not required leaving the efficiency of the basic security service unaffected).
• Reporting on findings and open points with solutions and action plans to follow.
• Provision of online training via e-learning, e-quiz and other platforms.

Security Efficiency Measurement & Control

To determine the level of efficiency and effectiveness of the security system in place at an organisation simulation tools and techniques are used. In this way, the response of the security system and the way it would cope with security bridges in real life situations can be established.

Dexiotis simulates threats using many tools and techniques including, but not limited to, the following:

• Threat materials (including restricted items): knives, swords, CS Gas spray, rubber or wooden batons, etc.
• Dangerous items: weapons, explosives, parts of them, etc.
• Accidents: employees being hurt, broken bones or even amputated limps.
• Communication situations: malicious, hysterical, employees or clients feeling unwell, etc.
• Organised (controlled): stealing, unauthorised entry.
• Organised legal entries: using fake documents or other means.

Security Service Quality Control

To ensure that the quality of the security service provided is performed at the expected level a wireless handheld device can be used. The device can be configured via its menu or remotely to monitor specific functions and send logged data to a centralised location using the Internet or mobile network.

The data send by the device can be displayed on a computer thus enabling in real time the involvement of security personnel on the task at hand. Reports can also be produced. As a result, the quality of the security level provided by personnel can be monitored thus enabling analysis, modifications, improvements, etc.

The handheld communications tool is used to monitor the engagement and effectiveness of security tasks undertaken by security personnel through tracking of various parameters configured on the device. These parameters include activity status through the incorporated shock sensor (patrolling or standing or sleeping), the frequency of habitual movements (time frames - too quick or too slow) when checking individuals or bags, battery level, etc.

Ad Hoc Security Solutions

Dexiotis recognises that every single case of security requirement is different from any other, with it's own quirks and peculiarities. That is why our security experts will consider all aspects of your security requirements and offer a solution that is tailor-made to your particular security needs.

The process of providing an ad hoc security solution by Dexiotis includes:

• Use of appropriate predefined lists with potential risks and undesired circumstances.
• Simulating real threats to identify reactions and responses.
• Use of high resolution online reporting and activity control system to monitor security relevant activity of employees (input from employees not required leaving the efficiency of the basic security service unaffected).
• Reporting on findings and open points with solutions and action plans to follow.
• Provision of online training via e-learning, e-quiz and other platforms.