Unified Risk Management Leaders in Independent Security Risk Management
From white collar crime to duty of care, businesses are exposed and vulnerable to growing, interconnected and ever-evolving security risks.
It is crucial to ensure that you have sustainable security and risk practices in place to protect your organisation’s assets and people.
Unified Risk Management is an independent security risk consulting firm. With over three decades of experience we specialise in security risk mitigation; providing clients with industry leading, sustainable and reliable security risk solutions, regardless of the size, location and industry.
Security Assessments and Solutions for:
Existing Infrastructure
Existing Infrastructure
- Physical and Technical Risk Assessments
- Security Upgrades and re-design
- Safety and OHS risk assessments
- Security Management Services
- Standard of workmanship checks
- Security tender specifications
- Assistance with service provider selection and appointment
- Cost containment
- Security Upgrades and re-design
- Safety and OHS risk assessments
- Security Management Services
- Standard of workmanship checks
- Security tender specifications
- Assistance with service provider selection and appointment
- Cost containment
Security Manpower
Security Manpower
- Review of service providers
- Review of complement and KPI's
- Cost Containment
- Knowledge and skills testing
- Soft skills Training
- Assistance with service provider selection and appointment
- Review of complement and KPI's
- Cost Containment
- Knowledge and skills testing
- Soft skills Training
- Assistance with service provider selection and appointment
Cyber Security
Cyber Security
- Strategy development and review
- Penetration Testing
- Audits
- Compliance
- Penetration Testing
- Audits
- Compliance
New Developments
New Developments
- Holistic Security Plan Design
- Security Component Layout Design
- Security tender specifications
- Assistance with service provider selection and appointment
- Overseeing installations and implementation
- Security Component Layout Design
- Security tender specifications
- Assistance with service provider selection and appointment
- Overseeing installations and implementation
Facilities Management
Facilities Management
-Assessments and review
-Training
-Cost Containment
-Business continuity planning and disaster recovery
-Training
-Cost Containment
-Business continuity planning and disaster recovery
Investigations and Threat Management
Investigations and Threat Management
- Forensic Investigations
- Surveillance
- Handwriting analysis
- Polygraph Testing
- Threat Management and Profiling
- Surveillance
- Handwriting analysis
- Polygraph Testing
- Threat Management and Profiling
Security Policies & Procedures
Security Policies & Procedures
- Review and design of policies and procedures
- Rewriting of policies and procedures
- Implementation of policies and procedures
- Evaluation of effectiveness of policies and procedures
- Rewriting of policies and procedures
- Implementation of policies and procedures
- Evaluation of effectiveness of policies and procedures
Security Training
Security Training
- Employee awareness training
- Executive awareness training
- Guarding Soft Skills training
- Hijacking Prevention training
- Specialised training
Other
- Executive awareness training
- Guarding Soft Skills training
- Hijacking Prevention training
- Specialised training
Other
Electronic and Technical Security
Electronic and Technical Security
- Security component layout design
- Security tender specifications
- Assistance with service provider selection and appointment
- Installations
- Security tender specifications
- Assistance with service provider selection and appointment
- Installations