DIGITAL TRANSFORMATION & PHYSICAL SECURITY: A CALL TO ACTION
The physical security industry is extremely active right now, with an addressable market estimated at $124.9 billion for 2020 and growing to $232.5 billion by 2027. This growth reflects the increasing demand for security as traditional threats like terrorism and crime grow exponentially in terms of variety and technical sophistication. This trend is of course exacerbated by the global pandemic. However, as important as growth is that digital transformation and advancements in areas such as automation, artificial intelligence, cloud computing, and blockchain are all fundamentally transforming the sector and the way security companies do business.
Digital transformation involves the integration of digital technology from all areas of the enterprise into the security infrastructure. While digital transformation is exceptionally promising for the physical security industry today, the fact is not everyone will survive the journey. Significant portions of the industry are seriously lagging behind their more data-driven contemporaries. These companies risk becoming displaced and disrupting the entire security ecosystem.
The physical security industry was built upon precursors of digital transformation, which bodes well for a promising future.
Ironically, the security industry has been transformative for quite some time, stemming from early advancements in technologies that fundamentally changed its business long ago. IP-based cameras, for instance, were an early advent of the IOT sensor. Access control programs of yesterday constructed some of the world’s first physical-digital identities. Security central stations had for years monitored customers’ assets remotely and on a 24/7 basis. However, despite these advancements, the industry historically has not leveraged the gold mine of untapped data because it failed to think creatively, and instead opted to use products and data only for the purposes for which they were originally designed and failing to apply these solutions in unique ways to address more complex problems. A great example from the past would be only using CCTV cameras to solve a crime, but not using them for parking enforcement at the airport, as is so common today. The security industry years ago also rarely had the tools or skills in place to solve more diverse security problems, like using access control logs to proactively discover insider threats. To some degree, this failure had to do with architecture and purpose-built solutions as well as limitations of technology at the time.
[…] read more
About The McLean Group
For over 30 years, The McLean Group has been providing investment banking and financial services offerings focused on the Defense, Government & Intelligence (DGI), Security, Critical Infrastructure, Maritime, Facility Services, Unmanned Systems, and Public Safety markets. Our 60+ professionals bring deep industry experience and relentless execution to every client engagement. We provide solutions that blend financial creativity with operational expertise. Whether we are providing transaction advisory, valuation opinions, or growth capital, our services are unmatched in these core markets. Learn more at www.McLeanLLC.com.
RECENT NEWS
Revenue Looks Strong on Paper – But ASC 606 Compliance in Construction Tells a Different Story
Revenue looks strong on paper – but ASC 606 compliance in construction tells a different story. In this case study, The McLean Group’s Financial Consulting and Transaction Due Diligence teams walk through a real construction services engagement where a project-level ASC 606 review surfaced a pattern of revenue recognition issues that materially changed the earnings picture. We examine the KPIs that matter most, including cost-to-complete accuracy, change order approval rates, and over and under billing trends, and explain why ASC 606 compliance deserves the same rigor in diligence as working capital analysis or debt-like items. […]
Purchase Price Allocations Under ASC 805: What Every PE-Backed CFO and Deal Team Needs to Know
A purchase price allocation (PPA) is the first post-close workstream that directly affects reported EBITDA, lender covenant calculations, and eventual exit valuation for PE-backed acquirers. Under ASC 805, every acquisition requires the buyer to allocate the total purchase price to identifiable assets and liabilities at fair value — including intangibles that never appeared on the target’s balance sheet. For middle-market deals, identified intangibles commonly represent 30–60% of total consideration, and each carries its own valuation methodology, useful life assumption, and amortization consequence. The McLean Group’s Valuation Advisory team breaks down what every CFO, controller, and deal team needs to know about getting the allocation right the first time. […]
Q1 2026 Mergers & Acquisitions Market Update
The McLean Group’s Q1 2026 M&A Insider Report tracks deal activity across Defense & Government, Physical & Cyber Security, Critical Infrastructure, and Maritime. Q1 was the strongest quarter on record for Defense M&A with 104 closed transactions, headlined by Arcline’s $2.2B acquisition of Novaria Holdings and VSE Corporation’s $2.15B acquisition of Precision Aviation Group. Cyber Security saw $57B+ in transaction value led by Google’s $32B acquisition of Wiz and Palo Alto Networks’ $24.6B acquisition of CyberArk Software, with Cyber/Technology EBITDA multiples reaching 41.3x LTM. Critical Infrastructure closed 48 transactions including Constellation Energy’s $28.9B acquisition of Calpine, while Maritime rebounded to 24 transactions in Q1. The full report includes sector commentary, EBITDA valuation multiples, public company benchmarks, and representative transaction data for each sector.[…]










