Preview

Argyle Security Case Study

Satisfactory Essays
Open Document
Open Document
756 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Argyle Security Case Study
Company Background:

Argyle Security Inc. is a detention and commercial security provider based out of San Antonio, TX. Established in 2005 originally as Argyle Security Acquisition Corporation, Argyle Security Inc. operates through five different business units ISI, MCS, PDI, Com-Tec, and MCS Fire & Security business units. In April 2008, the private equity firm MML Capital made a $15 million investment into Argyle Security. The company has since successfully positioned itself to take advantage of increasing domestic incarceration rates and the need to house and secure an ever growing number of inmates.

Segments

ISI

The ISI business segment primarily designs locks and detention equipment for prisons. Some of the products they design
…show more content…
MML purchased 18,750 shares of newly created Series A convertible preferred stock, with each share convertible into 100 shares of Argyle's common stock at $8.00 per share at MML's option. At the time, Argyle’s board of directors was composed of 14 members, but as a result of the deal, was reduced to seven members. Four of which were MML Capital professionals and the remaining three were previous Argyle board directors. Argyle president and COO Sam Youngblood said in a statement the investment “sends a clear message, especially to our customers, that we intend to maintain our position as an industry leader. While recognizing the challenging environment, we are determined to provide the exceptional service and project management expected by our …show more content…
purchased ISI Security Group Inc. in a cash and stock transaction. As part of the deal, ISI stockholders received $16.3 million in cash and 1.18 million shares of stock. Argyle also agreed to assume a $6 million line of debt from ISI. The total deal was valued roughly around $30 million. For the nine-month period ending Sept. 30, 2006, ISI generated $41.2 million in revenue and $4.1 million EBITDA. Giuliani Capital Advisors LLC, a New York investment banking firm advised Argyle Security throughout this deal.
Com-Tech, PDI, and FireQuest
In 2008, Argyle acquired three new companies for a total of $14 million, including transaction fees. Com-Tec was acquired in order to produce cost savings through Com-Tec’s lower-cost technology. Additionally, Com-Tec was expected to add $1.5 million in recurring revenues for Argyle. Pederson Detection (PDI) was acquired in hopes of to increasing margins through sourcing realignment. FireQuest was acquired with the aim of gaining synergies with the MCS- Commercial Industry.
Industry

You May Also Find These Documents Helpful

  • Good Essays

    It242 Week 2 (Oce) Voip

    • 760 Words
    • 4 Pages

    Dialogic is a Canadian business solutions company which conducted a case study regarding Oregon Corrections Enterprises’ (OCE). OCE is a correctional institute focused on rehabilitating prisoners by vocational training; meanwhile, it provides inmates with a work environment, which helps facilitate an inmate back into society. OCE’s decision to change from a TDM Hardware-based call center to a less expensive VoIP (Voice over Internet Protocol) solution has been extremely beneficial and has enabled OCE to not only save money, but expand its call center (where inmates work) without creating additional expenses. More importantly, the alternative also needed to uphold all of Oregon’s telecommunication compliances for prisons and inmates, CBX’s software have accomplished this need.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Gartenberg, M. (2005, January 13). How to develop an enterprise security policy. Retrieved from http://www.computerworld.com/article/2569303/security0/how-to-develop-an-enterprise-security-policy.html…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Thank you for your opinion and agreeing to implement the safeguard. I am surprised, besides Pat, Don and yourself did no get much of a traction.…

    • 118 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT 2580 Introduction To Information Security Teacher : Mr. Timothy Tacker Unit 10 Assignment 1 Examine Real-World Applications of Security Standards ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Subsidiary and Goods

    • 23346 Words
    • 94 Pages

    Edgar Co. acquired 60% of Stendall Co. on January 1, 2011. During 2011, Edgar made several sales of inventory to Stendall. The cost and selling price of the goods were $140,000 and $200,000, respectively. Stendall still owned one-fourth of the goods at the end of 2011. Consolidated cost of goods sold for 2011 was $2,140,000 because of a consolidating adjustment for intra-entity sales less the entire profit remaining in Stendall's ending inventory.…

    • 23346 Words
    • 94 Pages
    Powerful Essays
  • Powerful Essays

    Integrated Distributors Incorporated (IDI) will establish specific requirements for protecting information and information systems against unauthorised access. IDI will effectively communicate the need for information and information system access control.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Safeguarding Case Study

    • 378 Words
    • 2 Pages

    Therefore, it is Chris’s duty as a teaching assistant to follow the procedures regarding suspected abuse.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    I am working for a company called ICTIB and they have asked to do some research.…

    • 5708 Words
    • 23 Pages
    Better Essays
  • Good Essays

    Gap Analysis: Keefe Group

    • 332 Words
    • 2 Pages

    Through its companies ICSolutions, Keefe Commissary Network and Advanced Technologies Group, the company provides phones services to inmates and created a niche. From the initiation, Keefe Group had been committed to ensure inmates enjoy one of the most basic services of the outside world.…

    • 332 Words
    • 2 Pages
    Good Essays
  • Good Essays

    There are multiple vulnerabilities related to the Windows Exchange Servers that need to be address prior to establishing an enterprise security policy. Although all locations are capable of sending and receiving e-mail, they are very susceptible to attack from outside sources.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    What component of the overall security objective deserves the most attention in the environments mentioned in the article? What components would be less pertinent for these particular environments during a vulnerability assessment? Why?…

    • 570 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Colton Jones Inc.

    • 1331 Words
    • 4 Pages

    Under the U.S. GAAP Codification of Accounting Standards, Codification Topic 805: Business Combinations; Colton Jones accounted for the acquisition of Chempla as they should have. The acquisition method was used as it should have been, one entity was identified as the acquirer, an acquisition date was stated, and the recognition and measurement principals are present. All parts of the acquisition that needed to take place were present in the case.1…

    • 1331 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cisco Merger Strategy

    • 4595 Words
    • 19 Pages

    Acquiring other companies is an important strategy for Cisco to rapidly offer new products, reach new markets, and grow revenue. Since 1993, Cisco has acquired more than 120 companies, from small startups to large, wellestablished firms such as Linksys, Scientific Atlanta, and WebEx. Integrating the employees, products, services, operations, systems, and processes of acquired companies can be a daunting effort. With multiple acquisitions occurring each year, it became clear that Cisco could not approach the integration effort in an improvised manner, with different personnel and activities engaged each time. Instead, acquisition integration needed to become a standard way of doing business for Cisco employees. Cisco needed an integration approach that would be consistent across the company, repeatable for each new acquisition, and adaptable as Cisco began to acquire large companies with different operational parameters. “Cisco acquires only companies that will help to grow…

    • 4595 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Description of My Business:With our main focus being professionalism, reliability, officer safety and cutting-edge technology, we are leading providers of security and life safety solutions.Equipped with the technology, resources, expertise and experience needed to meet any challenge, our staff and field teams provide 24-hour remote and on-site client support every minute of every day.UL Listed and an approved vendor for the both the Americans with Disabilities Act (ADA) and the Drug Enforcement Administration (DEA). It has also received approved by the Factory Mutual Insurance Company is a Jewelers Mutual Insurance Company approved vendor.With outstanding service, up-to-the-minute security and safety solutions we make it as the top choices throughout the private and public sector.…

    • 1494 Words
    • 6 Pages
    Satisfactory Essays
  • Powerful Essays

    Case Study

    • 7851 Words
    • 32 Pages

    A ASSINGMENT REPORT ON “Case Study On Air Deccan” SESSION—2011-2013 Submitted To:- Submitted By:- SONIYA VISHWAKARMA AAKANKSHA KHATARE MBA(MM) 3rd SEMESTER SECTION-A INDEX:- * INTRODUCTION * ABOUT GOPINATH * VISSION AND MISSION * COMPETITORS * MERGER AND ACQUISITION * COMPANY PROFILE * COMPANY * LOW COST BUSINESS MODEL * TARGET MARKET AND POSITIONING * STP * STEPS BY AIR DECCAN * REVENUE OPTIMIZATION *…

    • 7851 Words
    • 32 Pages
    Powerful Essays