SlideShare a Scribd company logo
Adyar Orange Systems, India. All rights reserved.
Who are we?


           AOS is a company that synergistically combines the latest in technology and
            personnel, in innovative ways that maximize security , control and visibility of
            client assets
           We use the latest in surveillance technology, with network able cameras to
            provide remote IP-video hosting
           We use the latest in access control technology to maximize monitoring and
            control
           We capitalizes on the cloud technology’s potential to enable innovative
            connectivity and remote accessibility of electronic security
           We offers a remote human surveillance and intervention team that can monitor
            and report on client video in real-time -- Virtual Guards, if you will
           We offer onsite trained security personnel that work in conjunction with electronic
            technology to provided a high level of coverage of client assets




Adyar Orange Systems, India. All rights reserved.
What do we do?


   Solutions
    o   Analysis of client security needs
    o   Design and implementation of security, surveillance and monitoring solutions
    o   Selection and installation and surveillance equipment to meet client needs
    o   Remote & local monitoring coupled with cloud based storage of
        surveillance feeds
    o   Remote human surveillance and intervention team that can monitor and report on
        client video in real-time
    o   Onsite trained security personnel that work in conjunction with electronic
        technology to provided a high level of coverage of client assets
          What does that mean for you?
    o   A whole new world of security options, with visibility literally at your fingertips




Adyar Orange Systems, India. All rights reserved.
Key Benefits and Value


   Client pays for security visibility outcome, and not coverage
   Real time visibility of client assets - problems identified as they happen (not after a theft or
    damage has occurred)
   Real time monitoring to interdict security situation by on contract security personnel
   High visibility of security solution (cameras) to discourage casual theft
   Storage of surveillance video for duration client desires
   Accessibility of video surveillance on client desired device, computer, smart
    phone.
   Layers of security, Electronic access devices, Cameras and recording devices, Local and
    Offsite video storage, onsite and off site security personnel
   Identifying weak points for further improvement of security
   Flexible solution tailored to client immediate or growing security needs.
   Existing client security features could be integrated into new solutions




Adyar Orange Systems, India. All rights reserved.
Security & Surveillance Architecture




Adyar Orange Systems, India. All rights reserved.
Components of Premises
              Security
      Perimeter and access control
      In and Out control and screening of people and vehicular traffic
      Personnel screening and biometric based access control
      Surveillance monitoring for overall visibility of work areas for
          management control
      Monitoring of system status (Lights, machines status, personnel, etc.
          remotely)
      Remote access and notifications
      Onsite security detail tied into electronic surveillance


Adyar Orange Systems, India. All rights reserved.
Details of AOS-Security
                                        approach

 Step            1
    o   Assessment
    o   Current State presentation

 Step            2
    o   Security Architecture & design proposal

 Step            3
    o   Implementation

 Step            4
    o   Ongoing Security plan execution




Adyar Orange Systems, India. All rights reserved.
How We Approach Security
                                         Assessments

   Pre Work
      o   Review of appropriate policies and procedures, emergency response protocols,
          and  current training initiatives and crime analysis.
   On Site
      o   Review of site(s) using concepts of CPTED (Crime Prevention Through
          Environmental Design) which includes landscaping, lighting, visibility, etc.
      o   Development of risks and threats to security from within the site and from areas
          nearby.
      o   Review of all physical security aspects to include review of access control
          management, key control, security of high risk areas, health of all systems
          Consultation with appropriate supervisory personnel.
      o   Consultation, where appropriate, with in-house/contract security, local law
          enforcement/first responders.
      o   Meet with executives to discuss findings.




Adyar Orange Systems, India. All rights reserved.
Appendix I – Surveillance
                                               Technology

           Visual Surveillance
             o   Outdoor/Indoor surveillance cameras
             o   PTZ camera
             o   IP/Network camera
             o   Wireless camera
             o   Spy camera
           Control device
             o   DVR/NVR
             o   PC based solution


             All the devices are of latest technology and are
              imported directly from USA


Adyar Orange Systems, India. All rights reserved.
Appendix II – Access
                                               Control Technology

           Fingerprint Scanning
           Retinal Scanning
           Facial Recognition

              Biometrics are automated methods of recognizing a person based on a
            physiological or behavioral characteristic. Among the features measured are;
            face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice.
            Biometric technologies are becoming the foundation of an extensive array of
            highly secure identification and personal verification solutions. As the level of
            security breaches and transaction fraud increases, the need for highly
            secure identification and personal verification technologies is becoming
            apparent.



Adyar Orange Systems, India. All rights reserved.
Client List



               • M/s Noble Steels, Kancheepuram District, T.N

               •     Meenakshi College Of Engineering , Chennai

               •     CSI Christ Church, Salem, T.N

               •     Marco Leathers, Chennai

               Also we have secured for our services at all the colleges
               of Meenakshi Educational Trust.




Adyar Orange Systems, India. All rights reserved.
Adyar Orange Systems, India. All rights reserved.
Thank you


Adyar Orange Systems, India. All rights reserved.

More Related Content

What's hot

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
IRJET Journal
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
IRJET Journal
 
Safeguardindia
Safeguardindia Safeguardindia
Safeguardindia
Safeguard India
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
IRJET Journal
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
Puneet soni
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
Patrick Angel - MBA, CISSP(c) CISM(c) CRISC(c) CISA(c)
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
John Rhoton
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET Journal
 
Project cyper
Project cyperProject cyper
Project cyper
AbdulazizShammri
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
IJERA Editor
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security Systems
IndiaMART InterMESH Limited
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
TI Safe
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
OWASP EEE
 

What's hot (16)

Inttelix Stranger Detection System
Inttelix Stranger Detection SystemInttelix Stranger Detection System
Inttelix Stranger Detection System
 
Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.Voice Recognition System for Automobile Safety.
Voice Recognition System for Automobile Safety.
 
IRJET - Android based Secure and Smart Home Application using IoT
IRJET -  	  Android based Secure and Smart Home Application using IoTIRJET -  	  Android based Secure and Smart Home Application using IoT
IRJET - Android based Secure and Smart Home Application using IoT
 
Safeguardindia
Safeguardindia Safeguardindia
Safeguardindia
 
Cctv guide
Cctv guideCctv guide
Cctv guide
 
Importance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal InvestigationImportance of Electronic Surveillance in Criminal Investigation
Importance of Electronic Surveillance in Criminal Investigation
 
Smart surveillance
Smart surveillanceSmart surveillance
Smart surveillance
 
BYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO'sBYOD / Mobile-Device Security Guidelines for CxO's
BYOD / Mobile-Device Security Guidelines for CxO's
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
AXENT-Everything-IDS
AXENT-Everything-IDSAXENT-Everything-IDS
AXENT-Everything-IDS
 
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
IRJET-  	  Secure Automated Teller Machine (ATM) by Image ProcessingIRJET-  	  Secure Automated Teller Machine (ATM) by Image Processing
IRJET- Secure Automated Teller Machine (ATM) by Image Processing
 
Project cyper
Project cyperProject cyper
Project cyper
 
Intellectual Bank Locker Security System
Intellectual Bank Locker Security SystemIntellectual Bank Locker Security System
Intellectual Bank Locker Security System
 
Power Plus India Ent, Ahmedabad, Security Systems
Power Plus India Ent, Ahmedabad,  Security SystemsPower Plus India Ent, Ahmedabad,  Security Systems
Power Plus India Ent, Ahmedabad, Security Systems
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security[Bucharest] From SCADA to IoT Cyber Security
[Bucharest] From SCADA to IoT Cyber Security
 

Viewers also liked

Rhymes for rodela & rudmila
Rhymes for rodela & rudmilaRhymes for rodela & rudmila
Rhymes for rodela & rudmilaNazmul Karim
 
Khosra Kabbo
Khosra Kabbo Khosra Kabbo
Khosra Kabbo
Nazmul Karim
 
Workshop key note article
Workshop key note articleWorkshop key note article
Workshop key note articleNazmul Karim
 
Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2txispita
 

Viewers also liked (9)

Docs
DocsDocs
Docs
 
Poem
PoemPoem
Poem
 
Rhymes for rodela & rudmila
Rhymes for rodela & rudmilaRhymes for rodela & rudmila
Rhymes for rodela & rudmila
 
Rucmp crga
Rucmp  crgaRucmp  crga
Rucmp crga
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Khosra Kabbo
Khosra Kabbo Khosra Kabbo
Khosra Kabbo
 
Adyar orange systems
Adyar orange systemsAdyar orange systems
Adyar orange systems
 
Workshop key note article
Workshop key note articleWorkshop key note article
Workshop key note article
 
Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2Qué necesitamos para nuestra fiesta de cumpleaños2
Qué necesitamos para nuestra fiesta de cumpleaños2
 

Similar to Adyar orange systems

Ravij profic
Ravij proficRavij profic
Ravij profic
Amit kumar
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentationhemanth102030
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
FixonMexinsWaMenyaut
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015Tarek Medini
 
IoT Development Solutions
IoT Development SolutionsIoT Development Solutions
IoT Development Solutions
Mobiloitte Technologies
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
Dimitris Chalambalis
 
Uma communication
Uma communicationUma communication
Uma communication
Uma Communication
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
Infopulse
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Niraj Kumar
 
Nexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLARNexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLARRod Lima
 
Best-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptxBest-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptx
Cyber Legend Technologies LLC
 
Cctv camera in noida
Cctv camera in noidaCctv camera in noida
Cctv camera in noida
vouchprodelhi
 
Pln9 product presentation
Pln9 product presentationPln9 product presentation
Pln9 product presentation
PLN9 Security Services Pvt. Ltd.
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
NaveenKumar470500
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
CyberPactSolutions
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
Ivanti
 

Similar to Adyar orange systems (20)

Ravij profic
Ravij proficRavij profic
Ravij profic
 
Managed vs customer presentation
Managed vs customer presentationManaged vs customer presentation
Managed vs customer presentation
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
 
C2MS
C2MSC2MS
C2MS
 
Orbit-Company Profile 2015
Orbit-Company Profile 2015Orbit-Company Profile 2015
Orbit-Company Profile 2015
 
IoT Development Solutions
IoT Development SolutionsIoT Development Solutions
IoT Development Solutions
 
Maritime Security & Port Security Solutions
Maritime Security & Port Security SolutionsMaritime Security & Port Security Solutions
Maritime Security & Port Security Solutions
 
Uma communication
Uma communicationUma communication
Uma communication
 
MIservices
MIservicesMIservices
MIservices
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Nexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLARNexlar Brochure GO NEXLAR
Nexlar Brochure GO NEXLAR
 
Bank security
Bank securityBank security
Bank security
 
Best-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptxBest-Access-control-systems-in-dubai.pptx
Best-Access-control-systems-in-dubai.pptx
 
Cctv camera in noida
Cctv camera in noidaCctv camera in noida
Cctv camera in noida
 
Dhonaadhi hitec-innovations
Dhonaadhi hitec-innovationsDhonaadhi hitec-innovations
Dhonaadhi hitec-innovations
 
Pln9 product presentation
Pln9 product presentationPln9 product presentation
Pln9 product presentation
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
Cyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdfCyber_Security_CyberPact.pdf
Cyber_Security_CyberPact.pdf
 
OSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint SecurityOSB180: Learn More About Ivanti Endpoint Security
OSB180: Learn More About Ivanti Endpoint Security
 

Recently uploaded

India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
Kumar Satyam
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
AUDIJEAngelo
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
HARSHITHV26
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
Workforce Group
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
Erika906060
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
seri bangash
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
NathanBaughman3
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
Henry Tapper
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
marketingjdass
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
SynapseIndia
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop.com LTD
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
seoforlegalpillers
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
awaisafdar
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
creerey
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
HumanResourceDimensi1
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
PaulBryant58
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Jos Voskuil
 

Recently uploaded (20)

India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
India Orthopedic Devices Market: Unlocking Growth Secrets, Trends and Develop...
 
chapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxationchapter 10 - excise tax of transfer and business taxation
chapter 10 - excise tax of transfer and business taxation
 
Set off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptxSet off and carry forward of losses and assessment of individuals.pptx
Set off and carry forward of losses and assessment of individuals.pptx
 
Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Attending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learnersAttending a job Interview for B1 and B2 Englsih learners
Attending a job Interview for B1 and B2 Englsih learners
 
Memorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.pptMemorandum Of Association Constitution of Company.ppt
Memorandum Of Association Constitution of Company.ppt
 
April 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products NewsletterApril 2024 Nostalgia Products Newsletter
April 2024 Nostalgia Products Newsletter
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Skye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto AirportSkye Residences | Extended Stay Residences Near Toronto Airport
Skye Residences | Extended Stay Residences Near Toronto Airport
 
Premium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern BusinessesPremium MEAN Stack Development Solutions for Modern Businesses
Premium MEAN Stack Development Solutions for Modern Businesses
 
PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024PriyoShop Celebration Pohela Falgun Mar 20, 2024
PriyoShop Celebration Pohela Falgun Mar 20, 2024
 
What is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdfWhat is the TDS Return Filing Due Date for FY 2024-25.pdf
What is the TDS Return Filing Due Date for FY 2024-25.pdf
 
The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...The Parable of the Pipeline a book every new businessman or business student ...
The Parable of the Pipeline a book every new businessman or business student ...
 
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBdCree_Rey_BrandIdentityKit.PDF_PersonalBd
Cree_Rey_BrandIdentityKit.PDF_PersonalBd
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
Accpac to QuickBooks Conversion Navigating the Transition with Online Account...
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdfDigital Transformation in PLM - WHAT and HOW - for distribution.pdf
Digital Transformation in PLM - WHAT and HOW - for distribution.pdf
 

Adyar orange systems

  • 1. Adyar Orange Systems, India. All rights reserved.
  • 2. Who are we?  AOS is a company that synergistically combines the latest in technology and personnel, in innovative ways that maximize security , control and visibility of client assets  We use the latest in surveillance technology, with network able cameras to provide remote IP-video hosting  We use the latest in access control technology to maximize monitoring and control  We capitalizes on the cloud technology’s potential to enable innovative connectivity and remote accessibility of electronic security  We offers a remote human surveillance and intervention team that can monitor and report on client video in real-time -- Virtual Guards, if you will  We offer onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets Adyar Orange Systems, India. All rights reserved.
  • 3. What do we do?  Solutions o Analysis of client security needs o Design and implementation of security, surveillance and monitoring solutions o Selection and installation and surveillance equipment to meet client needs o Remote & local monitoring coupled with cloud based storage of surveillance feeds o Remote human surveillance and intervention team that can monitor and report on client video in real-time o Onsite trained security personnel that work in conjunction with electronic technology to provided a high level of coverage of client assets What does that mean for you? o A whole new world of security options, with visibility literally at your fingertips Adyar Orange Systems, India. All rights reserved.
  • 4. Key Benefits and Value  Client pays for security visibility outcome, and not coverage  Real time visibility of client assets - problems identified as they happen (not after a theft or damage has occurred)  Real time monitoring to interdict security situation by on contract security personnel  High visibility of security solution (cameras) to discourage casual theft  Storage of surveillance video for duration client desires  Accessibility of video surveillance on client desired device, computer, smart phone.  Layers of security, Electronic access devices, Cameras and recording devices, Local and Offsite video storage, onsite and off site security personnel  Identifying weak points for further improvement of security  Flexible solution tailored to client immediate or growing security needs.  Existing client security features could be integrated into new solutions Adyar Orange Systems, India. All rights reserved.
  • 5. Security & Surveillance Architecture Adyar Orange Systems, India. All rights reserved.
  • 6. Components of Premises Security  Perimeter and access control  In and Out control and screening of people and vehicular traffic  Personnel screening and biometric based access control  Surveillance monitoring for overall visibility of work areas for management control  Monitoring of system status (Lights, machines status, personnel, etc. remotely)  Remote access and notifications  Onsite security detail tied into electronic surveillance Adyar Orange Systems, India. All rights reserved.
  • 7. Details of AOS-Security approach  Step 1 o Assessment o Current State presentation  Step 2 o Security Architecture & design proposal  Step 3 o Implementation  Step 4 o Ongoing Security plan execution Adyar Orange Systems, India. All rights reserved.
  • 8. How We Approach Security Assessments  Pre Work o Review of appropriate policies and procedures, emergency response protocols, and  current training initiatives and crime analysis.  On Site o Review of site(s) using concepts of CPTED (Crime Prevention Through Environmental Design) which includes landscaping, lighting, visibility, etc. o Development of risks and threats to security from within the site and from areas nearby. o Review of all physical security aspects to include review of access control management, key control, security of high risk areas, health of all systems Consultation with appropriate supervisory personnel. o Consultation, where appropriate, with in-house/contract security, local law enforcement/first responders. o Meet with executives to discuss findings. Adyar Orange Systems, India. All rights reserved.
  • 9. Appendix I – Surveillance Technology  Visual Surveillance o Outdoor/Indoor surveillance cameras o PTZ camera o IP/Network camera o Wireless camera o Spy camera  Control device o DVR/NVR o PC based solution All the devices are of latest technology and are imported directly from USA Adyar Orange Systems, India. All rights reserved.
  • 10. Appendix II – Access Control Technology  Fingerprint Scanning  Retinal Scanning  Facial Recognition Biometrics are automated methods of recognizing a person based on a physiological or behavioral characteristic. Among the features measured are; face, fingerprints, hand geometry, handwriting, iris, retinal, vein, and voice. Biometric technologies are becoming the foundation of an extensive array of highly secure identification and personal verification solutions. As the level of security breaches and transaction fraud increases, the need for highly secure identification and personal verification technologies is becoming apparent. Adyar Orange Systems, India. All rights reserved.
  • 11. Client List • M/s Noble Steels, Kancheepuram District, T.N • Meenakshi College Of Engineering , Chennai • CSI Christ Church, Salem, T.N • Marco Leathers, Chennai Also we have secured for our services at all the colleges of Meenakshi Educational Trust. Adyar Orange Systems, India. All rights reserved.
  • 12. Adyar Orange Systems, India. All rights reserved.
  • 13. Thank you Adyar Orange Systems, India. All rights reserved.

Editor's Notes

  1. This template can be used as a starter file to give updates for project milestones. Sections Right-click on a slide to add sections. Sections can help to organize your slides or facilitate collaboration between multiple authors. Notes Use the Notes section for delivery notes or to provide additional details for the audience. View these notes in Presentation View during your presentation. Keep in mind the font size (important for accessibility, visibility, videotaping, and online production) Coordinated colors Pay particular attention to the graphs, charts, and text boxes. Consider that attendees will print in black and white or grayscale. Run a test print to make sure your colors work when printed in pure black and white and grayscale. Graphics, tables, and graphs Keep it simple: If possible, use consistent, non-distracting styles and colors. Label all graphs and tables.