Download presentation
Presentation is loading. Please wait.
Published byBryan Shields Modified over 9 years ago
2
“Why do we need Security” Each business has unique security and safety needs, e.g. Inventory Shrinkage and Theft Personal Safety Break Ins Moving Your Business Expansion of the Business Communal or terrorist attack Possible threats from visitors Internal threats etc. Any other threat
3
“Our Approach” Security ApplicationAssessmentTechnologySolution
4
“Our Services” Risk Assessment Solution Designing Resource utilization Implementation Cost effective solution from day One
5
Surveillance & Monitoring Monitoring the sensitive areas Monitor point-of-sale exceptions Observe and record floor activities. "Walk a beat" by programming a moving camera to pan, tilt, and zoom within a defined pattern. Performing covert surveillance (where legally applicable) Integrate with access control systems to provide video of persons entering and leaving the premises Complement asset tracking systems to provide video when a tagged asset leaves the premises. Wireless & Remote Surveillance.
6
Attendance & Payroll Management Features Fully menu driven graphical user interface Harness the power of automatic data acquisition Keep your leave balances Maintain attendance records Plan your manpower better Speed up data preparation for payroll Ensure accuracy of records Stretch the capacity of your hardware Grow as much you like and at your own speed
7
Intrusion Alarm System Intrusion detection Theft detection 24x7 detection Remote Notification Local alarm raising Integration with Access control system
8
Fire Detection & Control Smoke detection Heat detection Flame/ Spark detection Fighting and suppression system
9
Home Security & Automation Video Door Phones Light control Fire & Gas detection Automated Gates Home Alarm System Customized Solutions Perimeter fencing
10
Access Control System Proximity Card Based Solutions Contact less Smartcard Based Solutions Biometric Based Solutions Turnstiles, Boom Barriers etc. Bollards and Spike Active RFID Based Applications
11
Vehicle Parking Management System Requirement : Scanning underneath incoming vehicles for threats
12
Perimeter Control Outer Perimeter Control Power Fencing, Microwave Sensors, Cable Fencing etc. Interior Perimeter control Motion Sensors, Electronic Beam detectors
13
GIS/ GPS based Tracking & Control A Global Positioning System (GPS) is a positioning and navigational system. A GPS receiver receives the signal broadcast by satellites. Uses information contained in the signal to calculate the position of the receiver. GPS ranges from 100 meters to millimeters.
14
Central Monitoring Station This system is connected to a network or a dial-up receiver, capable of monitoring security, fire, intrusion and panic alarms of multiple sites that range from 500 to 80,000 sites. Offers 24/7 monitoring of a facility Diverse service options Future integration with BMS Window-based system Local security tie-up Immediate rescue. Centralized database Definable alarm levels
15
Thank You. E-mail : info@focuseyetech.com
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.