Now loading.
Please wait.

Main navigation

  • Home
  • Services
    • Consulting
    • Software Solutions
    • Engineering
    • Assurance
    • Education
  • About us
    • About Radar
    • Affiliation
  • Industries
  • Blog
  • Calendar
  • Contact

hello@radar-risk.com

Home

Main navigation

  • Home
  • Services
    • Consulting
    • Software Solutions
    • Engineering
    • Assurance
    • Education
  • About us
    • About Radar
    • Affiliation
  • Industries
  • Blog
  • Calendar
  • Contact

Software Solutions

Business intelligence and management software solutions for risk-wise organizations

Risk Management Software

Radar helps to select and implement the suited Risk Management Solution for you.

Securifyer™

SecurifyerTM is built on 6 modules that form an iterative process:

Security Radar Scanner™

Evaluate the security management system

Crime Profiler™

Assess security threats

Security Organizer™

Map, evaluate and adjust the security organization

Typical Security Designer™

Map, evaluate and adjust the security measures

Path Analyzer™

Calculate, evaluate and adjust the probability of interruption and attacker

ROSI Optimizer™

Map, evaluate and optimize the total cost of security

Security Radar Scanner™ Crime Profiler™ Security Organizer™ Security Designer™ Path Analyzer™ ROSI Optimizer™

Security Radar Scanner™ contains 101 capabilities measuring the current and future maturity along actions plans leading to state-of- the-art security. The 101 capabilities are themes as below on a gap-assessment questionnaire:

Security risk assessment
Security strategy &planning
Security organization and the human factor
Physical security
Access control
Fire engineering
Intrusion detection
Camera surveillance
ICT security
Control room
Guarding
Audit
Radar Scanner™ is available in a consulting formula, through self-assessment or a combination.
Contact us for more information

Crime Profiler™ assesses your security risks based on 7 crucial elements:

What are potential targets for attacks?
Where are these targets located?
How will adversaries operate?
With what means will they operate?
When will they attack?
Who is the potential adversary?
Why would one attack your organization?
Intrusion detection
Camera surveillance
ICT security
Control room
Guarding
Audit
Contact us for more information

Security Organizer™ is one of 6 elements of the Security Risk Management Method Securifyer™. The objective of Security Organizer is™ is to get best-in-class security. Security Organizer™ helps you to build your security organization by defining roles and responsibilities, the necessary resources, controls and competences. The human factor is crucial in managing security. 

Security Awareness
Many organizations have traditionally spent their time and budgets on security hardware, often overlooking security awareness and the importance of staff for managing security.

‘The human factor’ is however a critical part of all security programs. Technology does not work unless people decide to make it work. It is also one of the most overlooked elements in the security chain. If trained and motivated properly, staff, members and management can become the greatest asset in managing your security.

Criminals cannot succeed with alert people around. The most effective deterrent is for all personnel, all people around, not just security, to be attentive to their surroundings. The truth in this is often revealed during post-incident investigations when one or more witnesses are found who say something like; “I saw a person doing [something unusual] near the scene of the event [beforehand], but I didn’t think anything about it.”

If the “unusual behavior” had been reported to the appropriate security personnel, the incident may have been prevented. All criminal events are preceded by recognizable, unusual behavior.

Contact us for more information

Security Designer™ is one of the 7 elements in Securifyer™ and helps you to take the right security measures aiming at deterring, detecting, alarming, delaying and responding to an adversary attack. The cornerstones are:

The human factor
Physical security
Access control
Intrusion detection technology
Camera surveillance
Security Designer’s starting point is a zone model with layers of defense. Based on the defense-in- depth model, typical security designs are drawn for optimal mitigation of security risks.
Contact us for more information

Path Analyzer™ is one of the 7 elements in Securifyer™ and Path helps you to optimize your probability of interrupting an adversary. The cornerstones are:

Delaying times
Probability of detection
Location of detection
Probability of communication
Response force time
Intrusion detection
Camera surveillance
ICT security
Control room
Guarding
Audit
Contact us for more information

ROSI optimizer™ is our method to help you finding the ‘security optimum’: the point where the marginal benefits of security equal their marginal costs. This avoids that you under – or overinvest in security.

Contact us for more information

SaaS: Software as a Service

An easy subscription route covers all the bases to get you up and running quickly and without problems

1
Select Options

Customize your solution by
selecting from the available
software and content options.

2
Setup

We will prepare your solution
based on your requirments,
timeline and goals.

3
Ready to go!

You can maintain your configuration
yourself and start using our
configuration and content right
away.

Benchmarker™

Risk management system capabilities mature over years at staggered rates unique
to your organization - not others.

What gets measured, gets done...

Risk management system capabilities mature over years at staggered rates unique to your organization - not others. ERM Benchmarker, developed by Domenic Antonucci, is the most powerful tool for gap-assessing risk management system effectiveness. It benchmarks your current baseline against targeted self-improvements over time. This delivers the right set of specific capabilities within a risk management system best tailored to your organization.

8-multi-criteria

The ERM Benchmarker™ contains 105 capabilities represented by leading CRO practices, which are cross-walked to ISO 31000 standards and COSO ERM and are themed as below on a gap-assessment questionnaire:

Risk oversight
Managing the risk framework
Risk management
Risk assessment
Risk treatment
Monitoring and review
Risk culture
Other parties

Need more information? Contact us!

Get in touch

Links

  • Home
  • Services
  • Industries
  • About us
  • Contact
  • Blog
  • Calendar

About Radar

The Risk Management Company. Managing your risks is what we do. We empower your team and optimize your business, not only with our expert and strategic risk management advice, but also by committing ourselves to the partnership in an impeccable implementation. Our global customer base are private organization and the public sector, seeking a top Risk Management partner in Security, Enterprise Risk and GRC Technologies, our core capabilities.

Western Europe Office Belgium

Fruithoflaan 12, 2500 Koningshooikt
+32477347738
hello@radar-risk.com

© Copyright 2016. All Rights Reserved. Radar Risk