How Are Customer Expectations Changing In The Physical Security Market?
Meeting a customer’s expectations is a key component of success for any business, including the physical security market. However, understanding customers’ expectations is a big challenge, which is made even more difficult because those expectations are a moving target. We asked this week’s Expert Panel Roundtable: How are customer expectations changing in the physical security market? Their wide-ranging answers highlight elements from technology expectations to adaptability to change.
End users of physical security equipment have become far better educated about the products and systems protecting their organization’s people and assets. Looking at other industries, they’ve seen the better performance, tighter integration and greater convenience IT-based products provide. Now they are demanding the same. This puts pressure on integrators and manufacturers to meet those demands. Customers want to make choices based on performance and price, not being forced into proprietary systems and they want to know their choices will easily integrate with existing systems. They want simplicity and convenience in their security function. They want a road map for consolidating disparate systems. That requires a sophisticated integrator to sort through the customer’s needs and produce one centrally managed control solution. Today’s security customers know what they want; but as technology changes, so will their demands. Smart integrators and manufacturers will find a way to meet them.
The physical security market has demonstrated significant advancements over the last 20 years. Technologies in network video, two-way audio capture and recognition, analytics, biometric identification and video management software have truly redefined situational awareness. The evolution of these technologies has also resulted in greater and metric-managed expectations from customers, resulting in a total, integrated solution. In the past, end users deployed video, audio and access control systems that were developed independently from each other. Today, customers want an integrated, end-to-end solution in which all systems can operate with fluid interoperability, be controlled through a master software system, and operate from one central location. This shift has resulted in greater collaboration among physical and virtual security suppliers as well as new, state-of-the-art products that simplify integration and enhance ease-of-use.
Customers are expecting more and more services that provide them with a secure environment and that can adapt to changes. This means there is an increasing interest in cloud-based solutions. When implementing these, however, the security of these solutions need to be considered. In line with the expectations for services, people expect that the same services can be implemented and used in their entire company, even around the globe. In this respect, we see an increasing demand for standardized procedures and standardized security solutions for companies that operate on a global scale.
Security consumers have come to expect technology that is “plug & play,” much in line with the smartphones and apps they use all the time. There is a definite assumption that these systems will be easy and intuitive to operate right out of the box. This is totally understandable. As security systems have become more complicated than ever before, it is even more important that the user interface is straightforward and allows the operator to make full use of the many important functions and features. While much of the security sector has embraced this user-friendly technology approach, unfortunately some players in the market are still struggling to understand the benefits for both customers and providers. As well as offering the market more powerful and easy-to-use solutions, these systems additionally provide a healthy and continuous revenue stream for savvy security providers.
Consumer tech is bleeding into business life; people expect to be able to use the same conveniences and innovations both personally and at work. They want to integrate new applications into their core business system as easily as downloading an iPhone app. A new groups of users include IT professionals, who have a different set of technical skills and expectations. The IT market has an established standard of preventive maintenance processes, support, backup, and upgrades. They are used to paying for Service Level Agreements (SLAs), expecting high reliability and performance levels. Physical Security customers used to be only be concerned about viewing and capturing the video. Now they are asking: What else can I do with this video? Can I count people/cars? What about slip and fall, or metadata associated with objects or people? Can the video be triggered by temperature changes? Can I visually measure the size of objects?
Customer expectations are continually evolving in the physical security market for one simple reason: They are starting to realize that “perimeter security” means so much more than just providing detection and monitoring capability along the physical perimeter of a structure. Detecting threats when they’re at the walls of your facility is too late. Whether you see the threat or not, damage will occur and losses ensue. Customers today are demanding more. They want the ability to detect threats and prepare an effective response before damage or intrusion can take place. One way they are becoming more successful is by detecting threat surveillance activity. Since most threats conduct extensive reconnaissance and surveillance of their intended target beforehand, learning to effectively detect surveillance-related activity early on allows customers to ward off the threat without taking on the losses.
How are customer expectations changing? In a word, rapidly. In the last few years, the expansion of big data, the Internet of Things (IoT), and cloud-based software has impacted customers’ expectations when interacting with physical security and technology in general. Customers want simplicity, flexibility, low maintenance, and choice. As customers’ access to information increases, so too does their knowledge of products, setting their expectations higher. Previous expectations of physical security were low. In the past, customers accepted panels, DVR recorders, and large proprietary systems. With customers’ access to information and the incorporation of new technologies into their personal life, they expect mobile access, friendly user interfaces and work flows, and simplicity in their security systems as well. As the convergence of access to information and technology drives more simplicity into customers’ lives, they will continue to expect that same experience in their professional lives.
According to Gallup, higher workplace engagement leads to 41 percent fewer safety incidents. With the growing globalisation of the workforce, employers expect to engage their workforce through mobile technology to protect employees wherever they are located. With the increasing borderless workforce, employers must overcome communication challenges to stay connected with employees to keep them safe. As workers become more dispersed, organizations should consider technology that enables two-way communication with any employee, at any time and in any location during an emergency.
Today’s customers are better educated about the industry’s technologies. They are more tech-savvy. They are accustomed to using personal electronics devices, and want similar attributes available in their security systems. They want integrated, end-to-end solutions that are plug-and-play. They want standardization, simplicity, flexibility and low-maintenance. They want to do more with less effort. In short, customer expectations in today’s security market are higher than ever. Only manufacturers and integrators with a thorough understand of those expectations have any hope of meeting them.
- Related links
- ISONAS Access control systems & kits
- ISONAS Access control software
- Milestone Video Surveillance software
- Nedap AEOS Video Surveillance software
- Nedap AEOS Access control software
- Nedap AEOS Access control systems & kits
- TDSi Access control software
- TDSi Access control systems & kits
- TDSi Video Surveillance software
- TDSi Intruder detectors
- Milestone Network Video Recorders (NVRs)
- TDSi Network Video Recorders (NVRs)
- Getting To Know Dan Grimm, VP And General Manager Of Computer Vision At RealNetworks
- Big Wins And The Importance Of Showing Up: Insights From SecurityInformed.com Editor Larry Anderson
- Setting Goals, Business Travels And Radioactivity: Success Secrets From Tiandy's John Van Den Elzen
- Getting To Know Jeff Burgess, President/CEO At BCDVideo
Delivering a Smart, Secure and Healthy Workplace with CloudDownload
Are Your Technology Providers Keeping You In The Dark?Download
Facing the Ever-evolving Hacker Head-onDownload
Capture New Opportunities With Computer Vision And Video AnalyticsDownload