SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Artificial intelligence (AI)
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

How does risk influence buying decisions for security?

8 Jun 2023

How does risk influence buying decisions for security?
Larry Anderson
Larry Anderson
8 Jun 2023

Editor Introduction

Risk is a core concept in the practice of physical security. However, the risk is not always assessed effectively. Ideally, an organisation's appetite for risk guides its security strategy and action planning to the minutest detail, including buying decisions for security equipment and systems. We asked this week's Expert Panel Roundtable: How does the concept of risk influence buying decisions in the security market?
 

Card image cap
John Davies TDSi

Risk should always be the central question when it comes to buying security! Before you look at the potential technology or the cost, understanding the risk factor for any project or installation is key.  Every location is different and faces a unique set of risks, so it is important to ensure you understand these before looking for the right solution. Once the risk factors have been properly assessed this should be at the forefront of the decision criteria, so you can properly consider the adoption of the best technologies and the choice of security providers.

Card image cap
Mark Roberts ACRE, LLC

In the physical security market, the concept of risk greatly influences buying decisions. Organisations invest in physical security measures when they perceive a higher level of risk or threat to their employees, infrastructure, or assets. However, relying solely on perceived risk may not be ideal as it may not accurately reflect the actual risk or threat level. Perceived risk is subjective and can be influenced by a number of factors. A buyer's perception of risk can be higher or lower than the actual risk level, resulting in an inefficient allocation of resources. To make informed decisions, security leaders should conduct a thorough risk assessment to identify the level of risk and potential threats. By considering objective factors such as the likelihood of threats and potential consequences of security breaches, buyers can make smarter investments in measures that are appropriate and proportional to the actual risk level. 

Card image cap
Rebecca Sherouse HiveWatch

At its core, taking a risk-based approach to buying decisions means that the security buyer understands the key exposures of the business, has quantified, and assessed the impact of those exposures, and has determined the operational or technical tools best equipped to mitigate against them. For example, there is minimal value in spending a significant budget on a complex travel intelligence and tracking tool at a company with 98% domestic travel to low-risk locations, whereas companies entering new, often volatile global markets will want to prioritise spending for that exact purpose. Organisations that recognise the importance of duty-of-care know that it is their obligation to mitigate against reasonably foreseeable risks, so buying decisions should be made aligned with those pre-determined and agreed-upon risks and not on tools or services that, while they may seem flashy or “standard” in the industry, do not actually address the specific needs of the business. Sophisticated buyers will first ask themselves “What is the likelihood and impact of this threat event occurring?” and prioritise their spending based on that conclusion. 

Card image cap
Chuck Randolph Ontic Technologies

Managing and mitigating risks to their business, employees, and executives is critical to a corporate security team’s role. Effective risk mitigation means teams constantly identify and analyse potential threats to their organisation and create and administer effective strategies to mitigate, avoid, transfer, or accept each risk. Because of this, security teams utilise technology solutions that can help to collect intelligence on potential threats to manage risks, increase efficiency, and better protect their organisation. It also means security teams must demonstrate their value and the multiplying effects that a technology-enhanced strategy brings (time, efficiency, reporting, prompter investigations, connected information, etc.) to mitigate business risks and improve decision support. The threat landscape is dynamic; technology assists security teams in mitigating risks to their organisation and is a tremendous factor in a buying decision. 

Card image cap
Sean Foley Interface Systems LLC

In the QSR (Quick Serve Restaurant) space we have seen an uptick in physical safety risks to employees and customers from harassment and violence. In certain urban environments, the risk becomes a wholesale inability to run the business. Major QSR brands can be located just steps away from mini-tent cities where drug use, violence, and general desperation bring panhandling, outbursts in dining rooms, and provocation in the drive-thru. Instead of focusing solely on the business, employees must police the premises. It’s not uncommon to see high turnover and employees refusing to show up to work. Some businesses have resorted to security guards, but costs can be prohibitive, and the service is not always reliable. Many QSRs are turning to virtual guard interactive remote video monitoring solutions. This can include tours to clear areas of vagrants, escorting employees to and from vehicles, and responding instantly to issues without waiting on police at a fraction of the cost. 

Card image cap
Kyle Hurt Genetec, Inc.

For years, the primary motivation for selecting a security system has been risk mitigation. While this still plays a significant role in the decision process, organisations are starting to see how security systems can be more than a risk mitigation tool. With the rise of data analytics, physical security systems are now being seen as more than just a tool to respond to threats or a necessary expense to keep assets and people safe. Physical security systems are becoming key to the digital transformation of organisational processes. Data from these systems can highlight pain points, streamline processes, and improve the guest experience. When this data is in one unified platform, it can be analysed more accurately so companies realise important cost savings and operational efficiencies. Now, security departments are not only mitigating risks, but they are also becoming central players in their organisations’ strategic planning. 

Card image cap
Corey Still Bell

To get the most out of limited security dollars and resources, companies must first identify their biggest risks. Those risks are often closely connected to the areas most critical to financial success (e.g., transaction systems or storage of critical intellectual property). If intellectual property is a key asset, solutions guarding against intrusion and detecting east-west traffic anomalies are critical. If processing high volumes of transactions is critical, then distributed denial-of-service (DDoS) protection and strong identity and access management will likely be prioritised. Of course, your biggest risks today might not be the same as the ones you will face tomorrow. As sectors and technologies evolve, businesses must constantly re-evaluate vulnerabilities and mitigation. Consider automobile manufacturers: They used to focus on securing transactions across the supply chain, but now each car is a moving point of presence that is vulnerable to attack and in need of protection. Understanding how your risk changes as sectors and technologies evolve is essential. 

Card image cap
William DeWitt Verkada Inc.

Buyers are constantly trying to balance risk mitigation and the cost of new or enhanced systems. Most often, risk and managing perceived risk is what drives buyers’ decisions; however, they often find themselves having to weigh the most pressing security threat to determine which systems to purchase given the overall cost. When budgets are tighter, security teams need to strategically pick what security systems to invest in. Cloud-based integrated security systems especially those that integrate multiple products and solutions into a single platform are increasingly becoming the go-to solutions for companies who are looking to do the most with the budgets available to them.

 

Card image cap
Dan Berg Salient Systems

The concept of risk plays a crucial role in buying decisions within the security market. Insecurity, the perceived or actual risk of harm or loss, drives organisations and individuals to invest in security measures to mitigate potential threats. Risk assessment is highly subjective on both the buyer's and seller's part, which is why risk management is so important. Buyers assess the risk landscape and consider their assets' value and vulnerability, such as property, data, and human safety. They then evaluate which security systems and solutions best meet their needs while within budget constraints. On the other hand, security vendors must consider risk when marketing their products and services. They need to understand their clients' priorities and concerns and use effective communication to explain how their solutions can mitigate risk and protect their assets. Overall, the concept of risk is a driving force within the security market, influencing buying decisions and shaping the industry's direction.

Card image cap
Adam Lowenstein i-PRO

Risk always drives buying decisions, but the concept of risk varies greatly depending on the business and experience of those involved in system design. As an example, for retail and restaurants, it’s common to want to install the cheapest system available, because it’s considered a checkbox expense. Security system installed. Risk mitigated. Check. But that short-sightedness can come back to haunt them should they need to protect themselves from a slip-and-fall lawsuit if the business is found liable. A cheap video system that lacks sufficient resolution to identify the persons involved won’t stand up in court. A higher-quality AI-based video surveillance system could pay for itself often if the event and the “inebriated” defendant are visible. It’s important for businesses to not just consider the classic after-hours risk, but also what happens when customers, parking lots, and common areas are busy with customers. 

Card image cap
Kayne McGladrey Hyperproof

The avoidance of risk is a primary theme in today’s complicated market. Companies are sending increasingly complicated vendor risk management questionnaires as part of the evaluation of security solutions. Unfortunately, these are often sent blindly by the purchaser without a thoughtful examination of the risks associated with how a given vendor will be storing, processing, or transmitting the organisation’s data. This behavior is converging with a buzzword bingo of requesting proof of third-party certifications like ISO 2700, SOC 2, and FedRAMP, but again, this is often treated as a check-the-box exercise. Smart organisations know how to consider the exposure of their data to a vendor as well as requesting copies of the auditor’s reports to effectively assess the risk of doing business qualitatively with a given vendor before starting contractual negotiations. 


Editor Summary

Determining risk is a basic strategy in the security market, but implementation can be more complicated, sometimes resembling a rickety approach to a moving target. Often, product features and a desire to be “cutting edge” can upstage a careful evaluation of risk when it comes to purchasing security equipment. Perceived risks may be very different from actual risks, and distinguishing the two is a tricky, but vitally necessary, challenge for security professionals.

  • Related links
  • Axis Communications CCTV software
  • Axis Communications Access control system accessories
  • Axis Communications Access control software
  • Genetec CCTV software
  • Genetec Access control software
  • Salient Systems CCTV software
  • TDSi Access control systems & kits
  • TDSi CCTV software
  • TDSi Access control system accessories
  • TDSi Access control software
  • Verkada CCTV software
  • Verkada Access control software
  • Verkada Access control system accessories
  • Axis Communications Access control readers
  • TDSi Access control readers
  • Verkada Access control readers
  • TDSi Access control cards/ tags/ fobs
  • Verkada Access control cards/ tags/ fobs
  • Related categories
  • CCTV software
  • Access control systems & kits
  • Access control system accessories
  • Access control software
  • Access control readers
  • Access control cards/ tags/ fobs
Related white papers
Elevating security through multi-sensing solutions and large-scale AI

Elevating security through multi-sensing solutions and large-scale AI

Download
The 4 pillars of AI in managing high-stakes critical events

The 4 pillars of AI in managing high-stakes critical events

Download
How biometrics are reshaping security in a connected world

How biometrics are reshaping security in a connected world

Download
Related articles
Suprema BioStation 3 sets global sales record

Suprema BioStation 3 sets global sales record

A landmark gathering shaping the future of real estate, investment, sustainability & design

A landmark gathering shaping the future of real estate, investment, sustainability & design

Leuze AI elevates optical sensor precision

Leuze AI elevates optical sensor precision

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Artificial intelligence (AI)
  4. News
  5. Round table discussions
About this page

Security experts from TDSi, ACRE, LLC, HiveWatch, Ontic, Interface Systems LLC, Genetec, Inc., Bell, Verkada Inc., Salient Systems, i-PRO, Hyperproof discuss "How does risk influence buying decisions for security?"

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec