Networking VoIP Storage Security Workspace Solutions RFID ... Networking VoIP Storage Security Workspace

  • View
    214

  • Download
    0

Embed Size (px)

Text of Networking VoIP Storage Security Workspace Solutions RFID ... Networking VoIP Storage Security...

  • Networking VoIP Storage Security Workspace Solutions RFID POS Portable Electronics & Accessories A/V System Integration

    1 of 11Copyright 2008 GHA Technologies Inc. All rights reserved.

    GHA sells all of the leading security technology and solutions to protect and bullet proof your data which is the life blood of any organization. GHA sales consultants will perform a proactive security review to help identify vulnerabilities in advance of security breaches.

    GHA is at the forefront representing all of the leading security manufacturers to reduce risks associated with identity theft and to be Sarbanes Oxley and HIPAA compliant. We sell biometrics, intrusion detection, access control, perimeter monitoring and video surveillance, encryption, Wi Fi and wireless security, network scanning, license compli-ance, identity tags and badges, data safes and vaults, password management, equip-ment recovery and tracing, anti spam, virus, spyware, content filtering in compliance with the Internet Child Protection Act, and a variety of other security technologies and solutions.

    GHAs line of security products also includes what your business needs in order to remain compliant with national laws and regulations. Without the proper precautions to secure, archive and protect certain types of data, you and your business can become liable in cases where negligence causes damage or loss.

    Security

    Some of our Top Sellers

    ABSOLUTE LOJACK

    COMPUTER ASSOCIATES

    MCAFEE

    MX-LOGIC

    NEC

    PANASONIC

    RSA

    SYMANTEC

    WATCHGUARD

    Computer Lo-Jack from Absolute Software:

    Absolute Software Corporation (TSX: ABT) is the leader in Computer Theft Recovery, Data Protection and Secure Asset Tracking solutions. With over two million subscriptions currently under contract, Absolute Software provides individuals and organizations of all types and sizes with solutions to manage regulatory compliance, data protection and theft recovery.

    If a computer is stolen, Absolute Softwares Recovery Team will work with local law enforcement agencies to lo-cate and recover the machine. Computrace also enables IT professionals to remotely delete data on stolen or missing machines to protect the information from falling into the wrong hands.

    Computer

    Network

    Premise

    Biometrics

  • If you do not see the product that you need, just let us know and we will get it for you!

    When Service and Delivery Count

    2 of 11Copyright 2008 GHA Technologies Inc. All rights reserved.

    (Computer Security Manufacturers)

    Firewall/VPN Software

    CA CHECKPOINT CITRIX McAFEE MICROSOFT NOVELL SYMANTEC

    WiFi Security

    LUCENT LINK NEWBURY NET

    Secure Application Access

    CHECKPOINT CISCO CITRIX F5 NETWORKS JUNIPER NOKIA SAFENET

    Encryption

    IRONKEY PGP

    Anti-Virus

    AVG CA EST KASPERSKY MCAFEE MICROSOFT ONE CARE SYMANTEC MCAFEE SOPHOS TRENDMICRO

    Secure Content Management Software:

    CA McAFEE NET IQ SYMANTEC TREND MICRO VERICEPT WEBROOT WEBSENSE

    Email Security:

    BARRACUDA FRONTBRIDGE KASPERSKY LAB McAFEE MXLogic SOPHOS SUNBELT TREND MICRO

    Password Security:

    ROBOFORM RSA SYMANTEC

    Document Security:

    ENTRUST TUMBLEWEED

    Security Enclosures:

    Computer Security Kendall Howard

    A smart card is a card that is embed-ded with either a microprocessor and a memory chip or only a memory chip with non-programmable logic. The mi-croprocessor card can add, delete, and otherwise manipulate information on the card, while a memory-chip card (for example, pre-paid phone cards) can only undertake a pre-defined operation. Smart cards, unlike magnetic stripe cards, can carry all necessary functions and information on the card. Therefore, they do not require access to remote databases at the time of the transaction.

    Smart Cards:

    Safend - software environment used to monitor whos connecting what devices to every single endpoint in your network, enterprise-wide - from USB to Bluetooth - and gain extreme visibility over port access across the network. Sendio - the Sendio I.C.E. box delivers email integrity by eliminating ALL spam and unwanted email without losing a legitimate email message. This solution eliminates 100% of all machine-generated spam, blocks junk mail before it reaches the email server, and avoids false positive.

    User Monitoring and email security

  • If you do not see the product that you need, just let us know and we will get it for you!

    When Service and Delivery Count

    3 of 11Copyright 2008 GHA Technologies Inc. All rights reserved.

    GHA- Your Source for School Security Products

    Fargo offers a complete solution for your identification needs

    The Persona C30 Photo System is an economical solution for your badging needs. The photo system includes the printer, build-a-badge card design software, a YMCKO ribbon, cleaning kit and camera. It is available single or dual sided, with or without a magnetic stripe encoder. Just add a pack of cards and you are ready to print identification badges.

    Boost your security with Zebra card printers

    Zebras P120is modern design, high-tech materials and new electronics make it reliable and easy-to-use, setting it above the competition. All types of businesses can easily create person-alized ID cards instantly. The P110i color card printer is an affordable single-side printing option.

    (Biometrics Security Manufacturers)

    Access Control:

    AFI AIPHONE ALADDIN ALTRONIX AWID BOSCH DVTEL EVERFOCUS HID INTEGRATED BIOMETRICX KEYSCAN LOCKNETICS NVT RCI RECOGNITION SYSTEMS RUTHERFORD CONTROLS

    Access Control (cont):

    SCANSOURCE SCHLAGE SECURITRON SECURITY DOOR CONTROLS SECURITY INC SPECO TECHNOLOGIES SYNEL VIKING VON DUPRIN

    Authentication Hardware: CISCO SYSTEMS IBM RSA SECURITY SAFE NET SONY

    Authentication Software:

    CISCO SYSTEMS

    CITRIX SYSTEMS

    RSA SECURITY

    VERISIGN

    I.D. Badges:

    FARGO

    PERSONA

    ZEBRA

    Campus emergency notification system

    Displays support horizontal and vertical scrolling of messages:

    Time-of-Day, Operational Messages and Emergency Messages configured using a web browser Runs on Windows 2000 and Windows XP

  • If you do not see the product that you need, just let us know and we will get it for you!

    When Service and Delivery Count

    4 of 11Copyright 2008 GHA Technologies Inc. All rights reserved.

    Network Security Manufacturers

    3COM ADTRAN ARRAY CELESTIX CHECKPOINT CISCO D-LINK ENTERASYS eSOFT F5 NETWORKS HP INTRUSION JUNIPER LINKSYS NETGEAR NETWORK ENGINES NOKIA NORTEL NETWORKS SNAPGEAR SONICWALL SYMANTEC WATCHGUARD U.S. ROBOTICS ZYXEL

    CA CHECKPOINT CITRIX McAFEE MICROSOFT NOVELL SYMANTEC

    3COM CHECKPOINT CISCO ENTERASYS eSOFT INTRUSION JUNIPER McAFEE SONICWALL SYMANTEC WATCHDOG ZYXEL

    CA

    McAFEE

    NET IQ

    SYMANTEC

    TREND MICRO

    VERICEPT

    WEBROOT

    WEBSENSE

    Firewall/VPN Hardware: Firewall/VPN Hardware: Firewall/VPN Hardware:

    Firewall/VPN Hardware:

    The IronKey is the worlds most secure USB flash drive, and it has been widely heralded in the press and by customers for its unique combination of security and performance.

    The IronKey is provisioned at the factory with a 2,048 bit RSA Device Key which is used to authenticate the device and encrypt all commu-nications between the server and the device. The key resides on the Cryptochip and is not accessible. This protects the IronKey against on-the-wire attacks or attempts to access/guess the device.

    The device destroys all data after 10 incorrect password attempts.

    IronKeys patent pending self destruct methodology incorporates an exhaustive hardware erase of all flash and Cryptochip memory. This is a secure overwriting of data done in a hardware application for the ultimate protection.

    The IronKey is both waterproof and tamperproof and has been through rigorous durability testing.

    The IronKey also comes with a secure browsing technology which uses a private network to establish a secure connection between the device and the internet.

    1 g 2g 4g capacities available

  • If you do not see the product that you need, just let us know and we will get it for you!

    When Service and Delivery Count

    5 of 11Copyright 2008 GHA Technologies Inc. All rights reserved.

    Premise Security Manufacturers

    Surveillance and CCTV:ACTI AFS AIM AIPHONE ALARM CONTROLS ALARM LOCK ALARM SAF ALTRONIX AMERICAN DYNAMICS AMERICAN FIBERTEK AMSECO ANCHOR AUDIO APOLLO APPRO TECHNOLOGY APW RACKS ARM ELECTRONICS ATLAS SOUND ATV ATW AUDIO TECHNICA AVALAN WIRELESS AVE AXIS AZDEN BLACK BOX BLONDER TONGUE BOGEN BOSCH BOX LIGHT BRETFORD B-TRON BTX CANON CBC CHANNEL PLUS CHANNEL VISION CHIEF CLOVER COMMONSCOPE COMPREHENSIVE CORBY COVI

    CROW CROWN DALITE DEDICATED MICROS DELTA DESIGN DENON DIGIMERGE DIGITAL WATCHDOG DISPLAY DEVICES DITEK DRAPER DSI DUKANE DVTel EDWARDS SIGNALING ELECTRONICS LINE USA ELMO EMI ELECTRONIC SECURITY DEVICES EUROBEX EVERFOCUS EXTREME Cctv FEDERAL SIGNAL FIRE KING FM SYSTEMS FOCUS ENHANCEMENTS FUJINON GARRETT GE GENERAL SOLUTIONS GENTEX GRI HAWKING TECHNOLOGY HID HITACHI ICG IDview IEI IFS IKEGAMI IMAGE VAULT INFINOVA

    INFOCUS INOVONICS INSITE VIDEO SYSTEMS INTEGRAL TECHNOLOGIES ipCONFIGURE IQINVISION JVC KERI SYSTEMS KINYO KNOX KOWA KT&C LABOR SAVING DEVICES LEIGHTRONIX LEVITRON LG COMMERCIAL LINEAR LISTEN LOUROE LOWELL-LIGHT LUCASEY MACKIE MACURCO MARANTZ MARSHALL ELECTRONIC MAXELL MDI MICRO-TEK MIDDLE ATLANTIC MIER PRODUCTS MITSUBISHI MOBI MOTOROLA MUSIC & SOUND NETPROMAX NITEK NRG NUVICO NUTONE NVT OPTE