Skip to main content
European Commission logo
Enterprise Europe Network

Greek company specialised in security consultancy services,such as Smart Security Drone,Technical Surveillance Counter Measures (TSCM),Studies & evaluation threat assessment, smart city security system, seeks business partners for commercial agreements

Summary

Profile Type
  • Business Offer
POD Reference
BOGR20221011010
Term of Validity
26 January 2023 - 25 January 2025
Company's Country
  • Greece
Type of partnership
  • Commercial agreement
Targeted Countries
  • All countries
Contact the EEN partner nearest to you for more information.
Find my local partner

General information

Short Summary
The Greek company is specialised in security consultancy services, private and corporate. They have armed and unarmed security guards thoroughly trained with experience in close protection, discreet and at any time and in any environment. The company can and does combine physical security with technical means in order to achieve the ultimate result.The company seeks international business partners under commercial agreements to provide them with their products and services in Greece.
Full Description
The company ensures the maximum protection of the life and property and ensures the effective minimization of every risk and threat. They have armed and unarmed security guards thoroughly trained with experience in close protection, discreet and at any time and in any environment. The company can and does combine physical security with technical means in order to achieve the ultimate result.
The main services include:
Smart Security Drone (SSD): unmanned aerial vehicle (drone) systems are used for surveillance, inspection and security purposes and for drilling sites, gathering centers, pipelines, refineries and other surface facilities. Most of the practices are largely based on drone operation, data transfer. They offer you a complete cloud-enabled drone autopilot system and its application in field surveillance.
Advantages: Operating 24/7, Easy of use (Plug-and-play, Ability to interface with existing alarm & video management systems), Remote access and control , Greater awareness (Respond to situations with advanced artificial intelligence ), Reduced cost, Artificial Intelligence (AI) in real time (Recognition of objects, people in real time, Advanced identification and tracking system).

TSCM- Technical Surveillance Counter Measures
Preventing industrial espionage is critical to maintaining information security resilience. Even the smallest vulnerability can have devastating consequences, a disgruntled employee, a hole in a wall or an uncovered window can mean the difference between normal operation and irreparable damage.
Specialties: Threat assessment studies that identify your monitoring vulnerabilities. They use the information to detect eavesdropping devices and other technical surveillance threats. They help businesses detect and prevent corporate espionage through electronic surveillance. They help people detect eavesdropping devices in their home, computer, mobile phone and vehicles. The purpose of the company is the detection and neutralization of micro-electronic audio-video-location recording systems, etc. that you suspect someone may have put on you without your knowledge. Controlling spaces is the first step to securing your conversations and personal data. A full inspection includes scanning your business premises and your home to eliminate hazards from all sides. The control of vehicles has the same weight as the control of space since many people spend several hours in them making them the second target after mobile phones. Securing conversations and privacy doesn't just stop at controlling your premises and vehicles, the biggest enemy is in our pockets all day – every day. And with other features such as recording sound from the microphone of the device for up to 30 minutes, Smartphones enable someone to know everything about your business, but also your everyday life, even about the people close to you and the your personal life. Checking the mobile phone for tracking software and its protection tips are part of the services to offer maximum security of personal data.

Studies & evaluation threat assessment is the first step in a risk and vulnerability analysis. This threat assessment task involves evaluating the various security risks associated with a particular location. It covers a wide range of threats including: natural threats (tornadoes, hurricanes, floods, earthquakes), criminal threats (theft from a location, violence against personnel), terrorists (active shooter, vehicle and improvised explosive devices) and potential accidents. Once threats are identified, our company plans how to protect family, employees, facilities, supplies and critical infrastructure.

The Custom Administration Security Defense (CASD) that concerns the smart city security system.
Advantages and Innovations
The use of Artificial Intelligence has led to being able to have a remote monitoring of facilities as well as external spaces both private and public. A comprehensive study resulted in the Custom Administration Security Defense (CASD) smart city security system. The specific project concerning the creation and development of modern and innovative security plans for smart and safe cities won the 1st prize in the Crowd Hackathon Competition for Smart Cities. The product has been presented at conferences in Greece, it has won impressions and can work for any European city.
The company, also offers the possibility of training a company's personnel wherever it is based - B to B training - against threats that they may encounter during their work. They provide the opportunity to train and assess staff on safety issues such as: Earthquake situation, Fire in the workplace, Evacuation of space, Measures and instructions for the first response in cooperation with the authorities in emergency situations, Reaction to everyday incidents and dealing with challenging behaviors ,Reaction to special situations based on scenarios that can happen in the field.
They can also undertake the Close Protection of customers of corresponding companies in other countries and provide this service inside and outside Greece.
Stage of Development
  • Already on the market
Sustainable Development Goals
  • Goal 16: Peace and Justice Strong Institutions
IPR description
None

Partner Sought

Expected Role of a Partner
The company is looking for business partners to promote its services in security issues both privately as weel as in the context of smart city security system.
Type and Size of Partner
  • SME 11-49
  • Other
  • SME 50 - 249
  • Big company
  • SME <=10
  • R&D Institution
Type of partnership
  • Commercial agreement

Dissemination

Technology keywords
  • 010001002 - Assessment of Risk
  • 10001006 - Protection against intoxication
  • 09004 - Recording Devices
Market keywords
  • 09002004 - Security and commodity brokers and services
Sector Groups Involved
  • Digital
Targeted countries
  • All countries