Proxy Raises $42 Million

By: John Honovich and Brian Rhodes, Published on Mar 17, 2020

Startup Proxy has raised $42 million, an astounding amount for the access control market.

For background, see our Proxy access control test.

How did they get much funding? What do they aim to do with it and to the market? We spoke with Proxy executives and examine these questions inside.

What **** **** ** **

*** **** ** *** start *** *****, **** to ****** *** **********, the ******* ****. ***** access ******* *** ***** is ***********, ***** ********* offering ** ******** ******** to * ***** ***** of ******* ******* **** printers ** ** ** meeting *****, *******, ** amenities **** **** ****** and **** *******.

******, **** ******* ** the **** **** **** doors **** ** * distinct ******** ** ******* that **** ******* ****** to.

Business *****

***** *** ******* ***** hardware, *.*.,****** ******* ****** **** ****, *** ******* ******** model ** ******* ** software, ************, * **** model ***** ** ********* per ****** (*.*., *** door, ******* ******* ~$** to $** *** ****** per ***** ********* ** system **** *** ***** of ***********), ******* ** licensing *** ********** (******* physical ** *******).

*** ******* ******** **** it *** ***** ** a ***** ***** ** devices *******, ********** ******* per ********.

Top-Down ***** *****

****** **** ******** ******** companies **** ***** **** smaller *******, ***** **** they **** ******* ** enterprises *** ********** **** estate *********, ********* ******* Silicon ******-***** ******.

******, **** *** **** found ******* ******** ***** larger ********* *** ***** combination ** ****** ****** and * ******** ********** of ****** ** ******* devices.

Competitors - ***, *** *****, **, *******, ***.

*** ******** ********** ** likely *** ******. ***** Proxy **** **** **** made ********* ** *** to *******, ** ** likely ***** *** ******* incumbents *** *****'* *** ambitions **** ***** *** will *****.

*******, ** *** ****** control ********** ******** ****, Proxy ***** ** ******* with *********** ****** *******.

***** ***** ****** *** own ***** ********** ********, it **** *** ****** to ** * ****-******* access ******* ********** ******** and ******* *** * mobile ************** ***** ** existing *******.

Negatives / ***********

* *** ******* ********* or *********** ** ***** for *** ******* *****:

  • ****** *****, *** ******* has ~** *********.
  • ** **** ***** ************ or ***** ***** ** go ***** ******* ********.
  • ******* ***** *********** *** physical ****** *******
  • ************** *** ***** ***** and ****** *******

Can ***** ********* '************ ******' ********?

***** **** *****'* ******** into **** ********* ** via ******** ****** *******, the ******** ** ******* or *** **** ******** a ********** ******** **** the '***** ******* *******' applications *** ******* **** as **** ** ********* systems.

******** *********** *** *********** do *** ***** **** a '**** ** *** table' ** ***** ** selecting ** ********** ***** IT-group ******* *******, *** while *** ******** ** adding '************ ******' ** those ********* *** ** there, ******* ***** ***** heard *** * ******** on *** ***** ***** prove *********.

Using $** *******

** *******, ***** ** aiming ** *** *** $42 ******* ** ******** investments ** *&* ** well ** *****, ****** the ******* ********* **** caution ** *** ******* or ****** **** **** spend / *****, ****** the ******* ********* ******** currently.

*** ******** ** **** the $** ******* ***** them ***** * *** chest ** ****** ******* offerings ** **** ** build * ***** ************ to ** ***** *** broader ******.

Competitive *******

*** ** ******* *** gorilla ************ *** *** made ******* ******** ** enter *** ******** '********' market, **** ** ***** is *********** ******.

** *** ******* ****,***'* **** *************** ** ****** *** physical ******** ********** *** make ** *** ****** of * ******** ****** that ********** ***** **** logical (*********) ******* ** well. ***** ******* ********, like ******* *** *** **************** ****** ****** ******** attempts, **** **** ***** significantly ******* ** ***.

*** *** ********* ** breach ******* ******* **** Proxy ** *********** ******, but *** ********** ** sales *** ****** *********, especially ******* *** ************* of *********** ******** *********** into ***** *******.

*******, **** *****'* ******-***** approach, **** ** *** cumbersome *** ****** ************ are ********* *** ********** using *********** *** ****** adopted *** *********. *** less ******* *********** ******** could ***** ******** ** getting ***** **** ****** where *** *** *** been, *** ** ***, currently *** ****** ******.

***********, *** ** ***** the ******* *** **** of *** ****** ******* industry's ******* ******* *******, Assa *****, ** **** certainly **** *** ********* and **** ** **** on **** ****** ***** market.

Vote / ****

Comments (4)

*****, *****, ***** .... lol .. ****** **** anything ***** *****?

** **** ** ***** is ******** ***** ******** and **'** *** *********** access ** ****** *** an ********* ******** **** (wouldn't ** ********* ** Elon **** ******* *** this *** ******* ***) there **** ** *********** challenges ** ****** *** locksmith ***** **** *** folks *** **** ** control ****** ** **********, no ****** **** ** is, **** * ********* identifier.

***** ***** ** *** surface, ** ***** *** a ****** ** **** and ******* **** ** the ****, *** *** best ********* *** *** newer ******** ** ******** access ******* *** *** large **** ****** ********* with ********** *** **** very ****** ***** **** hardware ** ****, *** focus ** *** *** solution (***) ****** ******.

*****, ** ******* ****, but *** ******* *** only ******* ****** ** their *****, *** *** stakes *** ****** *** much **** ******* **** we *** *****, ** attaching **** *** ********, your "*****", ** * complex *** ** ********** applications ****** *** **** out ** **.

*** *** *** **********, and *****? ***'* *** it **** ** ** their *******.

***** ****:

*****'* **-******** ******** ************ ******, **** ******** ***** with *******/ **** ******* experience. ****** *** * former ****** ******** ** Intel/Sensory ******** ******** **** network ********, **** ******** worked *** *-**********, *** Ratner **** ******/*******.

**** *** ******* ******** security ********** ***** ** starting *****.

**** **** ****?

** ***** *** *** comment ** *** ************/*********** between ***** ********** ********* vs. *** ******* ****** Proxy's ***** ** ****** their ******** ****** ****** doors.

*** ********* ***** ********:

*** **** ******* **** embeds *** ****** ************** technology **** ***** ************* non-PACS ******** *** ********* that ***** **** *** broad **** ********* **** worldwide. **** ******* *** use ** ***’* ******* credentials **** * **** range ** ************. ** the ********** *****, *** example, *** ******** **** many ** *** *****’* top ****** ***** **** like ****** ******* *** others, ** **** ** cashless ******* ********, ********* terminal ******** (**** ** Suprema, ********* *** **** ID), ******** ******* ******** like ******** ***********, ***** peripheral ****** ******** *** many ****.

** ******** ** ***** partner ************, *** ********** is ********** **** * wide ***** ** ******** systems ** ******* ****** access ** *******, *****, medical *******, **** ********** cabinets, **** *** ********** terminals, *********, *** ** much ****.

*** ******** *** ***** examples ** ***** '******** business' *********** ****** **** and ****** *********** **** non-access *********, ***** ** similar ** *** ***** is ******** ** ****** their ********.

** ***** **** ********* to ******* *** ******* security ** *********** ***** the ********* **********.

*** ***** **** ******* integrated ******* *** **** credentials **** ****** ****:

'**** ******* **** *** master **** *** ************* operations, ********* ** ******** authenticate * ****** ********** or ***** ****, *** isolated ** ******* ********* containing ********* ******** ****** elements.'

***** **** ******* **** iClass **** *** ******** to ***** ***-****** *******, there ** ******* **** confidence **** *********** *** not ******* ** *******.

** **** ***** ***** to ******* ***** ******** to ******** ***** ***-***** credentials, ************ ** ********** is ****. ***** *********:

***** ****** *** ** an ********* ************* ****** (similar ** ****). ****** our ******, ****** *********** are ****** ** *** cloud (********* ** ****) and ********* ** *** phone ** *** ******* of ** ********* *****. The ****** *****-********, ****-******* encrypted ***** ** **** passed **** ** *** reader *** ***, ***** the ***** ** ********* with * ******-******** ********** key, *** *** ********** is ******* *** ****** down *** **** *** Wiegand ** **** ** to *** **********. **** token ** *** **** use **** ** ******* secure *** ****** ******* read-and-replay *******. ***** ** SOC-2 *********.

** **** ****, ***'* platform *** * **** start ** *** ******** Proxy ***** ** *****. For *******, *** *******'* deployment** ******* ************ *** **, ***** student *** *** ****/***** in * ****** ** systems:

***** ***** *** ****** devices *** ** **** for ********** **** ******** buildings – **** ** residence ***** *** ********** rooms – ** ****** meals, ********* *** ***, and ***** ****** ***** services *** ******** ***** university *********.

*****'* **** ** *** new, *** ****** ******* may ****** ** *** company ** **** ******/ more ****-********* **** *** in ********* ***** ************.

Read this IPVM report for free.

This article is part of IPVM's 6,535 reports, 880 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Proxy Presents Mobile Credentials For BLE Devices and Access on May 29, 2020
Proxy presented Mobile Credentials For BLE Devices and Access at the May 2020...
Startup Solink $17 Million USD Fund Raise Expands To Mass Market on Jun 24, 2020
Solink has raised ~$17 million USD, a sizeable round for the company that...
Verkada Access Control Tested on Sep 09, 2020
Verkada raised $80 million earlier in 2020, expanding from video into access...
Openpath Raises $36 Million on Jul 16, 2020
Openpath has raised $36 million as 2020 has become a boom year for access...
Milestone XProtect on AWS Tested on Sep 21, 2020
Milestone finally launched multiple cloud solutions in 2020, taking a...
Dedicated Vs Converged Access Control Networks Statistics 2020 on Sep 10, 2020
Access control is a crucial system where the network used can impact life...
Startup Cawamo Presents Live Alerts With Edge AI and Cloud VMS on Sep 15, 2020
Cawamo, an Israeli edge-to-cloud analytics and VMS startup, presented its...
Video Surveillance 101 Book Released on Jul 07, 2020
IPVM's unique introduction to video surveillance series is now available as a...
Startup Visual One Presents Object Detection and Smart Search on Aug 26, 2020
Visual One, a Y Combinator backed startup led by a PhD in machine learning...
Virtual ISC West and GSX+ Exhibiting Contrasted on Sep 17, 2020
Both ISC West and ASIS GSX are going virtual this year, just weeks apart, but...
Proxy Acquires Ring Maker Motiv on Apr 29, 2020
Fresh off of raising $42 million, access startup Proxy has acquired...
Anyvision Raises $43 Million, Focusing on Access Control And Remote Authentication on Sep 04, 2020
While Anyvision has had a tumultuous 2020 with significant layoffs, the...
Verkada Speaks On Disrupting Security Sales Channel on Aug 28, 2020
Verkada's fast growth has taken the industry by storm and their enterprise...
Mobiqam Presents Battery Powered & Quick Setup Video Surveillance on Jun 12, 2020
Mobiqam presented its battery-powered, quick setup video surveillance system...
Openpath Presents Two Door PoE Controller on May 21, 2020
Openpath presented its new PoE controller at the May 2020 IPVM Startups...

Recent Reports

OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Norway Council of Ethics Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...
Installation Course Fall 2020 - Save $50 - Last Chance on Sep 22, 2020
This is a unique installation course in a market where little practical...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
FLIR CEO: Many New Fever Entrants "Making Claims That The Science Just Won't Support" on Sep 22, 2020
FLIR's CEO joins a growing number calling out risks with fever / screening...
China Bems Temperature Measurement Terminal Tested on Sep 22, 2020
Guangzhou Bems (brand Benshi) is the manufacturer behind temperature...
Axis Exports To China Police Criticized By Amnesty International on Sep 21, 2020
Axis Communications and other EU surveillance providers are under fire from...
Milestone XProtect on AWS Tested on Sep 21, 2020
Milestone finally launched multiple cloud solutions in 2020, taking a...