SlideShare uma empresa Scribd logo
1 de 26
What if…
When you’re not in your Office, residence most of the time…
What if…
When you’re family and your little                       are alone at home most of the time…
What if…
When there is no one at you’re Work place, Office to watch over for you…
What if…
You're all by
Think about it Before its
Let us help you to be safe and sound….
What  are old methods that are used instead of CCTV… ,[object Object]
  Having pet guardian dogs.
  High parapet wall developments with barb wires.
  Motion sensitive flash lights.
  Sensitive alarm systems. 1st Age… past Age… Modern Age…
Disadvantages !!! People hired from other security companies –  ,[object Object]
  They try to sneak out while your gone.
  They plane their own tricks and games against you.Having pet guardian dogs –  ,[object Object]
  They try to run away.
  Environment pollution
  Rabies viral cause.High parapet wall developments with barb wires –  ,[object Object]
  Rusted barb wires.Motion sensitive flash lights –  ,[object Object]
  Some one should monitor it all the time.
  The device does not recognize the elements passing through the censer.Sensitive alarm systems  – ,[object Object]
  Some one should monitor it all the time.
  Sound pollution.,[object Object]

Mais conteúdo relacionado

Destaque

The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
 
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardAPNIC
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri LankaAPNIC
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation Jackseen Jeyaluck
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber CrimeChallenge:Future
 
Cctv installation training
Cctv installation trainingCctv installation training
Cctv installation trainingjamesbacon196
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri LankaSLINTEC
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceUpekha Vandebona
 

Destaque (14)

The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
ISOC Sri Lanka Way Forward
ISOC Sri Lanka Way ForwardISOC Sri Lanka Way Forward
ISOC Sri Lanka Way Forward
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
IGF Sri Lanka
IGF Sri LankaIGF Sri Lanka
IGF Sri Lanka
 
The Lanka Gate Initiative
The Lanka Gate InitiativeThe Lanka Gate Initiative
The Lanka Gate Initiative
 
ION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLSION Sri Lanka - DANE: The Future of TLS
ION Sri Lanka - DANE: The Future of TLS
 
Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation  Introduction to ICTA - Org Study Presentation
Introduction to ICTA - Org Study Presentation
 
[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime[Challenge:Future] Rallying Youth Against Cyber Crime
[Challenge:Future] Rallying Youth Against Cyber Crime
 
Cctv installation training
Cctv installation trainingCctv installation training
Cctv installation training
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
Intellectual Property in Sri Lanka
Intellectual Property in Sri LankaIntellectual Property in Sri Lanka
Intellectual Property in Sri Lanka
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Sri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic CommerceSri Lankan Context for Electronic Commerce
Sri Lankan Context for Electronic Commerce
 

cctv security camera presentation sri lanka

  • 2. When you’re not in your Office, residence most of the time…
  • 4. When you’re family and your little are alone at home most of the time…
  • 6. When there is no one at you’re Work place, Office to watch over for you…
  • 9. Think about it Before its
  • 10. Let us help you to be safe and sound….
  • 11.
  • 12. Having pet guardian dogs.
  • 13. High parapet wall developments with barb wires.
  • 14. Motion sensitive flash lights.
  • 15. Sensitive alarm systems. 1st Age… past Age… Modern Age…
  • 16.
  • 17. They try to sneak out while your gone.
  • 18.
  • 19. They try to run away.
  • 20. Environment pollution
  • 21.
  • 22.
  • 23. Some one should monitor it all the time.
  • 24.
  • 25. Some one should monitor it all the time.
  • 26.
  • 31. Hidden CameraFrom the history… The first CCTV system was installed by Siemens AG at Test Stand VII in Peenemunde, Germany in 1942, for observing the launch of V-2rockets.
  • 32. Indoor Camera- Indoor camera as the name suggests are used for indoor security mechanism. Depending upon your security needs, you can mount it at any suitable location inside the building. These are suitable for security in homes, schools, officers, hotels, etc. Outdoor Camera- Outdoor CCTV Camera is used for outdoor places. They are mostly used for entry and exit points with limited night lighting. Outdoor cameras typically have hard shell vandal-proof casings and a variety of lens options. IR Day/Night Camera- These are used for high alert security areas where surveillance needs to happen throughout day and night. In the daytime the camera functions like a normal camera with standard colors and at night it switches to low-luxblack and white mode.
  • 33. Dome Camera - Dome cameras are installed inside a dark dome and are designed in a way that they go unnoticed by visitors. They come in compact design for a discreet appearance. The thief does not know if the camera is recording. These cameras can also be rotated and tilted manually. Bullet Camera - Bullet cameras are placed inside a bullet shaped housing, and they are used in residential places as well as commercial places. They are small in size, have an integrated design, and are really effective. Hidden Camera -Hidden cameras are compact in size and are used for secret monitoring. They are usually installed in public places like department stores, theatres, clubs, etc.
  • 34.
  • 35. Constant site monitoring 24X 7 X365.
  • 36. High-resolution images that makes it very easy to identify threats / faces.
  • 37. Video and image recording options.
  • 38. Newer models less expensive. 
  • 39. NO sound pollution or Health threats.
  • 40. Enhance business efficiency.
  • 41.
  • 42. Users CANNOT have any back-up evidence.
  • 43. NOT ALL ordinary security methods are user friendly like CCTV.
  • 44. Users CANNOT identify the responsible persons / Robbers for the damages caused.
  • 45.
  • 46. Its so effective.
  • 47. It uses less Electricity [DC current].
  • 48.
  • 49. It supports for any windows operating system.
  • 50. Easy Plug & Play.
  • 52.
  • 53.
  • 54. Low quality cameras.
  • 55. Customer Service that’s provided by them will no longer be effective.
  • 56. Non guarantied cameras will be fixed.
  • 57.
  • 58. Hirdaramani Factories - Eheliyagoda Agalawatta Kirindiwela Maharagama Kahathuduwa
  • 60. Rough T-Shirt Fashion works - Boralesgamuwa
  • 61. Why You should select FRS Information technology (Pvt) ltdis a “total Security Solution Company” which uses the latest technology and that has been setup to eradicate all Security camera related problems. We cordially undertake all security camera solutions which aim to satisfy our clients to the best of their interests and to keep our clients safe and sound.
  • 62. Thanks you for your dedicated time and patients… Presentation Powered By - FRS Information technology (Pvt) Ltd.