Secutask system by Orca,
your personal assistant for managing all security tasks and ensuring high operational readiness every step of the way
Manage all your tasks and the tasks of the security managers with full transparency and real-time data. With the assistance of the Secutask system, maintain maximum readiness at all times
ABOUT ORCA
Orca was founded by Ori Russ, an expert on global security. Ori is a graduate of the Israeli Security Services Agency, having completed his duties there at the rank of Senior Director, and has had more than 25 years of activity in the close protection unit, as an Embassy Security Officer and Director of Information Security.
More recently, Ori was involved in the building and implementation of security programs within public and government companies, including the Prime Minister's Office, the Ministry of Defense, the Jewish Museum in Vienna, and the Fintech company eToro.
Ori specializes in the field analysis of physical information security (including crypto), personalities and facilities, identifying and understanding gaps in security, and creating detailed security plans.
OUR SERVICES
Protection of Dignitaries
Suitable dignitary protection requires the ability to provide a complete solution that covers all conceivable situations to those who require it. Such solutions would likely include security within homes, at events, on flights, while sailing and other outdoor conditions. To do this comprehensively requires extensive knowledge of dignitary protection and a broad-based level experience that Orca offers.
A comprehensive dignitary protection plan needs to balance the requirements of high-level professional security, while ensuring the minimum disruption in the life routine of the person in question. Orca bases its abilities on the extensive experience of Ori Russ, as a security guard for prime ministers, presidents, high-ranking guests and other VIPs, in Israel and worldwide. Optimal dignitary protection and security solutions will be built contingent to this, after conducting field analysis, identifying and fully understanding the potential threats, and knowing the character and personal activities of the person being protected.
The security plan consists of three main parameters:
1. Personnel: recruitment, training and competence
2. Means: cameras, distress buttons, security rooms, armored vehicles, etc.
3. Devising, writing, and implementing an ongoing security plan
Companies, both large and small, hold within their walls valuable assets and no-less valuable human staff, all of which must be guarded against external threats. Orca will provide optimal protection pertinent to the assets, and the threats against them, by carefully analyzing the area and building a bespoke security plan, to include (among other things) required means of communication, skilled personnel, control rooms, and command posts.
Security of facilities and events
Physical information security
The field of information security is prominently reflected in hi-tech companies, which largely concentrate on cybersecurity solutions. However, this often leads to gaps and misunderstandings regarding the need for physical protection of the information stored in servers, computers, safes, cabinets, data centers, and so on.
Coping with such threats requires a response on several levels:
Internal – Handling the issue of "rogue" employees begins at the company's recruitment process, and continues throughout the period of their employment.
External – Threats from the criminal element and other malicious forces must be managed using physical construction (walls, bars, fences, etc.), means of communication (cameras, alarm systems, access control systems, etc.) as well as actual physical security in the form of a skilled team of guards.
Cryptoassets
In recent years, the field of digital currencies has gained much momentum. Most security methods are cyber-based, however, few companies are aware of the physical issues with securing cryptocurrency.
It is extremely important to ensure the physical security of cryptoassets against both internal and external threats:
Internal – Company employees with direct access to crypto assets, without adequate supervision and appropriate preliminary inspections.
External - criminal attacks (Hakers), or terrorist actions by external parties, with no suitable plan or any of the necessary measures implemented
Orca has extensive experience in building, establishing and handling detailed and professional security plans against threats of this nature.
How We Do It
For all four of these parameters, security methodology is based on familiarity with the area, comprehensive knowledge of the assets to be safeguarded, and understanding and analyzing the main threats, resulting in the ability to provide a comprehensive security plan able to handle all contingencies. Orca provides its customers with three levels of security operations:
Conducting risk assessment
We use our criteria to test and check the systems, the security manpower and policies. This enables us to determine the level of security required.
Writing a detailed security plan
We devise and write a detailed security plan for the customer, to be based upon our evaluation. The purpose of this plan is to improve the actual security for the customer to use.
Support and implementation
Depending on the specific requirements of each customer, Orca will assist them in the full implementation of the security plan, collaborating where and when necessary.