Beveiliger 3: Van analyse tot borging by