American Alarm &
Communications, Inc.
Your Security Technology
Convergence Partner
Our History
 In1971, three engineers from the
  Massachusetts Institute of
  Technology (MIT) came together
  with a single mission.
 To create a security company
  focused on innovation, technical
  excellence and customer service.
Our Mission Today
 We work hard everyday to
  provide the best possible security
  technology and services to each
  and every one of our customers.
 We own and deliver the entire
  security solution from the
  assessment, planning, design and
  deployment, to monitoring,
  support, service and training.
My Background & Experience
 I have 32 years of financial theft and loss
  prevention experience through physical
  audits and proactive uses of physical
  electronic security technologies.
 I have been privileged to offer my
  Services that have allowed my clients
  from individuals to Fortune 100
  companies transform and not just
  maintain their security and loss
  prevention operations.
National and Local Rankings
AACI ranked 40th out of the top 100
security firms in the U.S. for 2010.   Ranked #1 in Boston by the Book of Lists
24/7 Alarm Monitoring & Service Capabilities
 Fire/Halon, Ansul, Sprinkler, Flow and
  Tamper, Video Verified Alarms
 Hold-up, Ambush and Panic, Intrusion,
  Power Loss, High or Low Temperature
 Hazardous Chemicals, Gas, CO, CO2,
  Flood, etc.
 Radio and Cellular Back-up
  Communications
 4 hour service response for Gold
  Service Contract clients
Security Systems Integrator (SSI)
   Our 41 years of security expertise allows
    us to build integrated systems for our
    clients by combining hardware and
    software products from multiple vendors.
   As a systems integrator , we can align
    inexpensive, pre-configured components
    and off-the-shelf software to meet key
    business goals, as opposed to more
    expensive, customized implementations
    that may require original programming or
    manufacture of unique components.
A Total Security Solution
Why Do We Need Security Solutions?

 Protecting People & Assets, from
 People and Assets.
Security Matrix
The Sociology of Bad Behaviors?
•   Financial Pressure - a non-shareable financial
    need. Addiction, Bills, etc. (Desire)

•   Rationalization- involves a person reconciling
    his/her negative behavior (stealing) with the
    commonly accepted notions of decency and         Fraud (Crime)
    trust. (Ability)                                    Triangle

•   Perpetrator believes they have an opportunity
    within a facility, home or anywhere to act and
    they will not get caught!
                                                     Opportunity
The 10/80/10 Rule

 10% of the People you hire or come in contact with will steal
  from you if you let them.
 10% of the people you come in contact with will never steal
  from you.
 The issue we deal with every day is the 80% that depending on
  their circumstances can be influenced either way good or bad.
Opportunity & Temptation
   Everyone is tempted and at different
    levels.
   Temptation is ever present in life, this is
    part of life, and not being tempted is
    unrealistic.
   We are not victims drawn towards
    temptation without choice! The
    following are precautions, things we can
    do to avoid temptation that eliminate
    the opportunity.
“Perception of Detection”
 IT IS ESSENTIAL THAT INDIVIDUALS AND ORGANIZATIONS CREATE AN
  ENVIRONMENT THAT DOESN'T NEEDLESSLY PUT PEOPLE IN A POSITION
  TO COMMIT NEGATIVE BEHAVIOS.
 YOUNEED TO IMPLEMENT PROCESSES, PROCEDURES AND CONTROLS
  THAT WILL DETECT NEGATIVE ACTIVITY, THEN
 DOCUMENT THAT NEGATIVE ACTIVITY BY CREATING THE BEST EVIDENCE
  POSSIBLE.
 THIS WILL ELIMINATE THE OPPORTUNITY!
Do You Need To..



                                          #1
Increase operational Reduce the time      Provide the best   Reduce potential    Meet regulatory
efficiencies         lost investigating   possible safety    false liabilities   demands
                     incidents            and protection     claims
Some Proactive Security Technologies
•   Visitor Management & Access Control
    Systems and Wireless Locks

•   HD Megapixel Surveillance Cameras,
    Software & Video Analytics

•   Intrusion, Environmental Detection and
    Monitoring

•   Emergency Critical Communications
    (CCoIP) and Wireless Networks
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Assessments
   Our holistic security assessment approach
    looks in, around and through any element that
    could threaten your ability to safeguard what
    matters most to you organization.

   We also support loss prevention, asset
    protection and fraud prevention assessments
    that utilize physical security technologies to
    influence behaviors and confirm your
    organizations policies and procedures.
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments              Planning                 Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Planning
   We place our 40+ years of professional
    safety and security experience at your
    fingertips, expertly managing security
    projects that address vulnerabilities,
    risks and threats to your organization.

   Our team guides your security project
    from pre-proposal meetings, expert
    consultation, quote assembly and
    project delivery.
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Design Services
   Our Design Services identify potential
    security threats and reduce prospect of
    incidents by designing security
    infrastructures that complement building
    design and safeguard your people, property
    and assets.

   Delivering a clear proposal with a clear
    materials list, baseline hours and the best
    technical solutions.
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment                Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Installation & Deployment
   Our Installation Managers
    conduct site visits during
    project installation, testing
    and commissioning of all
    systems to ensure proper
    installation and operation.
Our Solutions Process
   AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.


 Assessments               Planning                Design              Deployment               Support

• Security and        • Scope of Work        • Detailed             • Design                • Small and
  System                Analysis               Proposal               Planning                Large Job
  Review and          • Review               • Material List          Conference              delivery
  Survey                Feature              • Baseline               and Follow-up         • Technical
• System                Requirements           Hours                • On Site                 Expertise,
  Capabilities        • Valued Advice        • Best                   Installation            24/7/365
  and Functions       • Written Spec           Technological          Project                 Service &
                        Review                 Solutions              Management              Training
Service Support
   Our security management
    proficiency, in-depth market
    knowledge and technical expertise
    extend invaluable expert support.

   Our proactive service team and
    wide range of service plans allow
    facility managers the service
    coverage they need.
Comprehensive Training
   Our comprehensive programming and
    training services for public, private
    organizations and residential customers
    builds on our commitment of customer
    service.

   Our Gold Service Plan is tailored to each
    commercial customer, but often includes:
    On-site technical response within 4 hours,
    automatic software upgrades, power supply
    replacements and regular training.
FAC64
Overview
 FAC64 is the primary statewide contract used by the Executive
 and Judicial Agencies of the Commonwealth and is available for
 use by other eligible entities such as: municipalities, hospitals,
 public schools and universities.

 Security systems and related services includes, but not limited
 to, video, access control, integrated video management, visitor
 management, locks, alarm systems, monitoring services,
 equipment service contracts and other maintenance.
AACI FAC64 Program

Since granted the award in August of 2010:
 We have completed over 2 million in new Installations
 We have provided Installation and Service of Security,
  Surveillance, and Access Control Systems to more than 50
  different Executive Agencies and other eligible entities across
  the Commonwealth
Departments of Revenue, Transportation, Health & Human Services,
Massachusetts Trial Courts, State Police, MEMA, DCAM and Many Other
                      Agencies' & Municipalities
MASSACHUSETTS PHYSICAL AND ENVIRONMENTAL
  SECURITY POLICY ITD-SEC-10.1 OBJECTIVES
 Workforce Security

 Least Privileged Rights

 Visitor Control

 Equipment and Environmental
 Security
 Compliance
ITD-SEC-10.1 Recommended Technologies
 Visitor Management Systems

 Access Control Systems

 Video Surveillance Systems

 Intrusion Alarm Systems

 IP Intercom & Broadcast
 Systems
Our Commitment
"We continue to serve the unique needs of public clients and our
    track record of strong service was one of the reasons the
     Commonwealth expressed continuing confidence in our
  company and approved our program for another three years."

                      Wells Sampson, President
                American Alarm & Communications, Inc.
In Summary
   Extensive Experience
   End to End Implementation
   Turnkey Product Solutions
   Commitment to Service & Support
   Large Pool of Licensed & Certified
    Support Staff
   Always Offering the Best Value
James E. McDonald
            Direct Phone: 508-453-2731
      E-mail: jmcdonald@americanalarm.com
Additional Information at www.americanalarm.com
                Twitter: PHYSECTECH

AACI_Fac64 Sales Presentation V1

  • 1.
    American Alarm & Communications,Inc. Your Security Technology Convergence Partner
  • 2.
    Our History  In1971,three engineers from the Massachusetts Institute of Technology (MIT) came together with a single mission.  To create a security company focused on innovation, technical excellence and customer service.
  • 3.
    Our Mission Today We work hard everyday to provide the best possible security technology and services to each and every one of our customers.  We own and deliver the entire security solution from the assessment, planning, design and deployment, to monitoring, support, service and training.
  • 4.
    My Background &Experience  I have 32 years of financial theft and loss prevention experience through physical audits and proactive uses of physical electronic security technologies.  I have been privileged to offer my Services that have allowed my clients from individuals to Fortune 100 companies transform and not just maintain their security and loss prevention operations.
  • 5.
    National and LocalRankings AACI ranked 40th out of the top 100 security firms in the U.S. for 2010. Ranked #1 in Boston by the Book of Lists
  • 6.
    24/7 Alarm Monitoring& Service Capabilities  Fire/Halon, Ansul, Sprinkler, Flow and Tamper, Video Verified Alarms  Hold-up, Ambush and Panic, Intrusion, Power Loss, High or Low Temperature  Hazardous Chemicals, Gas, CO, CO2, Flood, etc.  Radio and Cellular Back-up Communications  4 hour service response for Gold Service Contract clients
  • 7.
    Security Systems Integrator(SSI)  Our 41 years of security expertise allows us to build integrated systems for our clients by combining hardware and software products from multiple vendors.  As a systems integrator , we can align inexpensive, pre-configured components and off-the-shelf software to meet key business goals, as opposed to more expensive, customized implementations that may require original programming or manufacture of unique components.
  • 8.
  • 9.
    Why Do WeNeed Security Solutions?  Protecting People & Assets, from  People and Assets.
  • 10.
  • 11.
    The Sociology ofBad Behaviors? • Financial Pressure - a non-shareable financial need. Addiction, Bills, etc. (Desire) • Rationalization- involves a person reconciling his/her negative behavior (stealing) with the commonly accepted notions of decency and Fraud (Crime) trust. (Ability) Triangle • Perpetrator believes they have an opportunity within a facility, home or anywhere to act and they will not get caught! Opportunity
  • 12.
    The 10/80/10 Rule 10% of the People you hire or come in contact with will steal from you if you let them.  10% of the people you come in contact with will never steal from you.  The issue we deal with every day is the 80% that depending on their circumstances can be influenced either way good or bad.
  • 13.
    Opportunity & Temptation  Everyone is tempted and at different levels.  Temptation is ever present in life, this is part of life, and not being tempted is unrealistic.  We are not victims drawn towards temptation without choice! The following are precautions, things we can do to avoid temptation that eliminate the opportunity.
  • 14.
    “Perception of Detection” IT IS ESSENTIAL THAT INDIVIDUALS AND ORGANIZATIONS CREATE AN ENVIRONMENT THAT DOESN'T NEEDLESSLY PUT PEOPLE IN A POSITION TO COMMIT NEGATIVE BEHAVIOS.  YOUNEED TO IMPLEMENT PROCESSES, PROCEDURES AND CONTROLS THAT WILL DETECT NEGATIVE ACTIVITY, THEN  DOCUMENT THAT NEGATIVE ACTIVITY BY CREATING THE BEST EVIDENCE POSSIBLE.  THIS WILL ELIMINATE THE OPPORTUNITY!
  • 15.
    Do You NeedTo.. #1 Increase operational Reduce the time Provide the best Reduce potential Meet regulatory efficiencies lost investigating possible safety false liabilities demands incidents and protection claims
  • 16.
    Some Proactive SecurityTechnologies • Visitor Management & Access Control Systems and Wireless Locks • HD Megapixel Surveillance Cameras, Software & Video Analytics • Intrusion, Environmental Detection and Monitoring • Emergency Critical Communications (CCoIP) and Wireless Networks
  • 17.
    Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 18.
    Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 19.
    Assessments  Our holistic security assessment approach looks in, around and through any element that could threaten your ability to safeguard what matters most to you organization.  We also support loss prevention, asset protection and fraud prevention assessments that utilize physical security technologies to influence behaviors and confirm your organizations policies and procedures.
  • 20.
    Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 21.
    Planning  We place our 40+ years of professional safety and security experience at your fingertips, expertly managing security projects that address vulnerabilities, risks and threats to your organization.  Our team guides your security project from pre-proposal meetings, expert consultation, quote assembly and project delivery.
  • 22.
    Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 23.
    Design Services  Our Design Services identify potential security threats and reduce prospect of incidents by designing security infrastructures that complement building design and safeguard your people, property and assets.  Delivering a clear proposal with a clear materials list, baseline hours and the best technical solutions.
  • 24.
    Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 25.
    Installation & Deployment  Our Installation Managers conduct site visits during project installation, testing and commissioning of all systems to ensure proper installation and operation.
  • 26.
    Our Solutions Process AACI involvement and responsibilities will vary based on the size, scope and complexity of the project. Assessments Planning Design Deployment Support • Security and • Scope of Work • Detailed • Design • Small and System Analysis Proposal Planning Large Job Review and • Review • Material List Conference delivery Survey Feature • Baseline and Follow-up • Technical • System Requirements Hours • On Site Expertise, Capabilities • Valued Advice • Best Installation 24/7/365 and Functions • Written Spec Technological Project Service & Review Solutions Management Training
  • 27.
    Service Support  Our security management proficiency, in-depth market knowledge and technical expertise extend invaluable expert support.  Our proactive service team and wide range of service plans allow facility managers the service coverage they need.
  • 28.
    Comprehensive Training  Our comprehensive programming and training services for public, private organizations and residential customers builds on our commitment of customer service.  Our Gold Service Plan is tailored to each commercial customer, but often includes: On-site technical response within 4 hours, automatic software upgrades, power supply replacements and regular training.
  • 29.
  • 30.
    Overview  FAC64 isthe primary statewide contract used by the Executive and Judicial Agencies of the Commonwealth and is available for use by other eligible entities such as: municipalities, hospitals, public schools and universities.  Security systems and related services includes, but not limited to, video, access control, integrated video management, visitor management, locks, alarm systems, monitoring services, equipment service contracts and other maintenance.
  • 31.
    AACI FAC64 Program Sincegranted the award in August of 2010:  We have completed over 2 million in new Installations  We have provided Installation and Service of Security, Surveillance, and Access Control Systems to more than 50 different Executive Agencies and other eligible entities across the Commonwealth
  • 32.
    Departments of Revenue,Transportation, Health & Human Services, Massachusetts Trial Courts, State Police, MEMA, DCAM and Many Other Agencies' & Municipalities
  • 33.
    MASSACHUSETTS PHYSICAL ANDENVIRONMENTAL SECURITY POLICY ITD-SEC-10.1 OBJECTIVES  Workforce Security  Least Privileged Rights  Visitor Control  Equipment and Environmental Security  Compliance
  • 34.
    ITD-SEC-10.1 Recommended Technologies Visitor Management Systems  Access Control Systems  Video Surveillance Systems  Intrusion Alarm Systems  IP Intercom & Broadcast Systems
  • 35.
    Our Commitment "We continueto serve the unique needs of public clients and our track record of strong service was one of the reasons the Commonwealth expressed continuing confidence in our company and approved our program for another three years." Wells Sampson, President American Alarm & Communications, Inc.
  • 36.
    In Summary  Extensive Experience  End to End Implementation  Turnkey Product Solutions  Commitment to Service & Support  Large Pool of Licensed & Certified Support Staff  Always Offering the Best Value
  • 37.
    James E. McDonald Direct Phone: 508-453-2731 E-mail: jmcdonald@americanalarm.com Additional Information at www.americanalarm.com Twitter: PHYSECTECH