VAS Security Systems Inc logo



In today’s world of data security breaches and threats, the traditional methods of protecting data are not sufficient. Most IT professionals protect the perimeter of a network but don’t have systems in place to protect the data itself. Protecting the data itself is called, “Data Centric Security”. Coupling “Data Centric Security” (RightsWATCH and TypeWATCH), physical security, intrusion protection, and concise security policies and procedures, creates a complete security solution to protect what matters most, your information.

With the partnership between American Technology Solutions (ATS) and VAS Security, we can provide this “Total Security Solution”, we call this, IP DEFENSE™ (Intellectual Property Defense). With our solution, as displayed in the picture below, we can dramatically decrease the chances of data theft and security breaches. Read more about “DATA CENTRIC SECURITY” by clicking the link below.

Click the picture to the left to see how IP DEFENSE provides a "Total Security Solution"


VAS and ATS Security Consultants

VAS Security and ATS consultants are a team of experts with deep field experience in designing and deploying data centric security and physical security solutions based on RMS, RightsWATCH, TypeWATCH, video surveillance, access control, and other complimentary technologies to achieve specific strategic requirements. Our services range from initial security assessments, consulting, to full information protection and security implementations.

Architecture Design

We dive deep into your existing information protection architecture, physical security, security policies and procedures, and fully explore your unique use cases. Then, we help you understand how our solutions can help achieve these use cases through in-depth presentations of how the solution would work. Upon completion of an assessment, you receive a high-level solution design that matches your specific requirements.


We can implement an environment based on cloud, cross-premises, and on-premises. The new architecture can be implemented to support advanced scenarios and can compliment what is already in place. For example, we can integrate our Data Centric Solutions with Microsoft server-side applications and technologies, including Exchange, SharePoint, File Classification Infrastructure, Office 365, Azure, Directory Services, and federation services. We can also integrate our Data Centric Solutions with third-party solutions that extend functionality to additional scenarios, devices, file formats, the DLP world, and more.

ArrowIcon BloggerIcon AimIcon DeliciousIcon PaperIcon EtsyIcon FacebookIcon FilmStripIcon FlickrIcon CameraIcon LaunchIcon GooglePlus2Icon GooglePlusIcon HeartIcon InformationIcon InstagramIcon LastfmIcon FrontCameraIcon LinkedInIcon EmailIcon MoneyIcon ItunesIcon MyspaceIcon OpenTableIcon PayPalIcon PencilIcon PersonIcon PhotoIcon PicasaIcon PinterestIcon PodcastIcon RssIcon ShoppingCartIcon SoundCloudIcon StarIcon TableProjectIcon TheCityIcon TumblrIcon Twitter2Icon TwitterIcon TypepadIcon VideoIcon VimeoIcon WordPressIcon YelpIcon YoutubeIcon