77 100 MEAUX

Tel : +33 1 60 24 32 32
Fax : +33 1 60 24 32 33"); define("_HOME","Home"); define("_VERSION","Version Française"); define("_CHARTE","Legal information"); define("_LOGOUT","Logout"); define("_COPYRIGHT","Copyright © goodlad.fr, All rights reserved."); define("_LOGIN","Login"); define("_BADPASSWORD","Bad username / password. Please try again..."); define("_ALREADYLOG","You're already logged "); define("_LOGINSCREEN","Please enter your username and your password"); define("_YOURNAME","Your name"); define("_YOUREMAIL","Your email"); define("_SUBJECT","Subject"); define("_MESSAGE","Message"); define("_SEND","Send"); define("_NONAME","Please enter your name !"); define("_NOTEXT","Your message is empty !"); define("_BADMAIL","Email incorrect or missing !"); define("_CONTACTUSTEXT","Please fill out this form and submit it to contact us."); define("_FLOOD","You have already sent an email,
please wait before retry..."); define("_MAILSUCCESS","Your email was sent successfully,
we'll answer you as soon as possible."); define("_POSTRESUMETEXT","You can sent your resume from your computer with this form. Warning, your file must be only Word format(.doc) or WordPad format(.rtf)."); define("_FILE","your resume"); define("_COMMENT","Comment"); define("_UPLOADSUCCESS","Your resume has been sent successfully,
you'll be redirected in a few seconds."); define("_BADFILE","Error, bad file format !!!"); ?>
Goodlad :: We Secure Your Future Goodlad :: We Secure Your Future
_NICKNAME :  _PASSWORD :


OUR SERVICES



Vulnerability Assessment & Threats Analysis

Audit, Functional analysis & assessment : Identification & Priorisation of existing threats & vulnerabilities.
Detail of existing and applicable security norms & regulations.
Evaluation of the Operator’s Needs in reference with security guidelines and regulations
Determining the legal environment faced by the operator (delegation of responsibilities from the authorities, sharing of responsibilities with other operators, etc.).



Advising & Designing Recommendations

Our recommendations will include:
Organisation of the Security Department
Mode of operation of the Security Department.
Upstream an downstream Security measures to be taken
Recommendations on necessary procedures, equipment and training.



Assisting in the Implementation

Detail of Security procedures according to the Risk level (normal, warning, crisis).
Design of Training modules recommended for security agents.
Review of existing equipment and technology and defining the technical specifications & requirements for new equipment bids, taking into accounts Security Policies and Financial constraints.
Planification of the Works & Installations.
Coordination of contracting companies.
Follow-up and supervision until works completion.



Training

Allocating Experimented coach and trainers for the training of security agents as well as agents indirectly involved in security matters.
Deploying qualitative & quantitative methodologies for training & screening of Security agents competences.



Technological & Legal Intelligence

Ongoing update on evolution of security norms and regulations
Prospective analysis of potential consequences for economic operators
Ongoing update on new Technology upgrades.



Reviews & Follow up

Reviews, for audited clients of all operational, technological and normative changes since last assessment.

Our ai mis to develop a long-term relationship with the Operator where Security concerns will be fully integrated into the Company overall Strategy.





 

_HOME | _VERSION | _CHARTE
_COPYRIGHT