SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Cloud security
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Are End Users Willing To Be ‘Locked In’ To A Single Manufacturer?

26 Apr 2022

Are End Users Willing To Be ‘Locked In’ To A Single Manufacturer?
Larry Anderson
Larry Anderson
26 Apr 2022
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • End-to-end security solutions increase user willingness for 'lock-in' with single manufacturers.
  • Open systems offer flexibility, while end-to-end solutions maintain significant market popularity.
  • Expert Panel discusses end-users' willingness and market role of manufacturer 'lock-in'.

Editor Introduction

It’s a debate almost as old as the security industry itself: open systems versus end-to-end solutions. The argument goes that end-to-end solutions from a single manufacturer tend to “lock in” an end-user to a certain company’s technology platform. In contrast, open systems offer greater flexibility over the long haul. However, the popularity of end-to-end solutions suggests a healthy continuing market for these systems. We asked this week’s Expert Panel Roundtable: How willing are end-users to be “locked-in” to a single manufacturer’s system? What role do such systems play in the market?


Card image cap
Rebecca Wormleighton Zendelity

How willing depends on what matters most to the buyer. With enterprise solutions, a buyer has two choices. They can either buy from a single vendor who provides an end-to-end solution, or they can go best in class and build a custom solution by integrating the best technology from each category of the end-to-end solution. With a single vendor, the buyer has a “single throat to choke” if something goes wrong and a faster response time. But because the vendor’s R&D resources can only go so far, the product is not as feature-rich as compared to the leader in the segment. On the flip side, integrating solutions from multiple vendors creates a more feature-rich solution but it's more expensive due to the development resources required. The role of single manufacturer solutions is to make the technology accessible to the masses, whereas multi-vendor solutions deliver innovation because they invest deeply in a specific area.

Card image cap
John Davies TDSi

Interestingly there are plenty of “buyer beware” messages out there in the marketplace regarding locked-in systems, but some buyers still choose them despite the fact they may not be best-of-breed or capable across all the silos of the security spectrum. For some security customers, buying all your security systems from one supplier ensures it all works together seamlessly and there is one point of contact should problems arise. For some buyers that are time-poor or technically less well-versed, this may be an advantage. However, anyone who delves a bit deeper will understand that with modern well-integrated systems, there is no need to “make do” with being locked in anymore. Many good quality security systems will easily integrate (especially with the assistance of a good integrator/installer) so there are big advantages to taking this “mix and match” approach to finding the ideal combination of performance and cost.

Card image cap
Francis Lachance Genetec, Inc.

While it might be tempting to go with the perceived lower upfront costs of subscription-based closed/proprietary systems, focusing on the short-term by investing in closed solutions can throw a wrench in a business’s operations. When an organization’s needs outgrow their physical security system or when they want to use their existing investments to expand their operations beyond security, they’re either forced to accept the closed system’s limitations or replace their entire system. An open platform, unified security solution can help end-users achieve greater long-term value and choose the devices and systems that fit their unique needs while presenting them together in a unified fashion. With a unified platform customers can adopt new technologies and hardware as their business and security needs change. All systems are managed from a common infrastructure, making system functionality consistent across all tasks.

Card image cap
Kami Dukes AMAG Technology, Inc.

When security systems came to market in the 1980s, end users expected a complete solution. The early access control manufacturers did just that by providing simple software, panels, and readers. Fast forward to 2022, and end users’ expectations are no different. They expect a complete solution, too. The difference between then and now is how we get to the complete solution. It spans well beyond simple access control. The total solution involves effortlessly weaving multiple security technologies into various business systems and workplace cultures. To do this, systems must be developed with open-architecture hardware and software, meaning multiple applications can communicate with any part of the system. End users are not willing to be “locked” into a single system at all. The conversation shifts away from technology and is about service and support. A manufacturer that makes its components provides trusting product control, and reliable solutions, and alleviates the risks associated with those relying on third-party components.    

Card image cap
Sean Foley Interface Systems LLC

End-users always leap when investing in a certain manufacturer's system. The larger the enterprise, the bigger the effort and the more embedded a system becomes in the day-to-day activities of the organization. Leadership must proceed with caution, conducting significant vetting in the selection process. Some end-users have learned the hard way to avoid proprietary systems, especially those that are incompatible with common equipment or will not operate without the payment of high recurring monthly fees. For video solutions, a lower upfront Capex may look attractive, but when it is time to make a change, buyers can find themselves in a situation where they have a system that doesn't play well with others. Failure to pay the high monthly fees results in cameras that won’t work with any other system. Being locked in can mean a complete rip-and-replace is required if a system doesn’t continue to meet an organization's requirements.

Card image cap
Dan Berg Salient Systems

In the past, end-users were more willing to be locked into a proprietary system. Looking back to 20-or-so years ago, major solutions were only compatible with their software and hardware and nothing else. As video surveillance has moved into the IT space, it has become more open-platform allowing organizations to choose what works best for their needs and budget. Servers, switches, cameras, software, and routers all need to work together, and the key to that is standards. ONVIF is a good example of a standards group that is facilitating this. Cameras and software that conform to those standards can be used interchangeably and easily upgraded with the latest technology. When integrators opt for a proprietary system, the end-user is stuck with that. However, if they had gone with a standard open platform, to begin with, they could easily replace faulty software, cameras, or servers and not be stuck with a solution that cannot be adapted or upgraded.

Card image cap
Bill Hobbs 3xLOGIC, Inc.

Every technology seems to follow roughly the same curve from birth to maturity. Along the way, adoption is driven by how non-proprietary the technology becomes. Early adopters may find themselves locked in because competitors are unable to keep up and/or technology developers leap-frog each other. However, technology eventually becomes more of a commodity, which is the result of developing competing but similar advancements. The point where the proprietary nature of a product intersects with the period where the cost/benefit of the technology is still fresh enough to remain desirable is the sweet spot for end users. The dilemma of competing attitudes leads to what we call the Proprietary Trap. Early adopters run the risk of being locked into a proprietary solution that falls out of favor. When this happens, end-users face the prospect of a “forklift upgrade.” As interoperability improves, end users are less likely to adopt a proprietary solution.


Editor Summary

As one panelist noted, the growing popularity of subscription-based closed/proprietary systems is the latest wrinkle in the debate between proprietary and open systems. In the end, the tradeoff of such systems is clear. Should an end-user trust a single company to provide an entire system, knowing that the approach could limit their options as the system needs to change in the future? Is it worth the additional integration costs and hassle of incorporating “best-of-breed” components from multiple manufacturers? Is the simplicity of dealing with a single manufacturer worth the possible downside? One end-user might be perfectly comfortable expecting that a well-suited system installed today could continue to deliver results for years to come. Another might need more flexibility to adapt their security systems to a growing or changing enterprise. In the end, it comes down to customer preference.  

  • Related links
  • AMAG Video Surveillance software
  • AMAG Access control software
  • Genetec Video Surveillance software
  • Genetec Access control software
  • Salient Systems Video Surveillance software
  • TDSi Access control software
  • TDSi Video Surveillance software
  • TDSi Surveillance cameras
  • Genetec IP cameras
  • TDSi IP cameras
  • Related categories
  • Surveillance cameras
  • Video Surveillance software
  • Access control software
  • IP cameras
Related white papers
Milestone Cloud Deployment Guide

Milestone Cloud Deployment Guide

Download
Maximizing Enterprise Security Systems In The Cloud

Maximizing Enterprise Security Systems In The Cloud

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
Related articles
Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

Abnormal AI Leads 2025 Gartner Magic Quadrant For Security

DigiCert's 2026 Security Predictions: AI & Quantum

DigiCert's 2026 Security Predictions: AI & Quantum

Zimperium's ClayRat Spyware: New Android Threats

Zimperium's ClayRat Spyware: New Android Threats

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cloud security
  4. News
  5. Round table discussions
About this page

Boost security systems' efficiency with multi-manufacturer integration, achieving seamless interoperability for optimal protection.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec