About Steve

Steve Van Till, a trailblazer in the SaaS and physical security technology sector, is best known as the founder and CEO of Brivo. Steve has made a significant mark in the broader Proptech industry with a diverse skill set that extends beyond entrepreneurship to business and technology strategy, corporate finance, private equity, and strategic growth. As an author, engaging writer, and dynamic public speaker, he shares his in-depth insights on technology trends and their implications for business and the economy.

Steve's contributions have been recognized with numerous accolades and awards, a testament to his profound influence in the industry. These include induction into the SSI Security Industry Hall of Fame, recognition as an IFSEC Top Influencer in 2022, the Security Industry Association’s Lippert Award in 2019, the Jay Hauhn Excellence in Partnerships Award in 2017, and the ASIS International 2017 Book of the Year Award for his influential work, The Five Technological Forces Disrupting Security.

Steve's strategic foresight and commitment to advancing the field of physical security shine through his numerous patents and significant contributions to industry publications. His expertise spans various technology sectors, including physical security, web development, healthcare information, and satellite communications. His comprehensive understanding of SaaS, cloud technology, and emerging trends, combined with his business acumen and knack for innovation, have driven his successful leadership across multiple industries.

Guided by Steve’s vision, Brivo has been the undisputed first-mover in applying cloud, SaaS, and IoT technologies to commercial access control. Renowned for its innovative SaaS-based Proptech solutions and first-of-a-kind IoT devices, Brivo has experienced a consistent above-industry growth trajectory from inception to its current position as the world's largest commercial access control system.

Expertise

SaaS

CCTV & Surveillance

Strategic Planning

Product Management

Cloud Computing

Business Strategy

Marketing

Mergers & Acquisitions

Access
Control

Business Development

Security

Entrepreneurship

Awards

George Lippert Memorial Award

Issued by Security Industry Association November, 2019

Security Hall of Fame 2019

Issued by Security Sales & Integration March, 2019

Security Industry Book of the Year

Issued by ASIS International
September, 2018

Jay Hauhn Excellence in Partnership Award

Issued by Security Industry Association November, 2017

Top 25 Most Influential People in Security

Issued by Security Industry Association November, 2017

Patents

  • Issued: January 11, 2022

    Video still frames with highest facial detection scores are matched and displayed to a security operator console with identity indicia retrieved upon a credential submission event from a physical access control system. An apparatus couples a security operator console to a surveillance camera at a physical access control portal. A video clip containing a frame with highest facial detection score of all frames captured in propinquity to the time of credential submission, is matched to and displayed with the identity indicia. Credentials from a group of people entering together are presented to a security officer console along with video clips simultaneously containing a plurality of faces or perspectives which may be accepted en masse or in part. Time shifting still frames to reconcile with credential submission time stamps concentrates content in a display console. The apparatus retrieves and presents identity indicia in conjunction with a face in the selected frame.

  • Issued: March 24, 2015

    The present invention provides, in one aspect, a system and method for managing authentication tokens that operate across multiple types or physical resources binding the tokens to one or more external electronic Identity Providers; generating tokens; authenticating the tokens at multiple physical resources; managing access to physical resources by linking the tokens to the electronic identities; translating the tokens to the appropriate physical token type based on infrastructure services available at the point of service; validating tokens at the physical resource; tracking and conveying usage information; and making use of social group relationships and other data defined by individual usage to, among other things, simplify the process of granting user-generated credentials to persons connected to a given individual via the Identity Provider or an external social network, for example.

  • Issued: June 11, 2002

    In one embodiment of the present invention, a system for access to an unattended storage device is described. The system includes a first transmitter for placing an order for an item with a merchant; a second transmitter for transmitting a request for a pick-up of the item; a tracking information generator for generating tracking information in response to a request for a pick-up of the item; a transceiver for receiving and transmitting the tracking information; a memory for storing the tracking information; a third transmitter for transmitting the tracking information to a storage device a comparator for comparing the tracking information transmitted to the storage device to the tracking information stored in the memory; and a digital signature generator for creating a digital signature. In another embodiment of the present invention, a method of providing remote access to a storage device is described. The method includes the steps of transmitting tracking information to a storage device; and gaining access to an interior of the storage device if the tracking information transmitted to the storage device matches tracking information stored in a memory.