{"id":842,"date":"2016-05-18T18:15:32","date_gmt":"2016-05-18T15:15:32","guid":{"rendered":"https:\/\/dogrulyk.com\/en\/sozdanie-sistem-bezopasnosti\/"},"modified":"2016-11-29T05:49:04","modified_gmt":"2016-11-29T02:49:04","slug":"sozdanie-sistem-bezopasnosti","status":"publish","type":"post","link":"https:\/\/dogrulyk.com\/en\/sozdanie-sistem-bezopasnosti\/","title":{"rendered":"Creating security systems"},"content":{"rendered":"<div class=\"content-img text-center\">\r\n  <img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/dogrulyk.com\/wp-content\/uploads\/2016\/05\/Vidy-deyatelnosti_Sistemy-bezopasnosti-1.jpg\" alt=\"\u0412\u0438\u0434\u044b \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438_\u0421\u0438\u0441\u0442\u0435\u043c\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438-1\" width=\"1364\" height=\"406\" class=\"alignnone size-full wp-image-791\" srcset=\"https:\/\/dogrulyk.com\/wp-content\/uploads\/2016\/05\/Vidy-deyatelnosti_Sistemy-bezopasnosti-1.jpg 1364w, https:\/\/dogrulyk.com\/wp-content\/uploads\/2016\/05\/Vidy-deyatelnosti_Sistemy-bezopasnosti-1-300x89.jpg 300w, https:\/\/dogrulyk.com\/wp-content\/uploads\/2016\/05\/Vidy-deyatelnosti_Sistemy-bezopasnosti-1-768x229.jpg 768w, https:\/\/dogrulyk.com\/wp-content\/uploads\/2016\/05\/Vidy-deyatelnosti_Sistemy-bezopasnosti-1-1024x305.jpg 1024w\" sizes=\"auto, (max-width: 1364px) 100vw, 1364px\" \/>\r\n<\/div>\r\n\r\n<p>\r\n\t<span class=\"text-blue\">ES \u00abDOGRULYK\u00bb<\/span> offers its clients the creation of the most modern security systems based on equipment produced by the leading manufacturers of the world industry, in accordance with their specifications and features. We carry out all work packages on the development and installation of integrated &#8220;turn-key\u201d security systems of any complexity for both public and private and corporate clients.\r\n<\/p>\r\n\r\n<p>\r\n\tHigh professional training and the rich practical experience of our employees, the strong technical base, as well as the close cooperation with the best manufacturers of security equipment allows us to create a variety of types of security systems.\r\n<\/p>\r\n\r\n<p>\r\n\tIn general, the establishment of a security system takes place in 3 stages:\r\n<\/p>\r\n  \r\n<p>\r\n\t<strong>Step 1:<\/strong> Analysis of the security state of the facility and of the business processes in which it has been involved (security audit).\r\n<\/p>\r\n\r\n<div>\r\n  <strong>Step 2:<\/strong> Designing the individual system project:\r\n  <ul>\r\n\t<li>identification of possible threats to the interests of the Client;<\/li>\r\n\t<li>study of the possible scenarios of the occurrence of these threats;<\/li>\r\n\t<li>development of the concept of the object security;<\/li>\r\n\t<li>formulation of the principles of organization of the security system;<\/li>\r\n\t<li>identification of priority functions, structures and mechanisms, which are subject for protection;<\/li>\r\n\t<li>identification of resources, forces, means and methods threat prevention, and the localization of negative consequences.<\/li>\r\n  <\/ul>\r\n<\/div>\r\n\r\n<p>\r\n\t<strong>Step 3:<\/strong> Analysis of the security state of the object and the business processes in which it has been involved (security audit).\r\n<\/p>\r\n\r\n<p>\r\n\tYou can find more detailed information on security systems offered by ES \u00abDOGRULYK\u00bb in &#8220;Solutions&#8221; section.\r\n<\/p>\r\n\r\n<p>\r\n\tAt the same time we carry out a full cycle of the works: pre-design inspection of the object, system design, installation of equipment and software installation, commissioning and integration of the system components, as well as its after-sales service after commissioning.  You can get more detailed information about our services in \u201cServices&#8221; section.\r\n<\/p>\r\n\r\n<span class=\"line line-gray line-full-width\"><\/span>\r\n\r\n<div class=\"text-center\">\r\n  For the further information, please contact our managers by phone:\r\n  <span class=\"text-blue\">(+993 12) 93-67-77<\/span>\r\n<\/div>\r\n\r\n\n<div class=\"wpcf7 no-js\" id=\"wpcf7-f1254-o1\" lang=\"ru-RU\" dir=\"ltr\" data-wpcf7-id=\"1254\">\n<div class=\"screen-reader-response\"><p role=\"status\" aria-live=\"polite\" aria-atomic=\"true\"><\/p> <ul><\/ul><\/div>\n<form action=\"\/en\/wp-json\/wp\/v2\/posts\/842#wpcf7-f1254-o1\" method=\"post\" class=\"wpcf7-form init\" aria-label=\"\u041a\u043e\u043d\u0442\u0430\u043a\u0442\u043d\u0430\u044f \u0444\u043e\u0440\u043c\u0430\" novalidate=\"novalidate\" data-status=\"init\">\n<div style=\"display: none;\">\n<input type=\"hidden\" name=\"_wpcf7\" value=\"1254\" \/>\n<input type=\"hidden\" name=\"_wpcf7_version\" value=\"6.0.6\" \/>\n<input type=\"hidden\" name=\"_wpcf7_locale\" value=\"ru_RU\" \/>\n<input type=\"hidden\" name=\"_wpcf7_unit_tag\" value=\"wpcf7-f1254-o1\" \/>\n<input type=\"hidden\" name=\"_wpcf7_container_post\" value=\"0\" \/>\n<input type=\"hidden\" name=\"_wpcf7_posted_data_hash\" value=\"\" \/>\n<\/div>\n<h4 class=\"text-center text-white\">CONSULTATION NEEDED\n<\/h4>\n<p class=\"text-center\">Leave your mobile phone number or an e-mail for a consultation request\n<\/p>\n<div class=\"clearfix\">\n\t<div class=\"col-md-6\">\n\t\t<p><span class=\"wpcf7-form-control-wrap\" data-name=\"email-or-phone\"><input size=\"40\" maxlength=\"400\" class=\"wpcf7-form-control wpcf7-text wpcf7-validates-as-required\" aria-required=\"true\" aria-invalid=\"false\" placeholder=\"Your e-mail or phone number\" value=\"\" type=\"text\" name=\"email-or-phone\" \/><\/span><br \/>\n[recaptcha]\n\t\t<\/p>\n\t<\/div>\n\t<div class=\"col-md-6 butn-place\">\n\t\t<p><button type=\"submit\" class=\"butn butn-green\">Request<\/button>\n\t\t<\/p>\n\t<\/div>\n<\/div><div class=\"wpcf7-response-output\" aria-hidden=\"true\"><\/div>\n<\/form>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>ES \u00abDOGRULYK\u00bb offers its clients the creation of the most modern security systems based on equipment produced by the leading manufacturers of the world industry, in accordance with their specifications and features. We carry out all work packages on the development and installation of integrated &#8220;turn-key\u201d security systems of any complexity for both public and [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":790,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24],"tags":[],"class_list":["post-842","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-activities"],"acf":[],"_links":{"self":[{"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/posts\/842","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/comments?post=842"}],"version-history":[{"count":3,"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/posts\/842\/revisions"}],"predecessor-version":[{"id":1264,"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/posts\/842\/revisions\/1264"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/media\/790"}],"wp:attachment":[{"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/media?parent=842"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/categories?post=842"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dogrulyk.com\/en\/wp-json\/wp\/v2\/tags?post=842"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}