SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Veracity expands scope with acquisition of software provider icomply

Veracity expands scope with acquisition of software provider icomply
Veracity expands scope with acquisition of software provider icomply
Veracity expands scope with acquisition of software provider icomply
Veracity expands scope with acquisition of software provider icomply
Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Related Links
  • Tackling security market commoditisation with innovation
  • Veracity acquires software solution provider iComply for end-to-end security system integration

Veracity, the Scottish company specialising in IP video transmission, storage and display, has made a small but significant acquisition that has the potential to impact its business profoundly, according to the company. Known for its COLDSTORE surveillance storage system and other video products, Veracity is expanding its scope with the acquisition of I-Comply Ltd. (icomply), a provider of command-and-control software whose UK customer base includes universities, hospitals, cities and power and water utilities.  

Veracity and icomply have previously worked together on several projects, so the technologies are already integrated, and Veracity plans to leverage the acquisition to introduce a new command-and-control product line to the US market, likely to be announced around ISC West.

Icomply command-and-control software

Icomply’s product is a command-and-control software system (sometimes called a PSIM, or physical security information management system). Veracity plans to sell software based on icomply’s technology under the Veracity brand in the US market, but will keep the separate brands in the United Kingdom, where icomply is better known.

Icomply has existing integrations with many third-party systems from international brands, including major access control, video management, fire and alarm systems such as Bosch, Honeywell, Axis and Hanwha Techwin. Entering the US market, Veracity expects to add additional sales support and maintenance personnel, and a development team will expand integrations to third party systems that are more common to the US market. In addition to command-and-control functions, the software offers a suite of modules to provide functions such as key management, lone worker protection, mapping, and guard tour management. The configuration of the system to be introduced into the US market is still to be determined.

Potential growth

Icomply has about 20 employees, which will be added to Veracity’s 50 employees. The icomply team will remain, and will move into larger premises near Leeds (UK). At current sales levels, icomply will make up about 10 percent of Veracity’s revenue, but hopes are high for rapid growth. Alastair McLeod, group CEO of Veracity, says the small company has plenty of unrealised potential. He projects sales could double this year, and then double again in 2018 (admittedly from a small base) – and that doesn’t even count any potential sales in the United States.

“We know the engineers, and the
product has developed considerably
until it is now mature. The architecture
is quite elegant, which makes it easy
to add on modules.”

“We have worked with this company for some years, know them, have done projects with them,” says McLeod. “We know the engineers, and the product has developed considerably until it is now mature. The architecture is quite elegant, which makes it easy to add on modules.” The acquisition will provide icomply the needed cashflow and capitalisation to jump-start sales, and to deliver needed technical support and rapid response to customer requests, he adds.

Stability and longevity are important elements in the command-and-control systems market, notes McLeod: The systems are seen as a long-term investment that involves integrating various systems over a five- to 10-year period. “The backing of Veracity will make more customers comfortable moving to icomply,” McLeod notes.

The icomply acquisition also includes a subsidiary in India that will boost Veracity’s presence in that market. Technical resources in India will help Veracity grow in the lucrative Middle East market, just a short plane flight away, where the need for long video retention times are a great fit for Veracity’s existing video storage products.

Moving away from commoditisation

McLeod sees the acquisition as a reflection of the need for companies in the security industry to move away from commoditised products. It will expand Veracity’s presence from one of supplying components to the system to supplying complete integrated solutions. “With this acquisition, we are moving up-market in terms of being able to supply whole systems,” he says. “And it’s a category that cannot be easily commoditised. There is an element of customisation and services. We want to become a part of the market that has more stability and resistance to price cutting.”

“We want to control our own destiny,” McLeod says. “Our customers are asking us for a complete system – for everything to come from Veracity. They know the vagaries of buying bits from several companies – what if something doesn’t work? We can now approach customers that want an integrated solution.”

The all-cash acquisition was closed in December 2016.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • IP video surveillance
  • Security software
  • Integration software
  • IP transmission
  • Video surveillance
  • Related links
  • ADPRO CCTV software
  • Axis Communications CCTV software
  • Bosch CCTV software
  • Hanwha Vision CCTV software
  • Honeywell Security CCTV software
  • Axis Communications Video servers (IP transmission)
  • Axis Communications IP cameras
  • Bosch IP cameras
  • Bosch Video servers (IP transmission)
  • Hanwha Vision Video servers (IP transmission)
  • Hanwha Vision IP cameras
  • Honeywell Security Video servers (IP transmission)
  • Honeywell Security IP cameras
  • Veracity Video servers (IP transmission)
  • Xtralis Video servers (IP transmission)
  • Axis Communications Storage
  • Bosch Storage
  • Honeywell Security Storage
  • Veracity Storage
  • Network IP cameras
  • Related categories
  • CCTV software
  • IP cameras
  • Video servers (IP transmission)
  • Storage
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Security beat
About this page

Veracity acquires iComply to enhance security systems offering, combining expertise in IP video, integrated applications, and command solutions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec