For å endre tekststørrelsen, hold Ctrl/Cmd-tasten nede og trykk på + for å forstørre eller - for å forminske

English

What is VTS analysis?

Simply explained, VTS analysis is an operationalization of the VTS method in a data tool. Because it is a data tool, it eliminates the challenge of templates, dispositions, collaboration, distribution of results and maintenance of the analysis over time, which so many struggles with.

The VTS method is an approach to assessing and analyzing risks associated with criminal and other unwanted actions, also called security risk. The method is rooted in criminological theory that identifies three factors that must be present and interact in order for a security issue to occur.

The method focuses on the valuation by saying that values ​​are the basis for any reasonable use of resources to ensure something, not threat or vulnerability. If you have identified that you have something of value that you are willing to protect, the next question is whether you have a fuse context or not. A hedging context exists when we have something of value that we want to protect, that there is a threat to this value and that one has or wishes to introduce safeguards to protect the specified value. If one of the factors value, threat, vulnerability is missing, you do not have a fuse context. You may want to spend money on safety in this case, but then there is no certainty to do.

The method has a social science approach to the analysis and assessments. That is, the method relies on qualitative discretionary assessments conducted by those who lead and / or participate in the process. This means that the content and results depend to a large extent on available data and information, as well as the correct interpretation of this.

In addition to focusing on hedging, the method is also concerned with illuminating complexity in the conditions analyzed. There is also a special focus on identifying and reducing uncertainty in the data bases and assessments that are made.

The method also facilitates presenting risks in a neutral and more accessible way for decision makers. This means that the method does not add to presenting risks using probability and consistency, but rather as a discretionary assessment of the sub-conclusions, the valuation, threat assessment and vulnerability assessment.

In other words, a VTS analysis is a tool that is specifically tailored to assessing security risk, in addition to making you better able to manage both the process, the result, and the follow-up over time.

 

Who is behind VTS analysis?

The Enterprise Security Council and One Voice have merged their heads and refined their knowledge. The result is a new software for implementing VTS analyzes. Based on VTS method ™ and CIM®, VTS analysis has become a reality.

The VTS method is an approach to assessing and analyzing risks associated with criminal and other unwanted actions, also called security risk. The method is rooted in criminological theory that identifies three factors that must be present and interact in order for a security issue to occur.


Safe storage

When assessing values (assets), threats and vulnerabilities, sensitive data is often involved. We take this on the highest seriousness. Therefore, we can proudly say that your data is safe with us. Through existing infrastructure, on which the national emergency response system CIM operates, we will store your data in accordance with applicable legislation. Further information can be found here and show what we guarantee.

 

Price

VTS analysis takes into account the number of users of the solution and is divided into three different levels, depending on size / number of users. For more information, please contact one of our contact persons. These can be found here.