Sep 18, 2018 | Blog, Security
“People, if you didn’t get the memo, we’re all going to the cloud” – Steve Van Till, President & CEO, Brivo First, a little background… A quick history on the cloud and how it came to be so widely adopted and important for business. Cloud technology...
Sep 17, 2018 | Blog, Security
When we say ‘cloud, mobile-first, IoT, big data and social networking,’ they aren’t just buzzwords. They are the larger forces at play pushing the security industry forward at a faster pace than ever before. Security Disruptors and What They Mean for You Security is...
Aug 27, 2018 | Blog, Security
What differentiates effective access control platform from failed systems, unable to achieve physical security and operational goals? Many factors contribute to the success of an access control system. Here are features to look for when selecting a physical security...
Aug 20, 2018 | Blog, Security
Impactful technology challenges the status quo and takes a starkly different approach to solve a common problem. But, adoption of this innovative technology takes time. Something we use every day today- the keyboard/personal computer- took 20 years to reach widespread...
Jul 13, 2018 | Blog, Cybersecurity
Based off a recent survey, 40% of security professionals believe their systems are only somewhat secure. As the frequency of cyber crimes continues to increase, security professionals must learn best practices for maintaining proper cyber hygiene. We asked 4 experts...
Jun 19, 2018 | Blog, Cybersecurity
Cybersecurity, particularly in the physical security space, is a hot topic. At Brivo, we’re focusing on educating security professionals on the intersection of cybersecurity and physical security. We want to ensure you make cybersecurity a priority to protect yourself...
Jun 12, 2018 | Blog, Cybersecurity
Cybersecurity is central to what we do. To honor our customer’s trust, we follow three best practices to deliver a physical security platform that is cyber secure. How We Build Products At Brivo, we architect our systems with cybersecurity as an explicit component. We...