Services
A step by step description of our offers
We got your back
Securify's Perimeter S
olution
- From Concept to Completion
At Securify, we take a comprehensive and methodical approach to perimeter security projects, ensuring each phase is well-planned and executed. Our client-centric process encompasses six key phases, ensuring we meet and exceed the specific security requirements for every site.
Theoretical Phase: We begin by defining the client's needs and designing a preliminary desktop solution tailored to their unique perimeter requirements.
Validation Phase: Our team conducts on-site evaluations to validate the proposed solution, ensuring optimal sensor placement and effective detection capabilities. This includes rigorous testing and validation with detailed reporting.
Delivery Phase: Upon acceptance of the design, we proceed with material ordering and in-factory testing to guarantee the quality and reliability of our systems before they reach the site.
Deployment Phase: The materials are delivered to the site, where our partners carry out the installation process, culminating in comprehensive system commissioning.
Operational Training Phase: We believe in empowering our clients with knowledge. To this end, we provide training on the operation of the newly installed perimeter systems, ensuring the client’s team is proficient in managing and maintaining security protocols.
Final Testing and Acceptance Phase: The project concludes with a final on-site test and validation to confirm that the system meets all the predefined criteria. Only after thorough testing and client satisfaction do we consider the project complete.
Throughout this journey, our process is designed to bridge any gaps between delivery and the client's expectations, ensuring a seamless transition to a high-capability security solution.
Assessment
Through dialogue with our partners, end-users and consultants, we craft tailor-made solutions through a meticulous requirement analysis.
Let’s use a utility station as an example: We need to consider factors such as detection areas, sensor position, possible deterrents and topology. The radar system will be integrated with other setups - communication systems and surveillance cameras for instance, to ensure optimal performance and incorporations of all stakeholders.
System Design
In this theoretical phase, we design a desktop solution using satellite maps and photos, outlining the choice and placement of sensors illustrating the monitored areas and volume coverage. This helps us determine the maximum security and budget for the project.
Site Survey
Here, we conduct an on-site visit with partners to perform penetration tests and document the results in a site survey report. These tests are made to confirm our solutions meet the highest standards.
The project planning process is executed on-site, aiming to validate the preliminary desktop solution while establishing precise radar placements and assessing their detection capabilities. The findings from this site survey are crucial for guiding the installation of radar sensors during the Deployment phase. This approach ensures that any discrepancies between the delivered solution and the client's specified requirements and expectations are identified and addressed effectively.
Pre-Configuration
After receiving orders and acquiring the necessary hardware and software, we prepare servers, sensors, etc., for delivery to installers. We like to communicate with all relevant parties during this, for a smooth commissioning process.
Site Commissioning
In this stage, we support the partner with configuration and system integration, which can be conducted on-site or via remote connection. This step often involves integrating the delivered components with other systems at the site, such as VMS, access control, intrusion alarms, and overarching systems (PSIM).
Support
Once the facility is commissioned and handed over to the customer, we provide dedicated 2nd line support. We are here to help you before and after the installation, with things such as troubleshooting, system optimization, updating, proactive measures, and much more.
Training
We aim to boost our partners’ independence by providing custom training, usually designed to fit real situations that may occur. We believe that the more knowledge we share with end-users, the more effortless the whole process will be.
SMA Agreements
Our SMA agreements are customized to our partners, covering service initiation, response time, and availability.