ICTS Güvenlik Hizmetleri ile Sürdürülebilir Güvenliği Keşfedin

Security Engineering

Security Engineering

The ICTS Methodology considers the physical and electronic means of security among the basic elements of a security system.

The electronic security systems extend the limits of the human capability and capacity, decreases the number of human errors, and increases the deterrence of the system.

The basic purpose of the security engineering activities is to provide the optimum system required by a Security Structure in line with its specific risks at the most reasonable cost, to make sure that this system is installed correctly, and once realized, to ensure that it is used in the most efficient way.

The security technology manufacturers worldwide minimize the traditional limitations of the electronic security systems with their intense R&D activities, especially in the last 20 years where the IP-based systems have been in the market. ICTS follows the technological trends both in Turkey and the world, mostly at first hand.

ICTS’s field experience, obtained through its Continuous Security Consulting services, allows it to better understand the strengths and weakness of the existing technology. This knowledge makes it possible to select the specific equipment required for the specific location during the design process of the electronic security system, and to correctly integrate it into other systems.

Beginning the Project

The ICTS Global projects have a 2-stage process which includes pre- and post-tender activities. Stage A includes the pre-tender process, and Stage B the post-tender process.

Stage A – System design and preparation of tender documents

Data Analysis

In the first stage of the project process, information is gathered on the project itself and on subjects such as its environmental factors, investor profile, and user profile.  This collected data is evaluated in the Analysis of Risks in the next stage.

 

Risk Analysis

The risk analysis is the basis of the system to be designed, because all factors that affect the system design such as selection of correct equipment, equipment placement, even the revision suggestions in architectural design, are based on the data obtained during the Risk Analysis.

 

Concept Design and Customer’s Approval

In the light of the collected data and completed risk analysis, the security concept of the project is determined. Basically, the security concept includes the basic principles and assumptions of the security system. In this context, the plans and predictions regarding matters such as vehicle traffic, pedestrian traffic, entrance checks, peripheral checks, necessary electronic and physical systems, security human resources, and the procedures to be required, are assessed. The designed security concept is presented to the customer before it is transferred into the project design, and the system design is started following the customer’s approval.

 

Design

The agreement reached with the customer on the concept is also considered as the first step of the design process. Following the agreement, the Security Project Drawings, Equipment Lists, Bill of Quantities, and Technical Specifications for Security are prepared, and delivered to the customer as a tender kit.

Stage B – Post-Tender and Implementation Process

Bid Evaluation,

The leading electronic security companies in Turkey apply for the implementation of a system designed by ICTS. The bids received during the tender process carried out by the customer, are analyzed by ICTS according to the following criteria;

 

Suitability with the project

Suitability of the Bill of Quantities

Compliance with the specifications

Price levels

Afterwards, a comparative Bid Evaluation Report is presented to the customer.

 

Process Support

Most of the time, the contractor needs support with the implementation of the designed system. In general, ICTS provides support for correct implementation during the infrastructure, installation process, and fine tuning of software and hardware.

 

Acceptance Tests

Once the installation is completed, ICTS performs acceptance tests to see if the system has been implemented as designed. The system is accepted by the customer only after the completion and approval of the final acceptance test, and only then starts the warranty period of the system.

You can contact with us and get information about our unique solution for your industry

Contact