Via al contenuto

SECURITY

Supervisory Networking

Supervisory Networking

WE HAVE DEVELOPED A NETWORK (BASED ON ART. 115 T.U.L.P.S.) THAT ALLOWS OUR CLIENTS TO ENTRUST THE COMPLETE MANAGEMENT OF PASSIVE AND ACTIVE SECURITY SERVICES, CURRENTLY PROVIDED BY A PLURALITY OF ENTITIES.
IT IS THE ORGANIZATION AND MANAGEMENT OF ARMED SECURITY SERVICES WITH THE USE OF SWORN SPECIAL GUARDS, VIDEO SURVEILLANCE AND TELE-ALARMS. ALL THROUGH FRAMEWORK AGREEMENTS WITH MAJOR PLAYERS IN THE SECURITY INDUSTRY THROUGHOUT THE COUNTRY.

The management of the services provided is supported by software “SecurManager” which allows real-time monitoring of the situation of the present surveillance activities at various customers and individual service stations, with control of order entries and historical reports on the events that have occurred, monitoring the time of intervention throughout the country.

The experience and know-how of our experts, together with the professionalism of a pool of partners, among the most qualified in their respective fields of reference, guarantee the achievement of quality standards of absolute excellence, all while effectively combining the rigor and formal correctness of current security regulations with the organizational and operational models of our clients.

Our supervisory network, which is independent of the various institutions, is an economy of scale for companies, both operationally and economically.

SSI’s network to date continuously provides services in 85 Italian provinces with an increasing number of companies employed, to date more than 80.

This territorial capillarity, combined with the multiplicity of services offered (traditional armed and unarmed surveillance services, remote alarms, emergency response and inspection services), has allowed SSI’s network to be fed over time with the inclusion of certified local partners, who are guaranteed technical-operational continuity and business development in their respective geographical areas.

All this translates into framework trade agreements where, SSI, in its capacity as a central purchasing agency, exercises significant bargaining power in order also and especially to the several thousand service hours/month entrusted.

This advantage reverberates on the end customer to whom, not only is guaranteed the use of the best available supplier according to the specific services required, i.e., perfectly centered according to the manifested needs, but also the application of the best possible price according to the economy of scale that SSI-through its in-house purchasing center-is able to achieve.

All this, of course, always guaranteeing full compliance with current regulations and the application of the relevant national collective bargaining agreements, guarantees, the latter, of which SSI stands surety for its clients.

SecurManager

The technology we have developed over the years to support our Vigilance Network.

This is an Internet portal that the Corporate Security Officer, Administrative Officer or other delegated figures access with their credentials to use a range of features, depending on their level of authorization.

Through his or her profile, the Security Manager can check, in real time, the status of services, request specific security services, check the status of connected systems (remote alarms, video surveillance systems, intrusion detection systems) and interact with them.

The added value, stated by managers who currently use it, is real-time updates on the use of supervisory services, the ability to check what is happening in all specific cases, transparency on billing for services provided, and easy realization of summaries.

SecurManager is a kind of remote control of the Operations Center, with a simple interface, easy and practical navigability, which allows the Security Manager to have analysis and alarm history available at all times. But also the analysis and accounting history, which is useful to the administration.

Articles about Security

Insider threats (insider threats) are one of the most insidious risks to corporate physical security. Unlike external attacks, they come from those who already have legitimate access to areas, information…
Read