Networking ▪ VoIP ▪ Storage ▪ Security ▪ Workspace Solutions ▪ RFID ▪ POS ▪ Portable Electronics & Accessories ▪ A/V ▪ System Integration
GHA sells all of the leading security technology and solutions to protect and bullet proof your data which is the life blood of any organization. GHA sales consultants will perform a proactive security review to help identify vulnerabilities in advance of security breaches.
GHA is at the forefront representing all of the leading security manufacturers to reduce risks associated with identity theft and to be Sarbanes Oxley and HIPAA compliant.
We sell biometrics, intrusion detection, access control, perimeter monitoring and video surveillance, encryption, Wi Fi and wireless security, network scanning, license compliance, identity tags and badges, data safes and vaults, password management, equipment recovery and tracing, anti spam, virus, spyware, content filtering in compliance with the Internet Child Protection Act, and a variety of other security technologies and solutions.
GHA’s line of security products also includes what your business needs in order to remain compliant with national laws and regulations. Without the proper precautions to secure, archive and protect certain types of data, you and your business can become liable in cases where negligence causes damage or loss.
•
•
•
•
•
•
•
•
•
ABSOLUTE – LOJACK
COMPUTER ASSOCIATES
MCAFEE
MX-LOGIC
NEC
PANASONIC
RSA
SYMANTEC
WATCHGUARD
Computer Lo-Jack from Absolute Software:
Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and
Secure Asset Tracking™ solutions. With over two million subscriptions currently under contract, Absolute Software provides individuals and organizations of all types and sizes with solutions to manage regulatory compliance, data protection and theft recovery.
If a computer is stolen, Absolute Software’s Recovery
Team will work with local law enforcement agencies to locate and recover the machine. Computrace also enables
IT professionals to remotely delete data on stolen or missing machines to protect the information from falling into the wrong hands.
1 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
•
•
•
•
•
•
•
Firewall/VPN Software
CA
CHECKPOINT
CITRIX
McAFEE
MICROSOFT
NOVELL
SYMANTEC
•
•
WiFi Security
LUCENT LINK
NEWBURY NET
•
•
•
•
•
•
•
Secure Application Access
CHECKPOINT
CISCO
CITRIX
F5 NETWORKS
JUNIPER
NOKIA
SAFENET
•
•
Encryption
IRONKEY
PGP
•
•
•
•
•
•
•
•
•
•
Anti-Virus
AVG
CA
EST
KASPERSKY
MCAFEE
MICROSOFT –ONE CARE
SYMANTEC
MCAFEE
SOPHOS
TRENDMICRO
•
•
•
•
•
•
•
•
Secure Content
Management Software:
CA
McAFEE
NET IQ
SYMANTEC
TREND MICRO
VERICEPT
WEBROOT
WEBSENSE
•
•
•
•
•
•
•
•
Email Security:
BARRACUDA
FRONTBRIDGE
KASPERSKY LAB
McAFEE
MXLogic
SOPHOS
SUNBELT
TREND MICRO
•
•
•
Password Security:
ROBOFORM
RSA
SYMANTEC
•
•
Document Security:
ENTRUST
TUMBLEWEED
•
•
Security Enclosures:
Computer Security
Kendall Howard
Smart Cards:
A smart card is a card that is embedded with either a microprocessor and a memory chip or only a memory chip with non-programmable logic. The microprocessor card can add, delete, and otherwise manipulate information on the card, while a memory-chip card (for example, pre-paid phone cards) can only undertake a pre-defined operation.
Smart cards, unlike magnetic stripe cards, can carry all necessary functions and information on the card. Therefore, they do not require access to remote databases at the time of the transaction.
User Monitoring and email security
Safend - software environment used to monitor who’s connecting what devices to every single endpoint in your network, enterprise-wide - from USB to Bluetooth - and gain extreme visibility over port access across the network.
Sendio - the Sendio I.C.E. box delivers email integrity by eliminating ALL spam and unwanted email without losing a legitimate email message. This solution eliminates
100% of all machine-generated spam, blocks junk mail before it reaches the email server, and avoids false positive.
2 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
Fargo offers a complete solution for your identification needs
The Persona C30 Photo System is an economical solution for your badging needs. The photo system includes the printer, build-a-badge card design software, a YMCKO ribbon, cleaning kit and camera. It is available single or dual sided, with or without a magnetic stripe encoder. Just add a pack of cards and you are ready to print identification badges.
Boost your security with Zebra card printers
Zebra’s P120i’s modern design, high-tech materials and new electronics make it reliable and easy-to-use, setting it above the competition. All types of businesses can easily create personalized ID cards instantly. The P110i color card printer is an affordable single-side printing option.
Campus emergency notification system
•
•
•
Displays support horizontal and vertical scrolling of messages:
Time-of-Day, Operational Messages and Emergency Messages configured using a web browser
Runs on Windows 2000 and Windows XP
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Access Control:
AFI
AIPHONE
ALADDIN
ALTRONIX
AWID
BOSCH
DVTEL
EVERFOCUS
HID
INTEGRATED BIOMETRICX
KEYSCAN
LOCKNETICS
NVT
RCI
RECOGNITION SYSTEMS
RUTHERFORD CONTROLS
Access Control (cont): Authentication Software:
•
•
•
•
•
•
•
•
•
SCANSOURCE
SCHLAGE
SECURITRON
SECURITY DOOR CONTROLS
SECURITY INC
SPECO TECHNOLOGIES
SYNEL
VIKING
VON DUPRIN
•
•
•
•
CISCO SYSTEMS
CITRIX SYSTEMS
RSA SECURITY
VERISIGN
•
•
•
•
•
Authentication Hardware:
CISCO SYSTEMS
IBM
RSA SECURITY
SAFE NET
SONY
I.D. Badges:
•
•
FARGO
PERSONA
• ZEBRA
3 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Firewall/VPN Hardware:
3COM
ADTRAN
ARRAY
CELESTIX
CHECKPOINT
CISCO
D-LINK
ENTERASYS eSOFT
F5 NETWORKS
HP
INTRUSION
JUNIPER
LINKSYS
NETGEAR
NETWORK ENGINES
NOKIA
NORTEL NETWORKS
SNAPGEAR
SONICWALL
SYMANTEC
WATCHGUARD
U.S. ROBOTICS
ZYXEL
Firewall/VPN Hardware:
•
•
•
•
•
•
•
CA
CHECKPOINT
CITRIX
McAFEE
MICROSOFT
NOVELL
SYMANTEC
•
•
•
•
•
•
•
•
•
•
•
•
Firewall/VPN Hardware:
3COM
CHECKPOINT
CISCO
ENTERASYS eSOFT
INTRUSION
JUNIPER
McAFEE
SONICWALL
SYMANTEC
WATCHDOG
ZYXEL
•
•
•
•
•
•
•
•
Firewall/VPN Hardware:
CA
McAFEE
NET IQ
SYMANTEC
TREND MICRO
VERICEPT
WEBROOT
WEBSENSE
The IronKey is the world’s most secure USB flash drive, and it has been widely heralded in the press and by customers for its unique combination of security and performance.
The IronKey is provisioned at the factory with a 2,048 bit RSA Device
Key which is used to authenticate the device and encrypt all communications between the server and the device. The key resides on the
Cryptochip and is not accessible. This protects the IronKey against on-the-wire attacks or attempts to access/guess the device.
The device destroys all data after 10 incorrect password attempts.
IronKey’s patent pending “self destruct” methodology incorporates an exhaustive hardware erase of all flash and Cryptochip memory. This is a secure overwriting of data done in a hardware application for the ultimate protection.
The IronKey is both waterproof and tamperproof and has been through rigorous durability testing.
The IronKey also comes with a secure browsing technology which uses a private network to establish a secure connection between the device and the internet.
4 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
Surveillance and CCTV:
ACTI
AFS
AIM
AIPHONE
ALARM CONTROLS
ALARM LOCK
ALARM SAF
ALTRONIX
AMERICAN DYNAMICS
AMERICAN FIBERTEK
AMSECO
ANCHOR AUDIO
APOLLO
APPRO TECHNOLOGY
APW RACKS
ARM ELECTRONICS
ATLAS SOUND
ATV
ATW
AUDIO TECHNICA
AVALAN WIRELESS
AVE
AXIS
AZDEN
BLACK BOX
BLONDER TONGUE
BOGEN
BOSCH
BOX LIGHT
BRETFORD
B-TRON
BTX
CANON
CBC
CHANNEL PLUS
CHANNEL VISION
CHIEF
CLOVER
COMMONSCOPE
COMPREHENSIVE
CORBY
COVI
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
CROW
CROWN
DALITE
DEDICATED MICROS
DELTA DESIGN
DENON
DIGIMERGE
DIGITAL WATCHDOG
DISPLAY DEVICES
DITEK
DRAPER
DSI
DUKANE
DVTel
EDWARDS SIGNALING
ELECTRONICS LINE USA
ELMO
EMI
ELECTRONIC SECURITY DEVICES
EUROBEX
EVERFOCUS
EXTREME Cctv
FEDERAL SIGNAL
FIRE KING
FM SYSTEMS
FOCUS ENHANCEMENTS
FUJINON
GARRETT
GE
GENERAL SOLUTIONS
GENTEX
GRI
HAWKING TECHNOLOGY
HID
HITACHI
ICG
IDview
IEI
IFS
IKEGAMI
IMAGE VAULT
INFINOVA
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
INFOCUS
INOVONICS
INSITE VIDEO SYSTEMS
INTEGRAL TECHNOLOGIES ipCONFIGURE
IQINVISION
JVC
KERI SYSTEMS
KINYO
KNOX
KOWA
KT&C
LABOR SAVING DEVICES
LEIGHTRONIX
LEVITRON
LG COMMERCIAL
LINEAR
LISTEN
LOUROE
LOWELL-LIGHT
LUCASEY
MACKIE
MACURCO
MARANTZ
MARSHALL ELECTRONIC
MAXELL
MDI
MICRO-TEK
MIDDLE ATLANTIC
MIER PRODUCTS
MITSUBISHI
MOBI
MOTOROLA
MUSIC & SOUND
NETPROMAX
NITEK
NRG
NUVICO
NUTONE
NVT
OPTEX
ORION
5 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
PACH & CO
PAN PACIFIC
PANASONIC
PANAVISE
PCSC
PEERLESS
PELCO
PENTAX
PICO MACOM
PORTA BRACE
PREFERRED POWER
PREMIER WIRELESS
QUANTEGY
RAINBOW SECURITY
REPORTER
REVERE
RL DRAKE CO
RUTHEFORD CONTROLS
SAFETY TECHNOLOGIES
SAMSON WIRELESS
SAMSUNG
SANYO
SECOLARM
SECURITRON
SE-KURE
SHURE
SILENT KNIGHT
SONY
SPECO TECH
STEALTH
STI
SVAT
TAKEX
TALK-A-PHONE
TAMERON
TATUNG
TEC NEC
TELEXPER
TELULAR
TEMPEST
TOA
TOKINA
TOSHIBA
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
TOTE VISION
TRANGO SYSTEMS
USP
VAC
VERINT
VICON
VIDEOCOMM
VIDEOLARM
VIDEOTEC
VIGITRON
VISONIC
VISUAL SENTRY
VITEK
VMP
WATEC
WEST PENN
WHEELOCK
WINLAND ELECTRIC
WINSTEAD
WIRELESS TECH
WREN
ZENITH
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Fire
APC
AVALAN
DIGI
DITEK
EATON POWERWARE
EDWARDS
ETS
ITW LINX
MULTITECH
NITEK
POTTER
POWERDSINE
TROPOS
WHEELOCK
•
•
•
•
•
•
•
•
Intrusion:
ALEPH
ALTRONIX
AMESCO
BOSCH
DSC
OPTEX
POTTER
VON DUPRIN
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Access Control:
AFI
AIPHONE
ALTRONIX
AWID
BOSCH
DVTEL
EVERFOCUS
HID
INTEGRATED BIOMETRICX
KEYSCAN
LOCKNETICS
NVT
RCI
RECOGNITION SYSTEMS
RUTHERFORD CONTROLS
SCHLAGE
SECURITRON
SECURITY DOOR CONTROLS
SECURITY INC.
SPECO TECHNOLOGIES
VIKING
VON DUPRIN
6 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
•
•
•
•
•
•
•
•
•
•
Intrusion Detection/
Prevention Hardware:
CHECKPOINT
CISCO
ENTERASYS
ESOFT
JUNIPER
McAFEE
SONICWALL
SYMANTEC
WATCHGUARD
ZYXEL
•
•
•
•
•
•
•
•
Intrusion Detection/
Prevention Software:
ALEPH
ALTRONIX
AMESCO
BOSCH
DSC
OPTEX
POTTER
VON DUPRIN
Remote Facility:
•
•
•
•
•
•
•
•
•
•
AIPHONE
AVALAN WIRELESS
CHATSWORTH
(SENSAPHONE)
EVERFOCUS
GEIST
KEYSCAN
NETBOTZ (APC)
PELCO
VALCOM
Water-Proof
(Manufacturers)
•
•
SCHWAB
PHOENIX SAFE INTERNATIONAL
•
•
FIREKING
SENTRY SAFE
7 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
ACTIVIDENTITY
ACCUTECH
ACT METERS
ACTi
ACTIVE SAFETY
ADAMS RITE
ADCO LIBERTY
ADCOM
ADVANCED SOURCING
AEP
AES
AGN/PRO
AKCESS BIOMETRICS
ALARM CONTROLS
ALLOT COMM
ALTERNATIVE
AMERICAN DYNAMICS
AMERICAN FIBERTEK
AMERICAN SECURITY PRODUCTS CO.
AMERICAN STORE FIXTURES
AMERICAN VIDEO EQUIPMENT
AMPHENOL
APC
APEX
ARCSIGHT
ARROW FASTENER
ASTATIC MICROPHONES
AUDIOSOURCE
ATLAS SOUND
AVG
AXIS COMMUNICATIONS
B&A MANUFACTURING
BANDIT SOLUTIONS
BAYCO
BELDEN
BEN Q
B.E.S MANUFACTURING
BETTER WAY PRODUCTS
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
BIOPASSWORD
BIOSCRIPT
BLONDER TONGUE
BLUECOAT
BOSCH SECURITY SYSTEMS
BOSTON ACOUSTICS
BOUNTIFUL WIFI
BRK ELECTRONICS
BYD:SIGN
C&C PRODUCTS
CAMBRIDGE
CAMDEN DOOR CONTROLS
CANADIAN FLEXI-DRILL
CARLON TELECOM
CCTP
CBC AMERICA
CDW
CE LABS
CELLAR SAVER
CHEMETRONICS
CINEMA SELECT
CITRIX
CLEARSWIFT
COLEMAN CABLE
COMMERCIAL PRODUCT
COMM SCOPE
COOPER WHEELOCK
CORNING CABLE SYSTEMS
COVI TECHNOLOGIES
CRIMESTOPPER
CROSS POINT
D3 DATA
DATACOMM
DATACORE
DBX PROFESSIONAL
DCX SYSTEMS
DEDICATED MICROS
DESIGNED SECURITY INC.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
DETEX
DEWALT
DIALOGIC
DIFINITRON
DIGITAL DEFENSE
DIRECT UPS
D-LINK
DOLPHIN COMPONENETS
DOORBELL FON
DOR-O-MATIC
DUAL-LITE
DUMMY CAMERAS
DURACEL
DYMO
DYNALOCK
EAGLE SECURITY
EDCO
EDT
EE SYSTEMS
ELECTROLUX
ELK PRODUCTS
EMERSON NETWORK
ENERSYS
ENERZONE
ENGINEERED ELECTRONICS
ERICO/CADDY
ETCON
EVAX SYSTEMS
EVEREADY
EVI/TELEX
EXCELSUS
EXTREME CCTV
EXTRON ELECTRONICS
FARGO
FENWAL
FIBER OPTIONS
FIRE BLANKETS
FIRE-LITE ALARMS
8 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
FIRETIDE
FLUKE
FOLGER ADAM
FORTINET
FREEFORM
FIBER OPTIONS
FLIR SYSTEMS
FUJINON
GAITRONICS
GARVIN INDUSTRIES
GEMALTO
GEM ELECTRONICS
GE SECURITY
GRAYSTONE SYSTEMS
GREENLEE
HARMON KARDON
HARMONY REMOTE
HAYDEN INDUSTRIES
HD TELECOM
HID
HELLERMAN/TYTON
HES
HIDEKI ELECTRONICS
HOME AUTOMATION INC
HONEYWELL
HSI FIRE & SAFETY GROUP
HUDSON VIDEO
ICC
ICM CORP.
ID SYSTEMS
IDEAL INDUSTRIES
IDENTIX
IDT
IEI
IGEL
INTEGRAL TECHNOLOGIES
INTERNATIONAL RESOURCES
INTER-TEL
IPIX
IQINVISION
IRWIN
ISOTEC
ITW LINX
JAM PLASTICS
JBL PROFESSIONAL
JERON ELECTRONICS
JDS DIGITAL SECURITY SYSTEMS
KELTRON CORP.
KEY DIGITAL
KEYSCAN
KEYSPAN
KIDDIE
KINGS
KLEIN TOOLS
KRYPTONITE
LCN
L.E.D.
LEE DAN
LEGEND AUDIO
LEFTHAND
LEICA GEOSYSTEMS
LENEL
LEXION
L.H. DOTTIE
LOCKNETICS
LOGENEX INNOVATIONS
LOGICMARK
MACROVISION
MAGNETIC AUTOCONTROLS
MARCH NETWORKS
MARKS USA
MARSHALL
MERCURY SECURITY
MG ELECTRONICS
MICON TECHNOLOGY
MICROFORUM INT’L
MICROTEK
MIDDLE ATLANTIC
MIJA
MILESTONE SYSTEMS
MINUTEMAN
MIRCOM
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
MK BATTERY
MOBICEL
MOBOTIX
MODULAR DEVICES
MONSTER CABLE
MORSE
M&S SYSTEMS
MUXLAB
MULTI-LINK
MUSIC GIANTS
MXLOGIC
NADY
NATIONAL TRAINING CENTER
NEC
NEDAP
NEL-TEC LABS
NEOWARE
NET MEDIA
NEW LINE USA
NICE SYSTEMS
NILES
NOVELL
NVT
OASIS AUDIO
OCC
OEM
OLYMPUS AMERICA
OMNI MOUNT
ONSSI
OPEN HOUSE
OSI SECURITY
OZVISION
O.W.I
PACKETEER
PAMA/DIRECT PLUS
PANASONIC
PASO
PATCHLINK
PENTAX
PERFECT VU
PERPLAS
9 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
PHILIPS
PHOENIX GOLD
PIONEER
PLANAR
PLANTRONICS
PLATESPIN
PORTER CABLE TOOLS
POS DISTRIBUTING
POSH
POTTER ELECTRIC
POWERLINE CONTROL
POWERLINE CONTROL
POWER-SONIC
PRO CO SOUND
PRODUCTIVE CONSULTANTS
PROFICIENT AUDIO
PROTECH
QSC AUDIO
QUAM
QUANTUM GROUP
RAB ELECTRONIC
RACO
RADIO DESIGN LABS
RADWARE
RECOGNITION SYSTEMS
RED HAWK
REGIN HVAC PRODUCTS
REMEE
REPAIR MASTER
ROKONET
RUSSOUND
S2 SECURITY CORP
SAFE FIRE DETECTION
SAFT
SAGEM MORPHO
SALCO INDUSTRIES
SAMSUNG
SANUS
SANYO
SATELLIE USA
SCHLAGE
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
SCRIPTLOGIC
SDC
SDI
SECURAKEY
SECURE COMPUTING
SECURITRON
SENSTAR-STELLAR
SENTEX/CHAMBERLAIN
SHERWOOD
SHURE
SIG COM
SIGNAL ONE SAFETY
SIM2
SLAYTON SOLUTIONS
SONICWALL
SONY
SPACE AGE ELECTRONICS
SPECIFIED TECHNOLOGIES
SPECO TECHNOLOGIES
SPERRY WEST
SPS ENERGY
SR COMPONENTS
SUPERIOR MODULAR
SUPERIOR/ESSEX
SURE ACTION INC.
SURFCONTROL
SUTTLE APPARATUS
SYMPHONY SELECT
SYSTEM SENSOR
TAMRON
TAPPAN
TATLE TALE PORTABLE ALARM
SYSTEMS
TATUNG
TDK
TECH SPRAY
TECHFLEX
TECHNOLOGY SYSTEMS SREVICES
TELDAT
TEST-UM
THE SIEMON COMPANY
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
THINPRINT
THOMAS & BETTS
TOA
TOSHIBA
TOTE VISION
TRAPEZE
TRIPP LITE
TYCO ELECTRONICS
ULTIMACO
ULTRA MAGIC CARD
ULTRAGUARD/ECS
ULTRA TECH
UNICOM
UNIVERSAL BATTERY
UNIVERSITY REMOTE CONTROL
UPLINK SECURITY
VERICEPT
VERICHIP
VERINT
VERNEX
VICON
VIDEO DOMAIN TECHNOLOGIES LTD.
VIDEOLARM
VIDEO MESSENGER CO.
VIDEO MOUNT PRODUCTS
VIDEOTEC
VIKING ELECTRONICS
VISIONTECH
VIZIONCORE
VODAVI
VONTRONICS
VMWARE
WALKER EQUIPMENT
WATCHGUARD
WATTSTOPPER/LEGRAND
WEST PEN WIRE
WIREMOLD/LEGRAND
WYRELESS ACCESS
WYSE
X-10 PRO
XANTECH
YALE SECURITY GROUP
10 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.
If you do not see the product that you need, just let us know and we will get it for you!
“When Service and Delivery Count” ®
IT security is a critical area that is many times neglected by companies until it is too late. Companies also feel that their IT security is sufficient without knowing the full security requirements. Don’t be a company that suffers from the consequences; call
GHA today for a vulnerability analysis.
GHA offers the most complete IT security services in the world. Everything from detailed security audits to post analysis and full solutions are offered in the GHA security package.
GHA covers the ten areas of IT security:
•
•
•
•
•
•
•
•
•
•
Security Policy
Security Organization
Asset Classification and Control
Personal Security
Physical and Environmental Control
Communications and Operations Management
Access Control
System Development and Maintenance
Business Continuity Management
Compliance
Businesses have long recognized the value of independent review of their security operations. All security review services result in an independent review of part of your entire security program but they differ in terms of scope and rigor.
11 of 11
Copyright © 2008 GHA Technologies Inc. All rights reserved.