UK & Ireland Featured Project: Cadent Mineral Blue / isCompliant Implementation (1603)

QEM Solutions have been assisting Cadent Gas with the implementation of our Mineral Blue and isCompliant software. By developing a bespoke connection between the two suites, QEM were able to establish a streamlined process for gathering project milestone achievements. Balancing these achievements with audit and inspection results have enabled Cadent to to get a true measure of project success.

Tell Me More...
Overseas Featured Project: Capita Symonds - Valve Inspections

QEM Solutions were contracted to carry 3rd party inspection and witnessing activities on a series of valves fabricated in Germany for a series of SGN contracts throughout Scotland.

Tell Me More...
We are QEM Solutions We are QEM Solutions

We are problem solvers. We are organisers. From the project start-up to the very final evaluations and analysis, we can bring enthusiasm to each and every part of your project.


ISO 27001 Information Security Management

With ever-increasing threats to digital information, a breach in information security can be catastrophic to any business, no matter what the scale or what industry they operate in.

QEM can review your current working practices and identify which aspects of your business are at risk.

ISO 27001:2013 is an international standard that provides a framework that helps organisations meet both their legal and contractual obligations associated with data protection and information security. Unlike the other international management system standards, (ISO 9001, ISO 14001 and ISO 45001)  ISO 27001 focuses on a list of mitigation controls that reduces or eliminates risks.  These controls are detailed in Annex A and include everything from access and physical perimeter management to cryptography and supplier assessments.

Implementing a robust information management system in accordance with ISO 27001 can dramatically reduce the following threats:

  • Cyber crime (attacks for monetary gain, such as phishing, malware intrusion, identity theft etc.)
  • Hacktivism, (attacks to disrupt activities in order to make a political or activist standpoint)
  • Active persistant threat, (such as a power cut or utility failure)
  • Insider threat, (a threat caused by an internal resource such as an employee or ex-employee)
  • Native state, (a state-driven attack on a political or geographical region)

QEM can reduce the CHAIN threats by applying the measures detailed in Annex A of ISO 27001 in a cost-effective and realistic manner.



Related Projects

QEM Specialist