RUN YOUR BUSINESS. WE’LL HANDLE THE REST.

Our tailor-made integrated security solutions enable our clients to focus more attention on the day-to-day running of their businesses, encouraging their growth. As our clients’ businesses grow, their security needs change. Icon Security is proactive and we consistently reassess our clients’ businesses and adapt their security solutions accordingly.

SERVICES SECTION 1

GUARDING

Guarding
  • Access and egress control
  • Searching
  • Patrolling services
  • Front desk duties

REPORTING AND ADVISORY SUPPORT

reporting
  • Comprehensive management and performance reports
  • Web-based reporting systems
  • Statistical analysis with focused KPI measurements and results in customised production reports
  • Full audit capacity with audit trail
  • Audit checks on recognised information systems such as SAP, Oracle and Freightware
  • Trend analysis and forecasts
  • KPI design planning and rollout

SYSTEM DEVELOPMENT AND DESIGN

system-development
  • Process mapping of total environment
  • Implementation of Standardised Electronic Audit Function’s (SEAF’s)
  • Design of integrated and customised electronic audit and verification systems
  • Project management
  • Site development support
  • Time in motion
  • Rollout management with test production, total process simulation and training

TRAINING AND DEVELOPMENT

training
  • Induction courses
  • Site-specific training
  • Specialised skills development
  • Customised audit training programmes
  • Hardware and software training
       
SERVICES SECTION 2

CUSTOMER SUPPORT CENTRE SERVICE

Customer-support  
  • 24-hour client support including hardware and software support
  • Call logs

PROVISION OF SECURITY TECHNOLOGY

Provision-of-security-technology
  • Automated access control
  • Closed circuit television monitoring
  • Alarm detection systems
  • Maintenance and servicing of security systems

INVESTIGATION

investigation
  • Criminal offences
  • Civil claims
  • Pre-employment screening
  • Disciplinary offences
  • Tracing services
  • Under-cover operations

ESCORTING

escourting  
  • Escorting vehicles and valuable items (excluding cash in transit)
  • Securing of confidential documents
  • Confidential shredding service
  • Post collection
 

CONSULTATION

  • Risk analysis
  • Preventative and awareness programs
  • Consulting services

 

     

 

 

 Contact us today for a comprehensive assessment of your company’s security risks.