Consultation services
Consultation services
01 Best practices and international security standards:
Physical security best practices continuously evolve as technology across the years
evolve. This will require continuous update on latest best practices and following
internation security standards that will ensure best security design. We at ghost
protocol, emphasize on latest updated practices not only the best, which keep our
clients updated with latest technologies.


02 Threats analysis and impact
Many institution know how to evaluate their threats (internal and external), but does
not really estimate the impact of these threats on business operation and organization
revenue. Some threats may have impact on even people security. Ghost protocol
highlights the impact of these threats in all aspects (people, assets, facilities,
infrastructure) and the counter measure to be taken to mitigate these threats.
03 Security Risk Assessment
Ghost proptocol execute physical security risk assessment after studying the current
security situation of the organization to understand the nature of risk, vulnerabilities
and their level of importance.
Based on this risk assessment, a grade will be given to the organization stating the level
of security that it currently has and the level of security that it should reach.


04 Impact of proposed solutions
Out of threat analysis and risk assessment, Ghost Protocol will proposal remedy
solutions using multiple security technologies. We make sure to explain to our
customer the impact of the proposed solution on the level of security level and grade.
05 Operation efficiency
Each security system implemented should achieve better operation efficiency and
automation. Ghost Protocol emphasize on the improvement in operation for security
personnel based on implementing recommend security measures. Ghost Protocol take
into consideration the current operation challenges and try to overcome these
challenges when designing and delivery physical security systems.


06 Return on investment measurement
The hardest decision in any physical security project is always budget allocation and
approval. Many organization question the amount of money invested on security
systems and what will happen if we do and if we don’t do, also how investement is
justifed.
Ghost Protocol use latest security technologies in their offering to automate and
improve the security management and operation which will definitely reduce the
number of physical guard needed, minimize the risks, threats and their impact on
money value and also save in IT management and operation. Ghost Protocol calculate
all cost reduction caused by implementing any security system to justify any investment
and calculate the return on this investment
07 Corporate physical security strategies
Ghost Protocol understand the different business needs, security threats, risks and
operation of different industry and try to find solution suitable for the nature of business in each vertical. We sit with our customer, listen to their pains, evaluate threats and daily operations needs and identify the security measures, policy and procedure that should take place across the whole organization which include but not limited to:
- Employees access and their different level of security clearance starting from MD/CEO up to lowest grade employee in the organization.
- Guests access and authorization.
- Consultant and contractors access and authorization
- Customers access and authorization.
- Type of supporting physical security systems to be in place to facilitate the management and automation of all these authorization.
- Safety requirement.
- Buildings and department classification across all organization and the level of security in each type.


08 Resources and manpower requirements
Ghost proptocol understand the need of manpower to manage whatever security
systems in place. We do also study the resources required to implement any security
measures from infrastructure to facilities readiness. We help our customer identify all
resources needed for the success of new project in place.
09 Project management and supervision
Ghost Protocol extend its experience to offer project management and supervision to
ensure that any security design has been implemented as per agreed specs and based
on latest best practice and international standard. During this phase, GP help in
preparing a professional and realistic project plan, Hight Level Design and Low Level
Design and provide onsite resources and checkpoint to evaluate implementer job based
on agreed design.
We believe that proper project management can save time, effort and money and
ensure delivering what have been promised.


10 Training planning and execution
Many projects has been delivered successfully but has not been fully utilized as should
be. Customer invest in technology to get the maximum out of it. That’s why a proper
training evaluation and execution is needed to make sure that security personnel and IT
administator are using all system features and can optimize sytem operation and
performance.
Ghost Protocol evaluate the current resources experience level and recommend the
needed training tracks to each person in charge to improve the level of knowledge and
standardize the certification level to all manpower involved in physical security
operation.
01 Best practices and international security standards:
Physical security best practices continuously evolve as technology across the years
evolve. This will require continuous update on latest best practices and following
internation security standards that will ensure best security design. We at ghost
protocol, emphasize on latest updated practices not only the best, which keep our
clients updated with latest technologies.

02 Threats analysis and impact
Many institution know how to evaluate their threats (internal and external), but does
not really estimate the impact of these threats on business operation and organization
revenue. Some threats may have impact on even people security. Ghost protocol
highlights the impact of these threats in all aspects (people, assets, facilities,
infrastructure) and the counter measure to be taken to mitigate these threats.

03 Security Risk Assessment
Ghost proptocol execute physical security risk assessment after studying the current
security situation of the organization to understand the nature of risk, vulnerabilities
and their level of importance.
Based on this risk assessment, a grade will be given to the organization stating the level
of security that it currently has and the level of security that it should reach.

04 Impact of proposed solutions
Out of threat analysis and risk assessment, Ghost Protocol will proposal remedy
solutions using multiple security technologies. We make sure to explain to our
customer the impact of the proposed solution on the level of security level and grade.

05 Operation efficiency
Each security system implemented should achieve better operation efficiency and
automation. Ghost Protocol emphasize on the improvement in operation for security
personnel based on implementing recommend security measures. Ghost Protocol take
into consideration the current operation challenges and try to overcome these
challenges when designing and delivery physical security systems.

06 Return on investment measurement
The hardest decision in any physical security project is always budget allocation and
approval. Many organization question the amount of money invested on security
systems and what will happen if we do and if we don’t do, also how investement is
justifed.
Ghost Protocol use latest security technologies in their offering to automate and
improve the security management and operation which will definitely reduce the
number of physical guard needed, minimize the risks, threats and their impact on
money value and also save in IT management and operation. Ghost Protocol calculate
all cost reduction caused by implementing any security system to justify any investment
and calculate the return on this investment

07 Corporate physical security strategies
Ghost Protocol understand the different business needs, security threats, risks and
operation of different industry and try to find solution suitable for the nature of business in each vertical. We sit with our customer, listen to their pains, evaluate threats and daily operations needs and identify the security measures, policy and procedure that should take place across the whole organization which include but not limited to:
- Employees access and their different level of security clearance starting from MD/CEO up to lowest grade employee in the organization.
- Guests access and authorization.
- Consultant and contractors access and authorization
- Customers access and authorization.
- Type of supporting physical security systems to be in place to facilitate the management and automation of all these authorization.
- Safety requirement.
- Buildings and department classification across all organization and the level of security in each type.

08 Resources and manpower requirements
Ghost proptocol understand the need of manpower to manage whatever security
systems in place. We do also study the resources required to implement any security
measures from infrastructure to facilities readiness. We help our customer identify all
resources needed for the success of new project in place.

09 Project management and supervision
Ghost Protocol extend its experience to offer project management and supervision to
ensure that any security design has been implemented as per agreed specs and based
on latest best practice and international standard. During this phase, GP help in
preparing a professional and realistic project plan, Hight Level Design and Low Level
Design and provide onsite resources and checkpoint to evaluate implementer job based
on agreed design.
We believe that proper project management can save time, effort and money and
ensure delivering what have been promised.

10 Training planning and execution
Many projects has been delivered successfully but has not been fully utilized as should
be. Customer invest in technology to get the maximum out of it. That’s why a proper
training evaluation and execution is needed to make sure that security personnel and IT
administator are using all system features and can optimize sytem operation and
performance.
Ghost Protocol evaluate the current resources experience level and recommend the
needed training tracks to each person in charge to improve the level of knowledge and
standardize the certification level to all manpower involved in physical security
operation.
