Security Consultancy Services

OSI provide security consultancy services across all types of project – ranging from residential to Critical National Infrastructure. We will protect your premises and your brand.

About Give us a call

We can help you to secure your premises & protect your brand

We have extensive expertise & experience in physical and electronic security solutions both in-depth and wide-ranging applications. Our team includes ex-military with the critical skills for organisational success. Team-working is ingrained but mission focus gives our staff the initiative and resilience to work alone when required.

We excel in:
· System design
· Vulnerability & threat analysis
· CNI protection

Methodologies include CCTV and perimeter protection design at utilities, defence sites and maximum security prisons

We specialise in:
· Brand Protection
· Design & Development
· Proof of Concept
· Pre-build
· Project Management
· Specialist Installation
· Commissioning Management
· Project Rescue
· Education & Training

Our technical expertise includes:
CCTV/VSS
· Lighting
· Access control
· Affray Alarms
· Personnel security
· Crisis management
· Locking & intercom alarms
· Physical Security Measures
· Physical Security Information Management
· PSIM Systems
· Biometric Systems
· Video Content Analysis
· System Integration

Design Services

Our system designers have a wide range of experience from commercial installations to maximum -security government facilities. Our team can develop and deploy the most sophisticated integrated security systems.

The design process is fully controlled to ensure that the best resources are combined to deliver the performance requirements. Each design is reviewed and tested at the desktop for technical viability, safety and commercial efficiency.

The Design Team’s resources comprise a Design Manager and Design Consultants. The Design Manager will control the technical performance of the design and oversee the designs prepared by the Consultants to ensure compliance with the requirements of the project and the associated specifications and standards.

Within our first-in-class factory acceptance test environment we have:

· Cross manufacturer management
· Deep functionality verification Specialist
· Comprehensive software Bespoke testing hardware
· Fully documented design packages
· Detailed schematic diagrams
· Software configurations Integration matrices
· Tailored system training

Our team comprises of Graduates, Industry Experts and Thought Leaders. This in-house knowledge base makes up a Security and IT industry certified team to design & deliver:

· Mission critical security systems
· Bespoke software & hardware Consultation between IT and Security
· Fast-track project acceleration
· Cost-effective services

High Security Systems

Modern security systems in a high-profile facility can consist of thousands of connected devices. The sheer scale of detection systems can make them difficult to maintain. Having a centralised software application to monitor all of the devices means a 24/7 health status of the scheme can be displayed to operators and people responsible for maintenance.

Exploiting intelligence to create warnings
If a camera stops producing a video signal or the usual scene activity changes dramatically, the system can automatically highlight this to an operator as soon as it happens rather than when the operator next looks at the relevant camera. If a detection device does not operate at least once in a given period of time, the system can create an alert and the scenario can be checked. The alternative is to either wait for the next routine maintenance activity or for a real threat event to go undetected with potentially disastrous consequences. 24/7 monitoring of central devices also allows for the detection of a ‘corridor of opportunity’. In a security system, this is when two or more lines of defence are inactive (and thus vulnerable) in a layered approach. It is common practice to have two different detection technologies on a perimeter to increase the probability of detection. Similarly, good practice dictates having CCTV to provide video verification of alarm events in any given zone.

A corridor of opportunity would be created if two of these three systems failed simultaneously. This would create a significant weakness on the perimeter so providing opportunities to breach the system. A corridor of opportunity would also occur if multiple lines of defence were to be ineffective throughout a facility, creating a weak path or ‘corridor’ to a protected asset.

Big data and trend analysis
The ability to automatically aggregate and correlate large data sets results in the further benefit of ‘trend analysis’ which has the potential to predict the next security event. Access to so much data allows the identification of common events across time and location. Patterns can be extracted through trend analysis to foresee and mitigate threats.

Project Management

We operate to the PRINCE2 methodology of project management. This means that our people work according to a structured process to establish what the objectives are, what the programme is, what resources will be required and how much the assignment will cost.

Projects that are run without this level of structure are at risk of failure. Our processes ensure that we communicate with stakeholders and get the project started in the right way from the onset with a project brief that outlines the goals of the finished task. We then lead the project to initiation and plan for the quality and project management requirements while creating the project filing system. With this in place, our project managers will direct and control the project through the various stages that it must go through to achieve its objectives.

Change control
Change control is high on our list of priorities to ensure that all changes are tracked, authenticated and communicated to all relevant parties from the stakeholders to the installing engineers. A rigorous process of change control ensures that all alterations are strictly necessary and that errors are not introduced simply as the result of lack of forethought.

Brand Protection
Our project management will get your project started, delivered and closed out in a smooth and cost-effective manner. The final task assigned to our project managers is to relay lessons learned back to the wider project team.

Our team will provide the following services:

Manage Health & Safety on site
· Procurement & delivery logistics
· Document site activity & engineer attendances
· Request for Information process
· Progress reporting
· Quality inspections and snag clearance
· Early Warning Notice
· Commissioning planning
· Management of training
· Detailed programme of works
· Cash flow forecasts
· Progress reporting

for security system design services

01494 730 601