Security - GHA Technologies, Inc.
Transcription
Security - GHA Technologies, Inc.
Networking ▪ VoIP ▪ Storage ▪ Security ▪ Workspace Solutions ▪ RFID ▪ POS ▪ Portable Electronics & Accessories ▪ A/V ▪ System Integration Security Computer Network Premise Biometrics Some of our Top Sellers GHA sells all of the leading security technology and solutions to protect and bullet proof your data which is the life blood of any organization. GHA sales consultants will perform a proactive security review to help identify vulnerabilities in advance of security breaches. GHA is at the forefront representing all of the leading security manufacturers to reduce risks associated with identity theft and to be Sarbanes Oxley and HIPAA compliant. We sell biometrics, intrusion detection, access control, perimeter monitoring and video surveillance, encryption, Wi Fi and wireless security, network scanning, license compliance, identity tags and badges, data safes and vaults, password management, equipment recovery and tracing, anti spam, virus, spyware, content filtering in compliance with the Internet Child Protection Act, and a variety of other security technologies and solutions. GHA’s line of security products also includes what your business needs in order to remain compliant with national laws and regulations. Without the proper precautions to secure, archive and protect certain types of data, you and your business can become liable in cases where negligence causes damage or loss. • ABSOLUTE – LOJACK Computer Lo-Jack from Absolute Software: • COMPUTER ASSOCIATES • MCAFEE • MX-LOGIC • NEC Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking™ solutions. With over two million subscriptions currently under contract, Absolute Software provides individuals and organizations of all types and sizes with solutions to manage regulatory compliance, data protection and theft recovery. • PANASONIC • RSA • SYMANTEC • WATCHGUARD If a computer is stolen, Absolute Software’s Recovery Team will work with local law enforcement agencies to locate and recover the machine. Computrace also enables IT professionals to remotely delete data on stolen or missing machines to protect the information from falling into the wrong hands. 1 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® (Computer Security Manufacturers) Firewall/VPN Software • • • • • • • CA CHECKPOINT CITRIX McAFEE MICROSOFT NOVELL SYMANTEC WiFi Security • • LUCENT LINK NEWBURY NET Secure Application Access • • • • • • • CHECKPOINT CISCO CITRIX F5 NETWORKS JUNIPER NOKIA SAFENET Secure Content Management Software: • • • • • • • • CA McAFEE NET IQ SYMANTEC TREND MICRO VERICEPT WEBROOT WEBSENSE Email Security: • • • • • • • • BARRACUDA FRONTBRIDGE KASPERSKY LAB McAFEE MXLogic SOPHOS SUNBELT TREND MICRO Encryption Password Security: • • • • • IRONKEY PGP Anti-Virus • • • • • • • • • • AVG CA EST KASPERSKY MCAFEE MICROSOFT –ONE CARE SYMANTEC MCAFEE SOPHOS TRENDMICRO ROBOFORM RSA SYMANTEC Document Security: • • ENTRUST TUMBLEWEED Security Enclosures: • • Computer Security Kendall Howard Smart Cards: A smart card is a card that is embedded with either a microprocessor and a memory chip or only a memory chip with non-programmable logic. The microprocessor card can add, delete, and otherwise manipulate information on the card, while a memory-chip card (for example, pre-paid phone cards) can only undertake a pre-defined operation. Smart cards, unlike magnetic stripe cards, can carry all necessary functions and information on the card. Therefore, they do not require access to remote databases at the time of the transaction. User Monitoring and email security Safend - software environment used to monitor who’s connecting what devices to every single endpoint in your network, enterprise-wide - from USB to Bluetooth - and gain extreme visibility over port access across the network. Sendio - the Sendio I.C.E. box delivers email integrity by eliminating ALL spam and unwanted email without losing a legitimate email message. This solution eliminates 100% of all machine-generated spam, blocks junk mail before it reaches the email server, and avoids false positive. 2 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® GHA- Your Source for School Security Products Fargo offers a complete solution for your identification needs The Persona C30 Photo System is an economical solution for your badging needs. The photo system includes the printer, build-a-badge card design software, a YMCKO ribbon, cleaning kit and camera. It is available single or dual sided, with or without a magnetic stripe encoder. Just add a pack of cards and you are ready to print identification badges. Boost your security with Zebra card printers Zebra’s P120i’s modern design, high-tech materials and new electronics make it reliable and easy-to-use, setting it above the competition. All types of businesses can easily create personalized ID cards instantly. The P110i color card printer is an affordable single-side printing option. Campus emergency notification system Displays support horizontal and vertical scrolling of messages: • • • Time-of-Day, Operational Messages and Emergency Messages configured using a web browser Runs on Windows 2000 and Windows XP (Biometrics Security Manufacturers) Access Control: Access Control (cont): Authentication Software: • • • • • • • • • • • • • • • • • • • • • • • • • • CISCO SYSTEMS • CITRIX SYSTEMS • RSA SECURITY • VERISIGN AFI AIPHONE ALADDIN ALTRONIX AWID BOSCH DVTEL EVERFOCUS HID INTEGRATED BIOMETRICX KEYSCAN LOCKNETICS NVT RCI RECOGNITION SYSTEMS RUTHERFORD CONTROLS SCANSOURCE SCHLAGE SECURITRON SECURITY DOOR CONTROLS SECURITY INC SPECO TECHNOLOGIES SYNEL VIKING VON DUPRIN Authentication Hardware: I.D. Badges: • • • • • • FARGO • PERSONA • ZEBRA CISCO SYSTEMS IBM RSA SECURITY SAFE NET SONY 3 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® Network Security Manufacturers Firewall/VPN Hardware: Firewall/VPN Hardware: Firewall/VPN Hardware: • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • CA • McAFEE • NET IQ • SYMANTEC • TREND MICRO • VERICEPT • WEBROOT • WEBSENSE 3COM ADTRAN ARRAY CELESTIX CHECKPOINT CISCO D-LINK ENTERASYS eSOFT F5 NETWORKS HP INTRUSION JUNIPER LINKSYS NETGEAR NETWORK ENGINES NOKIA NORTEL NETWORKS SNAPGEAR SONICWALL SYMANTEC WATCHGUARD U.S. ROBOTICS ZYXEL 3COM CHECKPOINT CISCO ENTERASYS eSOFT INTRUSION JUNIPER McAFEE SONICWALL SYMANTEC WATCHDOG ZYXEL The IronKey is the world’s most secure USB flash drive, and it has been widely heralded in the press and by customers for its unique combination of security and performance. The IronKey is provisioned at the factory with a 2,048 bit RSA Device Key which is used to authenticate the device and encrypt all communications between the server and the device. The key resides on the Cryptochip and is not accessible. This protects the IronKey against on-the-wire attacks or attempts to access/guess the device. The device destroys all data after 10 incorrect password attempts. IronKey’s patent pending “self destruct” methodology incorporates an exhaustive hardware erase of all flash and Cryptochip memory. This is a secure overwriting of data done in a hardware application for the ultimate protection. Firewall/VPN Hardware: • • • • • • • CA CHECKPOINT CITRIX McAFEE MICROSOFT NOVELL SYMANTEC The IronKey is both waterproof and tamperproof and has been through rigorous durability testing. The IronKey also comes with a secure browsing technology which uses a private network to establish a secure connection between the device and the internet. 1g – 2g – 4g capacities available 4 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® Premise Security Manufacturers Surveillance and CCTV: • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • ACTI AFS AIM AIPHONE ALARM CONTROLS ALARM LOCK ALARM SAF ALTRONIX AMERICAN DYNAMICS AMERICAN FIBERTEK AMSECO ANCHOR AUDIO APOLLO APPRO TECHNOLOGY APW RACKS ARM ELECTRONICS ATLAS SOUND ATV ATW AUDIO TECHNICA AVALAN WIRELESS AVE AXIS AZDEN BLACK BOX BLONDER TONGUE BOGEN BOSCH BOX LIGHT BRETFORD B-TRON BTX CANON CBC CHANNEL PLUS CHANNEL VISION CHIEF CLOVER COMMONSCOPE COMPREHENSIVE CORBY COVI • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • CROW CROWN DALITE DEDICATED MICROS DELTA DESIGN DENON DIGIMERGE DIGITAL WATCHDOG DISPLAY DEVICES DITEK DRAPER DSI DUKANE DVTel EDWARDS SIGNALING ELECTRONICS LINE USA ELMO EMI ELECTRONIC SECURITY DEVICES EUROBEX EVERFOCUS EXTREME Cctv FEDERAL SIGNAL FIRE KING FM SYSTEMS FOCUS ENHANCEMENTS FUJINON GARRETT GE GENERAL SOLUTIONS GENTEX GRI HAWKING TECHNOLOGY HID HITACHI ICG IDview IEI IFS IKEGAMI IMAGE VAULT INFINOVA • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • INFOCUS INOVONICS INSITE VIDEO SYSTEMS INTEGRAL TECHNOLOGIES ipCONFIGURE IQINVISION JVC KERI SYSTEMS KINYO KNOX KOWA KT&C LABOR SAVING DEVICES LEIGHTRONIX LEVITRON LG COMMERCIAL LINEAR LISTEN LOUROE LOWELL-LIGHT LUCASEY MACKIE MACURCO MARANTZ MARSHALL ELECTRONIC MAXELL MDI MICRO-TEK MIDDLE ATLANTIC MIER PRODUCTS MITSUBISHI MOBI MOTOROLA MUSIC & SOUND NETPROMAX NITEK NRG NUVICO NUTONE NVT OPTEX • ORION 5 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® Premise Security Manufacturers (cont.) • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • PACH & CO PAN PACIFIC PANASONIC PANAVISE PCSC PEERLESS PELCO PENTAX PICO MACOM PORTA BRACE PREFERRED POWER PREMIER WIRELESS QUANTEGY RAINBOW SECURITY REPORTER REVERE RL DRAKE CO RUTHEFORD CONTROLS SAFETY TECHNOLOGIES SAMSON WIRELESS SAMSUNG SANYO SECOLARM SECURITRON SE-KURE SHURE SILENT KNIGHT SONY SPECO TECH STEALTH STI SVAT TAKEX TALK-A-PHONE TAMERON TATUNG TEC NEC TELEXPER TELULAR TEMPEST TOA TOKINA TOSHIBA • • • • • • • • • • • • • • • • • • • • • • TOTE VISION TRANGO SYSTEMS USP VAC VERINT VICON VIDEOCOMM VIDEOLARM VIDEOTEC VIGITRON VISONIC VISUAL SENTRY VITEK VMP WATEC WEST PENN WHEELOCK WINLAND ELECTRIC WINSTEAD WIRELESS TECH WREN ZENITH Fire Intrusion: • ALEPH • ALTRONIX • AMESCO • BOSCH • DSC • OPTEX • POTTER • VON DUPRIN Access Control: • AFI • AIPHONE • ALTRONIX • AWID • BOSCH • DVTEL • EVERFOCUS • HID • INTEGRATED BIOMETRICX • KEYSCAN • LOCKNETICS • NVT • RCI • RECOGNITION SYSTEMS • RUTHERFORD CONTROLS • SCHLAGE • SECURITRON • APC • AVALAN • DIGI • DITEK • EATON POWERWARE • EDWARDS • ETS • ITW LINX • MULTITECH • NITEK • SECURITY DOOR CONTROLS • POTTER • SECURITY INC. • POWERDSINE • SPECO TECHNOLOGIES • TROPOS • VIKING • WHEELOCK • VON DUPRIN 6 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® Premise Security Manufacturers (cont.) Intrusion Detection/ Prevention Hardware: Intrusion Detection/ Prevention Software: Remote Facility: • CHECKPOINT • ALEPH • AIPHONE • CISCO AVALAN WIRELESS ENTERASYS ALTRONIX • • • CHATSWORTH ESOFT AMESCO • • • • (SENSAPHONE) BOSCH • EVERFOCUS • GEIST • KEYSCAN • NETBOTZ (APC) • PELCO • VALCOM • JUNIPER • • McAFEE • DSC • SONICWALL • SYMANTEC • OPTEX • WATCHGUARD • POTTER • ZYXEL • VON DUPRIN Water-Proof Allow GHA to help you safeguard your important files and documents including computer media and data tapes with the latest in safe technology. Fire and waterproof options are essential forms of protection from various events that may put your data at risk. Whether you’re protecting your laptop, important documents or jewelry, paper documents or electronic media, we have a solution for you. Fire-Proof (Manufacturers) • SCHWAB • FIREKING • PHOENIX SAFE INTERNATIONAL • SENTRY SAFE 7 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® Other great manufacturers that we carry • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • ACTIVIDENTITY ACCUTECH ACT METERS ACTi ACTIVE SAFETY ADAMS RITE ADCO LIBERTY ADCOM ADVANCED SOURCING AEP AES AGN/PRO AKCESS BIOMETRICS ALARM CONTROLS ALLOT COMM ALTERNATIVE AMERICAN DYNAMICS AMERICAN FIBERTEK AMERICAN SECURITY PRODUCTS CO. AMERICAN STORE FIXTURES AMERICAN VIDEO EQUIPMENT AMPHENOL APC APEX ARCSIGHT ARROW FASTENER ASTATIC MICROPHONES AUDIOSOURCE ATLAS SOUND AVG AXIS COMMUNICATIONS B&A MANUFACTURING BANDIT SOLUTIONS BAYCO BELDEN BEN Q B.E.S MANUFACTURING BETTER WAY PRODUCTS • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • BIOPASSWORD BIOSCRIPT BLONDER TONGUE BLUECOAT BOSCH SECURITY SYSTEMS BOSTON ACOUSTICS BOUNTIFUL WIFI BRK ELECTRONICS BYD:SIGN C&C PRODUCTS CAMBRIDGE CAMDEN DOOR CONTROLS CANADIAN FLEXI-DRILL CARLON TELECOM CCTP CBC AMERICA CDW CE LABS CELLAR SAVER CHEMETRONICS CINEMA SELECT CITRIX CLEARSWIFT COLEMAN CABLE COMMERCIAL PRODUCT COMM SCOPE COOPER WHEELOCK CORNING CABLE SYSTEMS COVI TECHNOLOGIES CRIMESTOPPER CROSS POINT D3 DATA DATACOMM DATACORE DBX PROFESSIONAL DCX SYSTEMS DEDICATED MICROS DESIGNED SECURITY INC. • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • DETEX DEWALT DIALOGIC DIFINITRON DIGITAL DEFENSE DIRECT UPS D-LINK DOLPHIN COMPONENETS DOORBELL FON DOR-O-MATIC DUAL-LITE DUMMY CAMERAS DURACEL DYMO DYNALOCK EAGLE SECURITY EDCO EDT EE SYSTEMS ELECTROLUX ELK PRODUCTS EMERSON NETWORK ENERSYS ENERZONE ENGINEERED ELECTRONICS ERICO/CADDY ETCON EVAX SYSTEMS EVEREADY EVI/TELEX EXCELSUS EXTREME CCTV EXTRON ELECTRONICS FARGO FENWAL FIBER OPTIONS FIRE BLANKETS FIRE-LITE ALARMS 8 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® Other great manufacturers that we carry (cont.) • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • FIRETIDE FLUKE FOLGER ADAM FORTINET FREEFORM FIBER OPTIONS FLIR SYSTEMS FUJINON GAITRONICS GARVIN INDUSTRIES GEMALTO GEM ELECTRONICS GE SECURITY GRAYSTONE SYSTEMS GREENLEE HARMON KARDON HARMONY REMOTE HAYDEN INDUSTRIES HD TELECOM HID HELLERMAN/TYTON HES HIDEKI ELECTRONICS HOME AUTOMATION INC HONEYWELL HSI FIRE & SAFETY GROUP HUDSON VIDEO ICC ICM CORP. ID SYSTEMS IDEAL INDUSTRIES IDENTIX IDT IEI IGEL INTEGRAL TECHNOLOGIES INTERNATIONAL RESOURCES INTER-TEL IPIX IQINVISION IRWIN • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • ISOTEC ITW LINX JAM PLASTICS JBL PROFESSIONAL JERON ELECTRONICS JDS DIGITAL SECURITY SYSTEMS KELTRON CORP. KEY DIGITAL KEYSCAN KEYSPAN KIDDIE KINGS KLEIN TOOLS KRYPTONITE LCN L.E.D. LEE DAN LEGEND AUDIO LEFTHAND LEICA GEOSYSTEMS LENEL LEXION L.H. DOTTIE LOCKNETICS LOGENEX INNOVATIONS LOGICMARK MACROVISION MAGNETIC AUTOCONTROLS MARCH NETWORKS MARKS USA MARSHALL MERCURY SECURITY MG ELECTRONICS MICON TECHNOLOGY MICROFORUM INT’L MICROTEK MIDDLE ATLANTIC MIJA MILESTONE SYSTEMS MINUTEMAN MIRCOM • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • MK BATTERY MOBICEL MOBOTIX MODULAR DEVICES MONSTER CABLE MORSE M&S SYSTEMS MUXLAB MULTI-LINK MUSIC GIANTS MXLOGIC NADY NATIONAL TRAINING CENTER NEC NEDAP NEL-TEC LABS NEOWARE NET MEDIA NEW LINE USA NICE SYSTEMS NILES NOVELL NVT OASIS AUDIO OCC OEM OLYMPUS AMERICA OMNI MOUNT ONSSI OPEN HOUSE OSI SECURITY OZVISION O.W.I PACKETEER PAMA/DIRECT PLUS PANASONIC PASO PATCHLINK PENTAX PERFECT VU PERPLAS 9 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® Other great manufacturers that we carry (cont.) • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • PHILIPS PHOENIX GOLD PIONEER PLANAR PLANTRONICS PLATESPIN PORTER CABLE TOOLS POS DISTRIBUTING POSH POTTER ELECTRIC POWERLINE CONTROL POWERLINE CONTROL POWER-SONIC PRO CO SOUND PRODUCTIVE CONSULTANTS PROFICIENT AUDIO PROTECH QSC AUDIO QUAM QUANTUM GROUP RAB ELECTRONIC RACO RADIO DESIGN LABS RADWARE RECOGNITION SYSTEMS RED HAWK REGIN HVAC PRODUCTS REMEE REPAIR MASTER ROKONET RUSSOUND S2 SECURITY CORP SAFE FIRE DETECTION SAFT SAGEM MORPHO SALCO INDUSTRIES SAMSUNG SANUS SANYO SATELLIE USA SCHLAGE • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • SCRIPTLOGIC SDC SDI SECURAKEY SECURE COMPUTING SECURITRON SENSTAR-STELLAR SENTEX/CHAMBERLAIN SHERWOOD SHURE SIG COM SIGNAL ONE SAFETY SIM2 SLAYTON SOLUTIONS SONICWALL SONY SPACE AGE ELECTRONICS SPECIFIED TECHNOLOGIES SPECO TECHNOLOGIES SPERRY WEST SPS ENERGY SR COMPONENTS SUPERIOR MODULAR SUPERIOR/ESSEX SURE ACTION INC. SURFCONTROL SUTTLE APPARATUS SYMPHONY SELECT SYSTEM SENSOR TAMRON TAPPAN TATLE TALE PORTABLE ALARM SYSTEMS TATUNG TDK TECH SPRAY TECHFLEX TECHNOLOGY SYSTEMS SREVICES TELDAT TEST-UM THE SIEMON COMPANY • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • • THINPRINT THOMAS & BETTS TOA TOSHIBA TOTE VISION TRAPEZE TRIPP LITE TYCO ELECTRONICS ULTIMACO ULTRA MAGIC CARD ULTRAGUARD/ECS ULTRA TECH UNICOM UNIVERSAL BATTERY UNIVERSITY REMOTE CONTROL UPLINK SECURITY VERICEPT VERICHIP VERINT VERNEX VICON VIDEO DOMAIN TECHNOLOGIES LTD. VIDEOLARM VIDEO MESSENGER CO. VIDEO MOUNT PRODUCTS VIDEOTEC VIKING ELECTRONICS VISIONTECH VIZIONCORE VODAVI VONTRONICS VMWARE WALKER EQUIPMENT WATCHGUARD WATTSTOPPER/LEGRAND WEST PEN WIRE WIREMOLD/LEGRAND WYRELESS ACCESS WYSE X-10 PRO XANTECH YALE SECURITY GROUP 10 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. If you do not see the product that you need, just let us know and we will get it for you! “When Service and Delivery Count” ® GHA Vulnerability Assessment Services IT security is a critical area that is many times neglected by companies until it is too late. Companies also feel that their IT security is sufficient without knowing the full security requirements. Don’t be a company that suffers from the consequences; call GHA today for a vulnerability analysis. GHA offers the most complete IT security services in the world. Everything from detailed security audits to post analysis and full solutions are offered in the GHA security package. GHA covers the ten areas of IT security: • Security Policy • Security Organization • Asset Classification and Control • Personal Security • Physical and Environmental Control • Communications and Operations Management • Access Control • System Development and Maintenance • Business Continuity Management • Compliance Businesses have long recognized the value of independent review of their security operations. All security review services result in an independent review of part of your entire security program but they differ in terms of scope and rigor. 11 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved.