SlideShare a Scribd company logo
1 of 37
Download to read offline
American Alarm &
Communications, Inc.
Your Security Technology
Convergence Partner
Our History
 In1971, three engineers from the
  Massachusetts Institute of
  Technology (MIT) came together
  with a single mission.
 To create a security company
  focused on innovation, technical
  excellence and customer service.
Our Mission Today
 We work hard everyday to
  provide the best possible security
  technology and services to each
  and every one of our customers.
 We own and deliver the entire
  security solution from the
  assessment, planning, design and
  deployment, to monitoring,
  support, service and training.
My Background & Experience
 I have 32 years of financial theft and loss
  prevention experience through physical
  audits and proactive uses of physical
  electronic security technologies.
 I have been privileged to offer my
  Services that have allowed my clients
  from individuals to Fortune 100
  companies transform and not just
  maintain their security and loss
  prevention operations.
National and Local Rankings
AACI ranked 40th out of the top 100
security firms in the U.S. for 2010.   Ranked #1 in Boston by the Book of Lists
24/7 Alarm Monitoring & Service Capabilities
 Fire/Halon, Ansul, Sprinkler, Flow and
  Tamper, Video Verified Alarms
 Hold-up, Ambush and Panic, Intrusion,
  Power Loss, High or Low Temperature
 Hazardous Chemicals, Gas, CO, CO2,
  Flood, etc.
 Radio and Cellular Back-up
  Communications
 4 hour service response for Gold
  Service Contract clients
Security Systems Integrator (SSI)
   Our 41 years of security expertise allows
    us to build integrated systems for our
    clients by combining hardware and
    software products from multiple vendors.
   As a systems integrator , we can align
    inexpensive, pre-configured components
    and off-the-shelf software to meet key
    business goals, as opposed to more
    expensive, customized implementations
    that may require original programming or
    manufacture of unique components.
A Total Security Solution
Why Do We Need Security Solutions?

 Protecting People & Assets, from
 People and Assets.
Security Matrix
The Sociology of Bad Behaviors?
•   Financial Pressure - a non-shareable financial
    need. Addiction, Bills, etc. (Desire)

•   Rationalization- involves a person reconciling
    his/her negative behavior (stealing) with the
    commonly accepted notions of decency and         Fraud (Crime)
    trust. (Ability)                                    Triangle

•   Perpetrator believes they have an opportunity
    within a facility, home or anywhere to act and
    they will not get caught!
                                                     Opportunity
The 10/80/10 Rule

 10% of the People you hire or come in contact with will steal
  from you if you let them.
 10% of the people you come in contact with will never steal
  from you.
 The issue we deal with every day is the 80% that depending on
  their circumstances can be influenced either way good or bad.
Opportunity & Temptation
   Everyone is tempted and at different
    levels.
   Temptation is ever present in life, this is
    part of life, and not being tempted is
    unrealistic.
   We are not victims drawn towards
    temptation without choice! The
    following are precautions, things we can
    do to avoid temptation that eliminate
    the opportunity.
“Perception of Detection”
 IT IS ESSENTIAL THAT INDIVIDUALS AND ORGANIZATIONS CREATE AN
  ENVIRONMENT THAT DOESN'T NEEDLESSLY PUT PEOPLE IN A POSITION
  TO COMMIT NEGATIVE BEHAVIOS.
 YOUNEED TO IMPLEMENT PROCESSES, PROCEDURES AND CONTROLS
  THAT WILL DETECT NEGATIVE ACTIVITY, THEN
 DOCUMENT THAT NEGATIVE ACTIVITY BY CREATING THE BEST EVIDENCE
  POSSIBLE.
 THIS WILL ELIMINATE THE OPPORTUNITY!
Do You Need To..



                                          #1
Increase operational Reduce the time      Provide the best   Reduce potential    Meet regulatory
efficiencies         lost investigating   possible safety    false liabilities   demands
                     incidents            and protection     claims
Some Proactive Security Technologies
•   Visitor Management & Access Control
    Systems and Wireless Locks

•   HD Megapixel Surveillance Cameras,
    Software & Video Analytics

•   Intrusion, Environmental Detection and
    Monitoring

•   Emergency Critical Communications
    (CCoIP) and Wireless Networks
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Assessments
   Our holistic security assessment approach
    looks in, around and through any element that
    could threaten your ability to safeguard what
    matters most to you organization.

   We also support loss prevention, asset
    protection and fraud prevention assessments
    that utilize physical security technologies to
    influence behaviors and confirm your
    organizations policies and procedures.
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments              Planning                 Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Planning
   We place our 40+ years of professional
    safety and security experience at your
    fingertips, expertly managing security
    projects that address vulnerabilities,
    risks and threats to your organization.

   Our team guides your security project
    from pre-proposal meetings, expert
    consultation, quote assembly and
    project delivery.
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Design Services
   Our Design Services identify potential
    security threats and reduce prospect of
    incidents by designing security
    infrastructures that complement building
    design and safeguard your people, property
    and assets.

   Delivering a clear proposal with a clear
    materials list, baseline hours and the best
    technical solutions.
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Installation & Deployment
   Our Installation Managers
    conduct site visits during
    project installation, testing
    and commissioning of all
    systems to ensure proper
    installation and operation.
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment               Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Service Support
   Our security management
    proficiency, in-depth market
    knowledge and technical expertise
    extend invaluable expert support.

   Our proactive service team and
    wide range of service plans allow
    facility managers the service
    coverage they need.
Comprehensive Training
   Our comprehensive programming and
    training services for public, private
    organizations and residential customers
    builds on our commitment of customer
    service.

   Our Gold Service Plan is tailored to each
    commercial customer, but often includes:
    On-site technical response within 4 hours,
    automatic software upgrades, power supply
    replacements and regular training.
FAC64
Overview
 FAC64 is the primary statewide contract used by the Executive
 and Judicial Agencies of the Commonwealth and is available for
 use by other eligible entities such as: municipalities, hospitals,
 public schools and universities.

 Security systems and related services includes, but not limited
 to, video, access control, integrated video management, visitor
 management, locks, alarm systems, monitoring services,
 equipment service contracts and other maintenance.
AACI FAC64 Program

Since granted the award in August of 2010:
 We have completed over 2 million in new Installations
 We have provided Installation and Service of Security,
  Surveillance, and Access Control Systems to more than 50
  different Executive Agencies and other eligible entities across
  the Commonwealth
Departments of Revenue, Transportation, Health & Human Services,
Massachusetts Trial Courts, State Police, MEMA, DCAM and Many Other
                      Agencies' & Municipalities
MASSACHUSETTS PHYSICAL AND ENVIRONMENTAL
  SECURITY POLICY ITD-SEC-10.1 OBJECTIVES
 Workforce Security

 Least Privileged Rights

 Visitor Control

 Equipment and Environmental
 Security
 Compliance
ITD-SEC-10.1 Recommended Technologies
 Visitor Management Systems

 Access Control Systems

 Video Surveillance Systems

 Intrusion Alarm Systems

 IP Intercom & Broadcast
 Systems
Our Commitment
"We continue to serve the unique needs of public clients and our
    track record of strong service was one of the reasons the
     Commonwealth expressed continuing confidence in our
  company and approved our program for another three years."

                      Wells Sampson, President
                American Alarm & Communications, Inc.
In Summary
   Extensive Experience
   End to End Implementation
   Turnkey Product Solutions
   Commitment to Service & Support
   Large Pool of Licensed & Certified
    Support Staff
   Always Offering the Best Value
James E. McDonald
            Direct Phone: 508-453-2731
      E-mail: jmcdonald@americanalarm.com
Additional Information at www.americanalarm.com
                Twitter: PHYSECTECH

More Related Content

Similar to AACI_Fac64 Sales Presentation V1

The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsCprime
 
Experis Overview
Experis OverviewExperis Overview
Experis Overviewecoonrad
 
Experis Overview
Experis OverviewExperis Overview
Experis Overviewecoonrad
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Servicessahrens1
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnSamuel Reed
 
Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]rickkhosla
 
GrayCell Corporate Presentation
GrayCell Corporate PresentationGrayCell Corporate Presentation
GrayCell Corporate PresentationAmit-GrayCell
 
Valiance solutions company profile
Valiance solutions   company profileValiance solutions   company profile
Valiance solutions company profileVikas Kamra
 
Project design and management
Project design and managementProject design and management
Project design and managementAndrew Zolnai
 
Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?Harry McLaren
 
Smart Company Profile
Smart Company ProfileSmart Company Profile
Smart Company Profilesumitchugh08
 
Systems Engineering Manager
Systems Engineering ManagerSystems Engineering Manager
Systems Engineering Managermbarulic
 
Idexcel Corporate Overview
Idexcel Corporate OverviewIdexcel Corporate Overview
Idexcel Corporate OverviewIdexcel
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overviewtbeckwith
 
Agileise Corporate Slides
Agileise Corporate SlidesAgileise Corporate Slides
Agileise Corporate Slideslordnnud
 
Infosys Automotive Engineering Services
Infosys Automotive Engineering ServicesInfosys Automotive Engineering Services
Infosys Automotive Engineering ServicesInfosys
 

Similar to AACI_Fac64 Sales Presentation V1 (20)

The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1Aaci & fac64 sales presentation v1
Aaci & fac64 sales presentation v1
 
Experis Overview
Experis OverviewExperis Overview
Experis Overview
 
Experis Overview
Experis OverviewExperis Overview
Experis Overview
 
Security Consulting Services
Security Consulting ServicesSecurity Consulting Services
Security Consulting Services
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]Rega solutions ppt [compatibility mode]
Rega solutions ppt [compatibility mode]
 
GrayCell Corporate Presentation
GrayCell Corporate PresentationGrayCell Corporate Presentation
GrayCell Corporate Presentation
 
Valiance solutions company profile
Valiance solutions   company profileValiance solutions   company profile
Valiance solutions company profile
 
Project design and management
Project design and managementProject design and management
Project design and management
 
Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?
 
Smart Company Profile
Smart Company ProfileSmart Company Profile
Smart Company Profile
 
Systems Engineering Manager
Systems Engineering ManagerSystems Engineering Manager
Systems Engineering Manager
 
Idexcel Corporate Overview
Idexcel Corporate OverviewIdexcel Corporate Overview
Idexcel Corporate Overview
 
Fishnet Security Overview
Fishnet Security   OverviewFishnet Security   Overview
Fishnet Security Overview
 
Agileise Corporate Slides
Agileise Corporate SlidesAgileise Corporate Slides
Agileise Corporate Slides
 
Company presentation one minute - 2013
Company presentation   one minute - 2013Company presentation   one minute - 2013
Company presentation one minute - 2013
 
USTS Corporate Profile 2011
USTS Corporate Profile 2011USTS Corporate Profile 2011
USTS Corporate Profile 2011
 
Infra-ops Agility
Infra-ops AgilityInfra-ops Agility
Infra-ops Agility
 
Infosys Automotive Engineering Services
Infosys Automotive Engineering ServicesInfosys Automotive Engineering Services
Infosys Automotive Engineering Services
 

More from James McDonald

Whitepaper Best Practices For Integrated Physical Security Supporting Ma It...
Whitepaper Best Practices For Integrated Physical Security   Supporting Ma It...Whitepaper Best Practices For Integrated Physical Security   Supporting Ma It...
Whitepaper Best Practices For Integrated Physical Security Supporting Ma It...James McDonald
 
White Paper Aaci Data Center Physical Security Mc Donald
White Paper Aaci  Data Center Physical Security  Mc DonaldWhite Paper Aaci  Data Center Physical Security  Mc Donald
White Paper Aaci Data Center Physical Security Mc DonaldJames McDonald
 
Jmcdonald American Alarm Ma Fac64
Jmcdonald American Alarm Ma Fac64Jmcdonald American Alarm Ma Fac64
Jmcdonald American Alarm Ma Fac64James McDonald
 
Justifying Physical Security
Justifying Physical SecurityJustifying Physical Security
Justifying Physical SecurityJames McDonald
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaJames McDonald
 
Physical Security Technology Marleting Trends 2009
Physical Security Technology Marleting Trends 2009Physical Security Technology Marleting Trends 2009
Physical Security Technology Marleting Trends 2009James McDonald
 
E Book Revolutionizing Qsr Multi Unit Operations And Loss Prevention
E Book Revolutionizing Qsr Multi Unit Operations And Loss PreventionE Book Revolutionizing Qsr Multi Unit Operations And Loss Prevention
E Book Revolutionizing Qsr Multi Unit Operations And Loss PreventionJames McDonald
 

More from James McDonald (7)

Whitepaper Best Practices For Integrated Physical Security Supporting Ma It...
Whitepaper Best Practices For Integrated Physical Security   Supporting Ma It...Whitepaper Best Practices For Integrated Physical Security   Supporting Ma It...
Whitepaper Best Practices For Integrated Physical Security Supporting Ma It...
 
White Paper Aaci Data Center Physical Security Mc Donald
White Paper Aaci  Data Center Physical Security  Mc DonaldWhite Paper Aaci  Data Center Physical Security  Mc Donald
White Paper Aaci Data Center Physical Security Mc Donald
 
Jmcdonald American Alarm Ma Fac64
Jmcdonald American Alarm Ma Fac64Jmcdonald American Alarm Ma Fac64
Jmcdonald American Alarm Ma Fac64
 
Justifying Physical Security
Justifying Physical SecurityJustifying Physical Security
Justifying Physical Security
 
Massbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed ProbaMassbiz Consulting Crede Sed Proba
Massbiz Consulting Crede Sed Proba
 
Physical Security Technology Marleting Trends 2009
Physical Security Technology Marleting Trends 2009Physical Security Technology Marleting Trends 2009
Physical Security Technology Marleting Trends 2009
 
E Book Revolutionizing Qsr Multi Unit Operations And Loss Prevention
E Book Revolutionizing Qsr Multi Unit Operations And Loss PreventionE Book Revolutionizing Qsr Multi Unit Operations And Loss Prevention
E Book Revolutionizing Qsr Multi Unit Operations And Loss Prevention
 

AACI_Fac64 Sales Presentation V1

  • 1. American Alarm & Communications, Inc. Your Security Technology Convergence Partner
  • 2. Our History  In1971, three engineers from the Massachusetts Institute of Technology (MIT) came together with a single mission.  To create a security company focused on innovation, technical excellence and customer service.
  • 3. Our Mission Today  We work hard everyday to provide the best possible security technology and services to each and every one of our customers.  We own and deliver the entire security solution from the assessment, planning, design and deployment, to monitoring, support, service and training.
  • 4. My Background & Experience  I have 32 years of financial theft and loss prevention experience through physical audits and proactive uses of physical electronic security technologies.  I have been privileged to offer my Services that have allowed my clients from individuals to Fortune 100 companies transform and not just maintain their security and loss prevention operations.
  • 5. National and Local Rankings AACI ranked 40th out of the top 100 security firms in the U.S. for 2010. Ranked #1 in Boston by the Book of Lists
  • 6. 24/7 Alarm Monitoring & Service Capabilities  Fire/Halon, Ansul, Sprinkler, Flow and Tamper, Video Verified Alarms  Hold-up, Ambush and Panic, Intrusion, Power Loss, High or Low Temperature  Hazardous Chemicals, Gas, CO, CO2, Flood, etc.  Radio and Cellular Back-up Communications  4 hour service response for Gold Service Contract clients
  • 7. Security Systems Integrator (SSI)  Our 41 years of security expertise allows us to build integrated systems for our clients by combining hardware and software products from multiple vendors.  As a systems integrator , we can align inexpensive, pre-configured components and off-the-shelf software to meet key business goals, as opposed to more expensive, customized implementations that may require original programming or manufacture of unique components.
  • 8. A Total Security Solution
  • 9. Why Do We Need Security Solutions?  Protecting People & Assets, from  People and Assets.
  • 11. The Sociology of Bad Behaviors? • Financial Pressure - a non-shareable financial need. Addiction, Bills, etc. (Desire) • Rationalization- involves a person reconciling his/her negative behavior (stealing) with the commonly accepted notions of decency and Fraud (Crime) trust. (Ability) Triangle • Perpetrator believes they have an opportunity within a facility, home or anywhere to act and they will not get caught! Opportunity
  • 12. The 10/80/10 Rule  10% of the People you hire or come in contact with will steal from you if you let them.  10% of the people you come in contact with will never steal from you.  The issue we deal with every day is the 80% that depending on their circumstances can be influenced either way good or bad.
  • 13. Opportunity & Temptation  Everyone is tempted and at different levels.  Temptation is ever present in life, this is part of life, and not being tempted is unrealistic.  We are not victims drawn towards temptation without choice! The following are precautions, things we can do to avoid temptation that eliminate the opportunity.
  • 14. “Perception of Detection”  IT IS ESSENTIAL THAT INDIVIDUALS AND ORGANIZATIONS CREATE AN ENVIRONMENT THAT DOESN'T NEEDLESSLY PUT PEOPLE IN A POSITION TO COMMIT NEGATIVE BEHAVIOS.  YOUNEED TO IMPLEMENT PROCESSES, PROCEDURES AND CONTROLS THAT WILL DETECT NEGATIVE ACTIVITY, THEN  DOCUMENT THAT NEGATIVE ACTIVITY BY CREATING THE BEST EVIDENCE POSSIBLE.  THIS WILL ELIMINATE THE OPPORTUNITY!
  • 15. Do You Need To.. #1 Increase operational Reduce the time Provide the best Reduce potential Meet regulatory efficiencies lost investigating possible safety false liabilities demands incidents and protection claims
  • 16. Some Proactive Security Technologies • Visitor Management & Access Control Systems and Wireless Locks • HD Megapixel Surveillance Cameras, Software & Video Analytics • Intrusion, Environmental Detection and Monitoring • Emergency Critical Communications (CCoIP) and Wireless Networks
  • 17. Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 18. Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 19. Assessments  Our holistic security assessment approach looks in, around and through any element that could threaten your ability to safeguard what matters most to you organization.  We also support loss prevention, asset protection and fraud prevention assessments that utilize physical security technologies to influence behaviors and confirm your organizations policies and procedures.
  • 20. Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 21. Planning  We place our 40+ years of professional safety and security experience at your fingertips, expertly managing security projects that address vulnerabilities, risks and threats to your organization.  Our team guides your security project from pre-proposal meetings, expert consultation, quote assembly and project delivery.
  • 22. Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 23. Design Services  Our Design Services identify potential security threats and reduce prospect of incidents by designing security infrastructures that complement building design and safeguard your people, property and assets.  Delivering a clear proposal with a clear materials list, baseline hours and the best technical solutions.
  • 24. Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 25. Installation & Deployment  Our Installation Managers conduct site visits during project installation, testing and commissioning of all systems to ensure proper installation and operation.
  • 26. Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 27. Service Support  Our security management proficiency, in-depth market knowledge and technical expertise extend invaluable expert support.  Our proactive service team and wide range of service plans allow facility managers the service coverage they need.
  • 28. Comprehensive Training  Our comprehensive programming and training services for public, private organizations and residential customers builds on our commitment of customer service.  Our Gold Service Plan is tailored to each commercial customer, but often includes: On-site technical response within 4 hours, automatic software upgrades, power supply replacements and regular training.
  • 29. FAC64
  • 30. Overview  FAC64 is the primary statewide contract used by the Executive and Judicial Agencies of the Commonwealth and is available for use by other eligible entities such as: municipalities, hospitals, public schools and universities.  Security systems and related services includes, but not limited to, video, access control, integrated video management, visitor management, locks, alarm systems, monitoring services, equipment service contracts and other maintenance.
  • 31. AACI FAC64 Program Since granted the award in August of 2010:  We have completed over 2 million in new Installations  We have provided Installation and Service of Security, Surveillance, and Access Control Systems to more than 50 different Executive Agencies and other eligible entities across the Commonwealth
  • 32. Departments of Revenue, Transportation, Health & Human Services, Massachusetts Trial Courts, State Police, MEMA, DCAM and Many Other Agencies' & Municipalities
  • 33. MASSACHUSETTS PHYSICAL AND ENVIRONMENTAL SECURITY POLICY ITD-SEC-10.1 OBJECTIVES  Workforce Security  Least Privileged Rights  Visitor Control  Equipment and Environmental Security  Compliance
  • 34. ITD-SEC-10.1 Recommended Technologies  Visitor Management Systems  Access Control Systems  Video Surveillance Systems  Intrusion Alarm Systems  IP Intercom & Broadcast Systems
  • 35. Our Commitment "We continue to serve the unique needs of public clients and our track record of strong service was one of the reasons the Commonwealth expressed continuing confidence in our company and approved our program for another three years." Wells Sampson, President American Alarm & Communications, Inc.
  • 36. In Summary  Extensive Experience  End to End Implementation  Turnkey Product Solutions  Commitment to Service & Support  Large Pool of Licensed & Certified Support Staff  Always Offering the Best Value
  • 37. James E. McDonald Direct Phone: 508-453-2731 E-mail: jmcdonald@americanalarm.com Additional Information at www.americanalarm.com Twitter: PHYSECTECH