SlideShare a Scribd company logo
1 of 13
Adyar Orange Systems, India. All rights reserved.
Who are we?


           AOS is a company that synergistically combines the latest in technology and
            personnel, in innovative ways that maximize security , control and visibility of
            client assets
           We use the latest in surveillance technology, with network able cameras to
            provide remote IP-video hosting
           We use the latest in access control technology to maximize monitoring and
            control
           We capitalizes on the cloud technology’s potential to enable innovative
            connectivity and remote accessibility of electronic security
           We offers a remote human surveillance and intervention team that can monitor
            and report on client video in real-time -- Virtual Guards, if you will
           We offer onsite trained security personnel that work in conjunction with electronic
            technology to provided a high level of coverage of client assets




Adyar Orange Systems, India. All rights reserved.
What do we do?


   Solutions
    o   Analysis of client security needs
    o   Design and implementation of security, surveillance and monitoring solutions
    o   Selection and installation and surveillance equipment to meet client needs
    o   Remote & local monitoring coupled with cloud based storage of
        surveillance feeds
    o   Remote human surveillance and intervention team that can monitor and report on
        client video in real-time
    o   Onsite trained security personnel that work in conjunction with electronic
        technology to provided a high level of coverage of client assets
          What does that mean for you?
    o   A whole new world of security options, with visibility literally at your fingertips




Adyar Orange Systems, India. All rights reserved.
Key Benefits and Value


   Client pays for security visibility outcome, and not coverage
   Real time visibility of client assets - problems identified as they happen (not after a theft or
    damage has occurred)
   Real time monitoring to interdict security situation by on contract security personnel
   High visibility of security solution (cameras) to discourage casual theft
   Storage of surveillance video for duration client desires
   Accessibility of video surveillance on client desired device, computer, smart
    phone.
   Layers of security, Electronic access devices, Cameras and recording devices, Local and
    Offsite video storage, onsite and off site security personnel
   Identifying weak points for further improvement of security
   Flexible solution tailored to client immediate or growing security needs.
   Existing client security features could be integrated into new solutions




Adyar Orange Systems, India. All rights reserved.
Security & Surveillance Architecture




Adyar Orange Systems, India. All rights reserved.
Components of Premises
              Security
      Perimeter and access control
      In and Out control and screening of people and vehicular traffic
      Personnel screening and biometric based access control
      Surveillance monitoring for overall visibility of work areas for
          management control
      Monitoring of system status (Lights, machines status, personnel, etc.
          remotely)
      Remote access and notifications
      Onsite security detail tied into electronic surveillance


Adyar Orange Systems, India. All rights reserved.
Details of AOS-Security
                                        approach

 Step            1
    o   Assessment
    o   Current State presentation

 Step            2
    o   Security Architecture & design proposal

 Step            3
    o   Implementation

 Step            4
    o   Ongoing Security plan execution




Adyar Orange Systems, India. All rights reserved.
How We Approach Security
                                         Assessments

   Pre Work
      o   Review of appropriate policies and procedures, emergency response protocols,
          and  current training initiatives and crime analysis.
   On Site
      o   Review of site(s) using concepts of CPTED (Crime Prevention Through
          Environmental Design) which includes landscaping, lighting, visibility, etc.
      o   Development of risks and threats to security from within the site and from areas
          nearby.
      o   Review of all physical security aspects to include review of access control
          management, key control, security of high risk areas, health of all systems
          Consultation with appropriate supervisory personnel.
      o   Consultation, where appropriate, with in-house/contract security, local law
          enforcement/first responders.
      o   Meet with executives to discuss findings.




Adyar Orange Systems, India. All rights reserved.
Appendix I – Surveillance
                                               Technology

           Visual Surveillance
             o   Outdoor/Indoor surveillance cameras
             o   PTZ camera
             o   IP/Network camera
             o   Wireless camera
             o   Spy camera
           Control device
             o   DVR/NVR
             o   PC based solution


             All the devices are of latest technology and are
              imported directly from USA


Adyar Orange Systems, India. All rights reserved.
Appendix II – Access
                                               Control Technology

           Fingerprint Scanning
           Retinal Scanning
           Facial Recognition

              Biometrics are automated methods of recognizing a person based on a
            physiological or behavioral characteristic. Among the features measured are;
            face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
            Biometric technologies are becoming the foundation of an extensive array of
            highly secure identification and personal verification solutions. As the level of
            security breaches and transaction fraud increases, the need for highly
            secure identification and personal verification technologies is becoming
            apparent.



Adyar Orange Systems, India. All rights reserved.
Client List



               • M/s Noble Steels, Kancheepuram District, T.N

               •     Meenakshi College Of Engineering , Chennai

               •     CSI Christ Church, Salem, T.N

               •     Marco Leathers, Chennai

               Also we have secured for our services at all the colleges
               of Meenakshi Educational Trust.




Adyar Orange Systems, India. All rights reserved.
Adyar Orange Systems, India. All rights reserved.
Thank you


Adyar Orange Systems, India. All rights reserved.

More Related Content

What's hot

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.IRJET Journal
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoTIRJET Journal
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationIRJET Journal
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillancePuneet soni
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image ProcessingIRJET Journal
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIJERA Editor
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security SystemsIndiaMART InterMESH Limited
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber SecurityOWASP EEE
 

What's hot (16)

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Safeguardindia
Safeguardindia Safeguardindia
Safeguardindia
 
Cctv guide
Cctv guideCctv guide
Cctv guide
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Project cyper
Project cyperProject cyper
Project cyper
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security Systems
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 

Similar to AOS Security Solutions Overview

Similar to AOS Security Solutions Overview (20)

Ravij profic
Ravij proficRavij profic
Ravij profic
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
 
C2MS
C2MSC2MS
C2MS
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
IoT Development Solutions
IoT Development SolutionsIoT Development Solutions
IoT Development Solutions
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
Uma communication
Uma communicationUma communication
Uma communication
 
MIservices
MIservicesMIservices
MIservices
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Nexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLARNexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLAR
 
Bank security
Bank securityBank security
Bank security
 
Cctv camera in noida
Cctv camera in noidaCctv camera in noida
Cctv camera in noida
 
Dhonaadhi hitec-innovations
Dhonaadhi hitec-innovationsDhonaadhi hitec-innovations
Dhonaadhi hitec-innovations
 
Pln9 product presentation
Pln9 product presentationPln9 product presentation
Pln9 product presentation
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 
2m Solutions
2m Solutions2m Solutions
2m Solutions
 

Recently uploaded

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

AOS Security Solutions Overview

  • 1. Adyar Orange Systems, India. All rights reserved.
  • 2. Who are we?  AOS is a company that synergistically combines the latest in technology and personnel, in innovative ways that maximize security , control and visibility of client assets  We use the latest in surveillance technology, with network able cameras to provide remote IP-video hosting  We use the latest in access control technology to maximize monitoring and control  We capitalizes on the cloud technology’s potential to enable innovative connectivity and remote accessibility of electronic security  We offers a remote human surveillance and intervention team that can monitor and report on client video in real-time -- Virtual Guards, if you will  We offer onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets Adyar Orange Systems, India. All rights reserved.
  • 3. What do we do?  Solutions o Analysis of client security needs o Design and implementation of security, surveillance and monitoring solutions o Selection and installation and surveillance equipment to meet client needs o Remote & local monitoring coupled with cloud based storage of surveillance feeds o Remote human surveillance and intervention team that can monitor and report on client video in real-time o Onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets What does that mean for you? o A whole new world of security options, with visibility literally at your fingertips Adyar Orange Systems, India. All rights reserved.
  • 4. Key Benefits and Value  Client pays for security visibility outcome, and not coverage  Real time visibility of client assets - problems identified as they happen (not after a theft or damage has occurred)  Real time monitoring to interdict security situation by on contract security personnel  High visibility of security solution (cameras) to discourage casual theft  Storage of surveillance video for duration client desires  Accessibility of video surveillance on client desired device, computer, smart phone.  Layers of security, Electronic access devices, Cameras and recording devices, Local and Offsite video storage, onsite and off site security personnel  Identifying weak points for further improvement of security  Flexible solution tailored to client immediate or growing security needs.  Existing client security features could be integrated into new solutions Adyar Orange Systems, India. All rights reserved.
  • 5. Security & Surveillance Architecture Adyar Orange Systems, India. All rights reserved.
  • 6. Components of Premises Security  Perimeter and access control  In and Out control and screening of people and vehicular traffic  Personnel screening and biometric based access control  Surveillance monitoring for overall visibility of work areas for management control  Monitoring of system status (Lights, machines status, personnel, etc. remotely)  Remote access and notifications  Onsite security detail tied into electronic surveillance Adyar Orange Systems, India. All rights reserved.
  • 7. Details of AOS-Security approach  Step 1 o Assessment o Current State presentation  Step 2 o Security Architecture & design proposal  Step 3 o Implementation  Step 4 o Ongoing Security plan execution Adyar Orange Systems, India. All rights reserved.
  • 8. How We Approach Security Assessments  Pre Work o Review of appropriate policies and procedures, emergency response protocols, and  current training initiatives and crime analysis.  On Site o Review of site(s) using concepts of CPTED (Crime Prevention Through Environmental Design) which includes landscaping, lighting, visibility, etc. o Development of risks and threats to security from within the site and from areas nearby. o Review of all physical security aspects to include review of access control management, key control, security of high risk areas, health of all systems Consultation with appropriate supervisory personnel. o Consultation, where appropriate, with in-house/contract security, local law enforcement/first responders. o Meet with executives to discuss findings. Adyar Orange Systems, India. All rights reserved.
  • 9. Appendix I – Surveillance Technology  Visual Surveillance o Outdoor/Indoor surveillance cameras o PTZ camera o IP/Network camera o Wireless camera o Spy camera  Control device o DVR/NVR o PC based solution All the devices are of latest technology and are imported directly from USA Adyar Orange Systems, India. All rights reserved.
  • 10. Appendix II – Access Control Technology  Fingerprint Scanning  Retinal Scanning  Facial Recognition Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Adyar Orange Systems, India. All rights reserved.
  • 11. Client List • M/s Noble Steels, Kancheepuram District, T.N • Meenakshi College Of Engineering , Chennai • CSI Christ Church, Salem, T.N • Marco Leathers, Chennai Also we have secured for our services at all the colleges of Meenakshi Educational Trust. Adyar Orange Systems, India. All rights reserved.
  • 12. Adyar Orange Systems, India. All rights reserved.
  • 13. Thank you Adyar Orange Systems, India. All rights reserved.

Editor's Notes

  1. This template can be used as a starter file to give updates for project milestones. Sections Right-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors. Notes Use the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production) Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.