NEW INVESTMENT: Grove announced a $10 million investment from Volition Capital (“Volition”), a leading growth equity firm that notably was a large investor in Chewy.  Read More

NEW INVESTMENT: Volition Capital Invests $25M in hackajob  Read More

VOLITION NEWS: Volition Capital Named Top 25 Growth Equity Firm  Read More

ANALYSIS: Rule of 40 Index: Year in Review  Read More

VOLITION UPDATE: Volition Capital Announces Closing of Volition Capital Fund V, L.P. with $675M in Capital Commitments  Read More

NEW INVESTMENT: Zenarate AI Coach Transforming How Agents Learn and Perform through AI Simulation Training  Read More

WHY WE INVESTED IN ZENARATE: Why Volition Invested in Zenarate  Read More



ISC West 2023 Preview

What I Am Looking For at ISC West 2023:

When it comes to companies’ security strategies of tomorrow, one key component is becoming more and more clear: physical security and cyber security processes are converging.

From a physical security perspective, the modern world has presented increased demand for solutions to previously less relevant threats. These more complex threats have led to cyber solutions as a compliment to physical security become increasingly common. However, as technology has continued to advance, it is becoming clear that a proper security protocol does not only have cyber solutions as a compliment to physical security, but rather as a core component – hence, the convergence.

Specifically, a Gartner Physical Security survey shared that 41% of enterprises aim to converge aspects of their cyber and physical security processes by 2025 – a sharp increase from the 10% figure in 2020.

One area that exemplifies the convergence of these components of security well is the converging solutions needed around identity management. How hard is it to envision a world where employees will want to use smartphones and smartwatches instead of key cards? How many already are?

There will also be solutions necessary that come along with managing a workforce that uses both legacy and tech empowered solutions. And finally, think about the centralized cyber infrastructure that will need to be deployed to track, predict, and respond to not only identity management solutions but security solutions company wide.  

Not only will companies need to be focused on creating these solutions, but also the successful ones will need to have the impacts of these changes on their customers in mind. Let’s just say that learning and following new security standards are not employees’ favorite thing to do. Ensuring that the rollout of new processes is seamless, troubleshooted beforehand, and are customer first will be critical. 


Sinjon Goldberg


Sinjon Goldberg