Security management consultancy

Because you want to know that it is well organized

Meet your security expectations and ambitions

In the ideal situation you as a company or organization have insight into the current real criminal risks. The security plans then clearly state which interests must be protected and how the risks are addressed (or not). The organizational, structural and electronic security measures are implemented in such a way that they reinforce each other, whereby the organization's point of departure is aimed at preventing incidents and, in the event of a risk manifestation, returning the organization to the old situation as quickly as possible.


Companies and organizations are often not aware of the degree of presence and the effectiveness (or lack thereof) of security measures. Have sufficient measures - under the right conditions - been taken? And do they (still) fit the security ambition? And when it appears that adjustments are required, what must be done to get the security measures to the desired ambition level?

What we can do for you

By making use of our human skills that - partly - have been formed at the special units of the Ministry of Defense and the Dutch police, we have found the relevant mix of knowledge, skills and the capacities to turn them into clear, comprehensible ( integral) security advice at the Organizational, Architectural and Electronic level. We have converted this into three - ideally connected, but to be purchased separately - services, namely:

1.Security audit - 2.Integrated security - 3.Implementation process

1. Security audit

Do all the security measures taken by the organization comply with the requirements set for the protection of employees, visitors, building, household effects? Are the existing measures not outdated and can you still rely on them? Or may new security requirements be set (soon)?

We tell you the current situation of the security level and easily expose any vulnerabilities. You simply want to know where you stand in the field of security (and safety).

"Because you wat to know where you stand

Step 1

We begin to get to know each and every trajectory with you / your company or organization, or we take stock of your context.

What kind of organization are you? How is your organization organized? What are the organization objectives? What are the internal and external interests? What is the culture? Etc.

But we also ask about your safety expectations and ambitions. Where do you expect to be and where do you want to go?

Step 2

After we know what your context is, we will determine which security risks apply to your organization.

In other words; which criminal dangers are real within your organization and processes and what are the possible consequences if these dangers arise? But we will also look at the chance that this specific risk may arise.

Step 3

Now it's our turn. We will now examine to what extent the current situation meets your expectations and ambition with regard to the certain realistic risks.

In other words, are you protected the way you want (or perhaps should) be protected? We call this your current security level.

In this we also look at the feeling of safety. Because there may be situations in which security can be in order, but there are still people who feel unsafe. You have to do something with that, otherwise this will have an effect on job satisfaction and performance.

Step 4

We summarize everything in a well-arranged advice that fits in with you, your organization and the culture within your organization. Because nothing is as annoying as advice that nobody can (or want) to use. The advice gives you insight into:

  • Developing an (integral) security policy
  • Real criminal risks
  • Scenario description of present risks
  • Estimating risks of chance and potential impact
  • Advice on organizational, structural and electronic security measures, for example:
    • Internal agreements, education and training;
    • Replacement of doors, windows, glass;
    • Expanding or adjusting the intrusion alarm system, camera surveillance, etc.

2. Integrated security

There are challenges in the field of safety management within companies and organizations. These companies and organizations have difficulty realizing and guaranteeing safety. Often the intentions of the security officer and the organization are too far apart. There vulnerabilities arise.

We realize integral security. In other words, security gets a role in every process and every employee at all times. In addition to their daily duties, employees within the museum receive a proactive attention to safety. We hereby take care of everything for you and address the pain points. That is even more important when security falls within your function range. We do what we are good at and you can focus on what you are good at.

"Security is now a task for everyone

Step 1

If we do not know you yet, we will meet you first. We would like to know who you are and how the company / organization works. We will then start by making all your internal processes transparent with a security interface.

In other words; which process within which department is directly or indirectly related to a security topic. Consider, for example, cash transportation within a financial department and its payment process.

Step 2

If we have insight into the current situation, we will assess where the points for improvement are.

We do this by balancing the existing processes with a security interface against the factors vision, mission, ambition and integrality. Together with the process managers, we determine which adjustments create added value.

Step 3

We summarize step 1 and step 2 in a clear advice that the internal organization can use to get started.

Every person responsible for the process extracts his or her points of improvement from the advice, with the integrated process steps clearly formulated within it.

3. Implementation process

Do you know that feeling that the garage says you really need a new distribution belt ... You never know for sure ...

No problem. We now know your organization through and through and know the market of providers of structural and electronic security measures. If you want, we will draw up a program of requirements together with you, we will make the applications for you and we can assess them on the basis of functioning and price.

Are they coming to build or install the measures? We look with you and ensure that nothing is left to chance. We ensure that you get what you pay for and - more importantly - get what you need. We use a structural recurring check on the services provided for their efficiency and effectiveness. Because what is doing right now must continue to do so!

"All you need to do now is to apply