Is The Security Industry Shifting Toward End-to-end Solutions?
Editor Introduction
Products are the building blocks of systems and solutions. How those products are combined, and where the integration happens, is a variable in the physical security market. Before the advent of open systems, a single manufacturer typically combined his own products, using proprietary connections, into end-to-end solutions for customers. Open systems undermined that paradigm to some degree and made it possible for customers to pick and choose products from multiple manufacturers to be integrated into a solution. Lately, the pendulum has again swung toward “system solutions,” or end-to-end systems provided by a single manufacturer … Or has it? We asked this week’s Expert Panel Roundtable: Is the industry shifting from a focus on products to emphasizing end-to-end solutions? How is that a good (or bad) thing?
For years, the security industry has successfully provided end users with security products such as cameras, ID cards, and electronic door locks. Increasingly, security end users want more than products: they want solutions, and the security industry is changing to respond to that need. The difference is important. For complex security problems, the solution almost always requires more than one product, usually from more than one manufacturer, and likely services too. A handful of products – camera, cables, and monitor – can provide basic video monitoring. Today, a security solution combines these on a flexible and scalable platform with a video management system (VMS) that delivers situational awareness to accurately detect abnormal behaviors and trigger alerts. Unlike products, solutions can help investigate incidents and possibly even end potentially dangerous situations before they cause harm. Manufacturers and integrators that provide solutions will foster lasting relationships and help to mitigate risk.
The industry is moving towards end-to-end solutions as customers want a full solution and don’t want to worry about the specifics that drive it. There is no reason why this should be a bad thing for the security industry, but it does mean that we sometimes need to “think outside the box” to offer exactly what customers want. This will undoubtedly involve embracing true open protocol systems, which have rapidly become an industry must-have as they give real choice to customers. Card-to-phone credentials have also become popular, and people are far more aware of the benefits of data mining to drive economies. The general move towards IoT will undoubtedly encourage even greater usage of data mining and ultimately, security systems will just be seen as part of the whole technology ecosystem. Customers will simply want these solutions to be reliable and to work efficiently.
Many low-cost manufacturers have entered the physical security market in recent years. To combat price pressure and to ensure end-users get the most out of their investments, systems integrators have indeed shifted to an emphasis on solutions. Manufacturers have reacted by either building their own end-to-end solutions or growing their community of partners to address the need through best-of-breed options. While the total solution should be the focus of any installation, there is risk in deploying a complete end-to-end solution from a single manufacturer as you may not be leveraging the best technology for each functional requirement. In addition, tackling a full solution as a single project adds complexity and introduces installation challenges which can ultimately lead to issues with customer satisfaction. It is always my recommendation to implement and tune your core technologies first; once proven stable, continue by adding best-of-breed products that leverage and complement the core technologies.
The industry is in a state of evolution as the shift to end-to-end solutions is becoming more popular, specifically within small- and medium-sized systems that prefer openness. IP began in the enterprise and as the market matured, it made its way to small and medium businesses as they also want flexibility, better image quality, etc. and for those systems it is more important to have an end-to-end solution that is easy to sell, easy to install, and easy to use. However, in enterprise systems the best of breed, open system is still preferred by most end customers and integrators.
Editor Summary
Customers buy end-to-end systems, not individual products. Or even more to the point, they buy solutions to their problems, not technology. But what is the most cost-effective and efficient means of providing an end-to-end solution? Should it be integrated at the manufacturer level or by an integrator and based on open systems? Our Expert Panel Roundtable offers several views on the subject, all focused on the need to provide customers with exactly the systems they need. Does the best solution come pre-packaged from a manufacturer or should it be assembled by an integrator using best-in-breed solutions? The answer may depend on the market or even the individual customer. In our large industry with its range of use cases and technology approaches, it seems both options will remain in play for the foreseeable future. Choice is a good thing.
- Related companies
- Axis Communications
- Milestone Systems
- Pelco, Inc
- TDSi
- Seagate Technology
- Related links
- Axis Communications Access control software
- Axis Communications Video Surveillance software
- Milestone Video Surveillance software
- Pelco Video Surveillance software
- TDSi Access control software
- TDSi Video Surveillance software
- Axis Communications IP cameras
- Pelco IP cameras
- TDSi Electronic lock systems
- TDSi IP cameras
- Pelco Security Monitors
- TDSi Access control cards/ tags/ fobs
- Axis Communications Storage
- Seagate Storage
- View all news from
- Axis Communications
- Milestone Systems
- Pelco, Inc
- TDSi
- Seagate Technology
Expert commentary
Security beat
Security bytes
- Getting To Know Dan Grimm, VP And General Manager Of Computer Vision At RealNetworks
- Big Wins And The Importance Of Showing Up: Insights From SecurityInformed.com Editor Larry Anderson
- Setting Goals, Business Travels And Radioactivity: Success Secrets From Tiandy's John Van Den Elzen
- Getting To Know Jeff Burgess, President/CEO At BCDVideo
Healthcare security articles
Milestone Systems, a global pioneer in video technology, is at the forefront of the video security industry, emphasizing responsible technology innovation across its operations. The company will host...
Just like fighting against the spread of disease in a clinical environment, healthcare providers must mobilize, coordinate with interconnected partners, and apply sufficient budgetary resources to com...
VIPRE Security Group, a global pioneer and award-winning cybersecurity, privacy, and data protection company, released its Q1 2024 Email Threat Trends report, based on an analysis of 1.8 billion email...
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, demonstrated complete building security solutions at ISC West 2024 in Las Vegas. The company showcased its comprehen...
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, a...
ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2024 with in-person and di...
Next DLP, a pioneer in data loss prevention and insider threat solutions announced that their Reveal Platform is the first Insider Risk Management solution to automatically map detection events to MIT...
The Security Executive Council, with Rice University and MD Anderson Cancer Center, will facilitate a day and a half of expert-led sessions on workplace violence risk management for corporate security...
At Hannover Messe 2024, Siemens presents the first generative artificial intelligence (AI) product for engineering in an industrial environment. Siemens Industrial Copilot The Siemens Industrial Cop...
HID, the pioneer in trusted identity solutions, announces it has been positioned by Gartner® as a Pioneer in its 2024 Magic Quadrant for Indoor Location Services. The evaluation was based on speci...
Vismo will launch the latest version of its Locate & Protect App at the International Association for Healthcare Security and Safety (IAHSS) Annual Conference and Exhibition 2024, at booth #713, f...
ASSA ABLOY Opening Solutions will be exhibiting an expanded range of innovative products at booth #8061 during ISC West. With access and intrusion risks rising in schools, healthcare spaces, and worsh...
Cohesity, a pioneer in AI-powered data security and management, announced it is collaborating with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud. Leverage...
Identiv, Inc., a global digital security and identification pioneer in the Internet of Things (IoT), has entered into a definitive asset purchase agreement to sell its physical security, access card,...
Thailand’s pioneering fair for security and fire safety for commercial and industrial premises, announced at the press conference at Grand Hyatt Erawan Bangkok that the 2024 edition will return...
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadGunshot Detection
DownloadVerkada TD52 Cloud-Based Video Intercom
exacqVision IP08-64T-R1XW-E X-Series 1U Rdnt IP NVR 64TB RAID5 Windows OS with 8 IP Ent Lic
Climax Technology TouchPanel-3 7” Color Graphic Touchscreen Panel