• Tag-Archive for » securing assets «

    White Paper-The 4 Most Critical Considerations for Physical Security Systems: #3

    Consideration #3: Overt and Covert Systems When installing a security system, there are interesting psychological ramifications that KTC takes into consideration to create the ultimate system for our clients. We want visitors, wanted and unwanted, to know that our sites are fully secured. We use visible cameras, guns and other systems that make all parties aware of the security measures taken. This fact, to the trained eye, is a sign of a well-formed covert security system as well as overt. Ideally, the overt and covert systems should work together to reinforce one another. We use covert designed sensors that workContinue Reading

    White Paper-The 4 Most Critical Considerations for Physical Security Systems: #2

    Consideration #2: Scalability, Flexibility, Installation and Disruption of Flow When considering security for any asset many people look only into the foreseeable future. One of the most valuable features that KTC offers is an ability to scale any project for size, cost and other variables. In many cases the project is so large it must be done in phases. In these situations we know the scalability of the project and we add the element of flexibility with the installation. With our plans we are able to close sections of a factory or port to install security measures while other locationsContinue Reading

    White Paper-The 4 Most Critical Considerations for Physical Security Systems: #1

    Consideration #1: Requirements Definition and Cost The first step in any security and protection assignment is to determine to what extent a subject will be protected. This will take into account several factors. Threat What is the direct threat to the asset? Is the threat coming from a physical attack or a technology system attack? From an unknown source? Vulnerabilities Where is the asset vulnerable? The size and type of the asset will determine what types of vulnerabilities could open it for an attack. Larger assets like a tanker will have very different vulnerabilities than a piece of software. Value of Asset We must establishContinue Reading