aaci_fac64 sales presentation v1
DESCRIPTION
Presentation of American Alarm and Fac64TRANSCRIPT
American Alarm &
Communications, Inc.
Your Security Technology
Convergence Partner
Our History
In1971, three engineers from the Massachusetts Institute of Technology (MIT) came together with a single mission.
To create a security company focused on innovation, technical excellence and customer service.
Our Mission Today
We work hard everyday to provide the best possible security technology and services to each and every one of our customers.
We own and deliver the entire security solution from the assessment, planning, design and deployment, to monitoring, support, service and training.
My Background & Experience
I have 32 years of financial theft and loss prevention experience through physical audits and proactive uses of physical electronic security technologies.
I have been privileged to offer my Services that have allowed my clients from individuals to Fortune 100 companies transform and not just maintain their security and loss prevention operations.
National and Local Rankings
AACI ranked 40th out of the top 100 security firms in the U.S. for 2010. Ranked #1 in Boston by the Book of Lists
24/7 Alarm Monitoring & Service Capabilities
Fire/Halon, Ansul, Sprinkler, Flow and Tamper, Video Verified Alarms
Hold-up, Ambush and Panic, Intrusion, Power Loss, High or Low Temperature
Hazardous Chemicals, Gas, CO, CO2, Flood, etc.
Radio and Cellular Back-up Communications
4 hour service response for Gold Service Contract clients
Security Systems Integrator (SSI)
Our 41 years of security expertise allows us to build integrated systems for our clients by combining hardware and software products from multiple vendors.
As a systems integrator , we can align inexpensive, pre-configured components and off-the-shelf software to meet key business goals, as opposed to more expensive, customized implementations that may require original programming or manufacture of unique components.
A Total Security Solution
Why Do We Need Security Solutions?
Protecting People & Assets, from
People and Assets.
Security Matrix
The Sociology of Bad Behaviors?
Fraud (Crime)
Triangle
• Financial Pressure - a non-shareable financial
need. Addiction, Bills, etc. (Desire)
• Rationalization- involves a person reconciling
his/her negative behavior (stealing) with the
commonly accepted notions of decency and
trust. (Ability)
• Perpetrator believes they have an opportunity
within a facility, home or anywhere to act and
they will not get caught! Opportunity
The 10/80/10 Rule
10% of the People you hire or come in contact with will steal from you if you let them.
10% of the people you come in contact with will never steal from you.
The issue we deal with every day is the 80% that depending on their circumstances can be influenced either way good or bad.
Opportunity & Temptation Everyone is tempted and at different
levels.
Temptation is ever present in life, this is part of life, and not being tempted is unrealistic.
We are not victims drawn towards temptation without choice! The following are precautions, things we can do to avoid temptation that eliminate the opportunity.
“Perception of Detection”
IT IS ESSENTIAL THAT INDIVIDUALS AND ORGANIZATIONS CREATE AN ENVIRONMENT THAT DOESN'T NEEDLESSLY PUT PEOPLE IN A POSITION TO COMMIT NEGATIVE BEHAVIOS.
YOUNEED TO IMPLEMENT PROCESSES, PROCEDURES AND CONTROLS THAT WILL DETECT NEGATIVE ACTIVITY, THEN
DOCUMENT THAT NEGATIVE ACTIVITY BY CREATING THE BEST EVIDENCE POSSIBLE.
THIS WILL ELIMINATE THE OPPORTUNITY!
Do You Need To..
Increase operational
efficiencies
Reduce the time
lost investigating
incidents
Provide the best
possible safety
and protection
Reduce potential
false liabilities
claims
#1 Meet regulatory
demands
Some Proactive Security Technologies
• Visitor Management & Access Control Systems and Wireless Locks
• HD Megapixel Surveillance Cameras, Software & Video Analytics
• Intrusion, Environmental Detection and Monitoring
• Emergency Critical Communications (CCoIP) and Wireless Networks
Assessments
• Security and System Review and Survey
• System Capabilities and Functions
Planning
• Scope of Work Analysis
• Review Feature Requirements
• Valued Advice
• Written Spec Review
Design
• Detailed Proposal
• Material List
• Baseline Hours
• Best Technological Solutions
Deployment
• Design Planning Conference and Follow-up
• On Site Installation Project Management
Support
• Small and Large Job delivery
• Technical Expertise, 24/7/365 Service & Training
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Our Solutions Process
Assessments
• Security and System Review and Survey
• System Capabilities and Functions
Planning
• Scope of Work Analysis
• Review Feature Requirements
• Valued Advice
• Written Spec Review
Design
• Detailed Proposal
• Material List
• Baseline Hours
• Best Technological Solutions
Deployment
• Design Planning Conference and Follow-up
• On Site Installation Project Management
Support
• Small and Large Job delivery
• Technical Expertise, 24/7/365 Service & Training
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Our Solutions Process
Assessments
Our holistic security assessment approach looks in, around and through any element that could threaten your ability to safeguard what matters most to you organization.
We also support loss prevention, asset protection and fraud prevention assessments that utilize physical security technologies to influence behaviors and confirm your organizations policies and procedures.
Assessments
• Security and System Review and Survey
• System Capabilities and Functions
Planning
• Scope of Work Analysis
• Review Feature Requirements
• Valued Advice
• Written Spec Review
Design
• Detailed Proposal
• Material List
• Baseline Hours
• Best Technological Solutions
Deployment
• Design Planning Conference and Follow-up
• On Site Installation Project Management
Support
• Small and Large Job delivery
• Technical Expertise, 24/7/365 Service & Training
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Our Solutions Process
Planning
We place our 40+ years of professional safety and security experience at your fingertips, expertly managing security projects that address vulnerabilities, risks and threats to your organization.
Our team guides your security project from pre-proposal meetings, expert consultation, quote assembly and project delivery.
Assessments
• Security and System Review and Survey
• System Capabilities and Functions
Planning
• Scope of Work Analysis
• Review Feature Requirements
• Valued Advice
• Written Spec Review
Design
• Detailed Proposal
• Material List
• Baseline Hours
• Best Technological Solutions
Deployment
• Design Planning Conference and Follow-up
• On Site Installation Project Management
Support
• Small and Large Job delivery
• Technical Expertise, 24/7/365 Service & Training
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Our Solutions Process
Design Services
Our Design Services identify potential security threats and reduce prospect of incidents by designing security infrastructures that complement building design and safeguard your people, property and assets.
Delivering a clear proposal with a clear materials list, baseline hours and the best technical solutions.
Assessments
• Security and System Review and Survey
• System Capabilities and Functions
Planning
• Scope of Work Analysis
• Review Feature Requirements
• Valued Advice
• Written Spec Review
Design
• Detailed Proposal
• Material List
• Baseline Hours
• Best Technological Solutions
Deployment
• Design Planning Conference and Follow-up
• On Site Installation Project Management
Support
• Small and Large Job delivery
• Technical Expertise, 24/7/365 Service & Training
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Our Solutions Process
Installation & Deployment
Our Installation Managers conduct site visits during project installation, testing and commissioning of all systems to ensure proper installation and operation.
Assessments
• Security and System Review and Survey
• System Capabilities and Functions
Planning
• Scope of Work Analysis
• Review Feature Requirements
• Valued Advice
• Written Spec Review
Design
• Detailed Proposal
• Material List
• Baseline Hours
• Best Technological Solutions
Deployment
• Design Planning Conference and Follow-up
• On Site Installation Project Management
Support
• Small and Large Job delivery
• Technical Expertise, 24/7/365 Service & Training
AACI involvement and responsibilities will vary based on the size, scope and complexity of the project.
Our Solutions Process
Service Support
Our security management proficiency, in-depth market knowledge and technical expertise extend invaluable expert support.
Our proactive service team and wide range of service plans allow facility managers the service coverage they need.
Comprehensive Training Our comprehensive programming and
training services for public, private organizations and residential customers builds on our commitment of customer service.
Our Gold Service Plan is tailored to each commercial customer, but often includes: On-site technical response within 4 hours, automatic software upgrades, power supply replacements and regular training.
FAC64
Overview
FAC64 is the primary statewide contract used by the Executive and Judicial Agencies of the Commonwealth and is available for use by other eligible entities such as: municipalities, hospitals, public schools and universities.
Security systems and related services includes, but not limited to, video, access control, integrated video management, visitor management, locks, alarm systems, monitoring services, equipment service contracts and other maintenance.
AACI FAC64 Program
Since granted the award in August of 2010:
We have completed over 2 million in new Installations
We have provided Installation and Service of Security, Surveillance, and Access Control Systems to more than 50 different Executive Agencies and other eligible entities across the Commonwealth
Departments of Revenue, Transportation, Health & Human Services, Massachusetts Trial Courts, State Police, MEMA, DCAM and Many Other
Agencies' & Municipalities
Workforce Security
Least Privileged Rights
Visitor Control
Equipment and Environmental Security
Compliance
MASSACHUSETTS PHYSICAL AND ENVIRONMENTAL SECURITY POLICY ITD-SEC-10.1 OBJECTIVES
Visitor Management Systems
Access Control Systems
Video Surveillance Systems
Intrusion Alarm Systems
IP Intercom & Broadcast Systems
ITD-SEC-10.1 Recommended Technologies
Our Commitment
"We continue to serve the unique needs of public clients and our track record of strong service was one of the reasons the Commonwealth expressed continuing confidence in our
company and approved our program for another three years."
Wells Sampson, President
American Alarm & Communications, Inc.
In Summary
Extensive Experience
End to End Implementation
Turnkey Product Solutions
Commitment to Service & Support
Large Pool of Licensed & Certified Support Staff
Always Offering the Best Value
Direct Phone: 508-453-2731
E-mail: [email protected]
Additional Information at www.americanalarm.com
Twitter: PHYSECTECH
James E. McDonald