• Home

    Aldred Balclutha is a security consultancy company with a major difference from other
    companies; we are engineers first and foremost. Our knowledge base has developed
    over the last 35 years from facing problems of securing everything from a corner
    shop in the centre of London, to securing an airbase in the middle of the
    desert with a hundred mile perimeter.

    Read More
  • About Us

    Aldred Balclutha was formed in 1991 due to the demand for a more professional and accountable approach to security consultancy services.

    At the head of the company is John Aldred, an electrical
    engineer with over 25 years experience in the security,
    fire and loss prevention industry and a proven track record
    working with many blue chip companies including British
    Aerospace, Ferranti, Bahrain Telecommunications and Wormald/Mather & Platt.

    The company has acquired a reputation for high quality
    output which can be attributed to our development of a specific
    security methodology. This methodology has been successfully
    implemented on a number of projects in the UK and the USA
    and two major projects in the Middle East.

    Both have followed a detailed assessment of the threats, analysis of the risks, conceptual and final design, implementation and project management, ensuring that complete traceability is provided throughout all projects.

    Aldred Balclutha is at the forefront of security consultancy and in order to help its clients meet the challenges of the future will continue to invest in new thinking and new technology to ensure its leading role.

  • First Principles

    It is natural to protect ones own. It is also natural to defend ones property. Nature is itself rich in examples. Cacti that ward off attack with painful detterents; the Emperor moth when resting frightens away his attacker by assuming the appearance of a foe (deter); polyps, creatures who build protective outer casings and so form coral reefs; caterpillars who build cocoons until they are ready to emerge in resplendent glory; spiders who create intricate webs that alert them to the presence of an intruder (detection) held in in the web (delay) until the spider can assess its catch and disable it (defeat).

    The antelope who, when sensing danger, alerts the rest of the herd, at some risk to himself; and the musk oxen who form a defensive circle, with the young and the weakest at the centre when wolves approach.

    The earth, in fact, is a complex system; a system which encompasses the whole of creation (at least as we know it) in a beautiful and sometimes frightening dance of balance. A balance between predator and prey.

    Homeostasis - millions of years of evolution - has ensured that every living creature uses its own appropriate system of defence, and knowing exactly how much 'force' to use to ensure adequate survival of a species is one of nature's wonders. For mankind however, the problem is increasingly more complex, with moral, ethical and legal aspects to consider when faced with a particular threat.

    Homosapiens have always had more to fear from themselves than from any other predator. However, through superior intellect man has learned from nature's wisdom the ability to deter, detect, and delay in order to be able to defeat ones adversaries. These are the first principles of security.

  • Risk Assessment

    Mankind is almost as rich in solutions to its manmade problems as mother nature herself, and considerable amounts of money are consumed on research and development into an ever expanding armoury of security related products.

    The effectiveness of a given solution however, will be determined as much by the correct threat/risk requirements analysis as by the installation, commissioning and maintenance, yet is frequently overlooked by users and specifiers alike.

    It is the role of security professionals to ensure that the risks presented by a variety of threats are correctly identified to enable them to be contained, managed and reduced and to ensure that what their clients get is an overall system that is 'fit for its intended purpose'.

    In an increasingly competitive society however, manufacturers often have little or no control over the ultimate use of their products and very often the only qualification required to purchase highly technical components that require experience and skill in order to allow them to perform the way the manufacturer intended, is an ability to pay for them!

    The security industry is still relatively young when compared to other engineering disciplines, and as yet, remains largely unregulated with few recognised standards. The confusion surrounding the vast array of security products available makes it easy for compaines to exploit this situation and favour their own products and systems, whether they are right for the job or not. There are many good products available but they will only work to their maximum effectiveness in systems correctly designed and installed.

  • Process Control

    Our process

    Security project work is usually not about individual products, it is about a process. If the process is right from the start, the right products will naturally surface and be fit for their intended purpose. Our process is the basis for our success and has guaranteed customer satisfaction on many projects.

    When danger threatens, Musk Oxen do not run away. Instead, a herd of twenty to forty individuals backs into a rough circle facing outwards with the calves in the centre or under their mothers' bellies. From time to time a bull dashes out to do battle, then returns to the circle. He is exceedingly nimble and a single sweep of his horns can easily cripple or kill a wolf, dog or Eskimo hunter armed with a spear.

  • System Design

    The spider when spinning his intricate web employs logic which has many parallels within a security system and similarly tried and tested methodology has to be applied if it is to work. We believe the nucleus of any security system is the Structural Requirements and Compliancy Matrix.

    Aldred Balclutha clients have recognised and demonstrated how valuable it is to invest in qualified professional consultants and engineers in order to get it right, first time. Others have discovered that, particularly where system design is concerned, going for quality advice not only produces systems that work, but are far more cost effective.

    Savings can often be made by simply making sure that systems are not over specified. Bespoke solutions designed for obscure or uncertain threats very often fail to work and are abandoned or redesigned as a less complicated system more appropriate for their intended purpose.

    The spider web is a complex and intricate structure designed to allow the spider time to detect and delay his prey before defeating it. Wherever an insect appears on the spider's web, the spider is alerted to its presence by vibrations.

    Similarly, modern security systems pinpoint the position of intruders without their knowledge, allowing vital time for interception.

  • Contact Info

    Aldred Balclutha

    Int'l: 00 968 9208 2849
    UK: 00 44 7710 456 446


    If you have an enquiry, comment or suggestion we want to hear from you. Please complete the form below, or alternatively you may contact us by email, phone or post.

    Contact form submitted! We will be in touch soon.

  • Privacy Policy

    Fusce euismod consequat ante. Lorem ipsum dolor sit amet, consectetuer. Pellentesque sed dolor. Aliquam congue fermentum nisl. Mauris accumsan nulla vel diam. Sed in lacus ut enim adipiscing aliquet. Nulla venenatis. In pede mi, aliquet sit amet, euismod in,auctor ut, ligula.Aliquam dapibus tincidunt metus. Praesent justo dolor, lobortis quis, lobortis

    dignissim,pulvinar ac, lorem. Vestibulum sedDonec accumsan malesuada. Orcionec sit amet eros.Bsdraera nertya madetaertya lertyaers ceriteryase masrtaderas.Lorem ipsum dolor sit amet, consectetuer adipiscing elauris fermentum dictum magn laoreet aliquam leo. Ut tellusdolorapibus egeteleturpis. Integer rutrum anteacus.Fusce euismod consequat ante.

    Lorem ipsum dolor sit amet, conseetuer adipiscing elit. Pellentesque sed. Aliquam congue fermentum nisl. Mauris accumsan nulla vel diam. Sed in lacus ut enim adipiscing aliquet. Nulla venenatis. In pede mi, aliquet sit amet, euismod in,auctor ut, ligula.Aliquam dapibus tincidunt metus. m. Vestibulum senulla vel diam. Sed in lacus ut enim adipiscing aliquet.

    Nulla venenatis. In pede mi, aliquet sit amet, euismod in,auctor ut. Logula.Aliquam dapibus tincidunt metus. Praesent justo dolor, lobortis quis, lobortis dignissim,pulvinar ac, lorem. Vestibulum sedDonec accumsan malesuada orcionec sit amet eros.Bsdraera nertya madetaertya lertyaers ceriteryase masrtaderas.Lorem ipsum dolor sit amet, consect.


  • Read More

    The one thing we learned above all else in the very early years was the importance of helping our clients to understand exactly what is was they were hoping to achieve in protecting their assets in the first place. This may sound ridiculously like common sense, but 25 years ago, in our experience, more than 80% of so called "integrated solutions" fell far short of their customer's requirements. Today, that figure is still above 80%!

    How can this be so, with all the quality standards and regulations introduced over the last 25 years? The answer is simple; whilst these well meaning initiatives sought to promote quality and good standards, they failed miserably in two main areas: 1. They failed to influence clients to actually seek and pay for good advice at the outset, and 2. They are still no guarantee that the supplier actually understands the client's requirements.

    For this reason alone we developed our own methodology for ensuring that we always extract from our clients exactly what it is they are hoping to achieve, and we sign off each stage of this process before we move to the next stage. We have successfully applied this simple formula to complex security issues on military air bases, telecommunications facilities, hospitals, schools and universities, stadia, shopping centres and many more with 100% satisfied customers every time.

    This web site draws on colourful analogies from the natural world to demonstrate the simplicity but effectiveness of security measures employed by a wide range of life forms on our planet. It is to these examples we often refer to ensure we do not overcomplicate things in our pursuit of the ultimate security.

  • Structured Requirements Analysis

    Firstly we clearly establish what the real requirement is. Starting with a clear definition of the threat and carefully analysing how the threat is likely to manifest itself in terms of risks to our customers' assets, we categorise them in order of importance to enable appropriate solutions to be developed in accordance with their value to our customers' needs.

    Models may be constructed and scenarios developed with great attention paid to the vulnerability of the assets under a variety of conditions relative to the likelihood (probability) and the nature (severity) of attack, recognising the skill level and determination of the attackers, individual user requirements, corporate policy, costs and human factors.

    This will enable us to develop a Conceptual Solution and provide budgetary costings for planning purposes.

  • Detailed System Design

    Once the fundamentals are established, we are then able to commence Detailed System Design (phase 2) where the hardware and software elements surface for cross checking with the overall design philosophy together with more practical considerations e.g. the personnel who wil be operating and supporting the systems, and installation factors.

    Site trials are always recommended prior to finalising a design to allow our customers to see solutions and ensure that their requirements have been correctly interpreted.

  • Integration

    The subject of integration (phase 3) can be extremely onerous. In our model process, we believe the main thrust of what is meant by integration should not be addressed until appropriate solutions have been developed to meet the threat and ensure that systems are selected for their suitability to the design concepts rather than their ability to be integrated.

    Many companies promote their products or systems based solely on the fact that they are integrated. Close analysis often reveals that the term integration is used to disguise the real manufacturers of security system components, with integration being a bespoke software package that is usually inflexible and restrictive tying the customer to the supplier for the life of the system.

    The most important thing to remember about integration, given that no manufacturer makes all of the components found in an average security system incorporating CCTV, Access Control and IDS is that integration is not, and should not be the driver of the security system design process.

  • Implementation

    The implementation phase (phase 4) covers the purchasing of all hardware and software and nomination of sub-contractors, preparation of facilities to receive the security equipment, installation, testing, commissioning and establishing support, training personnel and preparing to handover the system.

  • Operation

    Finally, phase 5 is the operational phase where system operation and support together with establishing self sufficiency is addressed. Ongoing system developments, policy changes and all documentation is handed over. The single most important document at this stage in our belief is the compliancy matrix.

    This proves that the system handed over fully meets with the requirements laid down in the structured requirements document and that the systems are fit for their intended pupose.

  • Our Location