The Will-Burt Company Acquires Two Diebold Business Lines

The acquisition brings the Will-Burt name to security filing cabinet and LINX access control business lines from Diebold, Inc.

The Will-Burt Company has acquired two security solution business lines from Diebold, Incorporated. Included in the transaction are Diebold’s GSA-approved security filing cabinet and vault door business and its LINX Security Solutions business.

Will-Burt has been manufacturing GSA-approved security filing cabinets and vault doors under the Diebold and Mosler names since 1996. With the acquisition, Will-Burt will begin selling these products under its own name.

“We have a long history building security cabinets and vault doors for Diebold,” said Jeff Evans, Will-Burt’s president, CEO and chairman. “It is a business we know well. We look forward to selling this same product under the Will-Burt name, while maintaining the same high-quality production standards these products have enjoyed for nearly 17 years with Will-Burt.”

Will-Burt has also acquired Diebold’s LINX access control business line. Included is LINX GateMaster, designed to manage the entry of vehicles and pedestrians onto a base or other campus setting. GateMaster is a complete, automated gate entry solution that fully integrates devices and data to provide positive identification of entering personnel and visitors, verification of vehicles and automated detection and prevention of unauthorized entry attempts.

Also included is LINX Predator Elite. The Predator Elite security solution features a truly integrated, multi-tasking, centralized system for access control and intrusion detection. Its modular design can integrate many technologies, such as CCTV, DVR, access control and intrusion detection, into a single, easily managed system. It is the only integrated security solution certified for installation at U.S. Air Force nuclear weapon storage sites.

Featured

  • Live From ISC West 2023 Preview

    ISC West 2023 is right around the corner! This year’s trade show is scheduled from March 28–31 at the Venetian Expo in Las Vegas, Nevada. The Campus Security & Life Safety and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Read Now

    • Industry Events
    • ISC West
  • A Break from Routine

    It was three years ago right about now that COVID was bringing the world to its knees. In mid-March of 2020, the president put travel restrictions on all flights in and out of Europe, the NBA suspended its season, and Tom Hanks announced that he’d tested positive for the disease—all in the same night. It was officially a national emergency two days later. Read Now

    • Industry Events
    • ISC West
  • Until We Meet Again

    A short three years ago we were all pondering whether to attend any tradeshows all thanks to COVID-19. Sorry to bring that nightmare up again, but it seems that little pandemic is in the rear-view mirror, and it’s time to meet again. Read Now

    • ISC West
  • Cyber Hygiene: What it Looks Like for IoT Devices

    Cyber Hygiene: What it Looks Like for IoT Devices

    For our second pillar about the Industrial Internet of Things (IIoT) Pillars of Security, we are going to discuss what cyber hygiene looks like for IoT devices. Read Now

Featured Cybersecurity

New Products

  • Dahua 2-Wire IP Video Intercom System

    Dahua 2-Wire IP Video Intercom System

    Dahua Technology is introducing a new line of expandable 2-wire IP video intercom solutions for the North America market. The New 2-wire IP video intercom is more advanced, cost effective, and designed to help businesses increase their security. 3

  • SecureAuth

    SecureAuth

    The acceleration of digital transformation initiatives as a result of COVID-19 has created a lasting impact on how businesses empower their workforce and engage customers. 3

  • SAFR® from RealNetworks

    SAFR® from RealNetworks

    A unique feature in SAFR version 3.4 is its ability to automate alerts to security personnel when a spoofing attempt or a fraudulent attempt to gain access is detected. 3