SECURITY REVIEW
We provide meticulous and structured commercial security reviews to ensure your facilities are secure and compliant with industry standards. Our team of seasoned security consultants conducts thorough assessments, delivering actionable recommendations to enhance your security measures. Our process encompasses on-site reviews, detailed assessments, seamless logistics, and comprehensive reporting to provide you with a robust security strategy.
On-site Security Review
with Lulworth Stone's principle consultants
We conduct a meticulous three-day security review at each location, performed by a team of two seasoned security consultants. This comprehensive review covers all critical aspects of your facility’s security, including physical security, access control, surveillance systems, and emergency response protocols.
Section Title
Detailed On-Site Security Assessment
​
Our on-site security assessment follows a systematic approach to ensure all aspects of your facility's security are thoroughly evaluated. The assessment includes:
Day 1: Initial Assessment and Planning
​
-
Kick-off Meeting: Meet with the facility management team to understand specific security concerns, recent incidents, and current security policies.
-
Facility Tour: Conduct a comprehensive tour of the facility to get an overview of the physical layout, access points, and existing security measures.
-
Risk Identification: Identify potential security threats unique to the facility, considering local crime statistics, previous incidents, and specific industry risks.
-
Review of Security Policies and Procedures: Evaluate existing security policies, emergency response plans, and compliance with local regulations and industry standards.
-
Stakeholder Interviews: Interview key personnel, including security staff, management, and other relevant stakeholders, to gain insights into operational security challenges and procedures.
Day 2: Detailed Evaluation and Testing
​
-
Physical Security Assessment: Examine the physical security measures in place, such as fences, barriers, lighting, and locks.
-
Access Control Systems: Evaluate the effectiveness of access control systems, including key card systems, biometric scanners, and visitor management processes.
-
Surveillance Systems: Assess the coverage, quality, and functionality of CCTV and other surveillance systems. Review monitoring practices and response protocols.
-
Alarm and Intrusion Detection Systems: Test and evaluate the effectiveness of alarm systems, motion detectors, and other intrusion detection systems.
-
Emergency Preparedness: Review emergency evacuation plans, assembly points, and the readiness of emergency response teams. Conduct a simulated emergency drill if feasible.
-
IT and Cybersecurity: Assess the facility's cybersecurity measures, including network security, data protection practices, and incident response protocols.
​
Day 3: Analysis and Preliminary Reporting
​
-
Security Personnel Evaluation: Assess the training, capabilities, and performance of on-site security personnel. Review incident reporting procedures and training records.
-
Visitor and Contractor Management: Evaluate the processes for managing visitors and contractors, including background checks, access control, and supervision.
-
Perimeter Security: Conduct a detailed inspection of perimeter security measures, including gates, barriers, and external lighting.
-
Vulnerability Testing: Perform penetration testing and other methods to identify vulnerabilities in the facility's security infrastructure.
-
Preliminary Findings and Recommendations: Summarize initial findings and discuss potential recommendations with facility management. Obtain feedback and address any immediate concerns.
​
Report Preparation
Allowing three days per location, one consultant prepares an exhaustive security report and recommendations. This ensures that you receive a detailed, actionable plan for enhancing your security measures.
Deliverables
We provide detailed reports for each of the three facilities, including:
​
-
Comprehensive Analysis: In-depth analysis of current security measures.
-
Identification of Vulnerabilities: Detailed identification of potential security weaknesses.
-
Recommendations: Clear and practical recommendations for security improvements.
-
Implementation Plan: A step-by-step plan and cost estimates for implementing suggested measures.
Executive Summary
​
A high-level summary of findings and recommendations is provided for senior management review.
Our team presents key findings and recommendations to your leadership team, ensuring that you have a clear understanding of the current security status and proposed enhancements.