AOS is a company that provides innovative security solutions by combining the latest surveillance and access control technologies. They use IP cameras and cloud storage to provide remote video monitoring. AOS also offers on-site security personnel and a remote monitoring team to watch client video feeds in real-time. Their solutions are customized to each client's needs and provide multiple layers of security through electronic and human monitoring.
2. Who are we?
AOS is a company that synergistically combines the latest in technology and
personnel, in innovative ways that maximize security , control and visibility of
client assets
We use the latest in surveillance technology, with network able cameras to
provide remote IP-video hosting
We use the latest in access control technology to maximize monitoring and
control
We capitalizes on the cloud technology’s potential to enable innovative
connectivity and remote accessibility of electronic security
We offers a remote human surveillance and intervention team that can monitor
and report on client video in real-time -- Virtual Guards, if you will
We offer onsite trained security personnel that work in conjunction with electronic
technology to provided a high level of coverage of client assets
Adyar Orange Systems, India. All rights reserved.
3. What do we do?
Solutions
o Analysis of client security needs
o Design and implementation of security, surveillance and monitoring solutions
o Selection and installation and surveillance equipment to meet client needs
o Remote & local monitoring coupled with cloud based storage of
surveillance feeds
o Remote human surveillance and intervention team that can monitor and report on
client video in real-time
o Onsite trained security personnel that work in conjunction with electronic
technology to provided a high level of coverage of client assets
What does that mean for you?
o A whole new world of security options, with visibility literally at your fingertips
Adyar Orange Systems, India. All rights reserved.
4. Key Benefits and Value
Client pays for security visibility outcome, and not coverage
Real time visibility of client assets - problems identified as they happen (not after a theft or
damage has occurred)
Real time monitoring to interdict security situation by on contract security personnel
High visibility of security solution (cameras) to discourage casual theft
Storage of surveillance video for duration client desires
Accessibility of video surveillance on client desired device, computer, smart
phone.
Layers of security, Electronic access devices, Cameras and recording devices, Local and
Offsite video storage, onsite and off site security personnel
Identifying weak points for further improvement of security
Flexible solution tailored to client immediate or growing security needs.
Existing client security features could be integrated into new solutions
Adyar Orange Systems, India. All rights reserved.
6. Components of Premises
Security
Perimeter and access control
In and Out control and screening of people and vehicular traffic
Personnel screening and biometric based access control
Surveillance monitoring for overall visibility of work areas for
management control
Monitoring of system status (Lights, machines status, personnel, etc.
remotely)
Remote access and notifications
Onsite security detail tied into electronic surveillance
Adyar Orange Systems, India. All rights reserved.
7. Details of AOS-Security
approach
Step 1
o Assessment
o Current State presentation
Step 2
o Security Architecture & design proposal
Step 3
o Implementation
Step 4
o Ongoing Security plan execution
Adyar Orange Systems, India. All rights reserved.
8. How We Approach Security
Assessments
Pre Work
o Review of appropriate policies and procedures, emergency response protocols,
and current training initiatives and crime analysis.
On Site
o Review of site(s) using concepts of CPTED (Crime Prevention Through
Environmental Design) which includes landscaping, lighting, visibility, etc.
o Development of risks and threats to security from within the site and from areas
nearby.
o Review of all physical security aspects to include review of access control
management, key control, security of high risk areas, health of all systems
Consultation with appropriate supervisory personnel.
o Consultation, where appropriate, with in-house/contract security, local law
enforcement/first responders.
o Meet with executives to discuss findings.
Adyar Orange Systems, India. All rights reserved.
9. Appendix I – Surveillance
Technology
Visual Surveillance
o Outdoor/Indoor surveillance cameras
o PTZ camera
o IP/Network camera
o Wireless camera
o Spy camera
Control device
o DVR/NVR
o PC based solution
All the devices are of latest technology and are
imported directly from USA
Adyar Orange Systems, India. All rights reserved.
10. Appendix II – Access
Control Technology
Fingerprint Scanning
Retinal Scanning
Facial Recognition
Biometrics are automated methods of recognizing a person based on a
physiological or behavioral characteristic. Among the features measured are;
face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
Biometric technologies are becoming the foundation of an extensive array of
highly secure identification and personal verification solutions. As the level of
security breaches and transaction fraud increases, the need for highly
secure identification and personal verification technologies is becoming
apparent.
Adyar Orange Systems, India. All rights reserved.
11. Client List
• M/s Noble Steels, Kancheepuram District, T.N
• Meenakshi College Of Engineering , Chennai
• CSI Christ Church, Salem, T.N
• Marco Leathers, Chennai
Also we have secured for our services at all the colleges
of Meenakshi Educational Trust.
Adyar Orange Systems, India. All rights reserved.
This template can be used as a starter file to give updates for project milestones. Sections Right-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors. Notes Use the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production) Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.