2. Our History
In1971, three engineers from the
Massachusetts Institute of
Technology (MIT) came together
with a single mission.
To create a security company
focused on innovation, technical
excellence and customer service.
3. Our Mission Today
We work hard everyday to
provide the best possible security
technology and services to each
and every one of our customers.
We own and deliver the entire
security solution from the
assessment, planning, design and
deployment, to monitoring,
support, service and training.
4. My Background & Experience
I have 32 years of financial theft and loss
prevention experience through physical
audits and proactive uses of physical
electronic security technologies.
I have been privileged to offer my
Services that have allowed my clients
from individuals to Fortune 100
companies transform and not just
maintain their security and loss
prevention operations.
5. National and Local Rankings
AACI ranked 40th out of the top 100
security firms in the U.S. for 2010. Ranked #1 in Boston by the Book of Lists
6. 24/7 Alarm Monitoring & Service Capabilities
Fire/Halon, Ansul, Sprinkler, Flow and
Tamper, Video Verified Alarms
Hold-up, Ambush and Panic, Intrusion,
Power Loss, High or Low Temperature
Hazardous Chemicals, Gas, CO, CO2,
Flood, etc.
Radio and Cellular Back-up
Communications
4 hour service response for Gold
Service Contract clients
7. Security Systems Integrator (SSI)
Our 41 years of security expertise allows
us to build integrated systems for our
clients by combining hardware and
software products from multiple vendors.
As a systems integrator , we can align
inexpensive, pre-configured components
and off-the-shelf software to meet key
business goals, as opposed to more
expensive, customized implementations
that may require original programming or
manufacture of unique components.
11. The Sociology of Bad Behaviors?
• Financial Pressure - a non-shareable financial
need. Addiction, Bills, etc. (Desire)
• Rationalization- involves a person reconciling
his/her negative behavior (stealing) with the
commonly accepted notions of decency and Fraud (Crime)
trust. (Ability) Triangle
• Perpetrator believes they have an opportunity
within a facility, home or anywhere to act and
they will not get caught!
Opportunity
12. The 10/80/10 Rule
10% of the People you hire or come in contact with will steal
from you if you let them.
10% of the people you come in contact with will never steal
from you.
The issue we deal with every day is the 80% that depending on
their circumstances can be influenced either way good or bad.
13. Opportunity & Temptation
Everyone is tempted and at different
levels.
Temptation is ever present in life, this is
part of life, and not being tempted is
unrealistic.
We are not victims drawn towards
temptation without choice! The
following are precautions, things we can
do to avoid temptation that eliminate
the opportunity.
14. “Perception of Detection”
IT IS ESSENTIAL THAT INDIVIDUALS AND ORGANIZATIONS CREATE AN
ENVIRONMENT THAT DOESN'T NEEDLESSLY PUT PEOPLE IN A POSITION
TO COMMIT NEGATIVE BEHAVIOS.
YOUNEED TO IMPLEMENT PROCESSES, PROCEDURES AND CONTROLS
THAT WILL DETECT NEGATIVE ACTIVITY, THEN
DOCUMENT THAT NEGATIVE ACTIVITY BY CREATING THE BEST EVIDENCE
POSSIBLE.
THIS WILL ELIMINATE THE OPPORTUNITY!
15. Do You Need To..
#1
Increase operational Reduce the time Provide the best Reduce potential Meet regulatory
efficiencies lost investigating possible safety false liabilities demands
incidents and protection claims
16. Some Proactive Security Technologies
• Visitor Management & Access Control
Systems and Wireless Locks
• HD Megapixel Surveillance Cameras,
Software & Video Analytics
• Intrusion, Environmental Detection and
Monitoring
• Emergency Critical Communications
(CCoIP) and Wireless Networks
17. Our Solutions Process
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Assessments Planning Design Deployment Support
• Security and • Scope of Work • Detailed • Design • Small and
System Analysis Proposal Planning Large Job
Review and • Review • Material List Conference delivery
Survey Feature • Baseline and Follow-up • Technical
• System Requirements Hours • On Site Expertise,
Capabilities • Valued Advice • Best Installation 24/7/365
and Functions • Written Spec Technological Project Service &
Review Solutions Management Training
18. Our Solutions Process
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Assessments Planning Design Deployment Support
• Security and • Scope of Work • Detailed • Design • Small and
System Analysis Proposal Planning Large Job
Review and • Review • Material List Conference delivery
Survey Feature • Baseline and Follow-up • Technical
• System Requirements Hours • On Site Expertise,
Capabilities • Valued Advice • Best Installation 24/7/365
and Functions • Written Spec Technological Project Service &
Review Solutions Management Training
19. Assessments
Our holistic security assessment approach
looks in, around and through any element that
could threaten your ability to safeguard what
matters most to you organization.
We also support loss prevention, asset
protection and fraud prevention assessments
that utilize physical security technologies to
influence behaviors and confirm your
organizations policies and procedures.
20. Our Solutions Process
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Assessments Planning Design Deployment Support
• Security and • Scope of Work • Detailed • Design • Small and
System Analysis Proposal Planning Large Job
Review and • Review • Material List Conference delivery
Survey Feature • Baseline and Follow-up • Technical
• System Requirements Hours • On Site Expertise,
Capabilities • Valued Advice • Best Installation 24/7/365
and Functions • Written Spec Technological Project Service &
Review Solutions Management Training
21. Planning
We place our 40+ years of professional
safety and security experience at your
fingertips, expertly managing security
projects that address vulnerabilities,
risks and threats to your organization.
Our team guides your security project
from pre-proposal meetings, expert
consultation, quote assembly and
project delivery.
22. Our Solutions Process
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Assessments Planning Design Deployment Support
• Security and • Scope of Work • Detailed • Design • Small and
System Analysis Proposal Planning Large Job
Review and • Review • Material List Conference delivery
Survey Feature • Baseline and Follow-up • Technical
• System Requirements Hours • On Site Expertise,
Capabilities • Valued Advice • Best Installation 24/7/365
and Functions • Written Spec Technological Project Service &
Review Solutions Management Training
23. Design Services
Our Design Services identify potential
security threats and reduce prospect of
incidents by designing security
infrastructures that complement building
design and safeguard your people, property
and assets.
Delivering a clear proposal with a clear
materials list, baseline hours and the best
technical solutions.
24. Our Solutions Process
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Assessments Planning Design Deployment Support
• Security and • Scope of Work • Detailed • Design • Small and
System Analysis Proposal Planning Large Job
Review and • Review • Material List Conference delivery
Survey Feature • Baseline and Follow-up • Technical
• System Requirements Hours • On Site Expertise,
Capabilities • Valued Advice • Best Installation 24/7/365
and Functions • Written Spec Technological Project Service &
Review Solutions Management Training
25. Installation & Deployment
Our Installation Managers
conduct site visits during
project installation, testing
and commissioning of all
systems to ensure proper
installation and operation.
26. Our Solutions Process
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Assessments Planning Design Deployment Support
• Security and • Scope of Work • Detailed • Design • Small and
System Analysis Proposal Planning Large Job
Review and • Review • Material List Conference delivery
Survey Feature • Baseline and Follow-up • Technical
• System Requirements Hours • On Site Expertise,
Capabilities • Valued Advice • Best Installation 24/7/365
and Functions • Written Spec Technological Project Service &
Review Solutions Management Training
27. Service Support
Our security management
proficiency, in-depth market
knowledge and technical expertise
extend invaluable expert support.
Our proactive service team and
wide range of service plans allow
facility managers the service
coverage they need.
28. Comprehensive Training
Our comprehensive programming and
training services for public, private
organizations and residential customers
builds on our commitment of customer
service.
Our Gold Service Plan is tailored to each
commercial customer, but often includes:
On-site technical response within 4 hours,
automatic software upgrades, power supply
replacements and regular training.
30. Overview
FAC64 is the primary statewide contract used by the Executive
and Judicial Agencies of the Commonwealth and is available for
use by other eligible entities such as: municipalities, hospitals,
public schools and universities.
Security systems and related services includes, but not limited
to, video, access control, integrated video management, visitor
management, locks, alarm systems, monitoring services,
equipment service contracts and other maintenance.
31. AACI FAC64 Program
Since granted the award in August of 2010:
We have completed over 2 million in new Installations
We have provided Installation and Service of Security,
Surveillance, and Access Control Systems to more than 50
different Executive Agencies and other eligible entities across
the Commonwealth
32. Departments of Revenue, Transportation, Health & Human Services,
Massachusetts Trial Courts, State Police, MEMA, DCAM and Many Other
Agencies' & Municipalities
33. MASSACHUSETTS PHYSICAL AND ENVIRONMENTAL
SECURITY POLICY ITD-SEC-10.1 OBJECTIVES
Workforce Security
Least Privileged Rights
Visitor Control
Equipment and Environmental
Security
Compliance
34. ITD-SEC-10.1 Recommended Technologies
Visitor Management Systems
Access Control Systems
Video Surveillance Systems
Intrusion Alarm Systems
IP Intercom & Broadcast
Systems
35. Our Commitment
"We continue to serve the unique needs of public clients and our
track record of strong service was one of the reasons the
Commonwealth expressed continuing confidence in our
company and approved our program for another three years."
Wells Sampson, President
American Alarm & Communications, Inc.
36. In Summary
Extensive Experience
End to End Implementation
Turnkey Product Solutions
Commitment to Service & Support
Large Pool of Licensed & Certified
Support Staff
Always Offering the Best Value
37. James E. McDonald
Direct Phone: 508-453-2731
E-mail: jmcdonald@americanalarm.com
Additional Information at www.americanalarm.com
Twitter: PHYSECTECH