Author Archives: Doug Levin

About Doug Levin

Doug is a certified (PSP, AHC, LEED AP), experienced business development professional with a focus on the physical security industry. With a diverse background that includes delivering products & services through multiple channels (manufacturing, distribution, specialty & general contracting), he brings a broad industry perspective that adds greater value for his clients. Having decades of experience with sales engineering and design-build of low-voltage automated systems, he also offers a strong emphasis on technical knowledge and consulting services. His career has included responsibility for: profit & loss, operations and sales management with front-line experience in estimating, sales/marketing, project management and developing security design documents & spec writing.

A Vision for Effective Application of Technology

Common Technology Oversights In my experience, there are three very common discoveries when I reach out to new potential partners: A lack of awareness that their existing systems have much more potential functionality than they currently utilize. A realization they … Continue reading

Posted in Integration, Physical Security, Technology | Tagged , , , , , , , , , , , | 1 Comment

2015 Bicsi Fall Conference – A Security Vendor Perspective

As a Biz Dev Manager in the physical security technology space, Bicsi members are an important emerging channel. This year the trade show was particularly productive. This was a well-attended conference, with a particularly good showing from technology consultants and … Continue reading

Posted in Physical Security, Power Distribution, Technology | Tagged , , , , , , , , , , , | Leave a comment

2015 ASIS Global Conference Review

The weekend recovery begins, after a long (but productive) ASIS focused week… This year I spent time walking the trade show floor and thinking about larger physical security industry issues and how the ASIS Conference is positioned. End-User Focused Event … Continue reading

Posted in Physical Security, Power Distribution, Technology | Tagged , , , , , , , , , | Leave a comment

Secure Data and Identity Management Solutions

As automated building systems become more dependent on shared network infrastructure, I.T. (Information Technology) Directors and CISO’s (Chief Information Security Officers) are beginning to realize these systems are adding significant vulnerabilities and risks to their network and sharing this realization … Continue reading

Posted in Cybersecurity, Physical Security, Technology | Tagged , , , , , , , , , , | Leave a comment

PoE Power Distribution – The Future for Effective Building Automation

Having met with many factory representatives this past year whose companies are developing this technology, in my opinion it is time to start talking seriously about broadening the use of PoE in system design. The current IEEE 802.3af PoE (Power … Continue reading

Posted in Physical Security, Power Distribution, Technology | Tagged , , , , , | Leave a comment

ASU Unveils Cybersecurity Program

I spent several¬†hours at ASU SkySong in Tempe, AZ with Jim Cook a couple of weeks ago discussing the broader road map for the data security space. Jim has an interesting job title: ASU Director of Business Development for the … Continue reading

Posted in Physical Security, Technology | Tagged , , , , , | Leave a comment

Convergence of Physical and Information Security

As mentioned in previous posts, all data paths eventually converge via LAN/WAN… so how will physical security evolve to accommodate this reality? Technology has one and ONLY ONE purpose in the physical security space: improving the effectiveness and/or efficiency of … Continue reading

Posted in Physical Security, Technology | Tagged , , , , , , , | Leave a comment

How to be Relevant to I.T. Professionals

I.T. Expanding Influence into Related Trades It really doesn’t matter which technology products/systems you offer today, the end-user approval process will eventually pass through the I.T./I.S. group. While the buying decision is likely to be based on the need and … Continue reading

Posted in Physical Security, Technology | Tagged , , , , , , | Leave a comment