{"id":31,"date":"2021-05-18T22:24:57","date_gmt":"2021-05-18T19:24:57","guid":{"rendered":"http:\/\/ma-sec.com\/?page_id=31"},"modified":"2021-06-21T13:40:37","modified_gmt":"2021-06-21T10:40:37","slug":"security","status":"publish","type":"page","link":"https:\/\/ma-sec.com\/?page_id=31&lang=en","title":{"rendered":"Security"},"content":{"rendered":"<div class=\"innerText10_ContentDiv\">\n<h2 class=\"Title-Copy-2-3-4-5-6-Copy-Copy ospfxwfffff0e34b2e5713bf19092c598e156cossfx\">Security<\/h2>\n<p class=\"Normal ospfxw0ce9cad684de706351d847a1204ece0bossfx\">Risk assessment, professional consultation, security planning, procedure writing, emergency plans, training, supervision and control by routine tests of all secured areas within an organization, procedures, emergency plans, recommendations and technological solutions.<\/p>\n<h2 class=\"Normal-Copy-2-3 ospfxw3d139b38780378cb88ac89063544ae2bossfx\">Securing Sensitive Facilities<\/h2>\n<p class=\"Normal ospfxw67ca46fbb544e0bc1c7d96d4236b36b2ossfx\">Planning the security and securing sensitive strategic facilities such as prisons, refineries, drilling rigs, government offices, sensitive government facilities, etc.<\/p>\n<p class=\"Normal ospfxw086099a2a84ed38a4061d193ffb55cbcossfx\">VIPs and Delegations Security \u2013 Planning the security and protecting VIPs in various destinations and outlines, events, meetings, and international activities, from residential security, securing the various installations used by the VIPs, to coaching and training of a local staff according to the risks and location.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium wp-image-342\" src=\"http:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_163607590_s-2019-1-300x169.jpg\" alt=\"security\" width=\"300\" height=\"169\" srcset=\"https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_163607590_s-2019-1-300x169.jpg 300w, https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_163607590_s-2019-1-768x432.jpg 768w, https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_163607590_s-2019-1.jpg 1000w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<h2 class=\"Normal-Copy-2-3 ospfxwbfc383120d62824d2b9f6e1a158c0a6cossfx\">Aviation Security<\/h2>\n<p class=\"Normal ospfxw1dba6b81f67b0cb72ea8c18d61c64f39ossfx\">Aviation security is a doctrine based on knowledge and long time operational experience. The level of risk derived from an aviation terror attack is enormous. Thus, this matter is highly sensitive and requires many inputs and resources. In our view, an airport is a strategic and attractive installation with a high media profile. Therefore, the security activity is in the context of all parties operating at the airport, i.e. the installation itself and all stages of handling the passengers security while synchronizing all relevant parties. The additional and important component is the airline, which operates in a wide range of destinations and therefore requires focused attention to the various threats derived from each and every destination.<\/p>\n<h2 class=\"Normal-Copy-2-3 ospfxwece557d7298271b78642e729c4cb8a1bossfx\">Marine Security<\/h2>\n<p class=\"Normal ospfxw83817e9ee24b5c4fe4544c49e189b472ossfx\">The security of seaports is a complex task, in light of the multiple threats derived from the physical location of the installation, which allows for possible operational approaches with a complex security treatment, because of the double-front threat \u2013 from land on the one hand and from sea on the other hand. This combination requires a solution that addresses each threat separately with the know-how of combining and synchronizing between the different sectors.<\/p>\n<h2 class=\"Normal-Copy-2-3 ospfxwf6e96c9ec6ae10d2c4fbe523803b1879ossfx\">Information and Cyber Security<\/h2>\n<p class=\"Normal ospfxw31350e33e95d0cf896446b2d914df137ossfx\">In today's highly developed technological world, information security is the most valuable asset of government and commercial companies. Intrusion to the organization's databases, whether overt or covert, may lead to the organization's crash and cause enormous damage to its customers. At M.A. Security, we instruct and educate for activity on two main levels. The first level is the human aspect, i.e. the company\/organization employees, and the second level is the technological aspect, responsible for protecting the organization or business. As part of our activities, we examine the company employees' behavior, the actual procedures and technological protections, and according to which we guide, instruct and work to upgrade all relevant systems.<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-medium wp-image-341\" src=\"http:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_46981133_s-2019-300x200.jpg\" alt=\"Low Voltage Systems\" width=\"300\" height=\"200\" srcset=\"https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_46981133_s-2019-300x200.jpg 300w, https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_46981133_s-2019-768x513.jpg 768w, https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_46981133_s-2019.jpg 999w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<h2 class=\"Normal-Copy-2-3 ospfxwb40e0d2c6e4d4dc164081cc91e1dd188ossfx\">Low Voltage Systems<\/h2>\n<p class=\"Normal ospfxwf928c1c4d5752dae510b3744720bfd26ossfx\">Consulting, planning and implementing access control system, PA systems, alarm systems, CCTV systems, including the video management software needed for surveillance, deterrence, inspection, investigation etc. Preliminary and advanced planning, quantity lists, and top-level supervision until the project is delivered and completed.<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Security Risk assessment, professional consultation, security planning, procedure writing, emergency plans, training, supervision and control by routine tests of all secured areas within an organization, procedures, emergency plans, recommendations and technological solutions. Securing Sensitive Facilities Planning the security and securing sensitive strategic facilities such as prisons, refineries, drilling rigs, government offices, sensitive government facilities, etc. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-31","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security - M.A Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ma-sec.com\/?page_id=31&lang=en\" \/>\n<meta property=\"og:locale\" content=\"he_IL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security - M.A Security\" \/>\n<meta property=\"og:description\" content=\"Security Risk assessment, professional consultation, security planning, procedure writing, emergency plans, training, supervision and control by routine tests of all secured areas within an organization, procedures, emergency plans, recommendations and technological solutions. Securing Sensitive Facilities Planning the security and securing sensitive strategic facilities such as prisons, refineries, drilling rigs, government offices, sensitive government facilities, etc. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ma-sec.com\/?page_id=31&amp;lang=en\" \/>\n<meta property=\"og:site_name\" content=\"M.A Security\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-21T10:40:37+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_163607590_s-2019-1-300x169.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u05d6\u05de\u05df \u05e7\u05e8\u05d9\u05d0\u05d4 \u05de\u05d5\u05e2\u05e8\u05da\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 \u05d3\u05e7\u05d5\u05ea\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ma-sec.com\\\/?page_id=31&lang=en\",\"url\":\"https:\\\/\\\/ma-sec.com\\\/?page_id=31&lang=en\",\"name\":\"Security - M.A Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ma-sec.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ma-sec.com\\\/?page_id=31&lang=en#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ma-sec.com\\\/?page_id=31&lang=en#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/ma-sec.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Depositphotos_163607590_s-2019-1-300x169.jpg\",\"datePublished\":\"2021-05-18T19:24:57+00:00\",\"dateModified\":\"2021-06-21T10:40:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ma-sec.com\\\/?page_id=31&lang=en#breadcrumb\"},\"inLanguage\":\"he-IL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ma-sec.com\\\/?page_id=31&lang=en\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\\\/\\\/ma-sec.com\\\/?page_id=31&lang=en#primaryimage\",\"url\":\"https:\\\/\\\/ma-sec.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Depositphotos_163607590_s-2019-1.jpg\",\"contentUrl\":\"https:\\\/\\\/ma-sec.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/Depositphotos_163607590_s-2019-1.jpg\",\"width\":1000,\"height\":563,\"caption\":\"security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ma-sec.com\\\/?page_id=31&lang=en#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u05d3\u05e3 \u05d4\u05d1\u05d9\u05ea\",\"item\":\"https:\\\/\\\/ma-sec.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ma-sec.com\\\/#website\",\"url\":\"https:\\\/\\\/ma-sec.com\\\/\",\"name\":\"M.A Security\",\"description\":\"\u05d0\u05ea\u05e8 \u05d5\u05d5\u05e8\u05d3\u05e4\u05e8\u05e1 \u05d7\u05d3\u05e9\",\"publisher\":{\"@id\":\"https:\\\/\\\/ma-sec.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ma-sec.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"he-IL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/ma-sec.com\\\/#organization\",\"name\":\"M.A Security\",\"url\":\"https:\\\/\\\/ma-sec.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"he-IL\",\"@id\":\"https:\\\/\\\/ma-sec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/ma-sec.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cropped-logo_n-white.png\",\"contentUrl\":\"https:\\\/\\\/ma-sec.com\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cropped-logo_n-white.png\",\"width\":1075,\"height\":228,\"caption\":\"M.A Security\"},\"image\":{\"@id\":\"https:\\\/\\\/ma-sec.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security - M.A Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ma-sec.com\/?page_id=31&lang=en","og_locale":"he_IL","og_type":"article","og_title":"Security - M.A Security","og_description":"Security Risk assessment, professional consultation, security planning, procedure writing, emergency plans, training, supervision and control by routine tests of all secured areas within an organization, procedures, emergency plans, recommendations and technological solutions. Securing Sensitive Facilities Planning the security and securing sensitive strategic facilities such as prisons, refineries, drilling rigs, government offices, sensitive government facilities, etc. [&hellip;]","og_url":"https:\/\/ma-sec.com\/?page_id=31&lang=en","og_site_name":"M.A Security","article_modified_time":"2021-06-21T10:40:37+00:00","og_image":[{"url":"http:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_163607590_s-2019-1-300x169.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"\u05d6\u05de\u05df \u05e7\u05e8\u05d9\u05d0\u05d4 \u05de\u05d5\u05e2\u05e8\u05da":"2 \u05d3\u05e7\u05d5\u05ea"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ma-sec.com\/?page_id=31&lang=en","url":"https:\/\/ma-sec.com\/?page_id=31&lang=en","name":"Security - M.A Security","isPartOf":{"@id":"https:\/\/ma-sec.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ma-sec.com\/?page_id=31&lang=en#primaryimage"},"image":{"@id":"https:\/\/ma-sec.com\/?page_id=31&lang=en#primaryimage"},"thumbnailUrl":"http:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_163607590_s-2019-1-300x169.jpg","datePublished":"2021-05-18T19:24:57+00:00","dateModified":"2021-06-21T10:40:37+00:00","breadcrumb":{"@id":"https:\/\/ma-sec.com\/?page_id=31&lang=en#breadcrumb"},"inLanguage":"he-IL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ma-sec.com\/?page_id=31&lang=en"]}]},{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/ma-sec.com\/?page_id=31&lang=en#primaryimage","url":"https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_163607590_s-2019-1.jpg","contentUrl":"https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/06\/Depositphotos_163607590_s-2019-1.jpg","width":1000,"height":563,"caption":"security"},{"@type":"BreadcrumbList","@id":"https:\/\/ma-sec.com\/?page_id=31&lang=en#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u05d3\u05e3 \u05d4\u05d1\u05d9\u05ea","item":"https:\/\/ma-sec.com\/"},{"@type":"ListItem","position":2,"name":"Security"}]},{"@type":"WebSite","@id":"https:\/\/ma-sec.com\/#website","url":"https:\/\/ma-sec.com\/","name":"M.A Security","description":"\u05d0\u05ea\u05e8 \u05d5\u05d5\u05e8\u05d3\u05e4\u05e8\u05e1 \u05d7\u05d3\u05e9","publisher":{"@id":"https:\/\/ma-sec.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ma-sec.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"he-IL"},{"@type":"Organization","@id":"https:\/\/ma-sec.com\/#organization","name":"M.A Security","url":"https:\/\/ma-sec.com\/","logo":{"@type":"ImageObject","inLanguage":"he-IL","@id":"https:\/\/ma-sec.com\/#\/schema\/logo\/image\/","url":"https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/07\/cropped-logo_n-white.png","contentUrl":"https:\/\/ma-sec.com\/wp-content\/uploads\/2021\/07\/cropped-logo_n-white.png","width":1075,"height":228,"caption":"M.A Security"},"image":{"@id":"https:\/\/ma-sec.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/ma-sec.com\/index.php?rest_route=\/wp\/v2\/pages\/31","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ma-sec.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ma-sec.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ma-sec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ma-sec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=31"}],"version-history":[{"count":5,"href":"https:\/\/ma-sec.com\/index.php?rest_route=\/wp\/v2\/pages\/31\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/ma-sec.com\/index.php?rest_route=\/wp\/v2\/pages\/31\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/ma-sec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=31"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}