Flavor services
 

Surveillance Camera

 

Give us a call. After discussing your situation we will schedule a visit to your facility to meet with you and your advisors to learn about your concerns and expectations. We will tour your facility and prepare a site survey to get a good feel for your business and your work flow. Based upon your input and our findings, will make system recommendations with a corresponding price quotation, usually within 24 hours.

Some of the hardware/software technology issues that we would like to cover include: Software capabilities, camera and lens performance, camera housings, cabling (coax versus cat5), power supplies, etc. 

The installation issues typically include: Lighting conditions for the various areas to be viewed, network and internet access issues, firewalls, access for pulling cable, etc.

Do you have existing electronic drawings of your facility? Existing facility drawings help us produce system layouts very quickly.


Method to Success:

Security Consulting - We will assess the physical and operational needs of your business. CLS INNOVATIONS creates security and safety plans tailored to your business with complete lists and costs that will help protect your personnel and assets.

Installation - Our professional installation crews can handle any size job from high rise buildings to large industrial manufacturing sites to small offices and homes.

Training - CLS INNOVATIONS provides on-site as well as internet based training for all its software. Training is designed to get personnel proficient in the shortest time possible.

Warranties - The components that we use in our systems are all top of the line products from name brand manufacturers that include standard warranties. Our optional Extended Warranty and Priority Service Agreement provide you with a comprehensive on-site 3 year 100% warranty.

CLS INNOVATIONS Security utilizes a 9-step consulting methodology in designing your digital video security systems:

 

1.
Assess - facilities are evaluated, access and control points identified, personnel/guest use are defined and categorized, key issues are identified.
2.
Interview - key management personnel are interviewed to gather unique and different perspectives on issues and needs.
3.
Audit - current security procedures, policies and known issues are noted.
4.
Objectives - a series of goals are defined and validated.
5.
Design - selection of technologies and services are chosen and slated to specific facilities.
6.
Plan - all significant tasks are coordinated with the client and built into a deployment timetable.
7.
Implement - equipment and all of the associated support cabling and electrical work is installed and tested for optimal performance.
8.
Train - appropriate stakeholders are trained in the use of software systems and the key workings of hardware.
9.
Support - a trained professional team handles all activities from product/software use to repair of equipment.