+ All Categories
Home > Documents > Networking VoIP Storage Security Workspace Solutions RFID ... · Networking VoIP Storage Security...

Networking VoIP Storage Security Workspace Solutions RFID ... · Networking VoIP Storage Security...

Date post: 02-Sep-2018
Category:
Upload: vuongdang
View: 225 times
Download: 0 times
Share this document with a friend
11
Networking VoIP Storage Security Workspace Solutions RFID POS Portable Electronics & Accessories A/V System Integration 1 of 11 Copyright © 2008 GHA Technologies Inc. All rights reserved. GHA sells all of the leading security technology and solutions to protect and bullet proof your data which is the life blood of any organization. GHA sales consultants will perform a proactive security review to help identify vulnerabilities in advance of security breaches. GHA is at the forefront representing all of the leading security manufacturers to reduce risks associated with identity theft and to be Sarbanes Oxley and HIPAA compliant. We sell biometrics, intrusion detection, access control, perimeter monitoring and video surveillance, encryption, Wi Fi and wireless security, network scanning, license compli- ance, identity tags and badges, data safes and vaults, password management, equip- ment recovery and tracing, anti spam, virus, spyware, content filtering in compliance with the Internet Child Protection Act, and a variety of other security technologies and solutions. GHA’s line of security products also includes what your business needs in order to remain compliant with national laws and regulations. Without the proper precautions to secure, archive and protect certain types of data, you and your business can become liable in cases where negligence causes damage or loss. Security Some of our Top Sellers ABSOLUTE – LOJACK COMPUTER ASSOCIATES MCAFEE MX-LOGIC NEC PANASONIC RSA SYMANTEC WATCHGUARD Computer Lo-Jack from Absolute Software: Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking™ solutions. With over two million subscriptions currently under contract, Absolute Software provides individuals and organizations of all types and sizes with solutions to manage regulatory compliance, data protection and theft recovery. If a computer is stolen, Absolute Software’s Recovery Team will work with local law enforcement agencies to lo- cate and recover the machine. Computrace also enables IT professionals to remotely delete data on stolen or missing machines to protect the information from falling into the wrong hands. Computer Network Premise Biometrics
Transcript

Networking ▪ VoIP ▪ Storage ▪ Security ▪ Workspace Solutions ▪ RFID ▪ POS ▪ Portable Electronics & Accessories ▪ A/V ▪ System Integration

1 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

GHA sells all of the leading security technology and solutions to protect and bullet proof your data which is the life blood of any organization. GHA sales consultants will perform a proactive security review to help identify vulnerabilities in advance of security breaches.

GHA is at the forefront representing all of the leading security manufacturers to reduce risks associated with identity theft and to be Sarbanes Oxley and HIPAA compliant. We sell biometrics, intrusion detection, access control, perimeter monitoring and video surveillance, encryption, Wi Fi and wireless security, network scanning, license compli-ance, identity tags and badges, data safes and vaults, password management, equip-ment recovery and tracing, anti spam, virus, spyware, content filtering in compliance with the Internet Child Protection Act, and a variety of other security technologies and solutions.

GHA’s line of security products also includes what your business needs in order to remain compliant with national laws and regulations. Without the proper precautions to secure, archive and protect certain types of data, you and your business can become liable in cases where negligence causes damage or loss.

Security

Some of our Top Sellers

ABSOLUTE – LOJACK•

COMPUTER ASSOCIATES•

MCAFEE•

MX-LOGIC•

NEC•

PANASONIC•

RSA•

SYMANTEC•

WATCHGUARD•

Computer Lo-Jack from Absolute Software:

Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking™ solutions. With over two million subscriptions currently under contract, Absolute Software provides individuals and organizations of all types and sizes with solutions to manage regulatory compliance, data protection and theft recovery.

If a computer is stolen, Absolute Software’s Recovery Team will work with local law enforcement agencies to lo-cate and recover the machine. Computrace also enables IT professionals to remotely delete data on stolen or missing machines to protect the information from falling into the wrong hands.

Computer

Network

Premise

Biometrics

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

2 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

(Computer Security Manufacturers)

Firewall/VPN Software

CA• CHECKPOINT• CITRIX• McAFEE• MICROSOFT• NOVELL• SYMANTEC•

WiFi Security

LUCENT LINK• NEWBURY NET•

Secure Application Access

CHECKPOINT• CISCO• CITRIX• F5 NETWORKS• JUNIPER• NOKIA• SAFENET•

Encryption

IRONKEY• PGP•

Anti-Virus

AVG• CA• EST• KASPERSKY• MCAFEE• MICROSOFT –ONE CARE• SYMANTEC• MCAFEE• SOPHOS• TRENDMICRO•

Secure Content Management Software:

CA• McAFEE• NET IQ• SYMANTEC• TREND MICRO• VERICEPT• WEBROOT• WEBSENSE•

Email Security:

BARRACUDA• FRONTBRIDGE• KASPERSKY LAB• McAFEE• MXLogic• SOPHOS• SUNBELT• TREND MICRO•

Password Security:

ROBOFORM• RSA• SYMANTEC•

Document Security:

ENTRUST• TUMBLEWEED•

Security Enclosures:

Computer Security• Kendall Howard•

A smart card is a card that is embed-ded with either a microprocessor and a memory chip or only a memory chip with non-programmable logic. The mi-croprocessor card can add, delete, and otherwise manipulate information on the card, while a memory-chip card (for example, pre-paid phone cards) can only undertake a pre-defined operation. Smart cards, unlike magnetic stripe cards, can carry all necessary functions and information on the card. Therefore, they do not require access to remote databases at the time of the transaction.

Smart Cards:

Safend - software environment used to monitor who’s connecting what devices to every single endpoint in your network, enterprise-wide - from USB to Bluetooth - and gain extreme visibility over port access across the network. Sendio - the Sendio I.C.E. box delivers email integrity by eliminating ALL spam and unwanted email without losing a legitimate email message. This solution eliminates 100% of all machine-generated spam, blocks junk mail before it reaches the email server, and avoids false positive.

User Monitoring and email security

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

3 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

GHA- Your Source for School Security Products

Fargo offers a complete solution for your identification needs

The Persona C30 Photo System is an economical solution for your badging needs. The photo system includes the printer, build-a-badge card design software, a YMCKO ribbon, cleaning kit and camera. It is available single or dual sided, with or without a magnetic stripe encoder. Just add a pack of cards and you are ready to print identification badges.

Boost your security with Zebra card printers

Zebra’s P120i’s modern design, high-tech materials and new electronics make it reliable and easy-to-use, setting it above the competition. All types of businesses can easily create person-alized ID cards instantly. The P110i color card printer is an affordable single-side printing option.

(Biometrics Security Manufacturers)

Access Control:

AFI• AIPHONE• ALADDIN• ALTRONIX• AWID• BOSCH• DVTEL• EVERFOCUS• HID• INTEGRATED BIOMETRICX• KEYSCAN• LOCKNETICS• NVT• RCI• RECOGNITION SYSTEMS• RUTHERFORD CONTROLS•

Access Control (cont):

SCANSOURCE• SCHLAGE• SECURITRON• SECURITY DOOR CONTROLS• SECURITY INC• SPECO TECHNOLOGIES• SYNEL• VIKING• VON DUPRIN•

Authentication Hardware: CISCO SYSTEMS• IBM• RSA SECURITY• SAFE NET• SONY•

Authentication Software:

CISCO SYSTEMS•

CITRIX SYSTEMS•

RSA SECURITY•

VERISIGN•

I.D. Badges:

FARGO•

PERSONA•

ZEBRA•

Campus emergency notification system

Displays support horizontal and vertical scrolling of messages:

Time-of-Day, Operational Messages and Emergency Messages• configured using a web browser• Runs on Windows 2000 and Windows XP•

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

4 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

Network Security Manufacturers

3COM• ADTRAN • ARRAY• CELESTIX• CHECKPOINT• CISCO• D-LINK• ENTERASYS• eSOFT• F5 NETWORKS• HP• INTRUSION• JUNIPER• LINKSYS• NETGEAR• NETWORK ENGINES• NOKIA• NORTEL NETWORKS• SNAPGEAR• SONICWALL• SYMANTEC• WATCHGUARD• U.S. ROBOTICS• ZYXEL•

CA• CHECKPOINT• CITRIX• McAFEE• MICROSOFT• NOVELL• SYMANTEC•

3COM• CHECKPOINT• CISCO• ENTERASYS• eSOFT• INTRUSION• JUNIPER• McAFEE• SONICWALL• SYMANTEC• WATCHDOG• ZYXEL•

CA•

McAFEE•

NET IQ•

SYMANTEC•

TREND MICRO•

VERICEPT•

WEBROOT•

WEBSENSE•

Firewall/VPN Hardware: Firewall/VPN Hardware: Firewall/VPN Hardware:

Firewall/VPN Hardware:

The IronKey is the world’s most secure USB flash drive, and it has been widely heralded in the press and by customers for its unique combination of security and performance.

The IronKey is provisioned at the factory with a 2,048 bit RSA Device Key which is used to authenticate the device and encrypt all commu-nications between the server and the device. The key resides on the Cryptochip and is not accessible. This protects the IronKey against on-the-wire attacks or attempts to access/guess the device.

The device destroys all data after 10 incorrect password attempts.

IronKey’s patent pending “self destruct” methodology incorporates an exhaustive hardware erase of all flash and Cryptochip memory. This is a secure overwriting of data done in a hardware application for the ultimate protection.

The IronKey is both waterproof and tamperproof and has been through rigorous durability testing.

The IronKey also comes with a secure browsing technology which uses a private network to establish a secure connection between the device and the internet.

1 g – 2g – 4g capacities available

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

5 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

Premise Security Manufacturers

Surveillance and CCTV:ACTI• AFS• AIM• AIPHONE• ALARM CONTROLS• ALARM LOCK• ALARM SAF• ALTRONIX• AMERICAN DYNAMICS• AMERICAN FIBERTEK• AMSECO• ANCHOR AUDIO• APOLLO• APPRO TECHNOLOGY • APW RACKS• ARM ELECTRONICS• ATLAS SOUND• ATV• ATW• AUDIO TECHNICA• AVALAN WIRELESS• AVE• AXIS• AZDEN• BLACK BOX• BLONDER TONGUE• BOGEN• BOSCH• BOX LIGHT• BRETFORD• B-TRON• BTX• CANON• CBC• CHANNEL PLUS• CHANNEL VISION• CHIEF• CLOVER• COMMONSCOPE• COMPREHENSIVE• CORBY• COVI•

CROW • CROWN• DALITE• DEDICATED MICROS• DELTA DESIGN• DENON• DIGIMERGE• DIGITAL WATCHDOG• DISPLAY DEVICES• DITEK• DRAPER• DSI• DUKANE• DVTel• EDWARDS SIGNALING• ELECTRONICS LINE USA• ELMO• EMI• ELECTRONIC SECURITY DEVICES• EUROBEX• EVERFOCUS• EXTREME Cctv• FEDERAL SIGNAL• FIRE KING• FM SYSTEMS• FOCUS ENHANCEMENTS• FUJINON• GARRETT• GE• GENERAL SOLUTIONS• GENTEX• GRI• HAWKING TECHNOLOGY• HID• HITACHI• ICG• IDview• IEI• IFS• IKEGAMI• IMAGE VAULT• INFINOVA•

INFOCUS• INOVONICS• INSITE VIDEO SYSTEMS• INTEGRAL TECHNOLOGIES• ipCONFIGURE• IQINVISION• JVC• KERI SYSTEMS• KINYO• KNOX• KOWA• KT&C• LABOR SAVING DEVICES• LEIGHTRONIX• LEVITRON• LG COMMERCIAL• LINEAR• LISTEN• LOUROE• LOWELL-LIGHT• LUCASEY• MACKIE• MACURCO• MARANTZ• MARSHALL ELECTRONIC• MAXELL• MDI• MICRO-TEK• MIDDLE ATLANTIC• MIER PRODUCTS• MITSUBISHI• MOBI• MOTOROLA• MUSIC & SOUND• NETPROMAX• NITEK• NRG• NUVICO• NUTONE• NVT• OPTEX• ORION•

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

6 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

PACH & CO• PAN PACIFIC• PANASONIC• PANAVISE• PCSC• PEERLESS• PELCO• PENTAX• PICO MACOM• PORTA BRACE• PREFERRED POWER• PREMIER WIRELESS• QUANTEGY• RAINBOW SECURITY • REPORTER• REVERE• RL DRAKE CO• RUTHEFORD CONTROLS• SAFETY TECHNOLOGIES • SAMSON WIRELESS• SAMSUNG• SANYO• SECOLARM• SECURITRON• SE-KURE• SHURE• SILENT KNIGHT• SONY• SPECO TECH• STEALTH• STI• SVAT• TAKEX• TALK-A-PHONE• TAMERON• TATUNG• TEC NEC• TELEXPER• TELULAR• TEMPEST• TOA• TOKINA• TOSHIBA•

TOTE VISION• TRANGO SYSTEMS• USP• VAC• VERINT• VICON• VIDEOCOMM• VIDEOLARM• VIDEOTEC• VIGITRON• VISONIC• VISUAL SENTRY• VITEK• VMP• WATEC• WEST PENN• WHEELOCK• WINLAND ELECTRIC• WINSTEAD• WIRELESS TECH• WREN • ZENITH•

APC•

AVALAN•

DIGI•

DITEK•

EATON POWERWARE•

EDWARDS•

ETS•

ITW LINX•

MULTITECH•

NITEK•

POTTER•

POWERDSINE•

TROPOS•

WHEELOCK•

ALEPH•

ALTRONIX•

AMESCO•

BOSCH•

DSC•

OPTEX•

POTTER•

VON DUPRIN•

AFI• AIPHONE• ALTRONIX• AWID• BOSCH• DVTEL• EVERFOCUS• HID• INTEGRATED BIOMETRICX• KEYSCAN• LOCKNETICS• NVT• RCI• RECOGNITION SYSTEMS• RUTHERFORD CONTROLS• SCHLAGE• SECURITRON• SECURITY DOOR CONTROLS• SECURITY INC.• SPECO TECHNOLOGIES• VIKING•

VON DUPRIN•

Fire

Intrusion:

Access Control:

Premise Security Manufacturers (cont.)

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

7 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

Premise Security Manufacturers (cont.)

AIPHONE•

AVALAN WIRELESS•

CHATSWORTH•

(SENSAPHONE)•

EVERFOCUS•

GEIST•

KEYSCAN•

NETBOTZ (APC)•

PELCO•

VALCOM•

CHECKPOINT•

CISCO•

ENTERASYS•

ESOFT•

JUNIPER•

McAFEE•

SONICWALL•

SYMANTEC•

WATCHGUARD•

ZYXEL•

ALEPH•

ALTRONIX•

AMESCO•

BOSCH•

DSC•

OPTEX•

POTTER•

VON DUPRIN•

SCHWAB•

PHOENIX SAFE INTERNATIONAL•

Remote Facility: Intrusion Detection/Prevention Hardware:

Intrusion Detection/Prevention Software:

Allow GHA to help you safe-guard your important files and documents including computer media and data tapes with the latest in safe technology. Fire and waterproof options are essential forms of protection from various events that may put your data at risk. Whether you’re protecting your laptop, important documents or jew-elry, paper documents or elec-tronic media, we have a solu-tion for you.

Water-Proof Fire-Proof

(Manufacturers)

FIREKING•

SENTRY SAFE•

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

8 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

Other great manufacturers that we carry

DETEX• DEWALT• DIALOGIC• DIFINITRON• DIGITAL DEFENSE• DIRECT UPS• D-LINK• DOLPHIN COMPONENETS• DOORBELL FON• DOR-O-MATIC• DUAL-LITE• DUMMY CAMERAS• DURACEL• DYMO• DYNALOCK• EAGLE SECURITY• EDCO• EDT• EE SYSTEMS• ELECTROLUX• ELK PRODUCTS• EMERSON NETWORK• ENERSYS• ENERZONE• ENGINEERED ELECTRONICS• ERICO/CADDY• ETCON• EVAX SYSTEMS• EVEREADY• EVI/TELEX• EXCELSUS• EXTREME CCTV• EXTRON ELECTRONICS• FARGO• FENWAL• FIBER OPTIONS• FIRE BLANKETS• FIRE-LITE ALARMS•

ACTIVIDENTITY• ACCUTECH• ACT METERS• ACTi• ACTIVE SAFETY• ADAMS RITE• ADCO LIBERTY• ADCOM• ADVANCED SOURCING• AEP• AES• AGN/PRO• AKCESS BIOMETRICS• ALARM CONTROLS• ALLOT COMM• ALTERNATIVE• AMERICAN DYNAMICS• AMERICAN FIBERTEK• AMERICAN SECURITY PRODUCTS CO.• AMERICAN STORE FIXTURES• AMERICAN VIDEO EQUIPMENT• AMPHENOL• APC• APEX• ARCSIGHT• ARROW FASTENER• ASTATIC MICROPHONES• AUDIOSOURCE• ATLAS SOUND• AVG• AXIS COMMUNICATIONS• B&A MANUFACTURING• BANDIT SOLUTIONS• BAYCO• BELDEN• BEN Q• B.E.S MANUFACTURING• BETTER WAY PRODUCTS•

BIOPASSWORD• BIOSCRIPT• BLONDER TONGUE• BLUECOAT• BOSCH SECURITY SYSTEMS• BOSTON ACOUSTICS• BOUNTIFUL WIFI• BRK ELECTRONICS• BYD:SIGN• C&C PRODUCTS• CAMBRIDGE• CAMDEN DOOR CONTROLS• CANADIAN FLEXI-DRILL• CARLON TELECOM• CCTP• CBC AMERICA• CDW• CE LABS• CELLAR SAVER• CHEMETRONICS• CINEMA SELECT• CITRIX• CLEARSWIFT• COLEMAN CABLE• COMMERCIAL PRODUCT• COMM SCOPE• COOPER WHEELOCK• CORNING CABLE SYSTEMS• COVI TECHNOLOGIES• CRIMESTOPPER• CROSS POINT • D3 DATA• DATACOMM• DATACORE• DBX PROFESSIONAL• DCX SYSTEMS• DEDICATED MICROS• DESIGNED SECURITY INC.•

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

9 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

MK BATTERY• MOBICEL• MOBOTIX• MODULAR DEVICES• MONSTER CABLE• MORSE• M&S SYSTEMS• MUXLAB• MULTI-LINK• MUSIC GIANTS• MXLOGIC• NADY• NATIONAL TRAINING CENTER• NEC• NEDAP• NEL-TEC LABS• NEOWARE• NET MEDIA• NEW LINE USA• NICE SYSTEMS• NILES• NOVELL• NVT• OASIS AUDIO• OCC• OEM• OLYMPUS AMERICA• OMNI MOUNT• ONSSI• OPEN HOUSE• OSI SECURITY• OZVISION• O.W.I• PACKETEER• PAMA/DIRECT PLUS• PANASONIC• PASO• PATCHLINK• PENTAX• PERFECT VU• PERPLAS•

FIRETIDE• FLUKE • FOLGER ADAM• FORTINET• FREEFORM• FIBER OPTIONS• FLIR SYSTEMS• FUJINON• GAITRONICS• GARVIN INDUSTRIES• GEMALTO• GEM ELECTRONICS• GE SECURITY• GRAYSTONE SYSTEMS• GREENLEE• HARMON KARDON• HARMONY REMOTE• HAYDEN INDUSTRIES• HD TELECOM• HID• HELLERMAN/TYTON• HES• HIDEKI ELECTRONICS• HOME AUTOMATION INC• HONEYWELL• HSI FIRE & SAFETY GROUP• HUDSON VIDEO• ICC• ICM CORP.• ID SYSTEMS• IDEAL INDUSTRIES• IDENTIX• IDT• IEI• IGEL• INTEGRAL TECHNOLOGIES• INTERNATIONAL RESOURCES• INTER-TEL• IPIX• IQINVISION• IRWIN•

ISOTEC• ITW LINX• JAM PLASTICS• JBL PROFESSIONAL• JERON ELECTRONICS• JDS DIGITAL SECURITY SYSTEMS• KELTRON CORP.• KEY DIGITAL• KEYSCAN• KEYSPAN• KIDDIE• KINGS• KLEIN TOOLS• KRYPTONITE• LCN• L.E.D.• LEE DAN• LEGEND AUDIO• LEFTHAND• LEICA GEOSYSTEMS• LENEL• LEXION• L.H. DOTTIE• LOCKNETICS• LOGENEX INNOVATIONS• LOGICMARK• MACROVISION• MAGNETIC AUTOCONTROLS• MARCH NETWORKS• MARKS USA• MARSHALL• MERCURY SECURITY• MG ELECTRONICS• MICON TECHNOLOGY• MICROFORUM INT’L• MICROTEK• MIDDLE ATLANTIC• MIJA• MILESTONE SYSTEMS• MINUTEMAN• MIRCOM•

Other great manufacturers that we carry (cont.)

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

10 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

THINPRINT• THOMAS & BETTS• TOA• TOSHIBA• TOTE VISION• TRAPEZE• TRIPP LITE• TYCO ELECTRONICS• ULTIMACO• ULTRA MAGIC CARD• ULTRAGUARD/ECS• ULTRA TECH• UNICOM• UNIVERSAL BATTERY• UNIVERSITY REMOTE CONTROL• UPLINK SECURITY• VERICEPT• VERICHIP• VERINT• VERNEX• VICON• VIDEO DOMAIN TECHNOLOGIES LTD.• VIDEOLARM• VIDEO MESSENGER CO.• VIDEO MOUNT PRODUCTS• VIDEOTEC• VIKING ELECTRONICS• VISIONTECH• VIZIONCORE• VODAVI• VONTRONICS• VMWARE• WALKER EQUIPMENT• WATCHGUARD• WATTSTOPPER/LEGRAND• WEST PEN WIRE• WIREMOLD/LEGRAND• WYRELESS ACCESS• WYSE• X-10 PRO• XANTECH• YALE SECURITY GROUP•

PHILIPS• PHOENIX GOLD• PIONEER• PLANAR• PLANTRONICS• PLATESPIN• PORTER CABLE TOOLS• POS DISTRIBUTING • POSH• POTTER ELECTRIC• POWERLINE CONTROL• POWERLINE CONTROL• POWER-SONIC• PRO CO SOUND• PRODUCTIVE CONSULTANTS• PROFICIENT AUDIO• PROTECH• QSC AUDIO• QUAM• QUANTUM GROUP• RAB ELECTRONIC• RACO• RADIO DESIGN LABS• RADWARE• RECOGNITION SYSTEMS• RED HAWK• REGIN HVAC PRODUCTS• REMEE• REPAIR MASTER• ROKONET• RUSSOUND• S2 SECURITY CORP• SAFE FIRE DETECTION• SAFT• SAGEM MORPHO• SALCO INDUSTRIES• SAMSUNG• SANUS• SANYO• SATELLIE USA• SCHLAGE•

SCRIPTLOGIC• SDC• SDI• SECURAKEY• SECURE COMPUTING• SECURITRON• SENSTAR-STELLAR• SENTEX/CHAMBERLAIN• SHERWOOD• SHURE• SIG COM• SIGNAL ONE SAFETY• SIM2• SLAYTON SOLUTIONS• SONICWALL• SONY• SPACE AGE ELECTRONICS• SPECIFIED TECHNOLOGIES• SPECO TECHNOLOGIES• SPERRY WEST• SPS ENERGY• SR COMPONENTS• SUPERIOR MODULAR• SUPERIOR/ESSEX• SURE ACTION INC.• SURFCONTROL• SUTTLE APPARATUS• SYMPHONY SELECT• SYSTEM SENSOR• TAMRON• TAPPAN• TATLE TALE PORTABLE ALARM • SYSTEMSTATUNG• TDK• TECH SPRAY• TECHFLEX• TECHNOLOGY SYSTEMS SREVICES• TELDAT• TEST-UM• THE SIEMON COMPANY•

Other great manufacturers that we carry (cont.)

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

11 of 11Copyright © 2008 GHA Technologies Inc. All rights reserved.

GHA Vulnerability Assessment Services

IT security is a critical area that is many times neglected by companies until it is too late. Companies also feel that their IT security is sufficient without knowing the full security requirements. Don’t be a company that suffers from the consequences; call GHA today for a vulnerability analysis.

GHA offers the most complete IT security services in the world. Everything from detailed security audits to post analysis and full solutions are offered in the GHA security package.

GHA covers the ten areas of IT security:

• Security Policy• Security Organization• Asset Classification and Control• Personal Security• Physical and Environmental Control• Communications and Operations Management• Access Control• System Development and Maintenance• Business Continuity Management• Compliance

Businesses have long recognized the value of independent review of their security

operations. All security review services result in an independent review of part of

your entire security program but they differ in terms of scope and rigor.


Recommended