SlideShare une entreprise Scribd logo
1  sur  61
Total Security Solutions
from Tech SIS
Presentation FlowPresentation Flow
• About SIS
• Tech SIS Advantage
• Group Management
• Products and Partners
• Our Solution offerings
• SIS Clients
• Tech SIS – Your Partner for Concept Design,
Implementation, Operation & Maintenance
• Training subject
About SISAbout SIS
• SIS (Security and Intelligence Services (India) Ltd) is a Public Limited
Company registered under companies act 1956 providing security
services to the organized sector. Set up in 1973, almost 35years ago,
SIS has been one of the pioneers in the Indian Private Security Industry,
having grown today into a “Total Security Solutions Provider”.
• In the year 2008, SIS acquired Chubb Security of Australia, a 100 year
old market leader with over 6000 employees, offering security services
to corporate customers across all parts of Australia. The company has
been renamed MSS Security (An SIS Group Enterprise). With this 100%
acquisition, SIS is now Asia Pacific’s largest manpower security
organization. SIS (India) Ltd. has in- house, well organized five
residential training academies and five urban training centres which
have a combined capacity of training over 15000 security personnel and
200 managers in a year.
Training Scope
• CCTV ( Analog , Hybrid & IP )
• Access Control system
• Time attandance system
• Fire Alarm System
• Intruder Alarm System
• Boom barrier & Bollard
• Scanners and detection equipment
What is an Analog CCTV security system?
Cameras on an modern analog CCTV system send their video in the
traditional base band format over coaxial cabling back to a digital video
recorder (DVR). Here, video is digitized and stored on hard drives. Most
modern DVRs are a network device, and as such can be accessed remotely
from the LAN, or with the proper configuration, from across a WAN or the
internet. There are no tapes to change. Video is kept on hard drives,
typically on a FIFO basis so there is always a rolling video archive of the
past X days. So, despite the fact that video is being transmitted from the
cameras in an analog format, live and recorded video is still available over
the network.
What is an IP CCTV security system?
IP video cameras broadcast their video as a digital stream over an
IP network. Like an analog system, video is recorded on hard
drives, but since the video is an IP stream straight from the camera,
there is more flexibility as to how and where that video is recorded.
The DVR is replaced with an NVR (network video recorder), which
in some cases is just software since it doesn't need to convert
analog to digital. Video footage can then be stored on new or
existing network RAID drives as directed by the NVR software.
What is an Hybrid CCTV security system?
Hybrid CCTV systems combine IP and analog video, and can be a
great way to transition an analog system to IP without needing to
replace all of the existing cameras. Many NVR boxes on the market
today are actually Hybrids in that they accept analog cameras, and
IP cameras and combine them onto a single platform for the user.
What is CCTV?
• CCTV is "Closed-Circuit Television"
Basic Devices ( Analog )
Camera
Coaxial Cable
BNC Connector
Digital Video Recorder
Monitor
Connectivity
Camera
Coaxial Cable
Digital Video Recorder Monitor
Types Of Cameras IP/Analog
Dome Type
Box Type
Indoor Speed dome
Outdoor speed dome
Zoom Camera
IR Dome Camera
IR Box Camera
Thermal Camera
Outdoor Box Camera
Basic Devices Hybrid
Analog Camera
IP Camera
IP Camera
Switch Hybrid DVR
Monitor
Basic Device IP
IP Cameras Switch
Server
OR
Network Video Recorder
Management
Software
Access Control System
……………A system which enables an authority to control access to areas and
resource in a given physical facility .
Physical Access control :In physical security , the term access control refers to the
practice of restricting entrance to a property , building or room to un authorized personnel .
Logical Access control : In this an Access control system determines who is allowed to
enter or exit , where , when and how they are allowed to enter or exit .
Access Control Product Types : An Access control system includes the following product
types as Control panel ,standalone controllers, readers , credentials and software
Main Components
Control Panel :
Control panels control physical access through doors and communicates with the management software ( PC )
through a TCP/IP or serial RS -485/422 communication line.
Standalone Controller :
Standalone controllers are one door control panel which have built-in RFID , keypad or biometric reader
Reader :
Readers reads the credential information and send it to control panels via a Wiegand communication line .
Readers can have one or more interfaces accommodating a combination of RFID cards as well as a keypad and
biometric reader .
Credential :
A card or credential contain a pass code , number or biometric information which identifies the user to access
control system
Management Software :
Access control software enables the user to program a customized database into the system .
Cardholder access parameters can be setup , as well as enabling automatic door control and a
number of customized features
Access Control
• Controller
• Reader
A) Proximity reader
Access control
B)Pin type reader
C)Biometric reader
D)Smart card reader
Basic Devicess of Access control
• Push button
• EM lock
• Access cards
• A) Proximity cards
• B) Smart cards
Basic Devices of Access control
CONTROLLER
EM LOCK
READER
PUSH
BUTTON
ACCESS CARD ACCESS CONTROL SOFTWARE
ACCESS CONTROL SERVER
Connectivity
NETWORK
Time attendance system
TIME ATTANDANCE SYSTEM
Connectivity
Fire alarm system
• Fire panel
• Sensor
A)Smoke sensor
B)Heat sensor
• Manual call point
• Repeater
• Hooter
Basic devices of Fire alarm system
FIRE ALARM PANEL
SMOKE SENSOR
HEAT SENSOR
MANUAL CALL POINT
REPEATER PANEL
HOOTER
RESPONSE INDICATOR
Connectivity
What is the difference between a Conventional fire alarm system
and an Addressable fire alarm system?
A Conventional Fire Alarm System is typically used in smaller applications.
They are usually less expensive than an addressable system but have
limitations regarding reporting the location of devices. A conventional
system will let you know which zone is in alarm, but not necessarily which
device. A zone may contain several smoke detectors or pull stations. You
may know which area of the building the smoke detector or pull station is
located in but you will not know the location of the device that is in alarm.
An Addressable Fire Alarm System can be programmed to indicate the
exact device that is in alarm. A display on the front of the panel will indicate
the device type and location. For example, the display will indicate
photoelectric smoke detector in alarm in first floor corridor outside room 201.
This information can be extremely vital in larger facilities. These panels can
usually be networked with other panels on a campus or within a facility.
Intruder alarm system
An intruder alarm system is designed to detect the presence of an intruder
your premises - trigger a local siren to deter activity and
communicate the alarm event to a security monitoring centre so an
appropriate response can be coordinated.
The objectives of an intruder alarm system are:
• To protect the physical assets within an unoccupied premises
• To provide a safer environment for occupants
• To deter crime and vandalism
• To enable a co-ordinated response to be actioned when an intrusion
event occurs
Intruder alarm system
• Intruder alarm panel
• Sensor
A)Magnetic contact
B)Multi function detector
C)PIR sensor
D)Ceiling PIR sensor
• Panic switch
• Sounder
Basic Devices of Intruder alarm system
INTRUDER PANEL
MAGNETIC CONTACT SENSOR
PIR MOTION SENSOR
CEILING PIR SENSOR
MULTI FUNCTION DETECTOR
PANIC SWITCH
SOUNDER
Connectivity
Zone-1
Zone-2
Zone-3
Video Door phone
Video door entry (also known as a video door phone) is a stand-alone
system used to manage calls made at the entrance to a building (residential
complex, detached family home, workplace, etc.) with access controlled by
audiovisual communication between the inside and outside. The main
feature of video door entry is that it enables the person indoors to identify
the visitor and, if (and only if) they wish, engage in conversation and/or open
the door to allow access to the person calling.
Video door phone
• Indoor unit
• Outdoor unit
Connectivity
Boom Barrier & Bollard
BOOM BARRIER
• Hydraulic
• Electromechanical
BOLLARD
• Hydraulic
• Electromechanical
Working
Tier -1
Tier -2
Tier -3
Entry Protection
Gates
•Swing
•Sliding
•Rolling Shutter
Vehicle Access Control
• Boom Barrier
• Bollards
• Road Blocker
• Tyre killer
Pedestrian Control
•Tripod Turnstiles
•Swing Gates
•Full Height Turnstile
•Under Vehicle Scanner
•ANPR system
•Parking Management System
Gates
• Swing Gates - Electro mechanical / hydraulic operator for
residential, commercial and industrial
1
1. Automation Operator
2. Signaling light.
3. Push Button / Key operated button.
4. Electronic Control Board.
5. Remote receiver.
6. Safety Beam/photo switch / loop sensor.
Sliding Gate
• Automated Systems for sliding gates in residential, Commercial &
Industrial use
1. Operator with electronic Control Board.
2. Signaling light
3. Push Bottom/Key operated button
4. Remote controls
5. Safety Beam/Photo switch/loop sensor
Rolling Shutter
Rolling Shutter
• Gear motor for spring balanced rolling shutters.
• Push Button / Key operated button.
• Control board.
• Safety Electric Brake - optional
Vehicle Access Control
Boom Barrier :
• Barrier operator with electronic control board.
• Aluminium profile barrier with rubber padding.
• Signalling light.
• Push Button / Key operated button.
• Safety Beam / photo switch / loop sensor
• Perfectly calibrated stopping
• Electro hydraulic solution for all applications
• Wide range
• Anti crash
Bollards
• Automatic Rising Hydraulic Bollards
• Semi Automatic-Rising Gas Actuated Bollards
• Metal cylinder, with ultra high resistance to impact and weather.
• Piston mechanism enabling movement by command.
• Housed inside a compartment in the road parking and discourages traffic
and/or parking.
• Can be activated or disabled automatically by commands executed by
authorized persons (holders of smart cards, remote controls, etc.) or by
pre-set time-based automatic commands (hourly programmer).
• Double-acting hydraulic activation and a hydraulic unit (Built into the
device) to motorise the bollard
System Design
Road Blocker
Road blocker barricades provide protection to sites from extreme
Vehicle Borne Improvised Explosive Device (VBIED) attack
• The hydraulic power pack is controlled by a programmable logic
controller (PLC) enabling connection of virtually any access control
to the road blocker
Benefits
• Comprehensive understanding of attack resistance
• Protection from multi-direction impact approach
• Confidence in proven performance
• Strength and Durability
• Operational under power failure conditions
• Flexibility to interface with all forms of access control
• Reliable and Dependable
Tyre Killer
• Tire Killer Barricades are designed for use in high security high traffic
applications
• Ideally suited for approach entrances to banks, military installations, airports, docks,
cash collection depots, government offices etc
• Tire killers teeth retract below ground level when a signal is received from the push
button or integrated access control unit providing safe access for authorised vehicles.
When the vehicle has passed, the tire killers teeth return to the active position,
ensuring total protection from unauthorised vehicle intrusion
Key Features
• Full electrical isolation and overload protection
• Manual operation facility with safety interlock
• Electro/Hydraulic Operation
• Tire Killer height in raised position 475mm
• Fully galvanised and powder coated construction to provide maximum protection in extreme
environments
Pedestrian Control
Tripod Turnstiles –
• designed to control pedestrians entering or exiting
restricted areas, usually under surveillance, in low
security situations.
This design provides a cost effective, anti-tailgating
solution with a bar rotation of 3 x 120 degrees
Swing Gates
• Swing gate for handicapped and other access control
Pedestrian Control
Full Height Turnstile
• Mechanical lock single lane full height turnstile
• Motor driven single lane full height turnstile
• Electro-mechanical lock single lane full height turnstile
• Motor driven dual lane full height turnstile
• Electro-mechanical lock dual lane full height turnstile
single lane dual lane
Pedestrian Barrier
Retractable Barrier Or Flap Barrier
• Retractable panel barrier has been developed as a user friendly solution for
the fast and controlled processing of pedestrians entering or exiting
restricted areas, usually under surveillance, offering a typical throughput of
up to 60 people per minute.
U.V.S.S
Under Vehicle scanning System
• Under Vehicle Surveillance System is used for detecting explosives, drugs
or other unauthorized material.
• solutions are designed to scan, monitor, and digitally record crisp clear
digital video images of the entire width of a vehicle's undersides all with one
permanent or portable system.
• cost effective and convenient
• solution for checking passenger vehicles, vans, buses, semi tractors, trucks
& trailers and more.
• Ideal solution for government, military, corporate and transportation facilities
wherever complete vehicle monitoring is required.
System Design
ANPR / ALPR System
• ALPR is an IP based license plate recognition system that reads, detects,
alerts and stores license plate information of the vehicles. It can even use
an analog camera by adding the IP encoder module to the camera.
• License Plate Recognition is typically used to control vehicle access,
• such as gate barriers, parking spaces, toll gates, and traffic enforcement
environments.
IT CAN :
• Detect, Read and Store License Plates
• Alarm & Alert you
• Vehicle log & Search
• Integrate to Build Intelligent Systems
HOW IT WORKS ?
• License Plate Recognition solution detects, reads alerts and stores license plate
information alongside with video footage.
capture
• An IP video camera (or an analog camera connected to a video encoder) captures images of a
car with a license plate.
• The video is captured by the IVS capture server and provides to the IVS LPR server for license
plate processing.
Process
• The IVS LPR server receives and processes the feed. License plates are detected and stored in
the IVS database
Decide
• Each license plate is compared to user-defined positive and negative lists. These lists define if an
action is to be taken, such as open a gate (I/O event), send an alarm or if no action should be
taken at all.
Action
• Based on the result of the action lists, the action is carried out. The system can integrate with
most I/O systems; send alarms to the video system, via email or SMS (using an email-SMS
service). User defined events, such as record video can also be configured.
System Design
Detection equipment
• Hand held metal detector
• Door frame metal detector
FG1 Security Pole
• Totally Passive Technology
• Robust Design for Indoor & Outdoor Use
• Aesthetically Pleasing Design
• Portable Operation with Rapid Deployment
• Covert Operation
• Uniform Coverage from Head to Toe
• Hi Sensitivity
• Working in Non-Flat Surface
• Mains Supply with 7 hrs of Battery Life
• Surprise Element
Features
● Full body scanning
● Freestanding or wall mounted deployment
● Covert screening possible
● Low cost of deployment
● Robust aluminium design
● Simple to operate
OPERATIONS :
● Freestanding
● Wall Mounted
● Covert
DEPLOYMENT :
● Unobtrusive door / entry security
● High end building security.
● Hotels, Malls, Multiplexes, Museums, etc.
● Prison, courthouse and police station screening Flexible VIP security Covert surveillance.
● Public event screening.
● Scanning for knives on street operations
Detection equipment
Baggage Scanner
Baggage Scanning Machine is a most common equipment used
for security reasons now a days. It is used to check luggage in
detail and also in short time. When a bag enters into the tunnel
of scanner, sensors on both side senses it and send a message
to X-Ray Generator which generates X-Ray. The X-rays passes
through the bag and make an image on the screen.
Detection equipment
• Baggage Scanner
Guard tour system
• RFID Gun
• RFID Tags
• Patrol management software
Connectivity
Total Security Solutions-30 BATCH 11-10-2013

Contenu connexe

Tendances

Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008Edward vd Berg
 
Encrypted Voice Communications
Encrypted Voice CommunicationsEncrypted Voice Communications
Encrypted Voice Communicationssbwahid
 
Blaze automation security product line sridhar ponugupati (2)
Blaze automation security product line sridhar ponugupati (2)Blaze automation security product line sridhar ponugupati (2)
Blaze automation security product line sridhar ponugupati (2)Blaze_Hyd
 
Blaze automation profile jan 2013
Blaze automation profile jan 2013  Blaze automation profile jan 2013
Blaze automation profile jan 2013 Blaze_Hyd
 
0 safety presentation master v1
0 safety presentation master v10 safety presentation master v1
0 safety presentation master v1confidencial
 
KEDACOM - Recognitive IP video solutions
KEDACOM - Recognitive IP video solutionsKEDACOM - Recognitive IP video solutions
KEDACOM - Recognitive IP video solutionsKEDACOM
 
Catalogue interphone video v1 en
Catalogue interphone video v1   enCatalogue interphone video v1   en
Catalogue interphone video v1 enGhomsi Adrien
 
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici - Te...
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici - Te...Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici - Te...
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici - Te...tecnoimprese
 
Lp 2010 operation-theory
Lp 2010 operation-theoryLp 2010 operation-theory
Lp 2010 operation-theoryNguyen Duc Anh
 
2N Solutions oveview (2)
2N Solutions oveview (2)2N Solutions oveview (2)
2N Solutions oveview (2)Knox Nunn
 
Reader Options Access Control 2015
Reader Options Access Control  2015Reader Options Access Control  2015
Reader Options Access Control 2015Andy Armour
 
Access control system
Access control systemAccess control system
Access control systemMatrix COSEC
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Team
 
Sales presentation EnGenius EDS1130
Sales presentation EnGenius EDS1130Sales presentation EnGenius EDS1130
Sales presentation EnGenius EDS1130EnGenius Europe
 
KEDACOM - Recognitive Tracking System (v4.2) BF
KEDACOM - Recognitive Tracking System (v4.2) BFKEDACOM - Recognitive Tracking System (v4.2) BF
KEDACOM - Recognitive Tracking System (v4.2) BFKEDACOM
 

Tendances (20)

UNSPresentation
UNSPresentationUNSPresentation
UNSPresentation
 
Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008
 
Security Technology Systems
Security Technology SystemsSecurity Technology Systems
Security Technology Systems
 
Encrypted Voice Communications
Encrypted Voice CommunicationsEncrypted Voice Communications
Encrypted Voice Communications
 
Blaze automation security product line sridhar ponugupati (2)
Blaze automation security product line sridhar ponugupati (2)Blaze automation security product line sridhar ponugupati (2)
Blaze automation security product line sridhar ponugupati (2)
 
SlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice EncryptionSlingSecure Mobile Voice Encryption
SlingSecure Mobile Voice Encryption
 
Biometric Access and Attendance Terminal
Biometric Access and Attendance TerminalBiometric Access and Attendance Terminal
Biometric Access and Attendance Terminal
 
Blaze automation profile jan 2013
Blaze automation profile jan 2013  Blaze automation profile jan 2013
Blaze automation profile jan 2013
 
Bio lynx - Biometric attendance machine
Bio lynx - Biometric attendance machineBio lynx - Biometric attendance machine
Bio lynx - Biometric attendance machine
 
0 safety presentation master v1
0 safety presentation master v10 safety presentation master v1
0 safety presentation master v1
 
KEDACOM - Recognitive IP video solutions
KEDACOM - Recognitive IP video solutionsKEDACOM - Recognitive IP video solutions
KEDACOM - Recognitive IP video solutions
 
Catalogue interphone video v1 en
Catalogue interphone video v1   enCatalogue interphone video v1   en
Catalogue interphone video v1 en
 
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici - Te...
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici - Te...Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici - Te...
Roma Tech & South Europe Forum - Convegno RF & Wireless Sfide e benefici - Te...
 
Lp 2010 operation-theory
Lp 2010 operation-theoryLp 2010 operation-theory
Lp 2010 operation-theory
 
2N Solutions oveview (2)
2N Solutions oveview (2)2N Solutions oveview (2)
2N Solutions oveview (2)
 
Reader Options Access Control 2015
Reader Options Access Control  2015Reader Options Access Control  2015
Reader Options Access Control 2015
 
Access control system
Access control systemAccess control system
Access control system
 
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
NXP MIFARE Webinar: Innovation Road Map: Present Improved- Future Inside
 
Sales presentation EnGenius EDS1130
Sales presentation EnGenius EDS1130Sales presentation EnGenius EDS1130
Sales presentation EnGenius EDS1130
 
KEDACOM - Recognitive Tracking System (v4.2) BF
KEDACOM - Recognitive Tracking System (v4.2) BFKEDACOM - Recognitive Tracking System (v4.2) BF
KEDACOM - Recognitive Tracking System (v4.2) BF
 

En vedette

05. Франция и Италия
05. Франция и Италия05. Франция и Италия
05. Франция и ИталияAnastasiyaF
 
Curriculum Vitea - 20150518
Curriculum Vitea - 20150518Curriculum Vitea - 20150518
Curriculum Vitea - 20150518Jan Hommes
 
Presentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferencePresentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferenceBill Despo
 
Top 8 hotel front office supervisor resume samples
Top 8 hotel front office supervisor resume samplesTop 8 hotel front office supervisor resume samples
Top 8 hotel front office supervisor resume samplestonychoper3705
 
Мастацтва 1945 - 1955 гг.
Мастацтва 1945 - 1955 гг.Мастацтва 1945 - 1955 гг.
Мастацтва 1945 - 1955 гг.AnastasiyaF
 
Thuốc Chữa Viêm Khơp
Thuốc Chữa Viêm KhơpThuốc Chữa Viêm Khơp
Thuốc Chữa Viêm Khơpjarrett628
 
презентація рафаель санті
презентація рафаель сантіпрезентація рафаель санті
презентація рафаель сантіAnyaMazur
 
мажуть
мажутьмажуть
мажуть16072010
 
Sustainable Design slide show
Sustainable Design slide showSustainable Design slide show
Sustainable Design slide showJernell Mclane
 
Basic ceo's tasks for small group
Basic ceo's tasks for small groupBasic ceo's tasks for small group
Basic ceo's tasks for small groupNguyen Van Thang
 
عروض عيد ميلاد كارفور
عروض عيد ميلاد كارفورعروض عيد ميلاد كارفور
عروض عيد ميلاد كارفورNour Elbader
 

En vedette (17)

05. Франция и Италия
05. Франция и Италия05. Франция и Италия
05. Франция и Италия
 
OTHELLO
OTHELLOOTHELLO
OTHELLO
 
Curriculum Vitea - 20150518
Curriculum Vitea - 20150518Curriculum Vitea - 20150518
Curriculum Vitea - 20150518
 
Presentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 ConferencePresentation for FPANJ Spring 2015 Conference
Presentation for FPANJ Spring 2015 Conference
 
Natural science
Natural scienceNatural science
Natural science
 
Why Your Business Needs Social Media
Why Your Business Needs Social MediaWhy Your Business Needs Social Media
Why Your Business Needs Social Media
 
Top 8 hotel front office supervisor resume samples
Top 8 hotel front office supervisor resume samplesTop 8 hotel front office supervisor resume samples
Top 8 hotel front office supervisor resume samples
 
PDF_thesis
PDF_thesisPDF_thesis
PDF_thesis
 
Мастацтва 1945 - 1955 гг.
Мастацтва 1945 - 1955 гг.Мастацтва 1945 - 1955 гг.
Мастацтва 1945 - 1955 гг.
 
Thuốc Chữa Viêm Khơp
Thuốc Chữa Viêm KhơpThuốc Chữa Viêm Khơp
Thuốc Chữa Viêm Khơp
 
Dstu 4363 2004
Dstu 4363 2004Dstu 4363 2004
Dstu 4363 2004
 
презентація рафаель санті
презентація рафаель сантіпрезентація рафаель санті
презентація рафаель санті
 
мажуть
мажутьмажуть
мажуть
 
Sustainable Design slide show
Sustainable Design slide showSustainable Design slide show
Sustainable Design slide show
 
vali
valivali
vali
 
Basic ceo's tasks for small group
Basic ceo's tasks for small groupBasic ceo's tasks for small group
Basic ceo's tasks for small group
 
عروض عيد ميلاد كارفور
عروض عيد ميلاد كارفورعروض عيد ميلاد كارفور
عروض عيد ميلاد كارفور
 

Similaire à Total Security Solutions-30 BATCH 11-10-2013

Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfMusicGramOfficial
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfLongJidin1
 
05 ip suervilence application
05 ip suervilence application05 ip suervilence application
05 ip suervilence applicationNader Elmansi
 
Best Condominium Security System Installation and Services
Best Condominium Security System Installation and ServicesBest Condominium Security System Installation and Services
Best Condominium Security System Installation and ServicesNexlar Security
 
Villas intelligent surveillance
Villas intelligent surveillanceVillas intelligent surveillance
Villas intelligent surveillancebappyni
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Corporate Services
 
ATM - Banking Proposal
ATM - Banking ProposalATM - Banking Proposal
ATM - Banking ProposalJogesh Makwana
 
Infra Egypt - Company Profile
Infra Egypt - Company ProfileInfra Egypt - Company Profile
Infra Egypt - Company ProfileMohamed Farahat
 
Security Solution By Digital Enterprises, Sahibabad
Security Solution By Digital Enterprises, SahibabadSecurity Solution By Digital Enterprises, Sahibabad
Security Solution By Digital Enterprises, SahibabadIndiaMART InterMESH Limited
 
Presentation VigilSiteSafe_2015_Final_v1
Presentation VigilSiteSafe_2015_Final_v1Presentation VigilSiteSafe_2015_Final_v1
Presentation VigilSiteSafe_2015_Final_v1Nabeel Khan
 
Types Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageTypes Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageNexlar Security
 
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access ControllerDaccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access ControllerIndiaMART InterMESH Limited
 
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune IndiaMART InterMESH Limited
 

Similaire à Total Security Solutions-30 BATCH 11-10-2013 (20)

Building Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdfBuilding Integrated Security Solution V1.4.pdf
Building Integrated Security Solution V1.4.pdf
 
Integrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdfIntegrated-perimeter-protection-solution.pdf
Integrated-perimeter-protection-solution.pdf
 
05 ip suervilence application
05 ip suervilence application05 ip suervilence application
05 ip suervilence application
 
Best Condominium Security System Installation and Services
Best Condominium Security System Installation and ServicesBest Condominium Security System Installation and Services
Best Condominium Security System Installation and Services
 
Villas intelligent surveillance
Villas intelligent surveillanceVillas intelligent surveillance
Villas intelligent surveillance
 
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
Close Circuit Television (CCTV SURVEILLANCE SYSTEMS)
 
Tab Smarti Presentation General
Tab Smarti Presentation GeneralTab Smarti Presentation General
Tab Smarti Presentation General
 
Company-profile-2022.pdf
Company-profile-2022.pdfCompany-profile-2022.pdf
Company-profile-2022.pdf
 
Pln9 product presentation
Pln9 product presentationPln9 product presentation
Pln9 product presentation
 
SECHEIM_TRADING
SECHEIM_TRADINGSECHEIM_TRADING
SECHEIM_TRADING
 
Ravij profic
Ravij proficRavij profic
Ravij profic
 
ATM - Banking Proposal
ATM - Banking ProposalATM - Banking Proposal
ATM - Banking Proposal
 
Infra Egypt - Company Profile
Infra Egypt - Company ProfileInfra Egypt - Company Profile
Infra Egypt - Company Profile
 
Security Solution By Digital Enterprises, Sahibabad
Security Solution By Digital Enterprises, SahibabadSecurity Solution By Digital Enterprises, Sahibabad
Security Solution By Digital Enterprises, Sahibabad
 
Bank security
Bank securityBank security
Bank security
 
Presentation VigilSiteSafe_2015_Final_v1
Presentation VigilSiteSafe_2015_Final_v1Presentation VigilSiteSafe_2015_Final_v1
Presentation VigilSiteSafe_2015_Final_v1
 
Types Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storageTypes Of Proactive Security Solutions For Self-storage
Types Of Proactive Security Solutions For Self-storage
 
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access ControllerDaccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
Daccess Security Systems Pvt. Ltd, Pune, Multiple Door Access Controller
 
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
Security & Surveillance Equipment by Daccess Security Systems Pvt. Ltd, Pune
 
PPT FOR SECURITY
PPT FOR SECURITYPPT FOR SECURITY
PPT FOR SECURITY
 

Total Security Solutions-30 BATCH 11-10-2013

  • 2. Presentation FlowPresentation Flow • About SIS • Tech SIS Advantage • Group Management • Products and Partners • Our Solution offerings • SIS Clients • Tech SIS – Your Partner for Concept Design, Implementation, Operation & Maintenance • Training subject
  • 3. About SISAbout SIS • SIS (Security and Intelligence Services (India) Ltd) is a Public Limited Company registered under companies act 1956 providing security services to the organized sector. Set up in 1973, almost 35years ago, SIS has been one of the pioneers in the Indian Private Security Industry, having grown today into a “Total Security Solutions Provider”. • In the year 2008, SIS acquired Chubb Security of Australia, a 100 year old market leader with over 6000 employees, offering security services to corporate customers across all parts of Australia. The company has been renamed MSS Security (An SIS Group Enterprise). With this 100% acquisition, SIS is now Asia Pacific’s largest manpower security organization. SIS (India) Ltd. has in- house, well organized five residential training academies and five urban training centres which have a combined capacity of training over 15000 security personnel and 200 managers in a year.
  • 4. Training Scope • CCTV ( Analog , Hybrid & IP ) • Access Control system • Time attandance system • Fire Alarm System • Intruder Alarm System • Boom barrier & Bollard • Scanners and detection equipment
  • 5. What is an Analog CCTV security system? Cameras on an modern analog CCTV system send their video in the traditional base band format over coaxial cabling back to a digital video recorder (DVR). Here, video is digitized and stored on hard drives. Most modern DVRs are a network device, and as such can be accessed remotely from the LAN, or with the proper configuration, from across a WAN or the internet. There are no tapes to change. Video is kept on hard drives, typically on a FIFO basis so there is always a rolling video archive of the past X days. So, despite the fact that video is being transmitted from the cameras in an analog format, live and recorded video is still available over the network.
  • 6. What is an IP CCTV security system? IP video cameras broadcast their video as a digital stream over an IP network. Like an analog system, video is recorded on hard drives, but since the video is an IP stream straight from the camera, there is more flexibility as to how and where that video is recorded. The DVR is replaced with an NVR (network video recorder), which in some cases is just software since it doesn't need to convert analog to digital. Video footage can then be stored on new or existing network RAID drives as directed by the NVR software.
  • 7. What is an Hybrid CCTV security system? Hybrid CCTV systems combine IP and analog video, and can be a great way to transition an analog system to IP without needing to replace all of the existing cameras. Many NVR boxes on the market today are actually Hybrids in that they accept analog cameras, and IP cameras and combine them onto a single platform for the user.
  • 8. What is CCTV? • CCTV is "Closed-Circuit Television"
  • 9. Basic Devices ( Analog ) Camera Coaxial Cable BNC Connector Digital Video Recorder Monitor
  • 11. Types Of Cameras IP/Analog Dome Type Box Type Indoor Speed dome Outdoor speed dome Zoom Camera IR Dome Camera IR Box Camera Thermal Camera Outdoor Box Camera
  • 12. Basic Devices Hybrid Analog Camera IP Camera IP Camera Switch Hybrid DVR Monitor
  • 13. Basic Device IP IP Cameras Switch Server OR Network Video Recorder Management Software
  • 14. Access Control System ……………A system which enables an authority to control access to areas and resource in a given physical facility . Physical Access control :In physical security , the term access control refers to the practice of restricting entrance to a property , building or room to un authorized personnel . Logical Access control : In this an Access control system determines who is allowed to enter or exit , where , when and how they are allowed to enter or exit . Access Control Product Types : An Access control system includes the following product types as Control panel ,standalone controllers, readers , credentials and software
  • 15. Main Components Control Panel : Control panels control physical access through doors and communicates with the management software ( PC ) through a TCP/IP or serial RS -485/422 communication line. Standalone Controller : Standalone controllers are one door control panel which have built-in RFID , keypad or biometric reader Reader : Readers reads the credential information and send it to control panels via a Wiegand communication line . Readers can have one or more interfaces accommodating a combination of RFID cards as well as a keypad and biometric reader . Credential : A card or credential contain a pass code , number or biometric information which identifies the user to access control system
  • 16. Management Software : Access control software enables the user to program a customized database into the system . Cardholder access parameters can be setup , as well as enabling automatic door control and a number of customized features
  • 17. Access Control • Controller • Reader A) Proximity reader
  • 18. Access control B)Pin type reader C)Biometric reader D)Smart card reader
  • 19. Basic Devicess of Access control • Push button • EM lock • Access cards • A) Proximity cards • B) Smart cards
  • 20. Basic Devices of Access control CONTROLLER EM LOCK READER PUSH BUTTON ACCESS CARD ACCESS CONTROL SOFTWARE ACCESS CONTROL SERVER
  • 22. Time attendance system TIME ATTANDANCE SYSTEM
  • 24. Fire alarm system • Fire panel • Sensor A)Smoke sensor B)Heat sensor • Manual call point • Repeater • Hooter
  • 25. Basic devices of Fire alarm system FIRE ALARM PANEL SMOKE SENSOR HEAT SENSOR MANUAL CALL POINT REPEATER PANEL HOOTER RESPONSE INDICATOR
  • 27. What is the difference between a Conventional fire alarm system and an Addressable fire alarm system? A Conventional Fire Alarm System is typically used in smaller applications. They are usually less expensive than an addressable system but have limitations regarding reporting the location of devices. A conventional system will let you know which zone is in alarm, but not necessarily which device. A zone may contain several smoke detectors or pull stations. You may know which area of the building the smoke detector or pull station is located in but you will not know the location of the device that is in alarm. An Addressable Fire Alarm System can be programmed to indicate the exact device that is in alarm. A display on the front of the panel will indicate the device type and location. For example, the display will indicate photoelectric smoke detector in alarm in first floor corridor outside room 201. This information can be extremely vital in larger facilities. These panels can usually be networked with other panels on a campus or within a facility.
  • 28. Intruder alarm system An intruder alarm system is designed to detect the presence of an intruder your premises - trigger a local siren to deter activity and communicate the alarm event to a security monitoring centre so an appropriate response can be coordinated. The objectives of an intruder alarm system are: • To protect the physical assets within an unoccupied premises • To provide a safer environment for occupants • To deter crime and vandalism • To enable a co-ordinated response to be actioned when an intrusion event occurs
  • 29. Intruder alarm system • Intruder alarm panel • Sensor A)Magnetic contact B)Multi function detector C)PIR sensor D)Ceiling PIR sensor • Panic switch • Sounder
  • 30. Basic Devices of Intruder alarm system INTRUDER PANEL MAGNETIC CONTACT SENSOR PIR MOTION SENSOR CEILING PIR SENSOR MULTI FUNCTION DETECTOR PANIC SWITCH SOUNDER
  • 32. Video Door phone Video door entry (also known as a video door phone) is a stand-alone system used to manage calls made at the entrance to a building (residential complex, detached family home, workplace, etc.) with access controlled by audiovisual communication between the inside and outside. The main feature of video door entry is that it enables the person indoors to identify the visitor and, if (and only if) they wish, engage in conversation and/or open the door to allow access to the person calling.
  • 33. Video door phone • Indoor unit • Outdoor unit
  • 35. Boom Barrier & Bollard BOOM BARRIER • Hydraulic • Electromechanical BOLLARD • Hydraulic • Electromechanical
  • 37. Entry Protection Gates •Swing •Sliding •Rolling Shutter Vehicle Access Control • Boom Barrier • Bollards • Road Blocker • Tyre killer Pedestrian Control •Tripod Turnstiles •Swing Gates •Full Height Turnstile •Under Vehicle Scanner •ANPR system •Parking Management System
  • 38. Gates • Swing Gates - Electro mechanical / hydraulic operator for residential, commercial and industrial 1 1. Automation Operator 2. Signaling light. 3. Push Button / Key operated button. 4. Electronic Control Board. 5. Remote receiver. 6. Safety Beam/photo switch / loop sensor.
  • 39. Sliding Gate • Automated Systems for sliding gates in residential, Commercial & Industrial use 1. Operator with electronic Control Board. 2. Signaling light 3. Push Bottom/Key operated button 4. Remote controls 5. Safety Beam/Photo switch/loop sensor
  • 40. Rolling Shutter Rolling Shutter • Gear motor for spring balanced rolling shutters. • Push Button / Key operated button. • Control board. • Safety Electric Brake - optional
  • 41. Vehicle Access Control Boom Barrier : • Barrier operator with electronic control board. • Aluminium profile barrier with rubber padding. • Signalling light. • Push Button / Key operated button. • Safety Beam / photo switch / loop sensor • Perfectly calibrated stopping • Electro hydraulic solution for all applications • Wide range • Anti crash
  • 42. Bollards • Automatic Rising Hydraulic Bollards • Semi Automatic-Rising Gas Actuated Bollards • Metal cylinder, with ultra high resistance to impact and weather. • Piston mechanism enabling movement by command. • Housed inside a compartment in the road parking and discourages traffic and/or parking. • Can be activated or disabled automatically by commands executed by authorized persons (holders of smart cards, remote controls, etc.) or by pre-set time-based automatic commands (hourly programmer). • Double-acting hydraulic activation and a hydraulic unit (Built into the device) to motorise the bollard
  • 44. Road Blocker Road blocker barricades provide protection to sites from extreme Vehicle Borne Improvised Explosive Device (VBIED) attack • The hydraulic power pack is controlled by a programmable logic controller (PLC) enabling connection of virtually any access control to the road blocker Benefits • Comprehensive understanding of attack resistance • Protection from multi-direction impact approach • Confidence in proven performance • Strength and Durability • Operational under power failure conditions • Flexibility to interface with all forms of access control • Reliable and Dependable
  • 45. Tyre Killer • Tire Killer Barricades are designed for use in high security high traffic applications • Ideally suited for approach entrances to banks, military installations, airports, docks, cash collection depots, government offices etc • Tire killers teeth retract below ground level when a signal is received from the push button or integrated access control unit providing safe access for authorised vehicles. When the vehicle has passed, the tire killers teeth return to the active position, ensuring total protection from unauthorised vehicle intrusion Key Features • Full electrical isolation and overload protection • Manual operation facility with safety interlock • Electro/Hydraulic Operation • Tire Killer height in raised position 475mm • Fully galvanised and powder coated construction to provide maximum protection in extreme environments
  • 46. Pedestrian Control Tripod Turnstiles – • designed to control pedestrians entering or exiting restricted areas, usually under surveillance, in low security situations. This design provides a cost effective, anti-tailgating solution with a bar rotation of 3 x 120 degrees Swing Gates • Swing gate for handicapped and other access control
  • 47. Pedestrian Control Full Height Turnstile • Mechanical lock single lane full height turnstile • Motor driven single lane full height turnstile • Electro-mechanical lock single lane full height turnstile • Motor driven dual lane full height turnstile • Electro-mechanical lock dual lane full height turnstile single lane dual lane
  • 48. Pedestrian Barrier Retractable Barrier Or Flap Barrier • Retractable panel barrier has been developed as a user friendly solution for the fast and controlled processing of pedestrians entering or exiting restricted areas, usually under surveillance, offering a typical throughput of up to 60 people per minute.
  • 49. U.V.S.S Under Vehicle scanning System • Under Vehicle Surveillance System is used for detecting explosives, drugs or other unauthorized material. • solutions are designed to scan, monitor, and digitally record crisp clear digital video images of the entire width of a vehicle's undersides all with one permanent or portable system. • cost effective and convenient • solution for checking passenger vehicles, vans, buses, semi tractors, trucks & trailers and more. • Ideal solution for government, military, corporate and transportation facilities wherever complete vehicle monitoring is required.
  • 51. ANPR / ALPR System • ALPR is an IP based license plate recognition system that reads, detects, alerts and stores license plate information of the vehicles. It can even use an analog camera by adding the IP encoder module to the camera. • License Plate Recognition is typically used to control vehicle access, • such as gate barriers, parking spaces, toll gates, and traffic enforcement environments. IT CAN : • Detect, Read and Store License Plates • Alarm & Alert you • Vehicle log & Search • Integrate to Build Intelligent Systems
  • 52. HOW IT WORKS ? • License Plate Recognition solution detects, reads alerts and stores license plate information alongside with video footage. capture • An IP video camera (or an analog camera connected to a video encoder) captures images of a car with a license plate. • The video is captured by the IVS capture server and provides to the IVS LPR server for license plate processing. Process • The IVS LPR server receives and processes the feed. License plates are detected and stored in the IVS database Decide • Each license plate is compared to user-defined positive and negative lists. These lists define if an action is to be taken, such as open a gate (I/O event), send an alarm or if no action should be taken at all. Action • Based on the result of the action lists, the action is carried out. The system can integrate with most I/O systems; send alarms to the video system, via email or SMS (using an email-SMS service). User defined events, such as record video can also be configured.
  • 54. Detection equipment • Hand held metal detector • Door frame metal detector
  • 55. FG1 Security Pole • Totally Passive Technology • Robust Design for Indoor & Outdoor Use • Aesthetically Pleasing Design • Portable Operation with Rapid Deployment • Covert Operation • Uniform Coverage from Head to Toe • Hi Sensitivity • Working in Non-Flat Surface • Mains Supply with 7 hrs of Battery Life • Surprise Element
  • 56. Features ● Full body scanning ● Freestanding or wall mounted deployment ● Covert screening possible ● Low cost of deployment ● Robust aluminium design ● Simple to operate OPERATIONS : ● Freestanding ● Wall Mounted ● Covert DEPLOYMENT : ● Unobtrusive door / entry security ● High end building security. ● Hotels, Malls, Multiplexes, Museums, etc. ● Prison, courthouse and police station screening Flexible VIP security Covert surveillance. ● Public event screening. ● Scanning for knives on street operations
  • 57. Detection equipment Baggage Scanner Baggage Scanning Machine is a most common equipment used for security reasons now a days. It is used to check luggage in detail and also in short time. When a bag enters into the tunnel of scanner, sensors on both side senses it and send a message to X-Ray Generator which generates X-Ray. The X-rays passes through the bag and make an image on the screen.
  • 59. Guard tour system • RFID Gun • RFID Tags • Patrol management software