Technical security

Always a thorough approach

• Organization of surveillance;

• Provision of quick radio communication;

• Provision of special technical equipment, such as: arched metal detectors, introscopes, hand-held metal detectors, etc.;

• Identification of technical channels of information leakage.