Security Design Scope of Works
TVRA

The assessment is going to be very important, to identify the people and assets at risk. People refer to guests, clients, tenants, visitors, employees/staffs, business partners, vendors, and others direct or indirect connection or involvement with the organization; where Assets are all types of property, core business, networks, and information. Specify loss risk events/vulnerabilities. Risks or threats are those incidents likely to occur at the site, either due to history of such events or circumstances in the local environment. They also can be based on the intrinsic value of assets housed or present at a facility or event. A loss risk event can be determined through a vulnerability analysis. Vulnerability analysis a consideration of anything that could be carried out as a threat. This process should highlight points of weakness and assist in the construction of a framework for subsequent analysis and countermeasures. Establish the probability of loss risk and frequency of events. Frequency of events relates to the regularity of the loss event. Probability of loss risk is a concept based upon considerations of such issues as prior incidents, trends, warnings, or threats, and such events occurring at the enterprise. Determine the impact of the events. Financial, psychological, and related costs associated with the loss of tangible or intangible assets of the organization and develop options to mitigate and control risks. Identify options available to prevent or mitigate losses through physical, procedural, logical, or related security processes. A continued study of the options feasibility for implementation is necessary to be carried out in every phase. Practicality of implementing the options without substantially interfering the overall project design and construction. This is to include the pre-conditioned industry standard, government regulations and local codes from legal bodies and associations. We will include a comprehensive in accordance to international best practices by the use of International Standards, including AS/NZ4360, ISO 31000 for Security Risk Assessments and ASIS TVRA standard and guidelines, and with liaison of the intelligent and security agents as well as the local authorities.
Concept Design

Security concept design should start by working together with the master planner and main architect, then the landscape designer. This will benefit client and operator to have security design and aesthetics at the same time. Minimizing security measures can be done by assigning security zones, re-arranging access and traffic, pedestrian or service access, putting plants rather than fences, etc. We have lots of experienced in designing security this way, especially for mix-used complex in Jakarta or resorts in Bali and Bintan. Risk mitigating is including to review and provide security countermeasures the vehicle movements that not only may affect security operations but we have to also consider the emergency lanes, for e.g. for fire fire truck and medical emergency. Bombing via vehicle in Jakarta –and refers to previous incidents, is capable to carry explosive 100Kg to 250 kg. However, the biggest explosive ever used in Indonesian bombing was in Bali, 1000 kg explosive was placed in the parked vehicle in tourist area, killing 200 people. The scenario we apply is usually done with two criteria: (a) surface type explosion: an explosion that occurs when the detonation is located close to or on the ground so that the initial shock is amplified at the point of detonation due to the ground reflections and (b) reflected overpressure: the rise in pressure above ambient produced by a shock wave or pressure wave as felt by a flat surface oriented perpendicular to the direction of wave propagation.
Engineering Performance Design

Security performance design will include, but not be limited to perimeter detection, CCTV, vehicle inspection and vehicle barrier with crash rating, access control system, baggage inspection, explosive detection, guard tour, door monitoring, intruder alarm, emergency buttons, etc. Our design is always using latest technology available with reasonable budget, for both investment and operational costs.
Tender Administration, Review and Recomendation
We will prepare and issue the tender documentation, including schematic design drawings of all security systems, technical specification in detail and bill of quantity (to be incorporated with QS for tender pricing), preparing and issuing tender interviews clarification and queries, provide comprehensive tender evaluation report outlining all processes and responses. Providing recommendation to the suitable security integrators and presenting to the client.