Cisco Meraki - Experts & Thought Leaders
Latest Cisco Meraki news & announcements
Aqua Security, the pioneer in cloud-native security revealed new research that shows how credentials, API tokens, and passkeys – collectively referred to as secrets – from organisations around the globe were exposed for years. By scanning the most popular 100 organisations on Github, which collectively includes more than 50,000 publicly accessible repositories, Aqua researchers found active secrets from open-source organisations and enterprises such as Cisco and Mozilla providing access to sensitive data and software. The exposed secrets could lead to significant financial losses, reputational damage, and legal consequences. Secrets in GitHub repositories Aqua Security’s research team, Aqua Nautilus, revealed that “phantom secrets” can persist in Git-based infrastructure used by most Source Code Management systems (SCMs), including GitHub, Gitlab, Bitbucket, and others. This is due to how even deleted or updated code commits are saved in those systems, such that even a one-time developer mistake can expose secrets to savvy threat actors over extended periods. Impact of a data leak "Our findings are truly alarming, and everyone involved in software development must grasp the seriousness of this issue," says Yakir Kadkoda, Aqua Nautilus Lead Security Researcher. “For years, we’ve been educating developers not to hard-code secrets into their code. Now it turns out that even doing this just once permanently exposes that secret – even when they thought it was deleted or overwritten. The impact of a sensitive data leak can lead to unauthorised access, compromised security controls, and significant financial or reputational damage. This would be devastating.” API tokens Among the exposed secrets were API tokens of Cisco Meraki and the Mozilla project Among the exposed secrets found by scanning open Github repositories were API tokens of Cisco Meraki and the Mozilla project. The Cisco security team confirmed the findings, “We discovered privileged Meraki API tokens used by some Fortune 500 companies." "These tokens could allow attackers to access network devices, Simple Network Management Protocol secrets, camera footage, and more, serving as an initial foothold for the exposed parties.” Mozilla project The Mozilla project acknowledged that “An API token for the Mozilla FuzzManager with read-write privileges” and that “an employee’s API token for sql.telemetry.mozilla.org was leaked”; both were assigned a “Critical” score. Not only does the FuzzManager allow access to many potential security vulnerabilities in Firefox and Tor, but the telemetry gives access to confidential information related to Mozilla products and business. Azure service principal token Additionally, Nautilus found an Azure service principal token belonging to a large healthcare company exposed in a Git commit. This token had the high privilege and high access to obtain credentials to the internal Azure Container Registry, which could have led an attacker to perform a supply chain attack impacting the organisation, and customers. In all cases, the exposed secrets were immediately revoked. Commit once, expose forever Most secrets scanners only look at repos accessible via the Git clone command, which overlooks almost 18% of secrets While secure coding best practices already require that secrets should not be hard coded, many developers continue this practice. They rely on secret scanning tools to ensure that such secrets are not pushed into production and often re-commit the updated code without those secrets. Phantom secrets exist because of underlying processes within Git-based SCMs, which cause code that was overwritten or deleted in repositories to remain accessible within the underlying system. Most secrets scanners only look at repos accessible via the Git clone command, which overlooks almost 18% of secrets. Software Supply Chain Security module “The findings once again reinforce the best practice that secrets should never be put into code, not even for testing purposes, and security teams must be able to monitor this,” says Amir Jerbi, CTO and co-founder of Aqua Security. “The software supply chain is optimised for speed and convenience, but this cannot come at the expense of secure engineering practices.” Available in August, Aqua customers using the Software Supply Chain Security module will be able to prevent developers from committing code with embedded secrets and scan for phantom secrets hidden within their SCM file system.
Driven by customer demand, Pimloc, the world-renowned AI video privacy, redaction, and analytics company, is proud to announce its partnership with Cisco Meraki, a worldwide technology pioneer, along with the availability of Pimloc’s Secure Redact technologies on Cisco Meraki’s Marketplace. Secure Redact’s industry-renowned video privacy platform automatically redacts sensitive personal information, such as faces and licence plates, captured via taped or live video, with incredible accuracy, which can now seamlessly integrate with Cisco Meraki CCTV cameras, body-worn cameras, dash cam footage, and more. All industries and sectors that use video technology can benefit from Secure Redact’s platform, from police and security patrols, healthcare businesses protecting patient anonymity to schools safeguarding staff and children. Accurate redaction capabilities The platform’s automated, accurate redaction capabilities operate 280 times faster than traditional video editing software, allowing users to quickly respond to DSARs, FOIAs, and ROA requests and facilitate wider, responsible data sharing, video analytics, and collaboration. It easily saves users time, improves their efficiency, and ensures they can stay compliant with ever-changing, stringent data privacy laws. Pimloc said that this year the group will expand Secure Redact to include text redaction for all cameras Pimloc recently announced that this year the company will expand Secure Redact to include text redaction for all cameras and specific patent-pending technology that improves redaction of visual, audio, and text for body-worn and moving cameras. These updates will improve the customer experience by increasing the options, speed, and efficiency with which users can anonymise proprietary information, saving them time and effort when processing sensitive footage. Cisco Meraki’s Marketplace Secure Redact technology is listed on Cisco Meraki’s Marketplace as two separate offerings, live video redaction and analytics and/or recorded video redaction, giving customers the ability to customise their technology to suit their surveillance needs. “Partnering with Cisco Meraki is an important milestone for us as we work to responsibly expand video redaction capabilities across organisations in various industries worldwide,” said Simon Randal, CEO of Pimloc. Pimloc and Cisco Meraki partnership Simon Randal adds, “The need for companies to comply with ever-changing data laws is frustrating, difficult, and time-consuming, but our integration with Cisco Meraki alleviates these problems. We’re offering customers a comprehensive surveillance solution that accurately protects personal data captured on camera and at scale.” Cisco Meraki users can discover more information about Pimloc’s Secure Redact offerings by searching for “Pimloc” on the Cisco Meraki Marketplace at apps.eraki.io.
It’s that time of the year again! The Cisco Meraki team is packing their bags and heading to Las Vegas, Nevada, USA, for ISC West 2023, the most comprehensive & converged security trade event in the United States of America (USA). ISC West is a great place to meet new people and reconnect with the network. It’s also the perfect place to discover the latest innovations that can help to meet safety and security needs. Cisco Meraki at ISC West 2023 Cisco Meraki understands the challenges facing physical security teams currently Cisco Meraki understands the challenges facing physical security teams currently — the need to improve agility and resiliency, to adapt to an ever-changing security landscape, and the need to do more with less. But doing more with less doesn’t have to mean working harder to resolve security incidents or provide safe and secure experiences. With cloud-managed smart cameras and sensors, Cisco Meraki offers an unmatched solution that combines simple, scalable architecture with practical effective security on an open platform that empowers organisations to protect people, places, and things — now, and into the future. They’d love the opportunity to show everyone how. Get the most from ISC West in three easy steps Wondering how to maximise the Meraki experience at the show? Here are three ways to connect with them at the ISC West 2023 event: Stop by their booth, #30063, and experience smarter physical security with the Meraki platform. In addition to camera and sensor demos, they’ll be highlighting some of their newest innovations and integrated solutions, including: powerful, secure, and scalable video wall monitoring with Meraki Display and Apple TV, on-camera analytics, like people counting, and line crossing for entry/exit detection — powered by one of their newest cameras, the MV93 series, and ecosystem partner applications, including V-APP, Analytiks AI, Kisi, Genea, and Cogniac, all designed to help realise more value from the Meraki platform. Schedule a meeting and lock in some one-on-one time for a more in-depth conversation with their IoT team. Attend the panel session — featuring Wesco, Intel, Convergint, Cisco, and Pathr.ai — and learn how to leverage the security platform to support use cases beyond traditional physical security. Connect with the Cisco Meraki’s team at ISC West 2023 Cisco Meraki’s team looks forward to connecting with everyone during ISC West 2023! Visit the company’s profile at ISC West 2023 event page for updated information on their presence or register for a complimentary exhibit hall pass. For those individuals who won’t be able to make it to ISC West 2023 event in Las Vegas, Nevada, USA, they can visit the Cisco Meraki website to learn how they can transform their organisation’s physical security.
Insights & Opinions from thought leaders at Cisco Meraki
GSX 2022 this week in Atlanta highlights the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Risk-based decisions “I really just do physical security.” That used to be a common phrase in the industry, but no more. In addition to ‘upskilling,’ security practitioners also need to speak the language of business and to insert the concepts of security into that language. Fast changes in security are challenging today’s professionals to keep up. The GSX education sessions seek to meet the need. Embracing ESRM includes a complete change in the thinking and approach to security Among the topics at the GSX conference is ESRM (Enterprise Security Risk Management), a security approach that focuses on risk-based decisions and partnerships with asset owners. It’s an approach that requires a holistic view of security risk. Embracing ESRM includes a complete change in the thinking and approach to security. Rather than seeking ‘approval’ for security decisions, security professionals identify risks and possible mitigation strategies and present them to management. Shaping access control Activity in the exhibit hall was brisk on the first day, which was heartening to those who attended a vastly downsized show last year in Orlando. At this show, there is even carpeting. Trends lead the lively discussions at GSX. In a presentation on the show floor Monday, manufacturer Brivo shared top trends that are shaping access control. The trends include: Hybrid work is here to stay. Some 60% of respondents to a Brivo survey said access control is extremely or very important to the hybrid work model. Providing immense value to an organisation, access data helps to manage occupancy and is part of the larger discussion of facility utilisation. Data analytics is ‘mission critical.’ Combining data from multiple sources, including access control, becomes powerful when leveraged using artificial intelligence (AI) and machine learning tools. Applications such as anomaly detection help companies improve operations. Some 65% of respondents to the Brivo survey say integrating access control with other technologies is an important trend. Keeping people healthy Other trends identified by Brivo include mobile credentialing and security centralisation (cloud) Other trends identified by Brivo include mobile credentialing and security centralisation (cloud). Among other exhibitors, Johnson Controls is focusing in their booth on solutions, not products, including the convergence of physical security into the digital space. The OpenBlue system is a digital platform that incorporates security, HVAC, fire/life safety, and building operations in a single platform that is the ‘nerve center’ of an organisation. Increasingly, the areas ‘security’ is responsible for are expanding. During the COVID pandemic, for example, security had to embrace a role in keeping people healthy (as well as safe). The challenges of the pandemic accelerated the OpenBlue portfolio as more security professionals expanded their role. Security operations centre “Moving into the digital space, and digitising what used to be a security operations center, enables us to increase automation and enable security operations to respond more quickly,” said Kenneth Poole, Johnson Controls’ Vice President, National Accounts, North America Building Solutions. Security directors are responsible for things they have never been responsible for before" “Surprisingly a lot of customers are being forced into new areas,” Poole added. “Security directors are responsible for things they have never been responsible for before.” Poole says he is encouraged by the willingness of ‘old school’ security directors to embrace the new reality. Azena’s approach to supplying edge-based camera applications on an ‘app store’ is gaining momentum. Several new applications are being announced at GSX, among the 110 apps on the Azena app store. Apps can be loaded onto Azena-enabled cameras manufactured by Bosch, Hanwha, Vivotek, BST, TopView, and Ability. Video management system Azena has simplified the integration of its app solutions, enabling developers to make only slight changes to an app and ensure it is compatible with the largest video management system (VMS) platforms, including Milestone, Genetec, and NX Witness. A wizard on the camera enables simplified mapping of data analytics to events in a VMS system. New applications in the Azena app store include video sensors to prevent ‘bed fall’ accidents in hospitals and healthcare facilities, incidents that can cost $35,000 on average and account for $34 billion in the United States in a year. The app identifies video signs of an imminent bed fall, such as excessive movement in bed. The analytics run inside the camera and the video feed doesn’t leave the device, so there are no privacy concerns. An Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics Effectiveness of metal detectors Another new application is gun detection that can augment the effectiveness of metal detectors. Also, an Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics and configured for security applications by Prosegur. An Azena app is installed in a Vivotek AI box on the back of the dog; it can detect fire, smoke, and moved luggage. Azena apps for flare and leak detection are becoming more popular in the oil and gas industries, and there are camera apps that can monitor tank levels. Cisco Meraki is introducing two new camera models at GSX, with 4K and 4MP options, a terabyte of storage for 4K, and 256Gb of storage for 4MP. Air quality sensors The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge. Also at the show, they introduced a push button and air quality sensors that are easy to incorporate into a Cisco Meraki application. Cisco Meraki also offers a dashboard that is integrated with the rest of the product portfolio to enable users to view devices on the same interface and in the same ‘pane of glass.’ For physical security users, there is the Meraki Vision Portal, which enables physical security users to run a more effective investigation. Features include a floor plan view and the ability to switch among multiple cameras. Users can instantly search videos using ‘motion search’ to easily find an event in a video.
For end-users, a simplified approach to video surveillance has its advantages. Cisco Meraki delivers simplicity, replacing a complex video surveillance system with edge-empowered cameras that connect directly to a web portal. The architecture minimises physical infrastructure and the software required for traditional cameras by placing storage and processing inside each camera, and by putting the video management system (VMS) in the Cisco Meraki cloud. Additionally, with Meraki’s web-based Vision portal, organisations can enable secure, remote access to the video anywhere with an internet connection. Providing simple experience Meraki enables customers to accelerate their business by continuing to provide a simple experience across hardware and software offerings, coupled by partnerships with ecosystem partners that directly address relevant business problems. Meraki MV smart cameras provide end-to-end, cloud-managed solutions for video security “We empower physical security teams with the necessary tools to stay informed, react, and respond faster, to create safe environments,” says Scott Wierstra, Senior Manager of IoT Product Management, Cisco Meraki. Meraki MV smart cameras provide end-to-end, cloud-managed solutions for video security, built on the Cisco Meraki cloud-first platform. Cisco Meraki is centered on helping customers connect, secure, and automate to accelerate their digital agility in a cloud-first world, says Wierstra. Thinking about the approach as a ‘service’ rather than a ‘system’ ensures that customers can benefit from Meraki’s capabilities right away, versus waiting to decipher the system’s capabilities. Cloud-managed approach Traditional obstacles to embracing cloud-managed video surveillance have been interoperability and cost. Customers that have historically been hesitant to implement a cloud-managed approach do not want to lose the interoperability that traditional systems may offer. Furthermore, a cloud-managed approach can be more costly in initial costs. However, in a recent Total Economic Impact study, respondents felt that the decrease in operational costs far outweighed initial costs over time, according to the company. Additionally, organisations experience up to 75 percent savings in maintenance costs, as well as a three-year 43 percent return on investment (ROI) with a payback period of 10 months. “With a cloud-managed approach to video surveillance, organisations can ensure simplicity and security, while improving day-to-day operations,” says Wierstra. Managing system costs A selling point of the Cisco Meraki approach is to manage system costs more efficiently A selling point of the Cisco Meraki approach is to manage system costs more efficiently -- i.e., end-users pay a monthly fee versus dealing with unpredictable, adhoc expenses over the life of a system. For traditional systems, the unpredictable expenses can often include the cost of diagnosing a camera issue, which can be an average of $525 per camera. With Meraki’s approach to video surveillance solutions, smart cameras are not only more reliable, but also provide the customer with enhanced visibility on the cloud-managed Meraki dashboard to troubleshoot the issues. Meraki Support is also available 24/7 to troubleshoot alongside the customer, should they need any assistance, says Wierstra. The process no longer requires a technician to be onsite for troubleshooting, and according to the Total Economic Impact study, it can save an organisation up to $457,000 over three years. Powering smart spaces At Meraki, business flows through an expert community of authorised resellers to connect hybrid workforces, power smart spaces, and provide safe and secure environments. These include Channel Partners, Managed Service Providers, Physical Security Integrators, and Service Providers, At Meraki, business flows through an expert community of authorised resellers It is true that a customer’s hardware investment would be lost in case he elects to change cloud vendors. However, if a customer wanted to change providers for any part of their system, or if they wanted to change cameras for new functionality or higher resolution, they would also lose that hardware investment. Similarly, if the customer wanted to change their VMS, they would also lose the investment in the hardware and software that supports that part of their system. Smart camera solutions With a cloud-managed approach like Meraki, a customer can upgrade or replace an existing Meraki MV smart camera, without losing the remaining license term. It would simply be applied to the new one. The Meraki MV license also offers ongoing support, firmware updates, and continuous access to new features, greatly expanding the practical lifespan of the product. As a result, customers are always receiving access to new, innovative capabilities, says Wierstra. Meraki’s MV smart camera solutions serve customers across all verticals. For example, higher education and K-12 institutions, or organisations with lean IT teams, often value the simplicity from the solutions. Healthcare organisations looking for fast, seamless deployments without compromising reliability also reap the benefits of Meraki MV. Lastly, retail organisations also embrace the approach, especially when planning large-scale deployments that need the simplicity and scalability of Meraki’s cloud-managed interface. Cloud video solutions Meraki has a number of integration solutions on the Meraki marketplace Organisations can design a Meraki deployment of any size. For access control, Meraki has a number of integration solutions on the Meraki marketplace with their own considerations that will affect the final deployment design. Cloud video is often seen as a complex and cybersecurity risk. While this is a common misconception, the reality is that with cloud video solutions, organisations can experience an out-of-the-box, end-to-end solution that is easy to work with. It also provides capabilities such as the ability to plug-and-play, and offers a fast, scalable setup via a web dashboard. Furthermore, with no-touch firmware updates, the solutions ensure security with automatic encryption of video, at rest and in transit, as well as secured access, with unique usernames and passwords, and a video access log, providing an audit of all video activity. Cloud-based solution The last two years have brought forward new workplace health and safety concerns—including occupancy, mask detection, and air quality—that organisations need to manage, in addition to core security needs. Organisations leveraging a cloud-based solution are best positioned to adapt to this evolving physical security landscape. With a cloud-first platform, businesses can offer flexibility, scalability, and the ability to easily integrate new systems and add new capabilities with ease. All these factors combined—ease of maintenance, system flexibility and adaptability, and long lifespan—can lead to a lower TCO for cloud surveillance solutions, ultimately lowering costs while enabling safe environments, according to Cisco Meraki.
ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., is the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. Here’s a quick rundown of integrator companies acquired by ADT: Protec, a Pacific Northwest commercial integrator (Aug. 2017); MSE Security, the USA’s 27th largest commercial integrator (Sept 2017); Gaston Security, founded in 1994 as a video surveillance integration company and whose services have since expanded to include intrusion, access control, and perimeter protection (Oct. 2017); Aronson Security Group (ASG), which delivers risk and security program consultants and offers advanced integration services, consulting and design engineers and a National Program Management team (March 2018); Acme Security Systems, among the largest privately held security systems integrators in the Bay Area, focusing on electronic security systems, access control, video networks and more (March 2018); Access Security Integration, a regional systems integrator specialising in design, delivery, installation and servicing of electronic security systems including enterprise-level access control, video and visitor management solutions, perimeter security and security operation command centers (Aug. 2018); In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity with the following two acquisitions: Datashield, specialising in Managed Detection and Response Services (Nov 2017); Secure Designs, Inc., specialising in design, implementation, monitoring, and managing network defense systems, including firewall services and intrusion prevention, to protect small business networks from a diverse and challenging set of global cyber threats (Aug. 2018). ADT has acquired more than a half-dozen security system integration firms in the last year or so For additional insights into ADT’s game plan and the strategy behind these acquisitions, we presented the following questions to Chris BenVau, ADT’s Senior Vice President of Enterprise Solutions. Q: ADT has been actively acquiring regional integrators this year – more than a half a dozen to date. Please describe the history of how ADT came to embrace a strategy of acquiring regional integrators as a route to growth? ADT's acquisition of Red Hawk is set to close in December, and brings premiere fire and life/safety solutions BenVau: Our acquisition strategy started at Protection 1 when we embarked on our journey to build out our commercial and national account business and add enhanced integration capabilities to our portfolio. The merger of Protection 1 and ADT brought that foundation to ADT which up to that point was primarily a residentially and SMB-focused company. After the merger, we set out to identify and acquire additional regional integrators that would continue to build on that foundation and deliver enhanced technical solutions, advanced technologies and an expanded service, install and support footprint. Through our acquisitions we now operate two Network Operations Centers and three Centers of Excellence. We are also unique in the industry with the number and variety of certifications, like Cisco and Meraki, our engineers hold which ultimately allows us to offer Managed Security as a Service. They have also enhanced our operational capabilities. Q: What criteria do you use to evaluate whether an integrator is a good “fit” for ADT? BenVau: First and foremost, we look at the culture of the companies. The companies that we target for acquisition must be metrics- and customer service-driven. Secondly, we look at the leadership teams. ADT view their acquisitions more like mergers and take a patient approach to integrating them into their business We have been fortunate in the fact the leadership of the companies we acquired remain with us today in key management and executive positions helping to drive continued growth within their organisations. We also evaluate their current customer base, unique solutions and their ability to complement and enhance our portfolio with the goal of becoming a leading full-service, enterprise commercial provider. Our acquisitions have bolstered our network capabilities, brought enterprise risk management services, and a broader solution set in high-end video and access control solutions. Our most recent acquisition – Red Hawk, set to close in December – brings us premiere fire and life/safety solutions. Q: What changes are typically needed after an integrator is acquired in order to adapt it to the ADT corporate model? BenVau: We view our acquisitions more like mergers and take a patient approach to integrating them into ADT while taking into account their culture. We want to ensure that we find the right positions for their people, embrace the right messaging and put the right processes in place. We acquire these companies because they are the best in their respective businesses and geographies and bring their knowledge and experience in markets or with solutions that we may not have had previous access to. ADT can support clients with their own in-house technicians which helps to ensure a consistent security program Q: How can regional integrators benefit from the ADT brand? Have your newly acquired integrators realised additional growth? BenVau: The companies we have acquired, generally, have exceeded expectations and surpassed initial goals. ADT brings expanded opportunities for these companies as well with our national footprint. Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver. These integrators help to deliver on that. In the past, the regional players may have had to rely on sub-contractors to service their larger clients. With ADT, we can now support those clients with our own in-house technicians which helps to ensure a consistent security program across multiple locations.Our National Account Sales Team has seen impressive growth over the years and are only limited by our ability to deliver" Q: Are additional integrator acquisitions planned this year and into 2019? How much is enough and when will it end (or slow down significantly)? BenVau: We expect to close on our latest acquisition, Red Hawk, before the end of 2018. Red Hawk brings a national footprint focused on fire/life safety and security to ADT. While ADT already had a robust security offering, Red Hawk will contribute significantly to the fire side of the business. In addition, we will continue to evaluate the companies in the industry to determine if additional acquisitions make sense. Q: Do you expect greater consolidation of the integrator channel in the industry as a whole? Why is this a good time for consolidation? Is it a good M&A market for buyers like ADT? BenVau: We will continue to evaluate companies in the industry to determine if further acquisitions make sense. As for the industry, we can only speak for ourselves. Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams" Q: What other trend(s) do you see in the industry that will impact ADT (on the commercial side) in the next year or so, and how? BenVau: In addition to their moves in the commercial integrator space, ADT has also sought to expand their presence in cybersecurity Networking is a big one. As we continue to drive integration of devices and services, from AI, “the cloud,” machine learning and even analytics, there will be more focus on the network they ride on. A deeper knowledge of network design, bandwidth impact, and system integration will be critical. As part of our acquisition strategy, we focused on talent to add to the team and have been able to add to our bench strength in this area. Q: Any other comments/insights you wish to share about ADT’s strategy, future, and role in the larger physical security marketplace? BenVau: Our focus is on investing in our field organisation, in particular our service technicians, engineers and project management teams. The cornerstone of our success lies in our ability to deliver outstanding customer support and service. It starts with sales and the ability to deliver security and life safety technologies, but it ends with a delighted customer who partners with us to help secure the things that matter most to them. Our recent acquisitions have more than doubled our commercial field operations teams and are key to establishing the ADT Commercial brand as a leading full-service provider of enterprise solutions to the marketplace.
The key to unlocking K12 school safety grants
Download5 surprising findings from OT vulnerability assessments
DownloadPhysical access control
DownloadHoneywell GARD USB threat report 2024
DownloadPalm vein recognition
Download