About Us

Vision Audio & Video, LLC (VAV) is a woman owned company and was formed in 2004 as a full service Audio Video integration company.

VAV has added a Signal Safeguard division specializing in manufacturing a shielded enclosure to protect portable electronic devices (PEDs).

Our product line is engineered to endure the changes in technology allowing our customers to purchase a device that will not be obsolete and avoid the cost or replacement in the near future.

Our line of Signal Safeguard products manages, stores and most importantly protects the wireless information on PEDs. Signal Safeguard devices are widely used in secure and non-secure areas, such as SCIF and related facilities.

Signal Safeguard units are designed to meet Government & Military regulations, mandates and standards for securing information such as FIPS, NIST & FISMA and proudly manufactured in Maryland.

The Information On Your Cell Phone and Tablet is Vulnerable

Signal Safeguard (SSG) is an RF shielded countermeasure metal enclosure.

SSG is designed to protect Portable Electronic Devices (PEDs) preventing wireless signals from infiltrating PEDs, rendering the devices ineffective. SSG not only physically protects and manages PEDs but more importantly secures the information on them addressing several regulations for Cyber Security, Information Assurance (IA), Personal Identifiable Information (PII) and related security. Ordinary wooden or locker boxes do NOT protect the wireless communications when left in unprotected areas, such as outside of a SCIF, hallways or visitor areas. [/two_third][one_third_last]

GSA Advantage

Signal Safeguard RF shielded products are now on GSA Advantage. Contract number GS-35F-053BA for Federal Supply Schedule 70. We welcome the opportunity to discuss how to implement Signal Safeguard in your environment. If you have any questions, please don’t hesitate to contact us.

NIST Guidelines to Secure Mobile Devices

Organizations should implement the following guidelines to improve the security of their mobile devices.

  • Organizations should develop system threat models for mobile devices and the resources that are accessed through the mobile devices.
  • Organizations deploying mobile devices should consider the merits of each provided security service, determine which services are needed for their environment, and then design and acquire one or more solutions that collectively provide the necessary services.
  • Organizations should have a mobile device security policy.
  • Organizations should implement and test a prototype of their mobile device solution before putting the solution into production.
  • Organizations should fully secure each organization-issued mobile device before allowing a user to access it.
  • Organizations should regularly maintain mobile device security.

Request a Quote

Phone No:

Get In Touch