SlideShare una empresa de Scribd logo
1 de 13
Adyar Orange Systems, India. All rights reserved.
Who are we?


           AOS is a company that synergistically combines the latest in technology and
            personnel, in innovative ways that maximize security , control and visibility of
            client assets
           We use the latest in surveillance technology, with network able cameras to
            provide remote IP-video hosting
           We use the latest in access control technology to maximize monitoring and
            control
           We capitalizes on the cloud technology’s potential to enable innovative
            connectivity and remote accessibility of electronic security
           We offers a remote human surveillance and intervention team that can monitor
            and report on client video in real-time -- Virtual Guards, if you will
           We offer onsite trained security personnel that work in conjunction with electronic
            technology to provided a high level of coverage of client assets




Adyar Orange Systems, India. All rights reserved.
What do we do?


   Solutions
    o   Analysis of client security needs
    o   Design and implementation of security, surveillance and monitoring solutions
    o   Selection and installation and surveillance equipment to meet client needs
    o   Remote & local monitoring coupled with cloud based storage of
        surveillance feeds
    o   Remote human surveillance and intervention team that can monitor and report on
        client video in real-time
    o   Onsite trained security personnel that work in conjunction with electronic
        technology to provided a high level of coverage of client assets
          What does that mean for you?
    o   A whole new world of security options, with visibility literally at your fingertips




Adyar Orange Systems, India. All rights reserved.
Key Benefits and Value


   Client pays for security visibility outcome, and not coverage
   Real time visibility of client assets - problems identified as they happen (not after a theft or
    damage has occurred)
   Real time monitoring to interdict security situation by on contract security personnel
   High visibility of security solution (cameras) to discourage casual theft
   Storage of surveillance video for duration client desires
   Accessibility of video surveillance on client desired device, computer, smart
    phone.
   Layers of security, Electronic access devices, Cameras and recording devices, Local and
    Offsite video storage, onsite and off site security personnel
   Identifying weak points for further improvement of security
   Flexible solution tailored to client immediate or growing security needs.
   Existing client security features could be integrated into new solutions




Adyar Orange Systems, India. All rights reserved.
Security & Surveillance Architecture




Adyar Orange Systems, India. All rights reserved.
Components of Premises
              Security
      Perimeter and access control
      In and Out control and screening of people and vehicular traffic
      Personnel screening and biometric based access control
      Surveillance monitoring for overall visibility of work areas for
          management control
      Monitoring of system status (Lights, machines status, personnel, etc.
          remotely)
      Remote access and notifications
      Onsite security detail tied into electronic surveillance


Adyar Orange Systems, India. All rights reserved.
Details of AOS-Security
                                        approach

 Step            1
    o   Assessment
    o   Current State presentation

 Step            2
    o   Security Architecture & design proposal

 Step            3
    o   Implementation

 Step            4
    o   Ongoing Security plan execution




Adyar Orange Systems, India. All rights reserved.
How We Approach Security
                                         Assessments

   Pre Work
      o   Review of appropriate policies and procedures, emergency response protocols,
          and  current training initiatives and crime analysis.
   On Site
      o   Review of site(s) using concepts of CPTED (Crime Prevention Through
          Environmental Design) which includes landscaping, lighting, visibility, etc.
      o   Development of risks and threats to security from within the site and from areas
          nearby.
      o   Review of all physical security aspects to include review of access control
          management, key control, security of high risk areas, health of all systems
          Consultation with appropriate supervisory personnel.
      o   Consultation, where appropriate, with in-house/contract security, local law
          enforcement/first responders.
      o   Meet with executives to discuss findings.




Adyar Orange Systems, India. All rights reserved.
Appendix I – Surveillance
                                               Technology

           Visual Surveillance
             o   Outdoor/Indoor surveillance cameras
             o   PTZ camera
             o   IP/Network camera
             o   Wireless camera
             o   Spy camera
           Control device
             o   DVR/NVR
             o   PC based solution


             All the devices are of latest technology and are
              imported directly from USA


Adyar Orange Systems, India. All rights reserved.
Appendix II – Access
                                               Control Technology

           Fingerprint Scanning
           Retinal Scanning
           Facial Recognition

              Biometrics are automated methods of recognizing a person based on a
            physiological or behavioral characteristic. Among the features measured are;
            face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
            Biometric technologies are becoming the foundation of an extensive array of
            highly secure identification and personal verification solutions. As the level of
            security breaches and transaction fraud increases, the need for highly
            secure identification and personal verification technologies is becoming
            apparent.



Adyar Orange Systems, India. All rights reserved.
Client List



               • M/s Noble Steels, Kancheepuram District, T.N

               •     Meenakshi College Of Engineering , Chennai

               •     CSI Christ Church, Salem, T.N

               •     Marco Leathers, Chennai

               Also we have secured for our services at all the colleges
               of Meenakshi Educational Trust.




Adyar Orange Systems, India. All rights reserved.
Adyar Orange Systems, India. All rights reserved.
Thank you


Adyar Orange Systems, India. All rights reserved.

Más contenido relacionado

La actualidad más candente

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.IRJET Journal
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationIRJET Journal
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security SystemsIndiaMART InterMESH Limited
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber SecurityOWASP EEE
 

La actualidad más candente (16)

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Safeguardindia
Safeguardindia Safeguardindia
Safeguardindia
 
Cctv guide
Cctv guideCctv guide
Cctv guide
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Project cyper
Project cyperProject cyper
Project cyper
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security Systems
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 

Destacado

Article child rights
Article child rightsArticle child rights
Article child rightsNazmul Karim
 
Article on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladeshArticle on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladeshNazmul Karim
 
Workshop key note article
Workshop key note articleWorkshop key note article
Workshop key note articleNazmul Karim
 
Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2txispita
 

Destacado (9)

Rucmp crga
Rucmp  crgaRucmp  crga
Rucmp crga
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Kanzas.ua
Kanzas.uaKanzas.ua
Kanzas.ua
 
Article child rights
Article child rightsArticle child rights
Article child rights
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Article on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladeshArticle on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladesh
 
Workshop key note article
Workshop key note articleWorkshop key note article
Workshop key note article
 
Khosra Kabbo
Khosra Kabbo Khosra Kabbo
Khosra Kabbo
 
Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2
 

Similar a Adyar orange systems

Similar a Adyar orange systems (20)

Ravij profic
Ravij proficRavij profic
Ravij profic
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
 
C2MS
C2MSC2MS
C2MS
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
IoT Development Solutions
IoT Development SolutionsIoT Development Solutions
IoT Development Solutions
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
Uma communication
Uma communicationUma communication
Uma communication
 
MIservices
MIservicesMIservices
MIservices
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Nexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLARNexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLAR
 
Bank security
Bank securityBank security
Bank security
 
Cctv camera in noida
Cctv camera in noidaCctv camera in noida
Cctv camera in noida
 
Dhonaadhi hitec-innovations
Dhonaadhi hitec-innovationsDhonaadhi hitec-innovations
Dhonaadhi hitec-innovations
 
Pln9 product presentation
Pln9 product presentationPln9 product presentation
Pln9 product presentation
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
2m Solutions
2m Solutions2m Solutions
2m Solutions
 

Último

NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 

Último (20)

NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 

Adyar orange systems

  • 1. Adyar Orange Systems, India. All rights reserved.
  • 2. Who are we?  AOS is a company that synergistically combines the latest in technology and personnel, in innovative ways that maximize security , control and visibility of client assets  We use the latest in surveillance technology, with network able cameras to provide remote IP-video hosting  We use the latest in access control technology to maximize monitoring and control  We capitalizes on the cloud technology’s potential to enable innovative connectivity and remote accessibility of electronic security  We offers a remote human surveillance and intervention team that can monitor and report on client video in real-time -- Virtual Guards, if you will  We offer onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets Adyar Orange Systems, India. All rights reserved.
  • 3. What do we do?  Solutions o Analysis of client security needs o Design and implementation of security, surveillance and monitoring solutions o Selection and installation and surveillance equipment to meet client needs o Remote & local monitoring coupled with cloud based storage of surveillance feeds o Remote human surveillance and intervention team that can monitor and report on client video in real-time o Onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets What does that mean for you? o A whole new world of security options, with visibility literally at your fingertips Adyar Orange Systems, India. All rights reserved.
  • 4. Key Benefits and Value  Client pays for security visibility outcome, and not coverage  Real time visibility of client assets - problems identified as they happen (not after a theft or damage has occurred)  Real time monitoring to interdict security situation by on contract security personnel  High visibility of security solution (cameras) to discourage casual theft  Storage of surveillance video for duration client desires  Accessibility of video surveillance on client desired device, computer, smart phone.  Layers of security, Electronic access devices, Cameras and recording devices, Local and Offsite video storage, onsite and off site security personnel  Identifying weak points for further improvement of security  Flexible solution tailored to client immediate or growing security needs.  Existing client security features could be integrated into new solutions Adyar Orange Systems, India. All rights reserved.
  • 5. Security & Surveillance Architecture Adyar Orange Systems, India. All rights reserved.
  • 6. Components of Premises Security  Perimeter and access control  In and Out control and screening of people and vehicular traffic  Personnel screening and biometric based access control  Surveillance monitoring for overall visibility of work areas for management control  Monitoring of system status (Lights, machines status, personnel, etc. remotely)  Remote access and notifications  Onsite security detail tied into electronic surveillance Adyar Orange Systems, India. All rights reserved.
  • 7. Details of AOS-Security approach  Step 1 o Assessment o Current State presentation  Step 2 o Security Architecture & design proposal  Step 3 o Implementation  Step 4 o Ongoing Security plan execution Adyar Orange Systems, India. All rights reserved.
  • 8. How We Approach Security Assessments  Pre Work o Review of appropriate policies and procedures, emergency response protocols, and  current training initiatives and crime analysis.  On Site o Review of site(s) using concepts of CPTED (Crime Prevention Through Environmental Design) which includes landscaping, lighting, visibility, etc. o Development of risks and threats to security from within the site and from areas nearby. o Review of all physical security aspects to include review of access control management, key control, security of high risk areas, health of all systems Consultation with appropriate supervisory personnel. o Consultation, where appropriate, with in-house/contract security, local law enforcement/first responders. o Meet with executives to discuss findings. Adyar Orange Systems, India. All rights reserved.
  • 9. Appendix I – Surveillance Technology  Visual Surveillance o Outdoor/Indoor surveillance cameras o PTZ camera o IP/Network camera o Wireless camera o Spy camera  Control device o DVR/NVR o PC based solution All the devices are of latest technology and are imported directly from USA Adyar Orange Systems, India. All rights reserved.
  • 10. Appendix II – Access Control Technology  Fingerprint Scanning  Retinal Scanning  Facial Recognition Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Adyar Orange Systems, India. All rights reserved.
  • 11. Client List • M/s Noble Steels, Kancheepuram District, T.N • Meenakshi College Of Engineering , Chennai • CSI Christ Church, Salem, T.N • Marco Leathers, Chennai Also we have secured for our services at all the colleges of Meenakshi Educational Trust. Adyar Orange Systems, India. All rights reserved.
  • 12. Adyar Orange Systems, India. All rights reserved.
  • 13. Thank you Adyar Orange Systems, India. All rights reserved.

Notas del editor

  1. This template can be used as a starter file to give updates for project milestones. Sections Right-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors. Notes Use the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production) Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.