Proxy Raises $42 Million

By: John Honovich and Brian Rhodes, Published on Mar 17, 2020

Startup Proxy has raised $42 million, an astounding amount for the access control market.

For background, see our Proxy access control test.

How did they get much funding? What do they aim to do with it and to the market? We spoke with Proxy executives and examine these questions inside.

********************* $** *******, ** ********** ****** for *** ****** ******* market.

*** **********, *** ******** ****** ******* ****.

*** *** **** *** much *******? **** ** they *** ** ** with ** *** ** the ******? ** ***** with ***** ********** *** examine ***** ********* ******.

[***************]

What **** **** ** **

*** **** ** *** start *** *****, **** to ****** *** **********, the ******* ****. ***** access ******* *** ***** is ***********, ***** ********* offering ** ******** ******** to * ***** ***** of ******* ******* **** printers ** ** ** meeting *****, *******, ** amenities **** **** ****** and **** *******.

******, **** ******* ** the **** **** **** doors **** ** * distinct ******** ** ******* that **** ******* ****** to.

Business *****

***** *** ******* ***** hardware, *.*.,****** ******* ****** **** ****, *** ******* ******** model ** ******* ** software, ************, * **** model ***** ** ********* per ****** (*.*., *** door, ******* ******* ~$** to $** *** ****** per ***** ********* ** system **** *** ***** of ***********), ******* ** licensing *** ********** (******* physical ** *******).

*** ******* ******** **** it *** ***** ** a ***** ***** ** devices *******, ********** ******* per ********.

Top-Down ***** *****

****** **** ******** ******** companies **** ***** **** smaller *******, ***** **** they **** ******* ** enterprises *** ********** **** estate *********, ********* ******* Silicon ******-***** ******.

******, **** *** **** found ******* ******** ***** larger ********* *** ***** combination ** ****** ****** and * ******** ********** of ****** ** ******* devices.

Competitors - ***, *** *****, **, *******, ***.

*** ******** ********** ** likely *** ******. ***** Proxy **** **** **** made ********* ** *** to *******, ** ** likely ***** *** ******* incumbents *** *****'* *** ambitions **** ***** *** will *****.

*******, ** *** ****** control ********** ******** ****, Proxy ***** ** ******* with *********** ****** *******.

***** ***** ****** *** own ***** ********** ********, it **** *** ****** to ** * ****-******* access ******* ********** ******** and ******* *** * mobile ************** ***** ** existing *******.

Negatives / ***********

* *** ******* ********* or *********** ** ***** for *** ******* *****:

  • ****** *****, *** ******* has ~** *********.
  • ** **** ***** ************ or ***** ***** ** go ***** ******* ********.
  • ******* ***** *********** *** physical ****** *******
  • ************** *** ***** ***** and ****** *******

Can ***** ********* '************ ******' ********?

***** **** *****'* ******** into **** ********* ** via ******** ****** *******, the ******** ** ******* or *** **** ******** a ********** ******** **** the '***** ******* *******' applications *** ******* **** as **** ** ********* systems.

******** *********** *** *********** do *** ***** **** a '**** ** *** table' ** ***** ** selecting ** ********** ***** IT-group ******* *******, *** while *** ******** ** adding '************ ******' ** those ********* *** ** there, ******* ***** ***** heard *** * ******** on *** ***** ***** prove *********.

Using $** *******

** *******, ***** ** aiming ** *** *** $42 ******* ** ******** investments ** *&* ** well ** *****, ****** the ******* ********* **** caution ** *** ******* or ****** **** **** spend / *****, ****** the ******* ********* ******** currently.

*** ******** ** **** the $** ******* ***** them ***** * *** chest ** ****** ******* offerings ** **** ** build * ***** ************ to ** ***** *** broader ******.

Competitive *******

*** ** ******* *** gorilla ************ *** *** made ******* ******** ** enter *** ******** '********' market, **** ** ***** is *********** ******.

** *** ******* ****,***'* **** *************** ** ****** *** physical ******** ********** *** make ** *** ****** of * ******** ****** that ********** ***** **** logical (*********) ******* ** well. ***** ******* ********, like ******* *** *** **************** ****** ****** ******** attempts, **** **** ***** significantly ******* ** ***.

*** *** ********* ** breach ******* ******* **** Proxy ** *********** ******, but *** ********** ** sales *** ****** *********, especially ******* *** ************* of *********** ******** *********** into ***** *******.

*******, **** *****'* ******-***** approach, **** ** *** cumbersome *** ****** ************ are ********* *** ********** using *********** *** ****** adopted *** *********. *** less ******* *********** ******** could ***** ******** ** getting ***** **** ****** where *** *** *** been, *** ** ***, currently *** ****** ******.

***********, *** ** ***** the ******* *** **** of *** ****** ******* industry's ******* ******* *******, Assa *****, ** **** certainly **** *** ********* and **** ** **** on **** ****** ***** market.

Vote / ****

Comments (4)

*****, *****, ***** .... lol .. ****** **** anything ***** *****?

** **** ** ***** is ******** ***** ******** and **'** *** *********** access ** ****** *** an ********* ******** **** (wouldn't ** ********* ** Elon **** ******* *** this *** ******* ***) there **** ** *********** challenges ** ****** *** locksmith ***** **** *** folks *** **** ** control ****** ** **********, no ****** **** ** is, **** * ********* identifier.

***** ***** ** *** surface, ** ***** *** a ****** ** **** and ******* **** ** the ****, *** *** best ********* *** *** newer ******** ** ******** access ******* *** *** large **** ****** ********* with ********** *** **** very ****** ***** **** hardware ** ****, *** focus ** *** *** solution (***) ****** ******.

*****, ** ******* ****, but *** ******* *** only ******* ****** ** their *****, *** *** stakes *** ****** *** much **** ******* **** we *** *****, ** attaching **** *** ********, your "*****", ** * complex *** ** ********** applications ****** *** **** out ** **.

*** *** *** **********, and *****? ***'* *** it **** ** ** their *******.

***** ****:

*****'* **-******** ******** ************ ******, **** ******** ***** with *******/ **** ******* experience. ****** *** * former ****** ******** ** Intel/Sensory ******** ******** **** network ********, **** ******** worked *** *-**********, *** Ratner **** ******/*******.

**** *** ******* ******** security ********** ***** ** starting *****.

**** **** ****?

** ***** *** *** comment ** *** ************/*********** between ***** ********** ********* vs. *** ******* ****** Proxy's ***** ** ****** their ******** ****** ****** doors.

*** ********* ***** ********:

*** **** ******* **** embeds *** ****** ************** technology **** ***** ************* non-PACS ******** *** ********* that ***** **** *** broad **** ********* **** worldwide. **** ******* *** use ** ***’* ******* credentials **** * **** range ** ************. ** the ********** *****, *** example, *** ******** **** many ** *** *****’* top ****** ***** **** like ****** ******* *** others, ** **** ** cashless ******* ********, ********* terminal ******** (**** ** Suprema, ********* *** **** ID), ******** ******* ******** like ******** ***********, ***** peripheral ****** ******** *** many ****.

** ******** ** ***** partner ************, *** ********** is ********** **** * wide ***** ** ******** systems ** ******* ****** access ** *******, *****, medical *******, **** ********** cabinets, **** *** ********** terminals, *********, *** ** much ****.

*** ******** *** ***** examples ** ***** '******** business' *********** ****** **** and ****** *********** **** non-access *********, ***** ** similar ** *** ***** is ******** ** ****** their ********.

** ***** **** ********* to ******* *** ******* security ** *********** ***** the ********* **********.

*** ***** **** ******* integrated ******* *** **** credentials **** ****** ****:

'**** ******* **** *** master **** *** ************* operations, ********* ** ******** authenticate * ****** ********** or ***** ****, *** isolated ** ******* ********* containing ********* ******** ****** elements.'

***** **** ******* **** iClass **** *** ******** to ***** ***-****** *******, there ** ******* **** confidence **** *********** *** not ******* ** *******.

** **** ***** ***** to ******* ***** ******** to ******** ***** ***-***** credentials, ************ ** ********** is ****. ***** *********:

***** ****** *** ** an ********* ************* ****** (similar ** ****). ****** our ******, ****** *********** are ****** ** *** cloud (********* ** ****) and ********* ** *** phone ** *** ******* of ** ********* *****. The ****** *****-********, ****-******* encrypted ***** ** **** passed **** ** *** reader *** ***, ***** the ***** ** ********* with * ******-******** ********** key, *** *** ********** is ******* *** ****** down *** **** *** Wiegand ** **** ** to *** **********. **** token ** *** **** use **** ** ******* secure *** ****** ******* read-and-replay *******. ***** ** SOC-2 *********.

** **** ****, ***'* platform *** * **** start ** *** ******** Proxy ***** ** *****. For *******, *** *******'* deployment** ******* ************ *** **, ***** student *** *** ****/***** in * ****** ** systems:

***** ***** *** ****** devices *** ** **** for ********** **** ******** buildings – **** ** residence ***** *** ********** rooms – ** ****** meals, ********* *** ***, and ***** ****** ***** services *** ******** ***** university *********.

*****'* **** ** *** new, *** ****** ******* may ****** ** *** company ** **** ******/ more ****-********* **** *** in ********* ***** ************.

Read this IPVM report for free.

This article is part of IPVM's 6,367 reports, 855 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Startup Solink $17 Million USD Fund Raise Expands To Mass Market on Jun 24, 2020
Solink has raised ~$17 million USD, a sizeable round for the company that raised $12 million last year. How fast have they grown? What do they...
Proxy Presents Mobile Credentials For BLE Devices and Access on May 29, 2020
Proxy presented Mobile Credentials For BLE Devices and Access at the May 2020 IPVM Startups show. Inside this report: A 30-minute video...
Gatekeeper Security Company Profile - Detecting Faces Inside Vehicles on Nov 14, 2019
Border security is a common discussion in mainstream US news and politics, as is the use of banned Chinese equipment by US Government agencies....
Razberi Technologies Company Profile on Aug 06, 2019
Razberi says they have doubled their revenue in the first half of 2019, citing their proprietary camera hardening and cybersecurity capabilities...
Sighthound Transforms Into Enterprise AI Provider Profile on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
Sales Turnover At Anyvision on Feb 13, 2019
Anyvision raised a $43 million Series A and according to their newest investor: what you need to do is push the gas pedal and build an...
Improved Security And Surveillance Bidding - 2018 MasterFormat Divisions Examined on Jul 19, 2018
Navigating the world of system specifications and bidding work can be complex and confusing, but a standard format exists, and understanding it...
Amazon Deep Learning Partnership With AgentVi on Jan 15, 2018
Amazon is aiming to grow its Kinesis Video Streams offering that "enables you to quickly build computer vision and ML applications" in the cloud....
$8 Billion Utility Georgia Power Enters Surveillance Business Offering Avigilon And Genetec on Jul 19, 2017
Utilities are typically considered major customers of surveillance integrators but one utility, Georgia Power, with $8+ billion in annual revenue...

Most Recent Industry Reports

Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM is 'not a good look' and that 'IPVM should never be your source of...
Vintra Presents FulcrumAI Face Recognition on Jul 02, 2020
Vintra presented its FulcrumAI face recognition and mask detection offering at the May 2020 IPVM Startups show. Inside this report: A...
Uniview Wrist Temperature Reader Tested on Jul 02, 2020
Uniview is promoting measuring wrist temperatures whereas most others are just offering forehead or inner canthus measurements. But how well does...
Dahua USA Admits Thermal Solutions "Qualify As Medical Devices" on Jul 02, 2020
Dahua USA has issued a press release admitting a controversial point in the industry but an obvious one to the US FDA, that the thermal temperature...
Access Control Online Show - July 2020 - With 40+ Manufacturers - Register Now on Jul 01, 2020
IPVM is excited to announce our July 2020 Access Control Show. With 40+ companies presenting across 4 days, this is a unique opportunity to hear...
Hanwha Face Mask Detection Tested on Jul 01, 2020
Face mask detection or, more specifically lack-of-face-mask detection, is an expanding offering in the midst of coronavirus. Hanwha in partnership...
UK Government Says Fever Cameras "Unsuitable" on Jul 01, 2020
The UK government's medical device regulator, MHRA, told IPVM that fever-seeking thermal cameras are "unsuitable for this purpose" and recommends...
Camera Course Summer 2020 on Jun 30, 2020
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training...
Worst Over But Integrators Still Dealing With Coronavirus Problems (June Statistics) on Jun 30, 2020
While numbers of integrators very impacted by Coronavirus continue to drop, most are still moderately dealing with the pandemic's problems, June...
FLIR Screen-EST Screening Software Tested on Jun 30, 2020
In our FLIR A Series Test, the cameras' biggest drawback was their lack of face detection, requiring manual adjustment when screening each...