Back to services

Safety and Security

We are an independent team of experts dedicated to tackling complex security challenges. We help organisations protect their built assets by delivering smart, integrated security solutions – from high-level policy development and risk analysis to detailed security design.

Strategic security expertise – from vision to implementation

Deerns has a strong track record in shaping and guiding organisational security policies. From defining strategic vision to implementing physical, digital, and operational measures, we support every step – conducting risk analyses, developing policies, and providing recalibration and audits to ensure they remain effective and aligned.

Risk analyses

We use risk analyses to assess potential threats such as theft, cyber-attacks, vandalism, fire and natural disasters. Risks are evaluated based on their likelihood of occurring and the potential impact on an organisation’s vulnerabilities.

Security policy reassessment

We enable futureproof security by recalibrating security policies. Components of recalibration include evaluating existing measures, assessing the effectiveness of existing security, reassessing risks and optimising security measures.

Security audit

A security audit systematically assesses the effectiveness of measures, checks compliance with laws and regulations, and identifies vulnerabilities that could lead to security incidents.

Independent security expertise tailored to your risk landscape

As an independent security consultant, we combine in-depth knowledge and extensive experience to find the ideal balance between your unique risk profile and the business processes and assets that need protection. For us, optimal security is a cohesive system – where organisational measures, architectural features and technical solutions work together seamlessly.

Security thrives

on cohesive measures:

80 %

organisational

17 %

architectural

3 %

electrical

Integrated security solutions for lasting protection
Holland Casino Venlo
Photography: Holland Casino

Effective security is the outcome of a well-coordinated and integrated approach that brings together organisational, structural and technical security measures. We offer advice on a wide range of security and security management systems and, where appropriate, we incorporate innovative technologies where they add value. These range from camera security, access control, intrusion detection and fire detection through to building security.

Project examples:

  • Museums: reassessing security measures
  • Government buildings: technical and integrated security design
  • High end security environments: upgrading security management systems design
  • Hospitals: design of online and offline controlled doors
" Optimal security is the result of integrating organisational, structural and technical security measures.
Safety & Security

Frequently asked questions

What are organisational, architectural and electronic (OAE) security measures?

OAE security measures together form an integrated approach to security that helps organisations mitigate risks and protect against various threats.

  • Organisational measures focus on policies, procedures (SOP’s), behaviour and supervision.
  • Architectural measures provide physical protection through infrastructure such as fences, doors, windows and perimeter shielding.
  • Electronic measures include technologies such as cameras, alarm systems and access control to enhance security.
Can you give examples of new security technologies?
  • Cameras with artificial intelligence (AI) analyse real-time video images that detect suspicious behaviour, facial recognition and incident alerts such as aggression and burglary.
  • Multi-authentication within access control systems deploys biometric systems e.g. fingerprint or iris scanners, or hand palm recognition.
  • Offline access control facilities replace traditional key systems.
How are our risks determined?

We do this by performing a risk analysis. Components of a risk analysis are:

  • Identifying assets and threats
  • Analysing vulnerabilities
  • Estimating probability and impact
  • Risk assessment
  • GAP analysis
  • Developing mitigation and management measures

Let’s talk