Operated by Genis Pieterse Consulting (Pty) Ltd
Why use our service
Discrete
We understand the sensitivity around information and communication security and the confidential nature of conducting a site survey. We are equally aware of the complexities our client faces if an information or communication security breach is confirmed, and in response, define a strict protocol prior to deployment to govern the process. Our team remains discrete in all their actions and throughout the entire survey life cycle.
​
OHS Governance
Our client, typically, functions within a complex risk environment where we have to ensure that a thorough site survey is completed within the constraints of its internal Occupational Health and Safety protocols. Our team is trained and equipped to allow them to safely work at heights, as well as, to safely interface with your cable network. Our procedures are documented, with daily pre-deployment, on-site, briefings conducted by either our team leader or a designated company OHS representative.
Trusted
We have been trusted by numerous clients across the globe and from varying industries such as the:
-
​Financial Industry,
-
Mining,
-
Security,
-
Petroleum,
-
Legal,
-
Pharmaceutical,
-
Regulatory, and
-
Government.
We are able to disclose more detail around this in-person.​​​​​
Experience
We have been trusted since 1994 to secure the information and communication environment for our clients across a diverse industry and country footprint. Often operating in extremely high-risk and hostile environments, our experience has been honed to function effectively in a variety of situations ranging from war stricken areas where large scale internal and external surveillance is prevalent, to stable but high-risk, corporate eco-systems where the information and communication security requirement is no less critical.
Industry Best Practice
We follow a rigorous scientific approach during an information and communication site survey. Our actions and test adheres to a well defined and documented Standard Operating Procedure which marries security best practice with equipment protocols. This allows us to extract optimal value from the equipment we use, while ensuring that our actions are aligned to a transparent and repeatable practice.
Investment
We continuously invest in our team, ensuring that they have the required theoretical foundation, exposure to environments that will challenge them to expand their experience and allows them to apply their class-room knowledge in a real world environment.
We, furthermore, invest heavily in acquiring equipment that will allow us to address the contemporary threat, and where no such equipment exist, we develop bespoke in-house equipment to ensure that the client risk is both effectively and efficiently addressed.