Protect America

Protect America is a home security company based in Austin, Texas.

Protect America
Private
IndustryHome security
Founded1992 in Austin, Texas
Headquarters
Area served
  • United States
  • Canada
Key people
  • Scott Fleming (CEO)
  • Janet Laird (COO)
  • Jared Miller (CFO)
  • Blain Vasek (CTO)
  • Brian Carter (VP)
  • Steve Jones (VP)
  • Ryan Pombrio (VP)
  • Rylan Francis (VP)
  • Aaron Wells (VP)
Websiteprotectamerica.com

Company history

The company was founded in 1992 by Thad Paschall in Austin, Texas—where it continues to be headquartered.[1] By 2001, the company had installed about 200,000 security systems.[2] In 2010 the company was purchased by Rockbridge Growth Equity LLC from Falcon Investments under advisement from Imperial Capital. The total cost of the company was about $100 million.[1][3] The company was ranked among SDM Magazine’s top 15 U.S. security system providers as of 2014.[4] In 2012 Protect America expanded into Canada, and had about 400,000 customers.[5] In 2013 the company had 390 employees, adding 67 jobs that year, the 13th most that year in the state of Texas according to Inc. Magazine.[6] Protect America also provides public security system advice on US television networks.[7][8]

Security systems

In 2005, the company produced the first monitored self-installed security system business model.[5] The company also offers mobile apps that allow customers to interact with their home security systems while away from their residences,[9] called the SMART connect app.[8] Security packages are offered at different pricing, in both hardline and cellular models.[10]

Philanthropy

Protect America has teamed with universities such as Michigan State University and the University of South Alabama to help students provide aid to local area charities.[11] It has also partnered directly with the Austin Police Department, providing financing for police initiatives,[12][13][14] including the updating of their security equipment.[15][16]

gollark: You know potatOS?
gollark: I actually deal with this a decent bit for potatOS exploits.
gollark: You don't have to. Just look at the IO.
gollark: Not that I'm particularly *good* at reverse engineering, but I can write... the windows equivalent of LD_PRELOAD things eventually maybe.
gollark: If I was being evil, I could just... windows equivalent of strace... your program, see that it looks for hardware IDs or something, and spoof that, without ever seeing the code.

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.