Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementAccess Management

Sponsored Content

New at Brivo - 3 Powerful Updates for Better Physical Security

Security is about protecting people.

New_at_Brivo_-_3_Powerful_Updates_for_Your_Physical_Security-1500x500_px
September 10, 2019

ContentProvidedByBrivo

The security professionals who stand between the promise of digital transformation and the daily reality of evolving security threats need our help. 

At Brivo, we’ve made it our mission to empower every person and organization to make the world a safer place. Today, this mission is focused on providing a better user experience to improve businesses’ corporate security posture. 

We are showcasing three powerful updates to give our customers more control over their security operations and empower security teams by reducing the noise, time-consuming tasks and complexities that used to challenge their daily responsibilities. 

 

1. Our new camera to cloud video solution, Brivo Onair Cam.

Integrate access control and video with simple camera to cloud connectivity for a fast, reliable and cost-effective way to protect your facility. 

Why is this important?

With Brivo Onair Cam, you can easily link important access control events with recorded video and remotely check a live video feed to better protect your facilities. You also have a simple, two-click process to play clips of important access events.

How does Brivo Onair Cam work?

Easily install Brivo Onair Cam without the need to set up a local gateway and integrate with wireless or wired POE cameras to view live site activity and rapidly access recorded events.

 

2. Visitor security with our new Brivo Visitor.

That’s right. You no longer need to continuously check if someone notifies the host when visitors arrive or if your visitors leave with active access cards.  

Why is this important?

With your time and efficiency in mind, we’ve created an easy to use solution for visitors and deliveries that directly integrates with your Brivo Onair platform. Automate the sign-in experience for visitors while you control everything from the pages your visitors see to the reports that your admins generate.

How does Visitor Security work?

To enable Brivo Visitor, download the app on your office iPad and manage configuration directly in Brivo Onair.

 

3. Cut the cord and move to ASSA ABLOY wireless locks.

We are expanding our wireless lock integrations to include the ASSA ABLOY AperioTM line.

Why is this important?

Use Brivo Onair to control more doors with ASSA ABLOY wireless locks. Our integration spans the vast majority of common door opening types so you can achieve real-time monitoring and better control of the spaces you need to protect.

How does it work?

You can easily add ASSA ABLOY wireless locks to your space by mounting the lock to the door, installing the Aperio hub and configuring your system in ASSA ABLOY and Brivo Onair.

 

Learn More

By extending our capabilities to include more wireless locks brands, and launching new solutions like Brivo Visitor and Brivo Onair Cam, businesses that use Brivo can have better security at a more affordable cost. There are no easy answers for security, but the cloud is unlocking new capabilities to give our partners and end users more options, increased confidence and peace of mind to secure buildings around the world.

KEYWORDS: access control security breach server software smart home

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing