SlideShare una empresa de Scribd logo
1 de 13
Adyar Orange Systems, India. All rights reserved.
Who are we?


           AOS is a company that synergistically combines the latest in technology and
            personnel, in innovative ways that maximize security , control and visibility of
            client assets
           We use the latest in surveillance technology, with network able cameras to
            provide remote IP-video hosting
           We use the latest in access control technology to maximize monitoring and
            control
           We capitalizes on the cloud technology’s potential to enable innovative
            connectivity and remote accessibility of electronic security
           We offers a remote human surveillance and intervention team that can monitor
            and report on client video in real-time -- Virtual Guards, if you will
           We offer onsite trained security personnel that work in conjunction with electronic
            technology to provided a high level of coverage of client assets




Adyar Orange Systems, India. All rights reserved.
What do we do?


   Solutions
    o   Analysis of client security needs
    o   Design and implementation of security, surveillance and monitoring solutions
    o   Selection and installation and surveillance equipment to meet client needs
    o   Remote & local monitoring coupled with cloud based storage of
        surveillance feeds
    o   Remote human surveillance and intervention team that can monitor and report on
        client video in real-time
    o   Onsite trained security personnel that work in conjunction with electronic
        technology to provided a high level of coverage of client assets
          What does that mean for you?
    o   A whole new world of security options, with visibility literally at your fingertips




Adyar Orange Systems, India. All rights reserved.
Key Benefits and Value


   Client pays for security visibility outcome, and not coverage
   Real time visibility of client assets - problems identified as they happen (not after a theft or
    damage has occurred)
   Real time monitoring to interdict security situation by on contract security personnel
   High visibility of security solution (cameras) to discourage casual theft
   Storage of surveillance video for duration client desires
   Accessibility of video surveillance on client desired device, computer, smart
    phone.
   Layers of security, Electronic access devices, Cameras and recording devices, Local and
    Offsite video storage, onsite and off site security personnel
   Identifying weak points for further improvement of security
   Flexible solution tailored to client immediate or growing security needs.
   Existing client security features could be integrated into new solutions




Adyar Orange Systems, India. All rights reserved.
Security & Surveillance Architecture




Adyar Orange Systems, India. All rights reserved.
Components of Premises
              Security
      Perimeter and access control
      In and Out control and screening of people and vehicular traffic
      Personnel screening and biometric based access control
      Surveillance monitoring for overall visibility of work areas for
          management control
      Monitoring of system status (Lights, machines status, personnel, etc.
          remotely)
      Remote access and notifications
      Onsite security detail tied into electronic surveillance


Adyar Orange Systems, India. All rights reserved.
Details of AOS-Security
                                        approach

 Step            1
    o   Assessment
    o   Current State presentation

 Step            2
    o   Security Architecture & design proposal

 Step            3
    o   Implementation

 Step            4
    o   Ongoing Security plan execution




Adyar Orange Systems, India. All rights reserved.
How We Approach Security
                                         Assessments

   Pre Work
      o   Review of appropriate policies and procedures, emergency response protocols,
          and  current training initiatives and crime analysis.
   On Site
      o   Review of site(s) using concepts of CPTED (Crime Prevention Through
          Environmental Design) which includes landscaping, lighting, visibility, etc.
      o   Development of risks and threats to security from within the site and from areas
          nearby.
      o   Review of all physical security aspects to include review of access control
          management, key control, security of high risk areas, health of all systems
          Consultation with appropriate supervisory personnel.
      o   Consultation, where appropriate, with in-house/contract security, local law
          enforcement/first responders.
      o   Meet with executives to discuss findings.




Adyar Orange Systems, India. All rights reserved.
Appendix I – Surveillance
                                               Technology

           Visual Surveillance
             o   Outdoor/Indoor surveillance cameras
             o   PTZ camera
             o   IP/Network camera
             o   Wireless camera
             o   Spy camera
           Control device
             o   DVR/NVR
             o   PC based solution


             All the devices are of latest technology and are
              imported directly from USA


Adyar Orange Systems, India. All rights reserved.
Appendix II – Access
                                               Control Technology

           Fingerprint Scanning
           Retinal Scanning
           Facial Recognition

              Biometrics are automated methods of recognizing a person based on a
            physiological or behavioral characteristic. Among the features measured are;
            face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
            Biometric technologies are becoming the foundation of an extensive array of
            highly secure identification and personal verification solutions. As the level of
            security breaches and transaction fraud increases, the need for highly
            secure identification and personal verification technologies is becoming
            apparent.



Adyar Orange Systems, India. All rights reserved.
Client List



               • M/s Noble Steels, Kancheepuram District, T.N

               •     Meenakshi College Of Engineering , Chennai

               •     CSI Christ Church, Salem, T.N

               •     Marco Leathers, Chennai

               Also we have secured for our services at all the colleges
               of Meenakshi Educational Trust.




Adyar Orange Systems, India. All rights reserved.
Adyar Orange Systems, India. All rights reserved.
Thank you


Adyar Orange Systems, India. All rights reserved.

Más contenido relacionado

La actualidad más candente

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.IRJET Journal
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationIRJET Journal
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security SystemsIndiaMART InterMESH Limited
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber SecurityOWASP EEE
 

La actualidad más candente (16)

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Safeguardindia
Safeguardindia Safeguardindia
Safeguardindia
 
Cctv guide
Cctv guideCctv guide
Cctv guide
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Project cyper
Project cyperProject cyper
Project cyper
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security Systems
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 

Destacado

Article child rights
Article child rightsArticle child rights
Article child rightsNazmul Karim
 
Article on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladeshArticle on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladeshNazmul Karim
 
Workshop key note article
Workshop key note articleWorkshop key note article
Workshop key note articleNazmul Karim
 
Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2txispita
 

Destacado (9)

Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Rucmp crga
Rucmp  crgaRucmp  crga
Rucmp crga
 
Article child rights
Article child rightsArticle child rights
Article child rights
 
Khosra Kabbo
Khosra Kabbo Khosra Kabbo
Khosra Kabbo
 
Article on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladeshArticle on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladesh
 
Workshop key note article
Workshop key note articleWorkshop key note article
Workshop key note article
 
Kanzas.ua
Kanzas.uaKanzas.ua
Kanzas.ua
 
Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2
 

Similar a AOS Security Solutions Overview

Similar a AOS Security Solutions Overview (20)

Ravij profic
Ravij proficRavij profic
Ravij profic
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
 
C2MS
C2MSC2MS
C2MS
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
IoT Development Solutions
IoT Development SolutionsIoT Development Solutions
IoT Development Solutions
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
Uma communication
Uma communicationUma communication
Uma communication
 
MIservices
MIservicesMIservices
MIservices
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Nexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLARNexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLAR
 
Bank security
Bank securityBank security
Bank security
 
Cctv camera in noida
Cctv camera in noidaCctv camera in noida
Cctv camera in noida
 
Dhonaadhi hitec-innovations
Dhonaadhi hitec-innovationsDhonaadhi hitec-innovations
Dhonaadhi hitec-innovations
 
Pln9 product presentation
Pln9 product presentationPln9 product presentation
Pln9 product presentation
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
2m Solutions
2m Solutions2m Solutions
2m Solutions
 

Último

Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...Operational Excellence Consulting
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsKnowledgeSeed
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterJamesConcepcion7
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Associazione Digital Days
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxRakhi Bazaar
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...SOFTTECHHUB
 

Último (20)

Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
The McKinsey 7S Framework: A Holistic Approach to Harmonizing All Parts of th...
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Introducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applicationsIntroducing the Analogic framework for business planning applications
Introducing the Analogic framework for business planning applications
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
WAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdfWAM Corporate Presentation April 12 2024.pdf
WAM Corporate Presentation April 12 2024.pdf
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptxThe Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
The Bizz Quiz-E-Summit-E-Cell-IITPatna.pptx
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Healthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare NewsletterHealthcare Feb. & Mar. Healthcare Newsletter
Healthcare Feb. & Mar. Healthcare Newsletter
 
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
Lucia Ferretti, Lead Business Designer; Matteo Meschini, Business Designer @T...
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptxGo for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
Go for Rakhi Bazaar and Pick the Latest Bhaiya Bhabhi Rakhi.pptx
 
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
How To Simplify Your Scheduling with AI Calendarfly The Hassle-Free Online Bo...
 

AOS Security Solutions Overview

  • 1. Adyar Orange Systems, India. All rights reserved.
  • 2. Who are we?  AOS is a company that synergistically combines the latest in technology and personnel, in innovative ways that maximize security , control and visibility of client assets  We use the latest in surveillance technology, with network able cameras to provide remote IP-video hosting  We use the latest in access control technology to maximize monitoring and control  We capitalizes on the cloud technology’s potential to enable innovative connectivity and remote accessibility of electronic security  We offers a remote human surveillance and intervention team that can monitor and report on client video in real-time -- Virtual Guards, if you will  We offer onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets Adyar Orange Systems, India. All rights reserved.
  • 3. What do we do?  Solutions o Analysis of client security needs o Design and implementation of security, surveillance and monitoring solutions o Selection and installation and surveillance equipment to meet client needs o Remote & local monitoring coupled with cloud based storage of surveillance feeds o Remote human surveillance and intervention team that can monitor and report on client video in real-time o Onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets What does that mean for you? o A whole new world of security options, with visibility literally at your fingertips Adyar Orange Systems, India. All rights reserved.
  • 4. Key Benefits and Value  Client pays for security visibility outcome, and not coverage  Real time visibility of client assets - problems identified as they happen (not after a theft or damage has occurred)  Real time monitoring to interdict security situation by on contract security personnel  High visibility of security solution (cameras) to discourage casual theft  Storage of surveillance video for duration client desires  Accessibility of video surveillance on client desired device, computer, smart phone.  Layers of security, Electronic access devices, Cameras and recording devices, Local and Offsite video storage, onsite and off site security personnel  Identifying weak points for further improvement of security  Flexible solution tailored to client immediate or growing security needs.  Existing client security features could be integrated into new solutions Adyar Orange Systems, India. All rights reserved.
  • 5. Security & Surveillance Architecture Adyar Orange Systems, India. All rights reserved.
  • 6. Components of Premises Security  Perimeter and access control  In and Out control and screening of people and vehicular traffic  Personnel screening and biometric based access control  Surveillance monitoring for overall visibility of work areas for management control  Monitoring of system status (Lights, machines status, personnel, etc. remotely)  Remote access and notifications  Onsite security detail tied into electronic surveillance Adyar Orange Systems, India. All rights reserved.
  • 7. Details of AOS-Security approach  Step 1 o Assessment o Current State presentation  Step 2 o Security Architecture & design proposal  Step 3 o Implementation  Step 4 o Ongoing Security plan execution Adyar Orange Systems, India. All rights reserved.
  • 8. How We Approach Security Assessments  Pre Work o Review of appropriate policies and procedures, emergency response protocols, and  current training initiatives and crime analysis.  On Site o Review of site(s) using concepts of CPTED (Crime Prevention Through Environmental Design) which includes landscaping, lighting, visibility, etc. o Development of risks and threats to security from within the site and from areas nearby. o Review of all physical security aspects to include review of access control management, key control, security of high risk areas, health of all systems Consultation with appropriate supervisory personnel. o Consultation, where appropriate, with in-house/contract security, local law enforcement/first responders. o Meet with executives to discuss findings. Adyar Orange Systems, India. All rights reserved.
  • 9. Appendix I – Surveillance Technology  Visual Surveillance o Outdoor/Indoor surveillance cameras o PTZ camera o IP/Network camera o Wireless camera o Spy camera  Control device o DVR/NVR o PC based solution All the devices are of latest technology and are imported directly from USA Adyar Orange Systems, India. All rights reserved.
  • 10. Appendix II – Access Control Technology  Fingerprint Scanning  Retinal Scanning  Facial Recognition Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Adyar Orange Systems, India. All rights reserved.
  • 11. Client List • M/s Noble Steels, Kancheepuram District, T.N • Meenakshi College Of Engineering , Chennai • CSI Christ Church, Salem, T.N • Marco Leathers, Chennai Also we have secured for our services at all the colleges of Meenakshi Educational Trust. Adyar Orange Systems, India. All rights reserved.
  • 12. Adyar Orange Systems, India. All rights reserved.
  • 13. Thank you Adyar Orange Systems, India. All rights reserved.

Notas del editor

  1. This template can be used as a starter file to give updates for project milestones. Sections Right-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors. Notes Use the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production) Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.