top of page
01.png

Secutask system by Orca,
your personal assistant for managing all security tasks and ensuring high operational readiness every step of the way

Manage all your tasks and the tasks of the security managers with full transparency and real-time data. With the assistance of the Secutask system, maintain maximum readiness at all times

09
08
07
010
011
orca_whitw_web.jpeg

ABOUT ORCA 

Orca was founded by Ori Russ, an expert on global security. Ori is a graduate of the Israeli Security Services Agency, having completed his duties there at the rank of Senior Director, and has had more than 25 years of activity in the close protection unit, as an Embassy Security Officer and Director of Information Security.
 

More recently, Ori was involved in the building and implementation of security programs within public and government companies, including the Prime Minister's Office, the Ministry of Defense, the Jewish Museum in Vienna, and the Fintech company eToro.

Ori specializes in the field analysis of physical information security (including crypto), personalities and facilities, identifying and understanding gaps in security, and creating detailed security plans.

ABOUT
unnamed (1)_edited.jpg

OUR SERVICES

our service

Protection of Dignitaries

Suitable dignitary protection requires the ability to provide a complete solution that covers all conceivable situations to those who require it. Such solutions would likely include security within homes, at events, on flights, while sailing and other outdoor conditions. To do this comprehensively requires extensive knowledge of dignitary protection and a broad-based level experience that Orca offers.
 

A comprehensive dignitary protection plan needs to balance the requirements of high-level professional security, while ensuring the minimum disruption in the life routine of the person in question. Orca bases its abilities on the extensive experience of Ori Russ, as a security guard for prime ministers, presidents, high-ranking guests and other VIPs, in Israel and worldwide. Optimal dignitary protection and security solutions will be built contingent to this, after conducting field analysis, identifying and fully understanding the potential threats, and knowing the character and personal activities of the person being protected.
 

The security plan consists of three main parameters:

1. Personnel: recruitment, training and competence

2. Means: cameras, distress buttons, security rooms, armored vehicles, etc.

3. Devising, writing, and implementing an ongoing security plan

orca_7.jpg

Companies, both large and small, hold within their walls valuable assets and no-less valuable human staff, all of which must be guarded against external threats. Orca will provide optimal protection pertinent to the assets, and the threats against them, by carefully analyzing the area and building a bespoke security plan, to include (among other things) required means of communication, skilled personnel, control rooms, and command posts.

Security of facilities and events

WhatsApp Image 2022-05-19 at 19_edited.j

Physical information security

The field of information security is prominently reflected in hi-tech companies, which largely concentrate on cybersecurity solutions. However, this often leads to gaps and misunderstandings regarding the need for physical protection of the information stored in servers, computers, safes, cabinets, data centers, and so on.

Coping with such threats requires a response on several levels:
 

Internal – Handling the issue of "rogue" employees begins at the company's recruitment process, and continues throughout the period of their employment.

External – Threats from the criminal element and other malicious forces must be managed using physical construction (walls, bars, fences, etc.), means of communication (cameras, alarm systems, access control systems, etc.) as well as actual physical security in the form of a skilled team of guards.

orca_8_edited_edited.jpg
orca_10.jpg

Cryptoassets

In recent years, the field of digital currencies has gained much momentum. Most security methods are cyber-based, however, few companies are aware of the physical issues with securing cryptocurrency.

It is extremely important to ensure the physical security of cryptoassets against both internal and external threats:

Internal – Company employees with direct access to crypto assets, without adequate supervision and appropriate preliminary inspections.

External - criminal attacks (Hakers), or terrorist actions by external parties, with no suitable plan or any of the necessary measures implemented

Orca has extensive experience in building, establishing and handling detailed and professional security plans against threats of this nature.

How We Do It

For all four of these parameters, security methodology is based on familiarity with the area, comprehensive knowledge of the assets to be safeguarded, and understanding and analyzing the main threats, resulting in the ability to provide a comprehensive security plan able to handle all contingencies. Orca provides its customers with three levels of security operations:

Conducting risk assessment 

We use our criteria to test and check the systems, the security manpower and policies. This enables us to determine the level of security required.
 

Writing a detailed security plan

We devise and write a detailed security plan for the customer, to be based upon our evaluation. The purpose of this plan is to improve the actual security for the customer to use. 
 

Support and implementation

Depending on the specific requirements of each customer, Orca will assist them in the full implementation of the security plan, collaborating where and when necessary.

Clients

 CLIENTS

shutterstock_1792855165.jpg

CONTACT US

Thanks for submitting!

Contact
bottom of page