Cornerstone Security Consulting Pty Ltd

Independent Security, Risk & ICT Consultants - Australia

Home Page

Home

Company & Information

About Cornerstone Security
Contact US
Our Key Staff & Experience
Security & Risk Resources
Useful Links to Security Agencies
Cornerstone's Privacy Policy
FAQs
SITEMAP
Recent Projects

Specialist Services We Provide

Expert Security Audits and Reviews
Security Risk & Threat Assessments
Server and Comms Room Audits
Hospital Security Audits &Reviews
Hostile Vehicle Mitigation Design
Swept Path Analysis
Preventing Hostile Reconnaissance

Systems Engineering

Design of CCTV & Digital Video Surveillance Systems
Design of Biometric Security Systems
Design of Personal Tracking & Duress Systems
Design of Perimeter Security
Design of "Active" Shooter Detection Systems
Design of Vehicle Checkpoints & Access Controls

Technical Articles

Vulnerabilities of standard RFID Credentials
Vulnerabilities of Wiegand format
Active Directory Integration
How to comply with the EU GDPR Data Privacy Directive
Design of Security Control Rooms
Security & Risk Glossary
Drawings for Construction

Information Videos

  1. Video Showing Testing of a Vehicle Barrier to PAS Standards
  2. Video Showing Bluetooth Enabled Proximity Reader
  3. Video Showing Gallagher Mobile Connect + Thumbprint
  4. Video Showing Real Time Tracking of Staff with Bosch Escort
  5. Video Showing how the SDS Shooter Detection System Works
  6. Video Showing Night Lock Testing by Police
  7. Video Showing the Swept Path of a Hostile Vehicle
  8. Video Showing how Easy it is to Clone a HID Proximity Card
  9. Video Showing how easy it is to Clone a Mifare Classic card