SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 Sets Sales Record In Security Market
    • A Landmark Gathering Shaping The Future Of Real Estate, Investment, Sustainability & Design
    • IDIS Launches New AI PTZ Cameras With NIR Performance
    • Leuze AI Boosts Optical Distance Sensor Accuracy
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

How Does Risk Influence Buying Decisions For Security?

8 Jun 2023

How Does Risk Influence Buying Decisions For Security?
Larry Anderson
Larry Anderson
8 Jun 2023
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • Risk appetite crucially shapes security equipment and systems purchase decisions.
  • Ineffective risk assessment hinders optimizing security strategy and action planning.
  • Expert insights highlight risk's central role in the security market buying process.

Editor Introduction

Risk is a core concept in the practice of physical security. However, the risk is not always assessed effectively. Ideally, an organization's appetite for risk guides its security strategy and action planning to the minutest detail, including buying decisions for security equipment and systems. We asked this week's Expert Panel Roundtable: How does the concept of risk influence buying decisions in the security market?

Card image cap
John Davies TDSi

Risk should always be the central question when it comes to buying security! Before you look at the potential technology or the cost, understanding the risk factor for any project or installation is key.  Every location is different and faces a unique set of risks, so it is important to ensure you understand these before looking for the right solution. Once the risk factors have been properly assessed this should be at the forefront of the decision criteria, so you can properly consider the adoption of the best technologies and the choice of security providers. 

 

Card image cap
Mark Roberts ACRE, LLC

In the physical security market, the concept of risk greatly influences buying decisions. Organizations invest in physical security measures when they perceive a higher level of risk or threat to their employees, infrastructure, or assets. However, relying solely on perceived risk may not be ideal as it may not accurately reflect the actual risk or threat level. Perceived risk is subjective and can be influenced by a number of factors. A buyer's perception of risk can be higher or lower than the actual risk level, resulting in an inefficient allocation of resources. To make informed decisions, security leaders should conduct a thorough risk assessment to identify the level of risk and potential threats. By considering objective factors such as the likelihood of threats and potential consequences of security breaches, buyers can make smarter investments in measures that are appropriate and proportional to the actual risk level. 

Card image cap
Rebecca Sherouse HiveWatch

At its core, taking a risk-based approach to buying decisions means that the security buyer understands the key exposures of the business, has quantified, and assessed the impact of those exposures, and has determined the operational or technical tools best equipped to mitigate against them. For example, there is minimal value in spending a significant budget on a complex travel intelligence and tracking tool at a company with 98% domestic travel to low-risk locations, whereas companies entering new, often volatile global markets will want to prioritize spending for that exact purpose. Organizations that recognize the importance of duty-of-care know that it is their obligation to mitigate against reasonably foreseeable risks, so buying decisions should be made aligned with those pre-determined and agreed-upon risks and not on tools or services that, while they may seem flashy or “standard” in the industry, do not actually address the specific needs of the business. Sophisticated buyers will first ask themselves “What is the likelihood and impact of this threat event occurring?” and prioritize their spending based on that conclusion. 

Card image cap
Chuck Randolph Ontic Technologies

Managing and mitigating risks to their business, employees, and executives is critical to a corporate security team’s role. Effective risk mitigation means teams constantly identify and analyze potential threats to their organization and create and administer effective strategies to mitigate, avoid, transfer, or accept each risk. Because of this, security teams utilize technology solutions that can help to collect intelligence on potential threats to manage risks, increase efficiency, and better protect their organization. It also means security teams must demonstrate their value and the multiplying effects that a technology-enhanced strategy brings (time, efficiency, reporting, prompter investigations, connected information, etc.) to mitigate business risks and improve decision support. The threat landscape is dynamic; technology assists security teams in mitigating risks to their organization and is a tremendous factor in a buying decision. 

Card image cap
Sean Foley Interface Systems LLC

In the QSR (Quick Serve Restaurant) space we have seen an uptick in physical safety risks to employees and customers from harassment and violence. In certain urban environments, the risk becomes a wholesale inability to run the business. Major QSR brands can be located just steps away from mini-tent cities where drug use, violence, and general desperation bring panhandling, outbursts in dining rooms, and provocation in the drive-thru. Instead of focusing solely on the business, employees must police the premises. It’s not uncommon to see high turnover and employees refusing to show up to work. Some businesses have resorted to security guards, but costs can be prohibitive, and the service is not always reliable. Many QSRs are turning to virtual guard interactive remote video monitoring solutions. This can include tours to clear areas of vagrants, escorting employees to and from vehicles, and responding instantly to issues without waiting on police at a fraction of the cost. 

Card image cap
Kyle Hurt Genetec, Inc.

For years, the primary motivation for selecting a security system has been risk mitigation. While this still plays a significant role in the decision process, organizations are starting to see how security systems can be more than a risk mitigation tool. With the rise of data analytics, physical security systems are now seen as more than just a tool to respond to threats or a necessary expense to keep assets and people safe. Physical security systems are becoming key to the digital transformation of organizational processes. Data from these systems can highlight pain points, streamline processes, and improve the guest experience. When this data is in one unified platform, it can be analyzed more accurately so companies realize important cost savings and operational efficiencies. Now, security departments are not only mitigating risks, but they are also becoming central players in their organizations’ strategic planning. 

Card image cap
Corey Still Bell

To get the most out of limited security dollars and resources, companies must first identify their biggest risks. Those risks are often closely connected to the areas most critical to financial success (e.g., transaction systems or storage of critical intellectual property). If intellectual property is a key asset, solutions guarding against intrusion and detecting east-west traffic anomalies are critical. If processing high volumes of transactions is critical, then distributed denial-of-service (DDoS) protection and strong identity and access management will likely be prioritized. Of course, your biggest risks today might not be the same as the ones you will face tomorrow. As sectors and technologies evolve, businesses must constantly re-evaluate vulnerabilities and mitigation. Consider automobile manufacturers: They used to focus on securing transactions across the supply chain, but now each car is a moving point of presence that is vulnerable to attack and in need of protection. Understanding how your risk changes as sectors and technologies evolve is essential. 

Card image cap
William DeWitt Verkada Inc.

Buyers are constantly trying to balance risk mitigation and the cost of new or enhanced systems. Most often, risk and managing perceived risk is what drives buyers’ decisions; however, they often find themselves having to weigh the most pressing security threat to determine which systems to purchase given the overall cost. When budgets are tighter, security teams need to strategically pick what security systems to invest in. Cloud-based integrated security systems especially those that integrate multiple products and solutions into a single platform are increasingly becoming the go-to solutions for companies who are looking to do the most with the budgets available to them.

Card image cap
Dan Berg Salient Systems

The concept of risk plays a crucial role in buying decisions within the security market. Insecurity, the perceived or actual risk of harm or loss, drives organizations and individuals to invest in security measures to mitigate potential threats. Risk assessment is highly subjective on both the buyer's and seller's part, which is why risk management is so important. Buyers assess the risk landscape and consider their assets' value and vulnerability, such as property, data, and human safety. They then evaluate which security systems and solutions best meet their needs while within budget constraints. On the other hand, security vendors must consider risk when marketing their products and services. They need to understand their clients' priorities and concerns and use effective communication to explain how their solutions can mitigate risk and protect their assets. Overall, the concept of risk is a driving force within the security market, influencing buying decisions and shaping the industry's direction.

Card image cap
Adam Lowenstein i-PRO

Risk always drives buying decisions, but the concept of risk varies greatly depending on the business and experience of those involved in system design. As an example, for retail and restaurants, it’s common to want to install the cheapest system available, because it’s considered a checkbox expense. Security system installed. Risk mitigated. Check. But that short-sightedness can come back to haunt them should they need to protect themselves from something like a slip-and-fall lawsuit if the business is found liable. A cheap video system that lacks sufficient resolution to identify the persons involved won’t stand up in court. A higher-quality AI-based video surveillance system could pay for itself many times over if the event and the “inebriated” defendant are clearly visible. It’s important for businesses to not just consider the classic after-hours risk, but also what happens when customers, parking lots, and common areas are busy with customers. 

Card image cap
Kayne McGladrey Hyperproof

The avoidance of risk is a primary theme in today’s complicated market. Companies are sending increasingly complicated vendor risk management questionnaires as part of the evaluation of security solutions. Unfortunately, these are often sent blindly by the purchaser without a thoughtful examination of the risks associated with how a given vendor will be storing, processing, or transmitting the organization’s data. This behavior is converging with a buzzword bingo of requesting proof of third-party certifications like ISO 2700, SOC 2, and FedRAMP, but again, this is often treated as a check-the-box exercise. Smart organizations know how to consider the exposure of their data to a vendor as well as requesting copies of the auditor’s reports to effectively assess the risk of doing business qualitatively with a given vendor before starting contractual negotiations. 


Editor Summary

Determining risk is a basic strategy in the security market, but implementation can be more complicated, sometimes resembling a rickety approach to a moving target. Often, product features and a desire to be “cutting edge” can upstage a careful evaluation of risk when it comes to purchasing security equipment. Perceived risks may be very different from actual risks, and distinguishing the two is a tricky, but vitally necessary, challenge for security professionals.

  • Related links
  • Axis Communications Access control software
  • Axis Communications Video Surveillance software
  • Axis Communications Access control accessories
  • Genetec Access control software
  • Genetec Video Surveillance software
  • Salient Systems Video Surveillance software
  • TDSi Access control accessories
  • TDSi Access control software
  • TDSi Access control systems & kits
  • TDSi Video Surveillance software
  • Verkada Video Surveillance software
  • Verkada Access control software
  • Verkada Access control accessories
  • Axis Communications Access control readers
  • TDSi Access control readers
  • Verkada Access control readers
  • TDSi Access control cards/ tags/ fobs
  • Verkada Access control cards/ tags/ fobs
  • Related categories
  • Access control systems & kits
  • Access control accessories
  • Access control software
  • Video Surveillance software
  • Access control readers
  • Access control cards/ tags/ fobs
Related white papers
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Open Credential Standards And The Impact On Physical Access Control

Open Credential Standards And The Impact On Physical Access Control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
Interface Systems: 2026 Retail Security Trends

Interface Systems: 2026 Retail Security Trends

Why Open Matters In The Age Of AI

Why Open Matters In The Age Of AI

Verkada AI Tech Reshapes Enterprise Security Industry

Verkada AI Tech Reshapes Enterprise Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Round table discussions
About this page

Security experts from TDSi, ACRE, LLC, HiveWatch, Ontic, Interface Systems LLC, Genetec, Inc., Bell, Verkada Inc., Salient Systems, i-PRO, Hyperproof discuss "How Does Risk Influence Buying Decisions For Security?"

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec