• Services
  • Risk Assessment

Risk Assessment

Operations Security Systems

The operations team of more than 200 staffs are ready to support 24 hours a day. Considering to play a role and the heart of driving the operation of security system in the area of responsibility, having close contact with security guards, the contractors including involved in various process to ensure that security system management is in control with requirements and objectives to achieve efficiency.

Security Service Control

In order to manage the security system according to the requirements and objectives, To achieve speed and maximum efficiency. The main service process is as follows:

Before Service

  • Provision of Security Personnel: Arrange security personnel according to the employment agreement.
  • Training: Conduct the security training as required by laws and specific job positions through our training academy.
  • Pre-Service Training: Train and rehearse protocols provided by the client to ensure alignment with the hiring objectives before deployment.
  • Client Coordination: Meet with the client or their representative to introduce our team and cooperative work methods.

Commencing Service

  • Deployment: Schedule a meeting with the client or their representative, along with security personnel and equipment, to start duties as per the contract.
  • Briefing: The operations team will brief and inform security personnel about specific protocols at their posts.
  • Asset Inspection: Collaborate with the client’s team to inspect and hand over assets to security personnel for safeguarding.
  • On-Site Training: The operations team and trainers will implement on-site training to ensure security personnel can execute the plan and use the equipment correctly. Daily works and reports will be maintained.

On-Site Development by Training Institute and Operations

To enhance the efficiency and development of security services for the benefit of the client, our team will monitor and conduct on-site training. This includes realistic scenario simulations to improve understanding of the actual situation post, enhance observational skills and incident reporting accuracy. Training is categorized as follows:

Training by Security Training Academy Team:

  • New Assignment Training on new assignment protocols.
  • Contractual Training: Conduct training as per the Contractor’s contract.
  • Special Request Training: Provide special security training as requested by the client or due to operational needs.
  • Discipline Monitoring: Ensure discipline across all security positions.

Training by Operations Team: 

  • Routine Protocol Training: Conduct regular protocol reviews.
  • Emergency Response Training for abnormal or emergency situations on-site.
  • Shift Change Briefings: Inform an updates and directives from the client during shift changes.

After-Sales Service

  • 24-Hour Inspection Plan: Implement a 24-hour inspection schedule.
  • Client Follow-Up: The operations team will meet with the client to review the service.
  • Risk Assessment: Survey and assess risks at the responsible site to propose recommendations and practices to the client.
  • Procedure Review: Review and adjust procedures to suit on-site operations.
  • Quality Control: The training institute team will ensure service quality and compliance with the contract to meet the client’s objectives.

Concept of Planning and Designing Security Systems with the GUTS-7D4M Model

Step 1 – Define Objectives, Scope, and Responsibilities

Security in the area

Safety of The Operators

Service provision

Environment

Step 2 – 7-Dimensional Risk Assessment

D1

Entrances and exits, perimeter

D2

Perimeter

D3

Outside the building

D4

Inside the building

D5

Subsurface (underground)

D6

Upper areas (airspace)

D7

Outside the responsible area (intelligence)

Step 3 – Implement Related Measures

M1

MAN

M2

Machine

M3

Money

M4

Management