Business intelligence and management software solutions for risk-wise organizations. Radar helps to select and implement the suited Risk Management Solution for you.
SecurifyerTM is built on 6 modules that form an iterative process:
Evaluate the security management systems' maturity
Assess security threats.
By 7 key elements.
Map, evaluate and adjust the security organisation
Map, evaluate and adjust the security measures
Calculate, evaluate and adjust the probability of interrupting an attacker
Map, evaluate and optimise the total cost of security
contains 101 capabilities measuring the current and future maturity along actions plans leading to state-of- the-art security. The 101 capabilities are themes on a gap-assessment questionnaire:
Available in a consulting formula, self-assessment or a combination.
• Risk assessment
• Strategy & planning
• Organisation & human factor
• Physical security
• Access control
• Fire engineering
• Intrusion detection
• Camera surveillance
• ICT security
• Control room
• Guarding
assesses your security risks based on 7 crucial elements:
• What are potential targets for attacks?
• Where are these targets located?
• How will adversaries operate?
• With what means will they operate?
• When will they attack?
• Who is the potential adversary?
• Why would one attack your organization?
is one of 6 elements of the Securifyer™ method.
The objective of Security Organizer is™ is to get best-in-class security.
Security Organizer™ helps you to build your security organisation by defining roles and responsibilities, the necessary resources, controls and competences.
The human factor is crucial in managing security.
Security Awareness
Many organizations have traditionally spent their time and budgets on security hardware, often overlooking security awareness and the importance of staff for managing security.‘The human factor’ is however a critical part of all security programs. Technology does not work unless people decide to make it work. It is also one of the most overlooked elements in the security chain. If trained and motivated properly, staff, members and management can become the greatest asset in managing your security.
Criminals cannot succeed with alert people around. The most effective deterrent is for all personnel, all people around, not just security, to be attentive to their surroundings. The truth in this is often revealed during post-incident investigations when one or more witnesses are found who say something like; “I saw a person doing [something unusual] near the scene of the event [beforehand], but I didn’t think anything about it.”If the “unusual behavior” had been reported to the appropriate security personnel, the incident may have been prevented. All criminal events are preceded by recognizable, unusual behavior.
is one of the 6 elements in Securifyer™ and helps you to design the right security measures aiming at deterring, detecting, alarming, delaying and responding to an adversary attack. The cornerstones are:
• The human factor
• Physical security
• Access control
• Intrusion detection technology
• Camera surveillance
Security Designer’s starting point is a zone model with layers of defense.
Based on the defense-in- depth model, typical security designs are drawn for optimal mitigation of security risks.
is one of the 6 elements in Securifyer™ and Path helps you to optimise the probability of interrupting an adversary. The cornerstones are:
• Delaying times
• Probability of detection
• Location of detection
• Probability of communication
• Response force time
is our method to help you finding the ‘security optimum’: the point where the marginal benefits of security equal their marginal costs. This avoids that you under – or overinvest in security.