side-area-logo
Why
SECOM

We have been protecting many business against the security threats for more than 2 decades.

The advance of today’s technology provides us with variety of options to build security parameter. Base on the need of the business as well as other factors such as location, building layouts and construction, SECOM (Malaysia) will provide the best option in order to maximize the capability of the equipment to serve accordingly. The advantage of having a total security solution that combines technology and responsive security is greater than that of which only dependent on one type of solution only. The precision and reliability of a machine is complimented by the responsive nature of respond officer on duty. Should the need arise from the incoming threat, within minutes it will be address and action will be taken. With more than 40 years of worldwide implementations of this responsive system, you can be sure it will benefit a lot of subscribers over the years.

Common Security Threats:-

Internal Security Threats:-

External Security Threats:-

  • Employee theft;
  • Workplace violence;
  • Vandalism & sabotage;
  • Fire & gas.
  • Outsider theft;
  • Unauthorized entry & trespassing;
  • Vandalism & sabotage;
  • Break-in & robbery.
Web

Benefits of Using SECOM Security Solutions:-

Improve in:-

Reduce in:-

  • Deterrence, detection & determination;
  • Round-the-clock monitoring, technical & customer support;
  • Responsiveness to emergency incident;
  • Protection / security effectiveness.
  • Worries;
  • Cost of maintenance;
  • Risk of loss prevention;
  • Risk of criminal.
Why Secom_Benefits

How SECOM Works:-

Step 1: Site Survey

>> Sales personnel will visit the site for potential risk and threats at customer’s premises;
>> Identify the potential threat and surrounding environment.

Step 2: Free Quotation

>> Suggestion and recommendation from a group of security expert for the right;
>> Recommend on improvement of physical building structure if necessary.

Step 3: Proposal Presentation

>> Presentation of proposal including system design, price and services;
>> Explain detail function of different sensors;
>> Benefit and effectiveness of security solution and package.

Step 4: Order Confirmation

>> Arrange for installation and commissioning date.

Step 5: System Installation

>> Final site survey by technician;
>> Contractor installs accordance to security plan;
>> Testing of system by technician.

Step 6: Handover

>> Area leader handover system to Subscriber;
>> Service start officially.

Step 7: Response Service

>> Upon alarm triggered, signal will send to control centre via telephone line;
>> Control Centre will inform respective depot for immediate response;
>> Upon response officer arrival at Subscriber’s premise, a perimeter check will be conducted follow by internal check.

Step 8: System Maintenance Support

>> Free and covered by monthly CMS (except caused by misused);
>> Suggested to sign up annual preventive maintenance if not covered by monthly CMS (One off purchase);
>> Alarm system has self diagnostic feature to detect any abnormalities or malfunction of the equipment, our Control Centre will be notified if abnormal signal received from the Panel;
>> Response Technicians will carry out the diagnosis and troubleshoot the problem upon arrival at Subscriber’s premise;
>> Replacement of problem sensors if necessary;
>> Experienced Servicing team to backup RT in the event of complicated technical fault;
>> To minimize downtime of the system and rectify the problem within shortest period of time to provide Subscribers a peace of mind.