Mitie deliver holistic security solutions to their customers, including intelligence-led security personnel, fire and security systems, mobile and void, key holding, alarm monitoring, vetting, front of house and more.
Since 2016 the awareness and knowledge surrounding vehicle as a weapon (VAW) attacks has grown significantly. At the same time a wide range of new HVM products, including our Impakt Defender, have come to market, giving event organisers and organisations access to a much wider range of permanent and temporary solutions to help reduce the vulnerability of their sites and mitigate vehicle-borne threats.
Jürgen Stock (JS), the Secretary General of INTERPOL, tells Philip Ingram MBE (PI) of the importance of improving public private cooperation in the fight against international crime and terror. He explains how international conferences and exhibition play a vital role in enabling this.
Our perimeter protection solutions separate the secured ‘air side’ of the airport from the ‘land side’. We ensure that the airport perimeter remains secure under all circumstances and that maintaining and managing the perimeter causes as little disruption as possible to the airport’s processes.
Crowded public spaces are very attractive "soft targets" for terrorists. Difficult to protect using traditional security means without causing undue disruption and delay, they require new approaches to seamlessly screen high volumes of people..
Many companies are focused on the external threat to their businesses, and seem to forget that internal threats are just as important. Within this article, P.Ingram talks of how the unpredictability of human behaviour can be classified as an insider threat.
International Security Expo is free-to-attend and unites the entire security community allowing shared learning and collaboration from Government, CNI, Law Enforcement, Military, Major Events, Transport & Borders, Cyber Security, Facilities, Public and Private sectors.
ISE features a major-scale exhibition including a series of CPD certified conferences, workshops and interactive features exploring considerations of security from initial design through to technologies to secure and in the event of an attack the capabilities to respond.