A+A Security LLC
A+A Security LLC is one of the subsidiaries of the A+A Group of Companies - the leading many-functional holding with valuable place on the local market.
Company is the experienced system integrator in the fields of CCTV, Perimeter Protection, Fire Extinguishing, Remote Telemetry, SCADA, AVL, Fleet Management as well as, residential, industrial, homeland and information security solutions.
Our services cover the range of various customers from natural persons and small enterprises up to industrial companies and governmental authorities.
The main value of our Co. is staff, sorted from certified experts and peoples espoused on their job. We always measure our efficiency by customer's satisfaction.
M2M solutions for fixed and mobile Asset Management
M2M stands for machine-to-machine, mobile-to-machine, and machine-to-mobile wireless communications over cellular allow you connects the range of equipment from mainframes to home appliances and unleash new levels of "smart services" and commerce.
Fleet Management & AVL based on GPS/GPRS convergence
Wireless M2M Mobile Assets Solutions provide bi-directional communication between mobile assets and control centers over wireless telephony networks (such as GSM/GPRS, CDMA, 2.5/3G).
The Global Positioning System (GPS) is a satellite-based navigation system allows you locate, track and control your personnel, vehicles and assets with a high precision just from your PC. The System provides you with a comprehensive problem-solving solution that improves your mobile asset utilization, productivity, safety and security anywhere in the world.
- AVL & Fleet Management (GSM/GPS Logger, Real Time GSM/GPS)
- Personal Tracking (Personnel Tracking, Children and Aged Safety)
- Automatic Meter Reading
- Remote machine diagnostic and control
- SCADA solutions
- Environmental monitoring (light, temperature, seismic activity, wind, humidity, radiation and etc.)
- Home security
- Vending Machines
- Smart sites
- Wireless PoS terminals & ATMs
Electronic Security Services
A+A Security Supplies of affordable, reliable and quality security products.
|Alarm Security Systems
- Control panels
- PIR Motion Detectors
- Break Glass Detectors
- Active Infrared Detectors
- Monitoring Stations
- Fire Detectors
|Perimeter protection Systems
- Decorative Anti-Climb Fence with force sensors
- Oil and gas Pipelines Protection Control
- Central Monitoring Station
- Sensor Cable
|Fire Alarm & Fire Extinguisher Systems
- Conventional Fire Control Panels
- Addressable Fire Control Panels
- Fire Monitors
- Fire Tanks
- Fire Boxes
- Fire Horses
- Fire Panels
- Foam Proportioners
- Portable Extinguishers
- Water Extinguishers
- AFFF Extinguishers
- AFFF Extinguisher Cars
- Foam Concentrates Smoke Detectors
- Heat Detectors
- Flame Detectors
- Gas Detectors
- Fire Call Point
- Bells, Sirens
- Other Accessories
|Access Control Systems
- Audio and Video Dome Phones
- Dome Phones for Buildings
- Cards Access Control
- Printers for Access Control Cards
- Biometrical Access Control
- Touch Memory Keys
- Gate Automatics
- Electronic Locks and Safes
- High Discrimination Walk-through metal detectors
- Security Screening Systems
- B/W and Color Cameras
- B/W and Color Monitors
- Video Switchers
- Video Multiplexers
- Video Quads
- Video Recorders
- Camera Housings
- Pan and Tilt Heads
- Infra Red Lamps
AUDIT & CONTROL of Information Systems vulnerability
- Security audit within Information Systems. Performance an independent security analysis of your critical infrastructure through a vulnerability assessment or security health checks. Implementation antivirus software, firewalls and proxy-servers.
- Risk management solutions to ensure the highest protection against both known and unknown vulnerabilities.
- Deployment of high availability solutions of data and applications.
- User right restrictions for information access.
- Control of the e-mail and web traffics (content, virus, worm, spam, e.t.c).
- Encryption critical end-user data.
- Carrying out backup and disaster recovery strategy.
- Detection and preventing internal and external intrusions.
- Secure Internet server publishing.
- High availability solution based on clustering and balancing.
- Training of the IT personal.
Information Systems deployment
- Site survey, technical design and architect.
- Design a user and computer authentication strategy which meets business and technical requirements.
- Installation, tuning and adjustment of logic and network resources.
- System administration.
- Users support.
- Support system and users resources.
- Provide enhanced awareness of the latest updates for configured systems, enabling enterprises to stay one step ahead of vulnerabilities.
- Training of the IT personal.
Complex performance of information systems for small offices
Installation and tuning of Microsoft Office System 2003 on personal computers
Deployment of systems based on Microsoft Windows Small Business Server 2003
- Automatic protection of business data by backup, duplication and archiving
- Increasing stuff efficiency by means of teamwork and team management tools, supporting latest mobile technology (Pocket PC, Smart Phone, WAP)
- Installations of Web and e-mail services
- Fast installation and adjustment of the server especially developed for small enterprises
- Automatic reporting and remote administrating
Deployment of a network infrastructure and safe connection to Internet
- Application Servers
- Print Servers