Blake Kozak
Blake Kozak
Principal Analyst, IHS IncBlake Kozak is a Principal Analyst with the Security and Building Technologies group within IHS. Since joining IHS in 2008, he has authored market reports on intruder alarms, electronic physical access control, access control as a service (ACaaS), perimeter security and residential security. Blake is a regular voice in the industry, presenting at industry events around the world. Before joining IHS, Blake helped oversee Ohio University’s access control system and interned with a U.S. Congressional leader in order to conduct research on healthcare and other initiatives. Blake earned his B.A. – Phi Beta Kappa – in public policy from Ohio University.
Articles by Blake Kozak
The smart home market has seen significant growth since 2010. Specifically, less than 0.5% of homes in the American region had connected home devices such as thermostats, lighting, security and entert...
News mentions
Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees,...
Summary Date: Tuesday, September 20, 2016 Time: 10:00am PT / 1:00pm ET / 5:00pm UTC Duration: 45 minutes + Q&A What's the webinar about? Mobile credentials...
Everything about wireless access control makes life easier for those who install and operate it A lot of market data crosses my desk at ASSA ABLOY. Sometimes it can be hard to spot...
(see bigger image) Access control market in Brazil is forecast to decline by 1.2% in 2015 and decline by another 0.8% in 2016 before growth returns in 2017 Blake Kozak, Princip...
A U.S. economic forecast of 2.3 percent growth in real gross domestic product (GDP) bodes well for security businesses to thrive in a healthy economy in 2014. The Conference Board&...
Key people from IHS Inc
Security experts
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
