Our Services

Physical Security & Access Control

  • Physical Security is the protection of personnel, materials, hardware/software/network from adverse physical actions and events that could cause serious loss or damage to an enterprise, agency, facility or institution.

  • Physical Security planning needs to address how teams will respond to different threats and emergencies and how to handle visitors, Partners, vendors and contractors so as to ensure that physical security policies are not violated.

  • Safe keeping of cash, sensitive documents, plans, maps/drawings explosives, highly inflammable gases, petroleum products, radioactive materials, arms and ammunitions (if any) etc is to be ensured.

  • Security of high valued personnel in the management like CEOs, Heads of HR, Security and R & D is to be considered.

  • Physical Security of Power and Water Supply, Transportation and Sewage Systems and Residential Colonies is to be given due importance.



  • IT and Cyber Security.


  • IT and Cyber Security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. Both fields have specialised roles and responsibilities. The personnel working in IT or cyber security will be responsible for the protection of people and information from electronic/cyber- attacks.

  • Physical and Cyber Security are not to be seen in isolation of each other. Both are intertwined and need to be comprehensively dealt with in view of dynamic nature of threats, including the insider threats from employees, ex-employees, vendors, valued partners, visitors etc which is often not given due importance in India.



  • CCTV Security


  • CCTV is designed to help protect and detect crime. It can reassure the management and the public about security and safety besides providing evidence to relevant enforcement agencies. Smart CCTV senhances the security but its Wi-Fi facilitation and remote control can lead to its vulnerability and threat to its security system.


  • Banks and ATM Security

  • The physical security of the banks and ATMs is gaining rapid importance as criminals have become more brazen in their attempts to steal or in some cases the entire machine itself. The increasing deployment of off-site ATMs in less secured locations has facilitated an increase in thefts and vandalism. The stories of ATMs being dragged out of ATM rooms are not uncommon and cash vans are often looted.


  • Security Control Room (SCR) and Visitors Management System (VMS), Mock Drills, up- gradation of Security Architecture etc.


  • SCR plays an important part in the implementation of Standard Operating Procedures (SOPs) laid down in the Security Architecture. SCR helps in collection, collation, analysis, prevention and mitigation of security related issues, post-incident and in analysis and also investigation of Security Agencies and Police.

  • Mock Drills, which are seldom held, are necessary to enhance the performance of security personnel, assess the Response Mechanism/QRT and Crisis Management System.

  • Security Architecture needs periodic up-gradation with changing threats.


  • Security of multi storey Complexes, Warehouses, Hotels, Hospitals, Malls and Multiplexes.

  • Increasingly offices, institutes, hospitals, hotels, warehouses and malls are being housed in multiplexes which require a special security and safety system of the entrance and exit, floors, lobbies, parking places etc unlike traditional facilities. If the facility has more than one owner or user its security becomes more complex, challenging and difficult for implementation and access control becomes very vital.

  • New Technologies: Artificial Intelligence (AI) and Biometric Recognition.


  • Technology is double edged and hence is exploited by the vested and inimical forces to disrupt the operations. AI, Biometric Recognition, Unmanned Aerial Vehicles (UAVs), Drones etc can be misused thereby adding to security challenges. Coordinated efforts of the sovereign forces/agencies with the public and private entities will be required to neutralise the threats engineered by adversarial state and non-state actors exploiting such technology.