SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Enhancing Physical Access Control Using A Self-Service Model
    Enhancing Physical Access Control Using A Self-Service Model
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Self-Service Access Control
  • AI special report
  • Cybersecurity special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Cybersecurity

Read now!

Should Marketers Seek To Leverage Violent Incidents?

Should Marketers Seek To Leverage Violent Incidents?
4 Oct 2016
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Security breaches increase demand for security technology among managers and institutions.
  • Violent incidents often drive businesses to consider investing in security systems.
  • Debate exists on leveraging violent incidents to boost sales of security products.

Editor Introduction

When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate into business for security companies of various types. But should security companies seek to capitalize on these opportunities? We asked this week’s Expert Panel Roundtable: Is it fair game for manufacturers or marketers to leverage recent violent incidents or terrorist attacks to promote sales of security systems or products? 


Card image cap
Greg Hamm Delta Scientific Corporation

If a product has the ability to hinder a terrorist incident, the type that security professionals dread, it only makes sense for the manufacturer to let the industry know. Here is a real life situation. On July 12, we announced that our portable barricades would be used at the upcoming GOP convention to stop terrorists from attacking those assembled with vehicles. Two days later, on July 14, a terrorist drove a truck through a crowd in Nice, France, and murdered 86 people. With Nice at the top of their minds and seeing the announcement about the Secret Service using Delta’s portable barriers to protect an event, we received many inquiries from people around the world who had never considered the problem of vehicles used as weapons.

Card image cap
Robert Lydic ISONAS, Inc.

As a security professional I want to provide products and solutions that minimize dangerous events from happening and mitigate risks to people, property, and information. I also realize that our products and services will never completely eliminate terrorist attacks. I personally find it deplorable and sickening when I hear manufacturers and integrators using fear-mongering techniques to sell products and services by using recent events. In the physical security space, we need to act ethically, sensitively and be socially responsible in marketing and selling. Security products minimize risks. They do not completely alleviate risks, and to pretend that our products would have holistically prevented a recent violent attack or incident is short-sighted and ethically wrong.

Card image cap
Steve Birkmeier Arteco Vision Systems (Arteco, Inc.)

The recent growth in violent attacks the world over is not something that manufacturers should ignore, but these events shouldn't be used as a marketing or promotional opportunity. The lesson to be learned in these incidents is not about how much we can analyze after the fact, but more about how certain indicators can be used to help prevent future incidents. Out of respect for the many families that have fallen victim to this type of violence, it is more prudent for security manufacturers to help eliminate threats proactively with new levels of intelligence about how these events occur and why.

Card image cap
Scott Sieracki Viscount Systems Inc.

Rather than leveraging major security incidents, manufacturers should focus on spotlighting trends that are gaining in frequency – not individual events. By identifying an uptick in certain threat tactics and methods, whether terrorist acts or cyber-attackers, vendors can be much more effective focusing on preventing future threats rather than fanning existing flames. For example, cybersecurity is a rapidly growing problem as all of our businesses migrate toward network-enabled devices, and the topic deserves all of our attention, but security manufacturers risk not looking toward future innovation if they fixate too much on the threats that have already occurred.

Card image cap
Matthew Kushner STANLEY Security

I would imagine there’s a group of folks who feel compelled to promote their products and services in a fashion related to recent terrorist attacks. I would propose to you that the majority of security professionals servicing our industry maintain a consistent commitment to providing the highest level of security services regardless of recent events. As security professionals, our mission and commitment should always be at the highest level regardless of what might be happening with respect to current events.


Editor Summary

It takes a delicate touch to ensure that companies and institutions that could benefit from security equipment get the information they need in the aftermath of an awareness-raising (often tragic) incident. Heaven forbid that a company be seen as trying to capitalize on tragedy! On the other hand, if solutions exist to prevent a future incident, shouldn’t that information be provided in a timely fashion (i.e., when awareness of a threat is heightened)? Still, our Expert Panel Roundtable responses reflect an awareness of the pitfalls, and the need to tread carefully.

  • Related links
  • ISONAS Access control systems & kits
  • Related categories
  • Surveillance cameras
  • Access control systems & kits
  • Intruder alarm system control panels & accessories
  • Barricades
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Leverage violent incidents: ethical marketing in security; exploring the balance between effective promotion and sensitivity.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Enhancing Physical Access Control Using A Self-Service Model
Enhancing Physical Access Control Using A Self-Service Model
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec