Networking ▪ VoIP ▪ Storage ▪ Security ▪ Workspace Solutions ▪ RFID ▪ POS ▪ Portable Electronics & Accessories ▪ A/V ▪ System Integration

Security

Computer

Network

Premise

Biometrics

Some of our Top Sellers

GHA sells all of the leading security technology and solutions to protect and bullet proof your data which is the life blood of any organization. GHA sales consultants will perform a proactive security review to help identify vulnerabilities in advance of security breaches.

GHA is at the forefront representing all of the leading security manufacturers to reduce risks associated with identity theft and to be Sarbanes Oxley and HIPAA compliant.

We sell biometrics, intrusion detection, access control, perimeter monitoring and video surveillance, encryption, Wi Fi and wireless security, network scanning, license compliance, identity tags and badges, data safes and vaults, password management, equipment recovery and tracing, anti spam, virus, spyware, content filtering in compliance with the Internet Child Protection Act, and a variety of other security technologies and solutions.

GHA’s line of security products also includes what your business needs in order to remain compliant with national laws and regulations. Without the proper precautions to secure, archive and protect certain types of data, you and your business can become liable in cases where negligence causes damage or loss.

ABSOLUTE – LOJACK

COMPUTER ASSOCIATES

MCAFEE

MX-LOGIC

NEC

PANASONIC

RSA

SYMANTEC

WATCHGUARD

Computer Lo-Jack from Absolute Software:

Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and

Secure Asset Tracking™ solutions. With over two million subscriptions currently under contract, Absolute Software provides individuals and organizations of all types and sizes with solutions to manage regulatory compliance, data protection and theft recovery.

If a computer is stolen, Absolute Software’s Recovery

Team will work with local law enforcement agencies to locate and recover the machine. Computrace also enables

IT professionals to remotely delete data on stolen or missing machines to protect the information from falling into the wrong hands.

1 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

(Computer Security Manufacturers)

Firewall/VPN Software

CA

CHECKPOINT

CITRIX

McAFEE

MICROSOFT

NOVELL

SYMANTEC

WiFi Security

LUCENT LINK

NEWBURY NET

Secure Application Access

CHECKPOINT

CISCO

CITRIX

F5 NETWORKS

JUNIPER

NOKIA

SAFENET

Encryption

IRONKEY

PGP

Anti-Virus

AVG

CA

EST

KASPERSKY

MCAFEE

MICROSOFT –ONE CARE

SYMANTEC

MCAFEE

SOPHOS

TRENDMICRO

Secure Content

Management Software:

CA

McAFEE

NET IQ

SYMANTEC

TREND MICRO

VERICEPT

WEBROOT

WEBSENSE

Email Security:

BARRACUDA

FRONTBRIDGE

KASPERSKY LAB

McAFEE

MXLogic

SOPHOS

SUNBELT

TREND MICRO

Password Security:

ROBOFORM

RSA

SYMANTEC

Document Security:

ENTRUST

TUMBLEWEED

Security Enclosures:

Computer Security

Kendall Howard

Smart Cards:

A smart card is a card that is embedded with either a microprocessor and a memory chip or only a memory chip with non-programmable logic. The microprocessor card can add, delete, and otherwise manipulate information on the card, while a memory-chip card (for example, pre-paid phone cards) can only undertake a pre-defined operation.

Smart cards, unlike magnetic stripe cards, can carry all necessary functions and information on the card. Therefore, they do not require access to remote databases at the time of the transaction.

User Monitoring and email security

Safend - software environment used to monitor who’s connecting what devices to every single endpoint in your network, enterprise-wide - from USB to Bluetooth - and gain extreme visibility over port access across the network.

Sendio - the Sendio I.C.E. box delivers email integrity by eliminating ALL spam and unwanted email without losing a legitimate email message. This solution eliminates

100% of all machine-generated spam, blocks junk mail before it reaches the email server, and avoids false positive.

2 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

GHA- Your Source for School Security Products

Fargo offers a complete solution for your identification needs

The Persona C30 Photo System is an economical solution for your badging needs. The photo system includes the printer, build-a-badge card design software, a YMCKO ribbon, cleaning kit and camera. It is available single or dual sided, with or without a magnetic stripe encoder. Just add a pack of cards and you are ready to print identification badges.

Boost your security with Zebra card printers

Zebra’s P120i’s modern design, high-tech materials and new electronics make it reliable and easy-to-use, setting it above the competition. All types of businesses can easily create personalized ID cards instantly. The P110i color card printer is an affordable single-side printing option.

Campus emergency notification system

Displays support horizontal and vertical scrolling of messages:

Time-of-Day, Operational Messages and Emergency Messages configured using a web browser

Runs on Windows 2000 and Windows XP

(Biometrics Security Manufacturers)

Access Control:

AFI

AIPHONE

ALADDIN

ALTRONIX

AWID

BOSCH

DVTEL

EVERFOCUS

HID

INTEGRATED BIOMETRICX

KEYSCAN

LOCKNETICS

NVT

RCI

RECOGNITION SYSTEMS

RUTHERFORD CONTROLS

Access Control (cont): Authentication Software:

SCANSOURCE

SCHLAGE

SECURITRON

SECURITY DOOR CONTROLS

SECURITY INC

SPECO TECHNOLOGIES

SYNEL

VIKING

VON DUPRIN

CISCO SYSTEMS

CITRIX SYSTEMS

RSA SECURITY

VERISIGN

Authentication Hardware:

CISCO SYSTEMS

IBM

RSA SECURITY

SAFE NET

SONY

I.D. Badges:

FARGO

PERSONA

• ZEBRA

3 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

Network Security Manufacturers

Firewall/VPN Hardware:

3COM

ADTRAN

ARRAY

CELESTIX

CHECKPOINT

CISCO

D-LINK

ENTERASYS eSOFT

F5 NETWORKS

HP

INTRUSION

JUNIPER

LINKSYS

NETGEAR

NETWORK ENGINES

NOKIA

NORTEL NETWORKS

SNAPGEAR

SONICWALL

SYMANTEC

WATCHGUARD

U.S. ROBOTICS

ZYXEL

Firewall/VPN Hardware:

CA

CHECKPOINT

CITRIX

McAFEE

MICROSOFT

NOVELL

SYMANTEC

Firewall/VPN Hardware:

3COM

CHECKPOINT

CISCO

ENTERASYS eSOFT

INTRUSION

JUNIPER

McAFEE

SONICWALL

SYMANTEC

WATCHDOG

ZYXEL

Firewall/VPN Hardware:

CA

McAFEE

NET IQ

SYMANTEC

TREND MICRO

VERICEPT

WEBROOT

WEBSENSE

The IronKey is the world’s most secure USB flash drive, and it has been widely heralded in the press and by customers for its unique combination of security and performance.

The IronKey is provisioned at the factory with a 2,048 bit RSA Device

Key which is used to authenticate the device and encrypt all communications between the server and the device. The key resides on the

Cryptochip and is not accessible. This protects the IronKey against on-the-wire attacks or attempts to access/guess the device.

The device destroys all data after 10 incorrect password attempts.

IronKey’s patent pending “self destruct” methodology incorporates an exhaustive hardware erase of all flash and Cryptochip memory. This is a secure overwriting of data done in a hardware application for the ultimate protection.

The IronKey is both waterproof and tamperproof and has been through rigorous durability testing.

The IronKey also comes with a secure browsing technology which uses a private network to establish a secure connection between the device and the internet.

1 g – 2g – 4g capacities available

4 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

Premise Security Manufacturers

Surveillance and CCTV:

ACTI

AFS

AIM

AIPHONE

ALARM CONTROLS

ALARM LOCK

ALARM SAF

ALTRONIX

AMERICAN DYNAMICS

AMERICAN FIBERTEK

AMSECO

ANCHOR AUDIO

APOLLO

APPRO TECHNOLOGY

APW RACKS

ARM ELECTRONICS

ATLAS SOUND

ATV

ATW

AUDIO TECHNICA

AVALAN WIRELESS

AVE

AXIS

AZDEN

BLACK BOX

BLONDER TONGUE

BOGEN

BOSCH

BOX LIGHT

BRETFORD

B-TRON

BTX

CANON

CBC

CHANNEL PLUS

CHANNEL VISION

CHIEF

CLOVER

COMMONSCOPE

COMPREHENSIVE

CORBY

COVI

CROW

CROWN

DALITE

DEDICATED MICROS

DELTA DESIGN

DENON

DIGIMERGE

DIGITAL WATCHDOG

DISPLAY DEVICES

DITEK

DRAPER

DSI

DUKANE

DVTel

EDWARDS SIGNALING

ELECTRONICS LINE USA

ELMO

EMI

ELECTRONIC SECURITY DEVICES

EUROBEX

EVERFOCUS

EXTREME Cctv

FEDERAL SIGNAL

FIRE KING

FM SYSTEMS

FOCUS ENHANCEMENTS

FUJINON

GARRETT

GE

GENERAL SOLUTIONS

GENTEX

GRI

HAWKING TECHNOLOGY

HID

HITACHI

ICG

IDview

IEI

IFS

IKEGAMI

IMAGE VAULT

INFINOVA

INFOCUS

INOVONICS

INSITE VIDEO SYSTEMS

INTEGRAL TECHNOLOGIES ipCONFIGURE

IQINVISION

JVC

KERI SYSTEMS

KINYO

KNOX

KOWA

KT&C

LABOR SAVING DEVICES

LEIGHTRONIX

LEVITRON

LG COMMERCIAL

LINEAR

LISTEN

LOUROE

LOWELL-LIGHT

LUCASEY

MACKIE

MACURCO

MARANTZ

MARSHALL ELECTRONIC

MAXELL

MDI

MICRO-TEK

MIDDLE ATLANTIC

MIER PRODUCTS

MITSUBISHI

MOBI

MOTOROLA

MUSIC & SOUND

NETPROMAX

NITEK

NRG

NUVICO

NUTONE

NVT

OPTEX

ORION

5 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

Premise Security Manufacturers (cont.)

PACH & CO

PAN PACIFIC

PANASONIC

PANAVISE

PCSC

PEERLESS

PELCO

PENTAX

PICO MACOM

PORTA BRACE

PREFERRED POWER

PREMIER WIRELESS

QUANTEGY

RAINBOW SECURITY

REPORTER

REVERE

RL DRAKE CO

RUTHEFORD CONTROLS

SAFETY TECHNOLOGIES

SAMSON WIRELESS

SAMSUNG

SANYO

SECOLARM

SECURITRON

SE-KURE

SHURE

SILENT KNIGHT

SONY

SPECO TECH

STEALTH

STI

SVAT

TAKEX

TALK-A-PHONE

TAMERON

TATUNG

TEC NEC

TELEXPER

TELULAR

TEMPEST

TOA

TOKINA

TOSHIBA

TOTE VISION

TRANGO SYSTEMS

USP

VAC

VERINT

VICON

VIDEOCOMM

VIDEOLARM

VIDEOTEC

VIGITRON

VISONIC

VISUAL SENTRY

VITEK

VMP

WATEC

WEST PENN

WHEELOCK

WINLAND ELECTRIC

WINSTEAD

WIRELESS TECH

WREN

ZENITH

Fire

APC

AVALAN

DIGI

DITEK

EATON POWERWARE

EDWARDS

ETS

ITW LINX

MULTITECH

NITEK

POTTER

POWERDSINE

TROPOS

WHEELOCK

Intrusion:

ALEPH

ALTRONIX

AMESCO

BOSCH

DSC

OPTEX

POTTER

VON DUPRIN

Access Control:

AFI

AIPHONE

ALTRONIX

AWID

BOSCH

DVTEL

EVERFOCUS

HID

INTEGRATED BIOMETRICX

KEYSCAN

LOCKNETICS

NVT

RCI

RECOGNITION SYSTEMS

RUTHERFORD CONTROLS

SCHLAGE

SECURITRON

SECURITY DOOR CONTROLS

SECURITY INC.

SPECO TECHNOLOGIES

VIKING

VON DUPRIN

6 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

Premise Security Manufacturers (cont.)

Intrusion Detection/

Prevention Hardware:

CHECKPOINT

CISCO

ENTERASYS

ESOFT

JUNIPER

McAFEE

SONICWALL

SYMANTEC

WATCHGUARD

ZYXEL

Intrusion Detection/

Prevention Software:

ALEPH

ALTRONIX

AMESCO

BOSCH

DSC

OPTEX

POTTER

VON DUPRIN

Remote Facility:

AIPHONE

AVALAN WIRELESS

CHATSWORTH

(SENSAPHONE)

EVERFOCUS

GEIST

KEYSCAN

NETBOTZ (APC)

PELCO

VALCOM

Allow GHA to help you safeguard your important files and documents including computer media and data tapes with the latest in safe technology. Fire and waterproof options are essential forms of protection from various events that may put your data at risk. Whether you’re protecting your laptop, important documents or jewelry, paper documents or electronic media, we have a solution for you.

Water-Proof

(Manufacturers)

SCHWAB

PHOENIX SAFE INTERNATIONAL

Fire-Proof

FIREKING

SENTRY SAFE

7 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

Other great manufacturers that we carry

ACTIVIDENTITY

ACCUTECH

ACT METERS

ACTi

ACTIVE SAFETY

ADAMS RITE

ADCO LIBERTY

ADCOM

ADVANCED SOURCING

AEP

AES

AGN/PRO

AKCESS BIOMETRICS

ALARM CONTROLS

ALLOT COMM

ALTERNATIVE

AMERICAN DYNAMICS

AMERICAN FIBERTEK

AMERICAN SECURITY PRODUCTS CO.

AMERICAN STORE FIXTURES

AMERICAN VIDEO EQUIPMENT

AMPHENOL

APC

APEX

ARCSIGHT

ARROW FASTENER

ASTATIC MICROPHONES

AUDIOSOURCE

ATLAS SOUND

AVG

AXIS COMMUNICATIONS

B&A MANUFACTURING

BANDIT SOLUTIONS

BAYCO

BELDEN

BEN Q

B.E.S MANUFACTURING

BETTER WAY PRODUCTS

BIOPASSWORD

BIOSCRIPT

BLONDER TONGUE

BLUECOAT

BOSCH SECURITY SYSTEMS

BOSTON ACOUSTICS

BOUNTIFUL WIFI

BRK ELECTRONICS

BYD:SIGN

C&C PRODUCTS

CAMBRIDGE

CAMDEN DOOR CONTROLS

CANADIAN FLEXI-DRILL

CARLON TELECOM

CCTP

CBC AMERICA

CDW

CE LABS

CELLAR SAVER

CHEMETRONICS

CINEMA SELECT

CITRIX

CLEARSWIFT

COLEMAN CABLE

COMMERCIAL PRODUCT

COMM SCOPE

COOPER WHEELOCK

CORNING CABLE SYSTEMS

COVI TECHNOLOGIES

CRIMESTOPPER

CROSS POINT

D3 DATA

DATACOMM

DATACORE

DBX PROFESSIONAL

DCX SYSTEMS

DEDICATED MICROS

DESIGNED SECURITY INC.

DETEX

DEWALT

DIALOGIC

DIFINITRON

DIGITAL DEFENSE

DIRECT UPS

D-LINK

DOLPHIN COMPONENETS

DOORBELL FON

DOR-O-MATIC

DUAL-LITE

DUMMY CAMERAS

DURACEL

DYMO

DYNALOCK

EAGLE SECURITY

EDCO

EDT

EE SYSTEMS

ELECTROLUX

ELK PRODUCTS

EMERSON NETWORK

ENERSYS

ENERZONE

ENGINEERED ELECTRONICS

ERICO/CADDY

ETCON

EVAX SYSTEMS

EVEREADY

EVI/TELEX

EXCELSUS

EXTREME CCTV

EXTRON ELECTRONICS

FARGO

FENWAL

FIBER OPTIONS

FIRE BLANKETS

FIRE-LITE ALARMS

8 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

Other great manufacturers that we carry (cont.)

FIRETIDE

FLUKE

FOLGER ADAM

FORTINET

FREEFORM

FIBER OPTIONS

FLIR SYSTEMS

FUJINON

GAITRONICS

GARVIN INDUSTRIES

GEMALTO

GEM ELECTRONICS

GE SECURITY

GRAYSTONE SYSTEMS

GREENLEE

HARMON KARDON

HARMONY REMOTE

HAYDEN INDUSTRIES

HD TELECOM

HID

HELLERMAN/TYTON

HES

HIDEKI ELECTRONICS

HOME AUTOMATION INC

HONEYWELL

HSI FIRE & SAFETY GROUP

HUDSON VIDEO

ICC

ICM CORP.

ID SYSTEMS

IDEAL INDUSTRIES

IDENTIX

IDT

IEI

IGEL

INTEGRAL TECHNOLOGIES

INTERNATIONAL RESOURCES

INTER-TEL

IPIX

IQINVISION

IRWIN

ISOTEC

ITW LINX

JAM PLASTICS

JBL PROFESSIONAL

JERON ELECTRONICS

JDS DIGITAL SECURITY SYSTEMS

KELTRON CORP.

KEY DIGITAL

KEYSCAN

KEYSPAN

KIDDIE

KINGS

KLEIN TOOLS

KRYPTONITE

LCN

L.E.D.

LEE DAN

LEGEND AUDIO

LEFTHAND

LEICA GEOSYSTEMS

LENEL

LEXION

L.H. DOTTIE

LOCKNETICS

LOGENEX INNOVATIONS

LOGICMARK

MACROVISION

MAGNETIC AUTOCONTROLS

MARCH NETWORKS

MARKS USA

MARSHALL

MERCURY SECURITY

MG ELECTRONICS

MICON TECHNOLOGY

MICROFORUM INT’L

MICROTEK

MIDDLE ATLANTIC

MIJA

MILESTONE SYSTEMS

MINUTEMAN

MIRCOM

MK BATTERY

MOBICEL

MOBOTIX

MODULAR DEVICES

MONSTER CABLE

MORSE

M&S SYSTEMS

MUXLAB

MULTI-LINK

MUSIC GIANTS

MXLOGIC

NADY

NATIONAL TRAINING CENTER

NEC

NEDAP

NEL-TEC LABS

NEOWARE

NET MEDIA

NEW LINE USA

NICE SYSTEMS

NILES

NOVELL

NVT

OASIS AUDIO

OCC

OEM

OLYMPUS AMERICA

OMNI MOUNT

ONSSI

OPEN HOUSE

OSI SECURITY

OZVISION

O.W.I

PACKETEER

PAMA/DIRECT PLUS

PANASONIC

PASO

PATCHLINK

PENTAX

PERFECT VU

PERPLAS

9 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

Other great manufacturers that we carry (cont.)

PHILIPS

PHOENIX GOLD

PIONEER

PLANAR

PLANTRONICS

PLATESPIN

PORTER CABLE TOOLS

POS DISTRIBUTING

POSH

POTTER ELECTRIC

POWERLINE CONTROL

POWERLINE CONTROL

POWER-SONIC

PRO CO SOUND

PRODUCTIVE CONSULTANTS

PROFICIENT AUDIO

PROTECH

QSC AUDIO

QUAM

QUANTUM GROUP

RAB ELECTRONIC

RACO

RADIO DESIGN LABS

RADWARE

RECOGNITION SYSTEMS

RED HAWK

REGIN HVAC PRODUCTS

REMEE

REPAIR MASTER

ROKONET

RUSSOUND

S2 SECURITY CORP

SAFE FIRE DETECTION

SAFT

SAGEM MORPHO

SALCO INDUSTRIES

SAMSUNG

SANUS

SANYO

SATELLIE USA

SCHLAGE

SCRIPTLOGIC

SDC

SDI

SECURAKEY

SECURE COMPUTING

SECURITRON

SENSTAR-STELLAR

SENTEX/CHAMBERLAIN

SHERWOOD

SHURE

SIG COM

SIGNAL ONE SAFETY

SIM2

SLAYTON SOLUTIONS

SONICWALL

SONY

SPACE AGE ELECTRONICS

SPECIFIED TECHNOLOGIES

SPECO TECHNOLOGIES

SPERRY WEST

SPS ENERGY

SR COMPONENTS

SUPERIOR MODULAR

SUPERIOR/ESSEX

SURE ACTION INC.

SURFCONTROL

SUTTLE APPARATUS

SYMPHONY SELECT

SYSTEM SENSOR

TAMRON

TAPPAN

TATLE TALE PORTABLE ALARM

SYSTEMS

TATUNG

TDK

TECH SPRAY

TECHFLEX

TECHNOLOGY SYSTEMS SREVICES

TELDAT

TEST-UM

THE SIEMON COMPANY

THINPRINT

THOMAS & BETTS

TOA

TOSHIBA

TOTE VISION

TRAPEZE

TRIPP LITE

TYCO ELECTRONICS

ULTIMACO

ULTRA MAGIC CARD

ULTRAGUARD/ECS

ULTRA TECH

UNICOM

UNIVERSAL BATTERY

UNIVERSITY REMOTE CONTROL

UPLINK SECURITY

VERICEPT

VERICHIP

VERINT

VERNEX

VICON

VIDEO DOMAIN TECHNOLOGIES LTD.

VIDEOLARM

VIDEO MESSENGER CO.

VIDEO MOUNT PRODUCTS

VIDEOTEC

VIKING ELECTRONICS

VISIONTECH

VIZIONCORE

VODAVI

VONTRONICS

VMWARE

WALKER EQUIPMENT

WATCHGUARD

WATTSTOPPER/LEGRAND

WEST PEN WIRE

WIREMOLD/LEGRAND

WYRELESS ACCESS

WYSE

X-10 PRO

XANTECH

YALE SECURITY GROUP

10 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.

If you do not see the product that you need, just let us know and we will get it for you!

“When Service and Delivery Count” ®

GHA Vulnerability Assessment Services

IT security is a critical area that is many times neglected by companies until it is too late. Companies also feel that their IT security is sufficient without knowing the full security requirements. Don’t be a company that suffers from the consequences; call

GHA today for a vulnerability analysis.

GHA offers the most complete IT security services in the world. Everything from detailed security audits to post analysis and full solutions are offered in the GHA security package.

GHA covers the ten areas of IT security:

Security Policy

Security Organization

Asset Classification and Control

Personal Security

Physical and Environmental Control

Communications and Operations Management

Access Control

System Development and Maintenance

Business Continuity Management

Compliance

Businesses have long recognized the value of independent review of their security operations. All security review services result in an independent review of part of your entire security program but they differ in terms of scope and rigor.

11 of 11

Copyright © 2008 GHA Technologies Inc. All rights reserved.