Applied G2

You are here: Home » Service Offerings

Services

Solutions are Evolutionary

E-mail Print PDF

Threats to your operating environment grow more numerous and sophisticated every day. Shouldn’t your security strategy be evolutionary to protect your organization today and minimize the impact of tomorrow’s potentially disruptive events?


As the need to connect to a growing number of partners, customers, and platforms is an imperative business requirement to remain competitive; organizations must securely extend access to mission critical data over unprotected public networks to edge devices they might not control and typically don’t own.


AppliedG2 will help you optimize the value of existing asset protection investments, while supporting efforts to realize the cost benefits of right sourcing and migrating to virtual platforms utilizing transparent secure connectivity for mobile applications and customer-owned mobile devices to improve the quality and convenience of each interaction.
AppliedG2 utilizes state of the art commercial and open source solutions to continuously incorporate the latest counter measures into your protection strategy no matter what your computing environment looks like today or may evolve into tomorrow.

Commercial AV Solutions

E-mail Print PDF

Our services include consultation, design,  project management, installation of equipment, and subscription service connectivity.  Our experience in a wide range of commercial setting allows us to effectively carry out  a wide variety of installations activities with efficiency and careful consideration for maintaining the aesthetics of the environment.


Some of our recent completed projects have included:

  • Conference Rooms
  • Churches and  Houses of Worship
  • Corporate Training Facilities
  • Hotels
  • Office Complexes
  • Restaurants
  • Department Stores
  • Night Clubs
  • Sports Facilities
  • Performing Arts Facilities
  • Colleges
  • Movie Theaters
  • Auditoriums

 

Connectivty Solutions

E-mail Print PDF

As your business expands, your supporting infrastructure needs to evolve to support your growth plans. For most clients this means increasing the capacity and capability of their network infrastructure. At the core of this expansion is the need for a scalable and highly reliable connectivity solution based on a certified cabling design.  To ensure reliable and secure connectivity for your high-speed networks, it is critical to know that your cabling is not going to fail you. As experts in network and cabling installation AppliedG2’s team has installed cable plants nationwide for almost every type of commercial application.

Modern security components are only as good as the connectivity that allows them to communicate, archive and integrate with other systems. These elements integrated across a wide array of networks, cabling plants and transmission mediums. From traditional twisted pair, CAT5 & 6, Wireless LANs, Fiber Optic and satellite based AppliedG2 is your trusted partner to design, integrate and deliver your critical infrastructure components. Our technical staff has over two decades of experience delivering voice, data, video, security, wireless and RF solutions to support your next major technology expansion or upgrade.

Initial Needs Assessment

With Communications Distribution Designers on-staff, Applied G2 can assist in assessing your complete needs. Our approach will look at not only your immediate applications but will also take into account future applications, future growth of your organization and possible technology changes which would impact your cabling needs. Considerations like type of equipment, load balancing and redundancy to support you Business Continuity Plan will be factored into our cost/benefit analysis and final design. Our comprehensive design capabilities are recognized by many as among the best in the industry.

Site Surveys

Applied G2 engineers are available to conduct comprehensive site surveys to accurately assess the layout and conditions impacting your operating environment. Factors such as structural layout of the facility, building codes, safety and physical security issues are among the conditions that will be incorporated into the final design. Critical data gathered in the site survey will be incorporated into the final implementation project plan.

Pre-construction Planning

Our flexible implementation capabilities allows us to perform many configuration and calibration activities prior to final build out or while awaiting certificate of occupancy. These activities often include installing telecommunications closets, core drilling, installing cable support hardware, conduit trays, rack installation, mounting equipment, and modifying drop ceiling components.

Cabling & Network Installation

We install a wide variety of transmission media including copper, fiber optic, twisted pair, baseband and broadband as well as associated components. Our network and service installations include 802.11a/b/g/n, Video cameras, WiFi and VoIP.

Testing & Certification

Applied G2 can test and certify our installations to meet or exceed industry or corporate standards. Our installations meet all of the manufacturer's specifications required to satisfy warranty conditions.

Physical Security

E-mail Print PDF

Applied G2 Physical Security Solutions integrates network security, information management, encrypted storage, video surveillance and forensic image analysis into a seamless solution to protect your organizations most important assets. Our solutions are designed to enable you to manage, archive, analyze, authenticate and properly scale your security components and video surveillance platforms. A properly designed system can increase your capability to detect, deter, and proactively manage security events in real time.  We have installed and integrated a wide range of sensor, audio and video solutions in hundreds of commercial settings ranging from stand alone buildings to entire subdivisions.


Video Surveillance Solutions
We are committed to providing a comprehensive system to meet their specific needs by providing expert advice on what key features and capabilities will provide the most value to our clients.  Our goal is to provide you the most cost effective solution that takes into consideration hardware, installation, staffing, maintenance and subscription service cost. We look for creative ways to provide maximum protection with minimal staffing by taking advantage of advancements in video analysis solutions that reduce operator error and fatigue by intelligently analyzing the scene and only alert on specific conditions minimizing the need to constantly scan static environments that only rarely change. AppliedG2 takes the time to understand how you want to manage your protection system. Our solutions can incorporate   cutting edge solutions that incorporate IP-based video solutions that deliver real time images to your smart phone.

Access Control Solutions
Compensating controls integrated into a defense-in-depth strategy provides the best protection for your business.  Access control is a critical component of this strategy to limit access to your property, provide physical protection for your staff and safeguard sensitive physical and IT assets.  An integrated system of digital access control and video surveillance can have a dramatic impact to the organization’s bottom line. At AppliedG2 we are experts in integrating these solutions to address the challenges of:
-    Provisioning access media to employees and trusted contractors
-    Integrating access activity into security logging system
-    Automating the suspension of access media upon employee separation
-    Integrating media access provisioning as part of new hire on-boarding process
-    Conversion from lock & key to digital access solutions
-    Loss prevention and shrinkage reduction by integrating access control & video surveillance
-    Minimizing liability associated with slip & fall, employee conduct and property damage
-    Assisting law enforcement in investigations with evidence production to support prosecution
-    Setting access controls to limit activity to authorized personnel during specific times
-    Integrating digital access control with employee attendance & time reporting tools

Our Approach

Implementations of physical security components require an on-site assessment to document environmental, structural components, employee safety, building code, power, lighting and coverage needs.  Our recommendation to new clients is to send us an email to This e-mail address is being protected from spambots. You need JavaScript enabled to view it with a description of your needs and desired results to get the process started. Our technical staff can then be scheduled to complete a site survey and initial consultation. 

Most customers that aren’t opening a new facility have some existing security components. We will make every attempt to leverage your current component investment. When integrating new solutions isn’t possible with your legacy systems we will take the time to help you understand our upgrade recommendation and can assist you in developing a migration strategy to minimize any disruption to your normal operations.

Common System Components

We partner with some of the largest solution providers for networking, software, storage, video, audio and access control systems.  Listing a comprehensive set of solutions we delivered would be daunting, but here is a list of the most common solutions our clients ask us to integrate:

  • Digital Cameras
  • DVRs
  • Integrated Video Solutions utilizing Pan/Tilt/Zoom Cameras
  • Pixel-based & IP Cameras
  • Video Forensics
  • Door, Gate & Perimeter Control Solutions
  • Smartphone Integration of Streaming Video, Access Logging or Static Images
  • Motion Controlled & Proximity Detection Systems
  • Digital Key Pads
  • Smart Card & Magnetic Swipe Access Control Systems
  • Proximity-based Access Control Systems
  • Biometric Access Control Systems
  • Wireless Access Control System
  • Evidence Production to Support Law Enforcement & Litigation Activities

Digital Forensics

E-mail Print PDF

Despite every effort sometimes data breaches and asset compromises occur.  Recognizing and accepting this scenario is the first step in developing a response plan to address this critical event and effectively respond to it.  Many organizations and careers IT professionals have learned the hard lessons of adopting an ostrich “head in the sand” policy that can result in stiff financial penalties and harsh legal realities when investigations and evidence is not handled properly. AppliedG2 recommends that as part of your approved and tested Business Continuity Plan that you include responding to a Data Breach, Denial of Service or Initiation of a Forensics Investigation as “declared incidents” your organization knows how to undertake in a controlled fashion.  If you find your organization in the midst of a compromise, we can still help with damage control and proper evidence handling utilizing our industry certified forensic investigators.

There are a few things we want all our client’s to remember related to their Incident Response plans:   
1)    Test them under real world conditions and not just in conference room role playing sessions.
2)    There are very specialized skills, tools and techniques that you must develop and maintain to properly support a forensics investigation.
3)    Utilizing the proper hardware & software tools to gather evidence must meet the scrutiny of the courts not your management if the case goes to trial.
4)    A combination of evidence is often the most convincing so consider both IT and physical security safeguards when responding to an incident.

We have trained professionals to help you respond to an incident, but believe it is more prudent to proactively assist your organization in preparing a comprehensive Incident Response plan.  We have been involved in some major cases involving data breaches and compromises of entire network infrastructures.  Mitigating damage, providing candid options to executive management and handling every piece of evidence as if it will end up in court are just a few of the lessons learned we bring to the plan development and testing process.  Consider AppliedG2 as your trusted partner to develop, maintain and most importantly TEST your Incident Reponses program.

AppliedG2 is available to provide support for response to isolated internal events that require a discrete response and proper evidence handling for administrative or litigation support.

Page 2 of 4