Black Hat Technologies provide a complete range of security services that can be applied to your overall solution or as individual services to support a specific requirement you may have.
With nearly 2 years of security technology experience and expertise, our team of accredited and qualified hardware and software engineers, designers and project managers can provide:
You can rely on our team of reactive and preventative maintenance service engineers to support your existing systems including support for:
Black Hat Technologies provide assistance and input to the security design process to establish the best security strategy to meet your threats.
The design process will normally follow these steps:
Key components of a typical Black Hat detailed design will comprise:
Each security project is managed by one of Black Hat’s trained project management staff who will draft the following project plans:
We will liaise with the person responsible for your security project when finalizing these plans.
The project manager will ensure that all work is performed according to project scope and specifications, time tables and costs. Specifically, the project manager strives to deliver every facet of the project to time, quality and budget.
Our policy is to keep in close contact with you throughout the project. This is achieved through excellent communications, regular meetings, and updates of the project plan.
Black Hat Technologies employs a professional team of highly trained and motivated engineers and project managers who design, install, commission and maintain your security systems to the highest standards
Security solutions we install include:
We can work directly with the end customer or as a specialist contractor as part of a larger project team.
Our goal for each project is simple: to deliver to quality, time and budget.
Our reputation is built on delivering excellence. Once a security design is agreed, our operational team takes responsibility for meeting your timescales.
Key elements of our security system installation planning include:
We will specify, plan and carry out a range of test procedures to demonstrate that the system fully meets the design specification. The systems are tested in a logical and progressive manner in accordance with the test plan and test documents.
Our standard test procedures include:
FAT tests are performed on a representative system prior to the project moving into the installation phase. The FAT tests are used to provide evidence that the system meets your requirements and provide confidence that it is suitable to move into the installation phase.
After successful Pre-SAT testing and commissioning of the system has been completed, we will perform a SAT test to provide evidence that the system meets the design specification in the presence of a client representative.
A customer acceptance certificate will be generated after the successful SAT test.
We will provide a Master Document Register (MDR) of all project documentation. This will typically comprise the following:
Training in equipment operation will be held at the installation site.
Contact us today to discuss your security project and how Black Hat Technologies can help.
When you’re away, our intruder alarm and CCTV remote monitoring and viewing service can provide you with peace of mind that your premises is completely safe.
Black Hat Technologies provide an extensive range of remote security monitoring and security technology services to help you address the risks to your assets.
We can provide remote monitoring of all electronic security systems including:
Our 24 hour telephone call center and remote monitoring facility operates 365 days per year. Highly trained operatives are able to respond immediately and initiate pre-agreed escalation procedures in the event of a threat to person or property, or technical fault.
We provide alarm activated and routine patrol CCTV monitoring from an Alarm Receiving Centre (ARC).
Alarmed images from monitored premises are transmitted to the BS8418 remote video response center which operates to BS 5979:2007 guidelines. Images are immediately evaluated by experienced operators, who are able to verify and act on any potential threats. Integration with public address allows warnings to be given before a crime has been committed.
In addition, we are able to provide a pro-active electronic security system monitoring service where customers receive a regular system health check, remote system reboot and remote user playback support. Remote user playback support can be of assistance when users are unfamiliar with the operation of the site recording systems.