SlideShare a Scribd company logo
ComSec Security SystemsComSec Security SystemsComSec Security SystemsComSec Security Systems
Company Presentation
ComSecComSec -- Business CardBusiness CardComSecComSec Business CardBusiness Card
• Name: ComSec Security Systems
• Company Registered in Tanzania• Company Registered in Tanzania
• Head Offices on Nyerere road, DSM
• Branches in all major regions of TanzaniaBranches in all major regions of Tanzania
• Rich experience of professionals across the globe with
expertise in Solution Design, Implementation, R&D and
C t S tCustomer Support
• Leader in professional End-to-End Security solutions
• Providing Risk Assessment and consulting services• Providing Risk Assessment and consulting services
• System Integration and Turn Key Projects
Who is ComSecWho is ComSecWho is ComSecWho is ComSec
• Comsec is a System Integration Company
providing professional security solutions usingproviding professional security solutions using
advanced technologies in the following areas:
• CCTV Surveillance
• Access Control
• Detection and Screeningg
• Perimeter Security / Fencing
• Intruder Alarm Systems
• Fire Detection & Alarm System• Fire Detection & Alarm System
• ICT/ Structured Cabling
• Vehicle Tracking
Our Value Added ServicesOur Value Added Services
• ComSec offers customized, bespoke solutions to suit client/ project
specific needs, in lines with global norms and best practices.
• ComSec has a rich in-house talent as well as a resource pool• ComSec has a rich in-house talent as well as a resource pool
comprising of industry experts from around the globe who are well
experienced in designing and delivering a complete range of Fire,
Security & ICT solutions from a basic set-up to a complex integratedSecurity & ICT solutions from a basic set up to a complex integrated
solution depending on the business needs
• Comsec offers Value Added Services in form of:• Comsec offers Value Added Services in form of:
• Consultancy Risk Management
• System IntegrationSystem Integration
• Annual Maintenance/ Support Services
Our MissionOur MissionOur MissionOur Mission
Provide State-of-the-Art, Professional, Security
Solutions to Protect Property, People and
Information
Technology PartnersTechnology Partners
Selected ClientsSelected Clients
Ministry of Finance
National Assembly
Our Distinct ValuesOur Distinct ValuesOur Distinct ValuesOur Distinct Values
• Professional Complete End-to-EndProfessional, Complete, End to End
Solutions
Advanced Technologies– Advanced Technologies
– R&D Evaluation & Testing
P f i l C t Wid S t• Professional Country Wide Support
– Help Desk
– Dedicated Professional Department
O S l iO S l iOur SolutionsOur Solutions
CCTV SurveillanceCCTV SurveillanceCCTV SurveillanceCCTV Surveillance
• Outdoor / Indoor Cameras
• Day / Night /Thermal Imaging
• Stationary / PTZ Cameras
• High Quality Digital Video
Recording
Central Monitoring / Control• Central Monitoring / Control
Rooms
• Intelligent Video Analysisg y
Solutions
Mega Pixel
Why Megapixel for Facial Recognition?Why Megapixel for Facial Recognition?
Mega Pixel
CIF 352 x 288
11
Access ControlAccess ControlAccess ControlAccess Control
• Controlling access to
secure areas
• Biometric or Card-Based
SystemsSystems
• Controlling doors, gates,
turnstiles
• Access Monitoring and
recording
• Time & Attendance• Time & Attendance
Perimeter SecurityPerimeter Security
• Smart Fencing
– Vibration sensors along theVibration sensors along the
fence detecting the intrusion
location
– Infrared / Microwave BeamsInfrared / Microwave Beams
• Video surveillance
– Day and night cameras with
f fInfrared illuminators for
improved night viewing
• Video analyticsy
– “smart eye” generating alarms
upon movement and events
along the fence
Fire Alarm SystemFire Alarm SystemFire Alarm SystemFire Alarm System
Remote Digital
Annunciators
Smoke Detector
Siren
Heat Detector
Gas Detector
M iElectricity
Disconnect
Main
Controller
Manual Fire Alarm
Call Point
Air-conditioning
Shutdown
Automatic Dialer
Extinguishing
Controller Automatic
ExtinguishingComputer Control & Display g gComputer Control & Display
Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions
• Banking Industry
– Branches
• CCTV monitoring for branch and ATMs
• Intruder Alarm (with Panic buttons)
• Fire Alarm
• Access Control
• All systems integrated
– Head Office / Regional Offices
• CCTV monitoring for building In/Out
• Fire Alarm
• Access Control for access to secure areas
• All systems integrated
• Control room for remote central monitoring
of branches and regional officesg
Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions
• Government/Police/Military
– CCTV SurveillanceCCTV Surveillance
– Access Control
– Fire Alarm
– Screening equipment – metal detectors,
x-ray machines
– Vehicle access monitoring
• Vehicle tags, license plate recognition cameras,
• barriers, gates
– Control room
• Monitoring the building
• remote central monitoring of regional offices /
camps (government organizations like Social
Security Fund Pension Funds etc )Security Fund, Pension Funds etc.)
– Perimeter Protection
• Smart Fencing
• CCTV Surveillance
• Smart VideoSmart Video
Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions
• Cellular Companies
– Head Office / Regional Offices
• CCTV monitoring for building In/Out
• Fire Alarm
• Access Control for access to secure areas
• All systems integrated
• Control room for remote central monitoring
of regional offices and base stations
– BTS Base Staion Sites
Th ft/i t i ti• Theft/intrusion prevention
• CCTV Surveillance
• Perimeter protection
• Access Control
• Control Room - Centralized CCTV viewingg
and alarm
Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions
• Local Government (parastatals)
– Governor Building
• CCTV monitoring for building In/Out
• Fire Alarm
• Access Control for access to secure areas
• All systems integrated
– City Surveillance
• Monitoring roads
• Monitoring junctions
• Monitoring entrances to the city
• Command & Control Center- Centralized
alarm and monitoring from Head Office
• Saves money on guards
Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions
• Mining Companies
– Major Threats
• Perimeter intrusion
• Illegal mining
• Theft
• Theft Prevention
– Access Control –cards, biometrics,
turnstiles, metal detectors
M i f i k t– Main areas of risk - storage,
processing areas and areas where
heavy machinery is present
– Biometrics - ensure only authorized
individuals are allowed on site for
labor intensive areas,. Fingerprint and
facial recognition are popular
recognition methods used in mines
Case StudyCase Studyyy
Gold Mine in TanzaniaGold Mine in Tanzania
Case StudyCase StudyCase StudyCase Study
• Perimeter fence of 1.8Km
• Two sets of fences, 6m apart, to
create no-man’s-land
• Single gate with full-height turnstiles
f l d b i f hi lfor people and barriers for vehicles
• Card system
– Access control by card following a
card (employee card + guard card) tocard (employee card + guard card) to
ensure secure access to sensitive
areas
– Time & Attendance
M t t t d G ld Milli• Most protected area – Gold Milling
Section
Case Study Contd..Case Study Contd..Case Study Contd..Case Study Contd..
• CCTV System
– Cameras every 50m along the
perimeter
– Video analytics (smart Video) for
alerting upon unauthorized movementalerting upon unauthorized movement
in restricted areas
Typical Markets SolutionsTypical Markets Solutions
((ContdContd)…..)…..((ContdContd)…..)…..
• Security Control Room with
monitoring of:
CCTV Surveillance– CCTV Surveillance
– Access Control
– Fire Alarm Signal
– Screening equipment – metal detectors,g q p ,
x-ray machines
– Vehicle access monitoring
• Vehicle tags, license plate recognition cameras,
• barriers, gates, g
– Control room
• Monitoring the building
• remote central monitoring of regional offices /
camps (government organizations like Social
S )Security Fund, Pension Funds etc.)
– Perimeter Protection
• Smart Fencing
• CCTV Surveillance
S t Vid• Smart Video
System IntegrationSystem IntegrationSystem IntegrationSystem Integration
• Turnkey Solutions – Advanced
Design and implementation
• Integration between CCTV,
Access Control , Perimeter
Security and Alarm Systems
• Integration to existing systems to
create a complete security
envelope
• Remote Monitoring
– Control Centers
– Alarm & Response
– Call Center
Integrated Security ConceptIntegrated Security Concept
Smoke/ Heat
Manual Fire Siren
Smoke/ Heat
Detector
Alarm
Call Point
Main Fire Panel
Intelligent Video
Management
Dual Authentication
Readers – Card +
Pin
g
Platform
Pin
Security Control Center
Multi-Door
Access Control
TCP/ IP Intelligent
Access Controllers
Vehicle Barrier
Intruder Alarm Systems
Cameras and
Video Recorders
Control Room Monitoring &Control Room Monitoring &
ReportingReporting-- Future CMS Set upFuture CMS Set up
Selected Projects & CustomersSelected Projects & Customers
Partial ListPartial List • NSSF Social Security FundPartial ListPartial List
• Tigo – Mobile Operator
– Centralized Access Control
– Centralized CCTV Monitoring
• NMB – Bank- Over 300 Sites
• NSSF – Social Security Fund
– CCTV CMS
– Access Control
– Turnstiles
– Vehicle barriers
– Intruder Alarm / Panic buttons
– CCTV: Branches, ATMs
– Fire Alarm
– Access Control
– Postal Bank- Over 25 Branches
– Access Control
– IP CCTV
• British Gas
• Akiba Commercial Bank- Over 15 Sites
• CCTV
• Standard Chartered Bank- All Sites in Tanzania
• CCTV
Vi T
– Access Control
– Turnstiles
– Intruder Alarm
• National Assembly
A C l• Viva Towers
– CCTV Surveillance
– Access Control (Turnstiles, Barriers)
– Public Address
– Fire Alarm
– Access Control
– Scanners
• Ministry of Finance
– Access Control
– CCTVFire Alarm
• Puma Energy
– CCTV
– Access Control
– Intrusion Detection
– CCTV
– Document Tagging
• CRDB Bank
– CCTV
Selected Projects & CustomersSelected Projects & Customers
Partial ListPartial List contdcontdPartial List..Partial List..contdcontd
• Everrett Aviation – JNIA Airport
– CCTV
– Access Control
ICT & Structured Cabling
• NSSF – Luxury Hotel in Mwanza
– CCTV
– Access Control
– Public Address
Vehicle barriers– ICT & Structured Cabling
• PUGU Mall
– CCTV
– Public Address
– ICT & Structured Cabling
– Vehicle barriers
• ECO Bank HQ- Kinondoni
– IP CCTV
– Access Control
– Intruder AlarmICT & Structured Cabling
– Voice & Data
• UHURU Mall
– CCTV
– Public Address
– Fire Alarm
• MOGAS
– CCTV
– Access Control
– ICT & Structured Cabling
– Voice & Data
• New NMB HQ- Dar
– IP CCTV Surveillance
IP A C t l (T til B i )
– Intruder Alarm
• NIC Bank HQ- PSPF Tower
– IP CCTV
– Access Control
I t d Al– IP Access Control (Turnstiles, Barriers)
– Public Address
– Intruder Alarm
– Integrated Command and Control Room Set up
– Intruder Alarm
– Fire Alarm
• I&M Bank- All Branches
– CCTV
– Access Control with Time & AttendanceAccess Control with Time & Attendance
Project MethodologyProject Methodology
Maintenance MethodologyMaintenance MethodologyMaintenance MethodologyMaintenance Methodology
• Certify 2 dedicated engineersCertify 2 dedicated engineers
• 2 scheduled maintenance visits PA
D C ll P• Down Call Process:
ICONIC REFERENCES
SummarySummary -- Why ComSecWhy ComSecSummarySummary Why ComSecWhy ComSec
• Professional Complete End-to-EndProfessional, Complete, End to End
Solutions
Advanced Technologies– Advanced Technologies
– R&D Evaluation & Testing
P f i l C t Wid S t• Professional Country Wide Support
– Help Desk
– Dedicated Professional Department
Our Business is to Secure
YoursYours

More Related Content

Similar to ComSec Security Systems - Tanzania

Itas profile
Itas profileItas profile
Itas profile
Dhanasekar Remo
 
05 ip suervilence application
05 ip suervilence application05 ip suervilence application
05 ip suervilence application
Nader Elmansi
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Corporate Services
 
Cctv
CctvCctv
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
Niraj Kumar
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
PawachMetharattanara
 
Isi 2010 Ottawa
Isi 2010 OttawaIsi 2010 Ottawa
Isi 2010 Ottawa
dwhotton
 
Tapsoft network solutions
Tapsoft network solutionsTapsoft network solutions
Tapsoft network solutions
SagarDabhade1
 
Gtc security
Gtc securityGtc security
Gtc security
Laurens De Prins
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
FixonMexinsWaMenyaut
 
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
sunsmart-chennai
 
Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013
SitexOrbis
 
Rosslare Access control, car parking, elevator control with CCTV Integration...
Rosslare  Access control, car parking, elevator control with CCTV Integration...Rosslare  Access control, car parking, elevator control with CCTV Integration...
Rosslare Access control, car parking, elevator control with CCTV Integration...
PowertechGM
 
Security telecoms 2015 short
Security telecoms 2015 shortSecurity telecoms 2015 short
Security telecoms 2015 short
John Jeffers
 
New 2020 Vision web site coming soon.
New 2020 Vision web site coming soon.New 2020 Vision web site coming soon.
New 2020 Vision web site coming soon.
Peter Houlis CSyP MSyl
 
SECURITY SYSTEM.pptx
SECURITY SYSTEM.pptxSECURITY SYSTEM.pptx
SECURITY SYSTEM.pptx
TwinkleMaharajwala
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016
Mohamed Shabeeb
 
SSS15-Medical-Food
SSS15-Medical-FoodSSS15-Medical-Food
SSS15-Medical-Food
Justin Soltani
 
Microteam Managed Deployment Services Client Devices
Microteam Managed Deployment Services Client DevicesMicroteam Managed Deployment Services Client Devices
Microteam Managed Deployment Services Client Devices
edwardratnaraja
 
MVS Security Presentation
MVS Security PresentationMVS Security Presentation
MVS Security Presentation
Ramon Solis, Jr.
 

Similar to ComSec Security Systems - Tanzania (20)

Itas profile
Itas profileItas profile
Itas profile
 
05 ip suervilence application
05 ip suervilence application05 ip suervilence application
05 ip suervilence application
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
 
Cctv
CctvCctv
Cctv
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
experience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.pptexperience_and_perspective_of_security_installation.ppt
experience_and_perspective_of_security_installation.ppt
 
Isi 2010 Ottawa
Isi 2010 OttawaIsi 2010 Ottawa
Isi 2010 Ottawa
 
Tapsoft network solutions
Tapsoft network solutionsTapsoft network solutions
Tapsoft network solutions
 
Gtc security
Gtc securityGtc security
Gtc security
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
 
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
AI | RPA | Chat Bots | MobileAPP | Enterprise Software - Unique Solutions for...
 
Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013Alarm Receiving Centres - IFSEC 2013
Alarm Receiving Centres - IFSEC 2013
 
Rosslare Access control, car parking, elevator control with CCTV Integration...
Rosslare  Access control, car parking, elevator control with CCTV Integration...Rosslare  Access control, car parking, elevator control with CCTV Integration...
Rosslare Access control, car parking, elevator control with CCTV Integration...
 
Security telecoms 2015 short
Security telecoms 2015 shortSecurity telecoms 2015 short
Security telecoms 2015 short
 
New 2020 Vision web site coming soon.
New 2020 Vision web site coming soon.New 2020 Vision web site coming soon.
New 2020 Vision web site coming soon.
 
SECURITY SYSTEM.pptx
SECURITY SYSTEM.pptxSECURITY SYSTEM.pptx
SECURITY SYSTEM.pptx
 
Company Profile 2016
Company Profile 2016Company Profile 2016
Company Profile 2016
 
SSS15-Medical-Food
SSS15-Medical-FoodSSS15-Medical-Food
SSS15-Medical-Food
 
Microteam Managed Deployment Services Client Devices
Microteam Managed Deployment Services Client DevicesMicroteam Managed Deployment Services Client Devices
Microteam Managed Deployment Services Client Devices
 
MVS Security Presentation
MVS Security PresentationMVS Security Presentation
MVS Security Presentation
 

Recently uploaded

Verified Call Girls Mumbai || +919920725232 || Quick Booking at Affordable Price
Verified Call Girls Mumbai || +919920725232 || Quick Booking at Affordable PriceVerified Call Girls Mumbai || +919920725232 || Quick Booking at Affordable Price
Verified Call Girls Mumbai || +919920725232 || Quick Booking at Affordable Price
ownerdetailssim i11
 
QuickBooks Unrecoverable Error...........
QuickBooks Unrecoverable Error...........QuickBooks Unrecoverable Error...........
QuickBooks Unrecoverable Error...........
lilya092000
 
Findlay Evans Waterproofing with AIW - Article November 2019
Findlay Evans Waterproofing with AIW - Article November 2019Findlay Evans Waterproofing with AIW - Article November 2019
Findlay Evans Waterproofing with AIW - Article November 2019
MELBOURNE Commercial Waterproofers - Findlay-Evans Waterproofing
 
Generate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model StrategyGenerate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model Strategy
RNayak3
 
Top Call Girls in Mumbai || +919920725232 || Quick Booking at Affordable Price
Top Call Girls in Mumbai || +919920725232 || Quick Booking at Affordable PriceTop Call Girls in Mumbai || +919920725232 || Quick Booking at Affordable Price
Top Call Girls in Mumbai || +919920725232 || Quick Booking at Affordable Price
ownerdetailssim i11
 
Findlay Evans Waterproofing with AIW - Article October 2018
Findlay Evans Waterproofing with AIW - Article October 2018Findlay Evans Waterproofing with AIW - Article October 2018
Findlay Evans Waterproofing with AIW - Article October 2018
MELBOURNE Commercial Waterproofers - Findlay-Evans Waterproofing
 
StoneSelexNaturalStoneFauxStoneSiding.pdf
StoneSelexNaturalStoneFauxStoneSiding.pdfStoneSelexNaturalStoneFauxStoneSiding.pdf
StoneSelexNaturalStoneFauxStoneSiding.pdf
yibema7137
 
一比一原版(UWA毕业证)西澳大学毕业证如何办理
一比一原版(UWA毕业证)西澳大学毕业证如何办理一比一原版(UWA毕业证)西澳大学毕业证如何办理
一比一原版(UWA毕业证)西澳大学毕业证如何办理
eqvum
 
How Live-In Care Benefits Chronic Disease Management.pdf
How Live-In Care Benefits Chronic Disease Management.pdfHow Live-In Care Benefits Chronic Disease Management.pdf
How Live-In Care Benefits Chronic Disease Management.pdf
KenWaterhouse
 
sim owner details | +923099554040 | sim owner details pakistan
sim owner details | +923099554040 | sim owner details pakistansim owner details | +923099554040 | sim owner details pakistan
sim owner details | +923099554040 | sim owner details pakistan
ownerdetailssim
 
The Late Samuel Sekyere Safo-Ankoma Funeral Booklet
The Late Samuel Sekyere Safo-Ankoma Funeral BookletThe Late Samuel Sekyere Safo-Ankoma Funeral Booklet
The Late Samuel Sekyere Safo-Ankoma Funeral Booklet
rajkintex
 
How to Handle Open Web Application Security Project(OWASP) Top Vulnerabilities
How to Handle Open Web Application Security Project(OWASP) Top VulnerabilitiesHow to Handle Open Web Application Security Project(OWASP) Top Vulnerabilities
How to Handle Open Web Application Security Project(OWASP) Top Vulnerabilities
coast550
 
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital MarketingBilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar
 
How Does Fantasy Sports Mobile App Make Money?
How Does Fantasy Sports Mobile App Make Money?How Does Fantasy Sports Mobile App Make Money?
How Does Fantasy Sports Mobile App Make Money?
fantasyimgglobalinfo
 
The 5 Most Important Pipefitter Tools.pdf
The 5 Most Important Pipefitter Tools.pdfThe 5 Most Important Pipefitter Tools.pdf
The 5 Most Important Pipefitter Tools.pdf
SchulteSupply
 
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdfPEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
EMk Termite Pest
 
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdfThe best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
tonytkelly6
 
#1 Call Girls in Mumbai || +919004268417 || Quick Booking at Affordable Price
#1 Call Girls in Mumbai || +919004268417 || Quick Booking at Affordable Price#1 Call Girls in Mumbai || +919004268417 || Quick Booking at Affordable Price
#1 Call Girls in Mumbai || +919004268417 || Quick Booking at Affordable Price
ownerdetailssim i11
 
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in PakistanCheck SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
ownerdetailssim
 
Unification of SMS API in Pakistan | Best SMS API Service Provider
Unification of SMS API in Pakistan | Best SMS API Service ProviderUnification of SMS API in Pakistan | Best SMS API Service Provider
Unification of SMS API in Pakistan | Best SMS API Service Provider
shikhaseo43
 

Recently uploaded (20)

Verified Call Girls Mumbai || +919920725232 || Quick Booking at Affordable Price
Verified Call Girls Mumbai || +919920725232 || Quick Booking at Affordable PriceVerified Call Girls Mumbai || +919920725232 || Quick Booking at Affordable Price
Verified Call Girls Mumbai || +919920725232 || Quick Booking at Affordable Price
 
QuickBooks Unrecoverable Error...........
QuickBooks Unrecoverable Error...........QuickBooks Unrecoverable Error...........
QuickBooks Unrecoverable Error...........
 
Findlay Evans Waterproofing with AIW - Article November 2019
Findlay Evans Waterproofing with AIW - Article November 2019Findlay Evans Waterproofing with AIW - Article November 2019
Findlay Evans Waterproofing with AIW - Article November 2019
 
Generate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model StrategyGenerate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model Strategy
 
Top Call Girls in Mumbai || +919920725232 || Quick Booking at Affordable Price
Top Call Girls in Mumbai || +919920725232 || Quick Booking at Affordable PriceTop Call Girls in Mumbai || +919920725232 || Quick Booking at Affordable Price
Top Call Girls in Mumbai || +919920725232 || Quick Booking at Affordable Price
 
Findlay Evans Waterproofing with AIW - Article October 2018
Findlay Evans Waterproofing with AIW - Article October 2018Findlay Evans Waterproofing with AIW - Article October 2018
Findlay Evans Waterproofing with AIW - Article October 2018
 
StoneSelexNaturalStoneFauxStoneSiding.pdf
StoneSelexNaturalStoneFauxStoneSiding.pdfStoneSelexNaturalStoneFauxStoneSiding.pdf
StoneSelexNaturalStoneFauxStoneSiding.pdf
 
一比一原版(UWA毕业证)西澳大学毕业证如何办理
一比一原版(UWA毕业证)西澳大学毕业证如何办理一比一原版(UWA毕业证)西澳大学毕业证如何办理
一比一原版(UWA毕业证)西澳大学毕业证如何办理
 
How Live-In Care Benefits Chronic Disease Management.pdf
How Live-In Care Benefits Chronic Disease Management.pdfHow Live-In Care Benefits Chronic Disease Management.pdf
How Live-In Care Benefits Chronic Disease Management.pdf
 
sim owner details | +923099554040 | sim owner details pakistan
sim owner details | +923099554040 | sim owner details pakistansim owner details | +923099554040 | sim owner details pakistan
sim owner details | +923099554040 | sim owner details pakistan
 
The Late Samuel Sekyere Safo-Ankoma Funeral Booklet
The Late Samuel Sekyere Safo-Ankoma Funeral BookletThe Late Samuel Sekyere Safo-Ankoma Funeral Booklet
The Late Samuel Sekyere Safo-Ankoma Funeral Booklet
 
How to Handle Open Web Application Security Project(OWASP) Top Vulnerabilities
How to Handle Open Web Application Security Project(OWASP) Top VulnerabilitiesHow to Handle Open Web Application Security Project(OWASP) Top Vulnerabilities
How to Handle Open Web Application Security Project(OWASP) Top Vulnerabilities
 
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital MarketingBilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital Marketing
 
How Does Fantasy Sports Mobile App Make Money?
How Does Fantasy Sports Mobile App Make Money?How Does Fantasy Sports Mobile App Make Money?
How Does Fantasy Sports Mobile App Make Money?
 
The 5 Most Important Pipefitter Tools.pdf
The 5 Most Important Pipefitter Tools.pdfThe 5 Most Important Pipefitter Tools.pdf
The 5 Most Important Pipefitter Tools.pdf
 
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdfPEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
PEST CONTROL IN SYDNEY | EXPERT TIPS.pdf
 
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdfThe best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
 
#1 Call Girls in Mumbai || +919004268417 || Quick Booking at Affordable Price
#1 Call Girls in Mumbai || +919004268417 || Quick Booking at Affordable Price#1 Call Girls in Mumbai || +919004268417 || Quick Booking at Affordable Price
#1 Call Girls in Mumbai || +919004268417 || Quick Booking at Affordable Price
 
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in PakistanCheck SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
 
Unification of SMS API in Pakistan | Best SMS API Service Provider
Unification of SMS API in Pakistan | Best SMS API Service ProviderUnification of SMS API in Pakistan | Best SMS API Service Provider
Unification of SMS API in Pakistan | Best SMS API Service Provider
 

ComSec Security Systems - Tanzania

  • 1. ComSec Security SystemsComSec Security SystemsComSec Security SystemsComSec Security Systems Company Presentation
  • 2. ComSecComSec -- Business CardBusiness CardComSecComSec Business CardBusiness Card • Name: ComSec Security Systems • Company Registered in Tanzania• Company Registered in Tanzania • Head Offices on Nyerere road, DSM • Branches in all major regions of TanzaniaBranches in all major regions of Tanzania • Rich experience of professionals across the globe with expertise in Solution Design, Implementation, R&D and C t S tCustomer Support • Leader in professional End-to-End Security solutions • Providing Risk Assessment and consulting services• Providing Risk Assessment and consulting services • System Integration and Turn Key Projects
  • 3. Who is ComSecWho is ComSecWho is ComSecWho is ComSec • Comsec is a System Integration Company providing professional security solutions usingproviding professional security solutions using advanced technologies in the following areas: • CCTV Surveillance • Access Control • Detection and Screeningg • Perimeter Security / Fencing • Intruder Alarm Systems • Fire Detection & Alarm System• Fire Detection & Alarm System • ICT/ Structured Cabling • Vehicle Tracking
  • 4. Our Value Added ServicesOur Value Added Services • ComSec offers customized, bespoke solutions to suit client/ project specific needs, in lines with global norms and best practices. • ComSec has a rich in-house talent as well as a resource pool• ComSec has a rich in-house talent as well as a resource pool comprising of industry experts from around the globe who are well experienced in designing and delivering a complete range of Fire, Security & ICT solutions from a basic set-up to a complex integratedSecurity & ICT solutions from a basic set up to a complex integrated solution depending on the business needs • Comsec offers Value Added Services in form of:• Comsec offers Value Added Services in form of: • Consultancy Risk Management • System IntegrationSystem Integration • Annual Maintenance/ Support Services
  • 5. Our MissionOur MissionOur MissionOur Mission Provide State-of-the-Art, Professional, Security Solutions to Protect Property, People and Information
  • 7. Selected ClientsSelected Clients Ministry of Finance National Assembly
  • 8. Our Distinct ValuesOur Distinct ValuesOur Distinct ValuesOur Distinct Values • Professional Complete End-to-EndProfessional, Complete, End to End Solutions Advanced Technologies– Advanced Technologies – R&D Evaluation & Testing P f i l C t Wid S t• Professional Country Wide Support – Help Desk – Dedicated Professional Department
  • 9. O S l iO S l iOur SolutionsOur Solutions
  • 10. CCTV SurveillanceCCTV SurveillanceCCTV SurveillanceCCTV Surveillance • Outdoor / Indoor Cameras • Day / Night /Thermal Imaging • Stationary / PTZ Cameras • High Quality Digital Video Recording Central Monitoring / Control• Central Monitoring / Control Rooms • Intelligent Video Analysisg y Solutions
  • 11. Mega Pixel Why Megapixel for Facial Recognition?Why Megapixel for Facial Recognition? Mega Pixel CIF 352 x 288 11
  • 12. Access ControlAccess ControlAccess ControlAccess Control • Controlling access to secure areas • Biometric or Card-Based SystemsSystems • Controlling doors, gates, turnstiles • Access Monitoring and recording • Time & Attendance• Time & Attendance
  • 13. Perimeter SecurityPerimeter Security • Smart Fencing – Vibration sensors along theVibration sensors along the fence detecting the intrusion location – Infrared / Microwave BeamsInfrared / Microwave Beams • Video surveillance – Day and night cameras with f fInfrared illuminators for improved night viewing • Video analyticsy – “smart eye” generating alarms upon movement and events along the fence
  • 14. Fire Alarm SystemFire Alarm SystemFire Alarm SystemFire Alarm System Remote Digital Annunciators Smoke Detector Siren Heat Detector Gas Detector M iElectricity Disconnect Main Controller Manual Fire Alarm Call Point Air-conditioning Shutdown Automatic Dialer Extinguishing Controller Automatic ExtinguishingComputer Control & Display g gComputer Control & Display
  • 15. Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions • Banking Industry – Branches • CCTV monitoring for branch and ATMs • Intruder Alarm (with Panic buttons) • Fire Alarm • Access Control • All systems integrated – Head Office / Regional Offices • CCTV monitoring for building In/Out • Fire Alarm • Access Control for access to secure areas • All systems integrated • Control room for remote central monitoring of branches and regional officesg
  • 16. Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions • Government/Police/Military – CCTV SurveillanceCCTV Surveillance – Access Control – Fire Alarm – Screening equipment – metal detectors, x-ray machines – Vehicle access monitoring • Vehicle tags, license plate recognition cameras, • barriers, gates – Control room • Monitoring the building • remote central monitoring of regional offices / camps (government organizations like Social Security Fund Pension Funds etc )Security Fund, Pension Funds etc.) – Perimeter Protection • Smart Fencing • CCTV Surveillance • Smart VideoSmart Video
  • 17. Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions • Cellular Companies – Head Office / Regional Offices • CCTV monitoring for building In/Out • Fire Alarm • Access Control for access to secure areas • All systems integrated • Control room for remote central monitoring of regional offices and base stations – BTS Base Staion Sites Th ft/i t i ti• Theft/intrusion prevention • CCTV Surveillance • Perimeter protection • Access Control • Control Room - Centralized CCTV viewingg and alarm
  • 18. Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions • Local Government (parastatals) – Governor Building • CCTV monitoring for building In/Out • Fire Alarm • Access Control for access to secure areas • All systems integrated – City Surveillance • Monitoring roads • Monitoring junctions • Monitoring entrances to the city • Command & Control Center- Centralized alarm and monitoring from Head Office • Saves money on guards
  • 19. Typical Markets & SolutionsTypical Markets & SolutionsTypical Markets & SolutionsTypical Markets & Solutions • Mining Companies – Major Threats • Perimeter intrusion • Illegal mining • Theft • Theft Prevention – Access Control –cards, biometrics, turnstiles, metal detectors M i f i k t– Main areas of risk - storage, processing areas and areas where heavy machinery is present – Biometrics - ensure only authorized individuals are allowed on site for labor intensive areas,. Fingerprint and facial recognition are popular recognition methods used in mines
  • 20. Case StudyCase Studyyy Gold Mine in TanzaniaGold Mine in Tanzania
  • 21. Case StudyCase StudyCase StudyCase Study • Perimeter fence of 1.8Km • Two sets of fences, 6m apart, to create no-man’s-land • Single gate with full-height turnstiles f l d b i f hi lfor people and barriers for vehicles • Card system – Access control by card following a card (employee card + guard card) tocard (employee card + guard card) to ensure secure access to sensitive areas – Time & Attendance M t t t d G ld Milli• Most protected area – Gold Milling Section
  • 22. Case Study Contd..Case Study Contd..Case Study Contd..Case Study Contd.. • CCTV System – Cameras every 50m along the perimeter – Video analytics (smart Video) for alerting upon unauthorized movementalerting upon unauthorized movement in restricted areas
  • 23. Typical Markets SolutionsTypical Markets Solutions ((ContdContd)…..)…..((ContdContd)…..)….. • Security Control Room with monitoring of: CCTV Surveillance– CCTV Surveillance – Access Control – Fire Alarm Signal – Screening equipment – metal detectors,g q p , x-ray machines – Vehicle access monitoring • Vehicle tags, license plate recognition cameras, • barriers, gates, g – Control room • Monitoring the building • remote central monitoring of regional offices / camps (government organizations like Social S )Security Fund, Pension Funds etc.) – Perimeter Protection • Smart Fencing • CCTV Surveillance S t Vid• Smart Video
  • 24. System IntegrationSystem IntegrationSystem IntegrationSystem Integration • Turnkey Solutions – Advanced Design and implementation • Integration between CCTV, Access Control , Perimeter Security and Alarm Systems • Integration to existing systems to create a complete security envelope • Remote Monitoring – Control Centers – Alarm & Response – Call Center
  • 25. Integrated Security ConceptIntegrated Security Concept Smoke/ Heat Manual Fire Siren Smoke/ Heat Detector Alarm Call Point Main Fire Panel Intelligent Video Management Dual Authentication Readers – Card + Pin g Platform Pin Security Control Center Multi-Door Access Control TCP/ IP Intelligent Access Controllers Vehicle Barrier Intruder Alarm Systems Cameras and Video Recorders
  • 26. Control Room Monitoring &Control Room Monitoring & ReportingReporting-- Future CMS Set upFuture CMS Set up
  • 27. Selected Projects & CustomersSelected Projects & Customers Partial ListPartial List • NSSF Social Security FundPartial ListPartial List • Tigo – Mobile Operator – Centralized Access Control – Centralized CCTV Monitoring • NMB – Bank- Over 300 Sites • NSSF – Social Security Fund – CCTV CMS – Access Control – Turnstiles – Vehicle barriers – Intruder Alarm / Panic buttons – CCTV: Branches, ATMs – Fire Alarm – Access Control – Postal Bank- Over 25 Branches – Access Control – IP CCTV • British Gas • Akiba Commercial Bank- Over 15 Sites • CCTV • Standard Chartered Bank- All Sites in Tanzania • CCTV Vi T – Access Control – Turnstiles – Intruder Alarm • National Assembly A C l• Viva Towers – CCTV Surveillance – Access Control (Turnstiles, Barriers) – Public Address – Fire Alarm – Access Control – Scanners • Ministry of Finance – Access Control – CCTVFire Alarm • Puma Energy – CCTV – Access Control – Intrusion Detection – CCTV – Document Tagging • CRDB Bank – CCTV
  • 28. Selected Projects & CustomersSelected Projects & Customers Partial ListPartial List contdcontdPartial List..Partial List..contdcontd • Everrett Aviation – JNIA Airport – CCTV – Access Control ICT & Structured Cabling • NSSF – Luxury Hotel in Mwanza – CCTV – Access Control – Public Address Vehicle barriers– ICT & Structured Cabling • PUGU Mall – CCTV – Public Address – ICT & Structured Cabling – Vehicle barriers • ECO Bank HQ- Kinondoni – IP CCTV – Access Control – Intruder AlarmICT & Structured Cabling – Voice & Data • UHURU Mall – CCTV – Public Address – Fire Alarm • MOGAS – CCTV – Access Control – ICT & Structured Cabling – Voice & Data • New NMB HQ- Dar – IP CCTV Surveillance IP A C t l (T til B i ) – Intruder Alarm • NIC Bank HQ- PSPF Tower – IP CCTV – Access Control I t d Al– IP Access Control (Turnstiles, Barriers) – Public Address – Intruder Alarm – Integrated Command and Control Room Set up – Intruder Alarm – Fire Alarm • I&M Bank- All Branches – CCTV – Access Control with Time & AttendanceAccess Control with Time & Attendance
  • 30. Maintenance MethodologyMaintenance MethodologyMaintenance MethodologyMaintenance Methodology • Certify 2 dedicated engineersCertify 2 dedicated engineers • 2 scheduled maintenance visits PA D C ll P• Down Call Process:
  • 32. SummarySummary -- Why ComSecWhy ComSecSummarySummary Why ComSecWhy ComSec • Professional Complete End-to-EndProfessional, Complete, End to End Solutions Advanced Technologies– Advanced Technologies – R&D Evaluation & Testing P f i l C t Wid S t• Professional Country Wide Support – Help Desk – Dedicated Professional Department
  • 33. Our Business is to Secure YoursYours