SlideShare a Scribd company logo
Adyar Orange Systems, India. All rights reserved.
Who are we?


           AOS is a company that synergistically combines the latest in technology and
            personnel, in innovative ways that maximize security , control and visibility of
            client assets
           We use the latest in surveillance technology, with network able cameras to
            provide remote IP-video hosting
           We use the latest in access control technology to maximize monitoring and
            control
           We capitalizes on the cloud technology’s potential to enable innovative
            connectivity and remote accessibility of electronic security
           We offers a remote human surveillance and intervention team that can monitor
            and report on client video in real-time -- Virtual Guards, if you will
           We offer onsite trained security personnel that work in conjunction with electronic
            technology to provided a high level of coverage of client assets




Adyar Orange Systems, India. All rights reserved.
What do we do?


   Solutions
    o   Analysis of client security needs
    o   Design and implementation of security, surveillance and monitoring solutions
    o   Selection and installation and surveillance equipment to meet client needs
    o   Remote & local monitoring coupled with cloud based storage of
        surveillance feeds
    o   Remote human surveillance and intervention team that can monitor and report on
        client video in real-time
    o   Onsite trained security personnel that work in conjunction with electronic
        technology to provided a high level of coverage of client assets
          What does that mean for you?
    o   A whole new world of security options, with visibility literally at your fingertips




Adyar Orange Systems, India. All rights reserved.
Key Benefits and Value


   Client pays for security visibility outcome, and not coverage
   Real time visibility of client assets - problems identified as they happen (not after a theft or
    damage has occurred)
   Real time monitoring to interdict security situation by on contract security personnel
   High visibility of security solution (cameras) to discourage casual theft
   Storage of surveillance video for duration client desires
   Accessibility of video surveillance on client desired device, computer, smart
    phone.
   Layers of security, Electronic access devices, Cameras and recording devices, Local and
    Offsite video storage, onsite and off site security personnel
   Identifying weak points for further improvement of security
   Flexible solution tailored to client immediate or growing security needs.
   Existing client security features could be integrated into new solutions




Adyar Orange Systems, India. All rights reserved.
Security & Surveillance Architecture




Adyar Orange Systems, India. All rights reserved.
Components of Premises
              Security
      Perimeter and access control
      In and Out control and screening of people and vehicular traffic
      Personnel screening and biometric based access control
      Surveillance monitoring for overall visibility of work areas for
          management control
      Monitoring of system status (Lights, machines status, personnel, etc.
          remotely)
      Remote access and notifications
      Onsite security detail tied into electronic surveillance


Adyar Orange Systems, India. All rights reserved.
Details of AOS-Security
                                        approach

 Step            1
    o   Assessment
    o   Current State presentation

 Step            2
    o   Security Architecture & design proposal

 Step            3
    o   Implementation

 Step            4
    o   Ongoing Security plan execution




Adyar Orange Systems, India. All rights reserved.
How We Approach Security
                                         Assessments

   Pre Work
      o   Review of appropriate policies and procedures, emergency response protocols,
          and  current training initiatives and crime analysis.
   On Site
      o   Review of site(s) using concepts of CPTED (Crime Prevention Through
          Environmental Design) which includes landscaping, lighting, visibility, etc.
      o   Development of risks and threats to security from within the site and from areas
          nearby.
      o   Review of all physical security aspects to include review of access control
          management, key control, security of high risk areas, health of all systems
          Consultation with appropriate supervisory personnel.
      o   Consultation, where appropriate, with in-house/contract security, local law
          enforcement/first responders.
      o   Meet with executives to discuss findings.




Adyar Orange Systems, India. All rights reserved.
Appendix I – Surveillance
                                               Technology

           Visual Surveillance
             o   Outdoor/Indoor surveillance cameras
             o   PTZ camera
             o   IP/Network camera
             o   Wireless camera
             o   Spy camera
           Control device
             o   DVR/NVR
             o   PC based solution


             All the devices are of latest technology and are
              imported directly from USA


Adyar Orange Systems, India. All rights reserved.
Appendix II – Access
                                               Control Technology

           Fingerprint Scanning
           Retinal Scanning
           Facial Recognition

              Biometrics are automated methods of recognizing a person based on a
            physiological or behavioral characteristic. Among the features measured are;
            face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
            Biometric technologies are becoming the foundation of an extensive array of
            highly secure identification and personal verification solutions. As the level of
            security breaches and transaction fraud increases, the need for highly
            secure identification and personal verification technologies is becoming
            apparent.



Adyar Orange Systems, India. All rights reserved.
Client List



               • M/s Noble Steels, Kancheepuram District, T.N

               •     Meenakshi College Of Engineering , Chennai

               •     CSI Christ Church, Salem, T.N

               •     Marco Leathers, Chennai

               Also we have secured for our services at all the colleges
               of Meenakshi Educational Trust.




Adyar Orange Systems, India. All rights reserved.
Adyar Orange Systems, India. All rights reserved.
Thank you


Adyar Orange Systems, India. All rights reserved.

More Related Content

What's hot

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
IRJET Journal
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
 
Safeguardindia
Safeguardindia Safeguardindia
Safeguardindia
Safeguard India
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
IRJET Journal
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
Puneet soni
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
Patrick Angel - MBA, CISSP(c) CISM(c) CRISC(c) CISA(c)
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
John Rhoton
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
 
Project cyper
Project cyperProject cyper
Project cyper
AbdulazizShammri
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security Systems
IndiaMART InterMESH Limited
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
TI Safe
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE
 

What's hot (16)

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Safeguardindia
Safeguardindia Safeguardindia
Safeguardindia
 
Cctv guide
Cctv guideCctv guide
Cctv guide
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Project cyper
Project cyperProject cyper
Project cyper
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security Systems
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 

Viewers also liked

Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
iftikharashakir
 
Article child rights
Article child rightsArticle child rights
Article child rightsNazmul Karim
 
Khosra Kabbo
Khosra Kabbo Khosra Kabbo
Khosra Kabbo
Nazmul Karim
 
Article on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladeshArticle on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladeshNazmul Karim
 
Workshop key note article
Workshop key note articleWorkshop key note article
Workshop key note articleNazmul Karim
 
Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2txispita
 

Viewers also liked (9)

Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Rucmp crga
Rucmp  crgaRucmp  crga
Rucmp crga
 
Article child rights
Article child rightsArticle child rights
Article child rights
 
Khosra Kabbo
Khosra Kabbo Khosra Kabbo
Khosra Kabbo
 
Article on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladeshArticle on monitoring presented at monitoring forum of bangladesh
Article on monitoring presented at monitoring forum of bangladesh
 
Workshop key note article
Workshop key note articleWorkshop key note article
Workshop key note article
 
Kanzas.ua
Kanzas.uaKanzas.ua
Kanzas.ua
 
Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2
 

Similar to Adyar orange systems

Ravij profic
Ravij proficRavij profic
Ravij profic
Amit kumar
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
FixonMexinsWaMenyaut
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015Tarek Medini
 
IoT Development Solutions
IoT Development SolutionsIoT Development Solutions
IoT Development Solutions
Mobiloitte Technologies
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
Dimitris Chalambalis
 
Uma communication
Uma communicationUma communication
Uma communication
Uma Communication
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
Infopulse
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Niraj Kumar
 
Nexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLARNexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLARRod Lima
 
Best-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptxBest-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptx
Cyber Legend Technologies LLC
 
Cctv camera in noida
Cctv camera in noidaCctv camera in noida
Cctv camera in noida
vouchprodelhi
 
Pln9 product presentation
Pln9 product presentationPln9 product presentation
Pln9 product presentation
PLN9 Security Services Pvt. Ltd.
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
NaveenKumar470500
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
CyberPactSolutions
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
Ivanti
 

Similar to Adyar orange systems (20)

Ravij profic
Ravij proficRavij profic
Ravij profic
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
 
C2MS
C2MSC2MS
C2MS
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
IoT Development Solutions
IoT Development SolutionsIoT Development Solutions
IoT Development Solutions
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
Uma communication
Uma communicationUma communication
Uma communication
 
MIservices
MIservicesMIservices
MIservices
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Nexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLARNexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLAR
 
Bank security
Bank securityBank security
Bank security
 
Best-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptxBest-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptx
 
Cctv camera in noida
Cctv camera in noidaCctv camera in noida
Cctv camera in noida
 
Dhonaadhi hitec-innovations
Dhonaadhi hitec-innovationsDhonaadhi hitec-innovations
Dhonaadhi hitec-innovations
 
Pln9 product presentation
Pln9 product presentationPln9 product presentation
Pln9 product presentation
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 

Recently uploaded

Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
Lviv Startup Club
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
Corey Perlman, Social Media Speaker and Consultant
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
Lital Barkan
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Arihant Webtech Pvt. Ltd
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
ofm712785
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
taqyed
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
Falcon Invoice Discounting
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
bosssp10
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
uae taxgpt
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
NZSG
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
dylandmeas
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
Allensmith572606
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 

Recently uploaded (20)

Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)Maksym Vyshnivetskyi: PMO Quality Management (UA)
Maksym Vyshnivetskyi: PMO Quality Management (UA)
 
Authentically Social Presented by Corey Perlman
Authentically Social Presented by Corey PerlmanAuthentically Social Presented by Corey Perlman
Authentically Social Presented by Corey Perlman
 
LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024LA HUG - Video Testimonials with Chynna Morgan - June 2024
LA HUG - Video Testimonials with Chynna Morgan - June 2024
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdfSearch Disrupted Google’s Leaked Documents Rock the SEO World.pdf
Search Disrupted Google’s Leaked Documents Rock the SEO World.pdf
 
5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer5 Things You Need To Know Before Hiring a Videographer
5 Things You Need To Know Before Hiring a Videographer
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-indiafalcon-invoice-discounting-a-premier-platform-for-investors-in-india
falcon-invoice-discounting-a-premier-platform-for-investors-in-india
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
Call 8867766396 Satta Matka Dpboss Matka Guessing Satta batta Matka 420 Satta...
 
VAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and RequirementsVAT Registration Outlined In UAE: Benefits and Requirements
VAT Registration Outlined In UAE: Benefits and Requirements
 
-- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month ---- June 2024 is National Volunteer Month --
-- June 2024 is National Volunteer Month --
 
Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...Discover the innovative and creative projects that highlight my journey throu...
Discover the innovative and creative projects that highlight my journey throu...
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
The key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EUThe key differences between the MDR and IVDR in the EU
The key differences between the MDR and IVDR in the EU
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 

Adyar orange systems

  • 1. Adyar Orange Systems, India. All rights reserved.
  • 2. Who are we?  AOS is a company that synergistically combines the latest in technology and personnel, in innovative ways that maximize security , control and visibility of client assets  We use the latest in surveillance technology, with network able cameras to provide remote IP-video hosting  We use the latest in access control technology to maximize monitoring and control  We capitalizes on the cloud technology’s potential to enable innovative connectivity and remote accessibility of electronic security  We offers a remote human surveillance and intervention team that can monitor and report on client video in real-time -- Virtual Guards, if you will  We offer onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets Adyar Orange Systems, India. All rights reserved.
  • 3. What do we do?  Solutions o Analysis of client security needs o Design and implementation of security, surveillance and monitoring solutions o Selection and installation and surveillance equipment to meet client needs o Remote & local monitoring coupled with cloud based storage of surveillance feeds o Remote human surveillance and intervention team that can monitor and report on client video in real-time o Onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets What does that mean for you? o A whole new world of security options, with visibility literally at your fingertips Adyar Orange Systems, India. All rights reserved.
  • 4. Key Benefits and Value  Client pays for security visibility outcome, and not coverage  Real time visibility of client assets - problems identified as they happen (not after a theft or damage has occurred)  Real time monitoring to interdict security situation by on contract security personnel  High visibility of security solution (cameras) to discourage casual theft  Storage of surveillance video for duration client desires  Accessibility of video surveillance on client desired device, computer, smart phone.  Layers of security, Electronic access devices, Cameras and recording devices, Local and Offsite video storage, onsite and off site security personnel  Identifying weak points for further improvement of security  Flexible solution tailored to client immediate or growing security needs.  Existing client security features could be integrated into new solutions Adyar Orange Systems, India. All rights reserved.
  • 5. Security & Surveillance Architecture Adyar Orange Systems, India. All rights reserved.
  • 6. Components of Premises Security  Perimeter and access control  In and Out control and screening of people and vehicular traffic  Personnel screening and biometric based access control  Surveillance monitoring for overall visibility of work areas for management control  Monitoring of system status (Lights, machines status, personnel, etc. remotely)  Remote access and notifications  Onsite security detail tied into electronic surveillance Adyar Orange Systems, India. All rights reserved.
  • 7. Details of AOS-Security approach  Step 1 o Assessment o Current State presentation  Step 2 o Security Architecture & design proposal  Step 3 o Implementation  Step 4 o Ongoing Security plan execution Adyar Orange Systems, India. All rights reserved.
  • 8. How We Approach Security Assessments  Pre Work o Review of appropriate policies and procedures, emergency response protocols, and  current training initiatives and crime analysis.  On Site o Review of site(s) using concepts of CPTED (Crime Prevention Through Environmental Design) which includes landscaping, lighting, visibility, etc. o Development of risks and threats to security from within the site and from areas nearby. o Review of all physical security aspects to include review of access control management, key control, security of high risk areas, health of all systems Consultation with appropriate supervisory personnel. o Consultation, where appropriate, with in-house/contract security, local law enforcement/first responders. o Meet with executives to discuss findings. Adyar Orange Systems, India. All rights reserved.
  • 9. Appendix I – Surveillance Technology  Visual Surveillance o Outdoor/Indoor surveillance cameras o PTZ camera o IP/Network camera o Wireless camera o Spy camera  Control device o DVR/NVR o PC based solution All the devices are of latest technology and are imported directly from USA Adyar Orange Systems, India. All rights reserved.
  • 10. Appendix II – Access Control Technology  Fingerprint Scanning  Retinal Scanning  Facial Recognition Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Adyar Orange Systems, India. All rights reserved.
  • 11. Client List • M/s Noble Steels, Kancheepuram District, T.N • Meenakshi College Of Engineering , Chennai • CSI Christ Church, Salem, T.N • Marco Leathers, Chennai Also we have secured for our services at all the colleges of Meenakshi Educational Trust. Adyar Orange Systems, India. All rights reserved.
  • 12. Adyar Orange Systems, India. All rights reserved.
  • 13. Thank you Adyar Orange Systems, India. All rights reserved.

Editor's Notes

  1. This template can be used as a starter file to give updates for project milestones. Sections Right-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors. Notes Use the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production) Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.