SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Are cybersecurity concerns slowing down the ‘race to the bottom?’

Are cybersecurity concerns slowing down the ‘race to the bottom?’
28 Jan 2019

Editor Introduction

Cybersecurity continues to be a major theme in the physical security industry, but effective cybersecurity comes at a cost. Higher cost is contrary to another major trend in the market: lower product pricing, which some have characterised as a ‘race to the bottom’. Chinese manufacturers, whose products tend to have lower prices, have been the target of cybersecurity concerns and even a government ban. So what is the overall impact of cybersecurity on pricing trends in video products? We asked this week’s Expert Panel Roundtable: Are cybersecurity concerns slowing down the ‘race to the bottom’ (i.e., the dominance of lower-cost cameras)?


Card image cap
Laurent Villeneuve Genetec, Inc.

People are now more aware than ever of the rising cybers threats and their unforgiving nature. With an increase in state-sponsored hacking and cyber warfare, it is becoming increasingly important to properly vet every product we install on our networks. Every year we have more proof points that cheaper solutions are very often less secure. That is because low-cost devices typically include fewer layers of protection and have more chance of including unsecure coding and potential exploits.

Organisations need to be diligent, and put more emphasis on cybersecurity, which will in turn slow down the race to the bottom. We recommend a defence-in-depth approach, which requires being constantly on the lookout as new threats arise. While that approach might mean purchasing higher-quality devices that cost a little more, it will result in a safer environment, and help avoid much greater costs and potential fines in the event of a breach.

Card image cap
Robert Beliles Pelco, Inc

In every industry, there is a segment of price-oriented suppliers and buyers that create downward pricing pressure. The physical security business is no different. However, there is a price for superior security that is both capital-based (well-designed and tested hardware and software) as well as operational-based (regular maintenance/monitoring, processes, etc.). Given that some well-publicised cybersecurity issues have driven the U.S. government’s vendor-specific ban on a handful of low-cost video surveillance manufacturers, customers and systems integrators are recognising the importance of cybersecurity more and more these days.

It is also forcing vendors to re-think their own policies and design choices. Over the next year or two, cybersecurity and the ban will become increasingly impactful (versus price) and will influence governments around the globe. The ‘race to the bottom’ will exist for pure commodity-oriented buyers. However, for a growing number of market segments, cybersecure robust products will take precedence over price.

Card image cap
Jamie Barnfield IDIS

Today more end users look to buy surveillance from a reputable brand that is at the vanguard of cybersecurity. Customers are looking for data and communication encryption from video capture to transfer, integrity of video evidence, RAID support, and enforced passwords together with two-factor authentication at a basic-level. They also want to see best practice embedded into training to mitigate against human oversight. And network security cannot be engineered and then ignored.

As threats change, customers want assurances that updates will be issued quickly, so they have the latest software and firmware to protect against the changing environment. There’s no doubt some manufacturers have been caught on the back foot. Re-engineering is an expensive process, and the cost to re-build trust more so. So, cybersecurity concerns, particularly in the mid- to enterprise-level sectors, have definitely put an end to some of the most aggressive price cutting. 

Card image cap
Jumbi Edulbehram NVIDIA

Cybersecurity and other important concerns such as privacy are definitely slowing down the ‘race to the bottom’ for cameras and other security equipment. When the industry made the transition from closed, proprietary analogue systems to open, networked-based systems, many integrators and end users were quick to adopt relatively cheap equipment that was ‘good enough’. As adoption of networked-enabled infrastructure became mainstream, there was a growing realisation – based on customers’ experiences and industry evaluations – that cheap physical security equipment suffered from a host of vulnerabilities.

Some of these, such as lack of encryption, were commonly found in a lot of devices, but some, such as ‘back-door’ access was discovered in devices made only by certain manufacturers. For users that have mandates around cybersecurity, privacy, etc., price has now ceased to be the overriding factor in buying physical security equipment; they are now willing to pay for keeping physical security equipment secure.

Card image cap
John Davies TDSi

There are no obvious signs that the ‘race to the bottom’ is slowing down. Inevitably some manufacturers will always want to sell low-cost products to that part of market. However, it’s wrong to assume that low-cost means low security, the two do not have to be synonymous! It is important for security buyers to understand what they are buying, though.

The embedded security in low-cost systems may vary greatly from higher-priced systems, but it depends on the needs of the security operator as to whether this is an issue or not. It’s most likely that some cybersecurity elements will be missing in lower-priced systems – but as long as you are aware, and it suits your needs, then what’s the problem? However, ‘cheap’ does not always equate to ‘value’ either – it’s all about finding the right combination of cost and performance for your specific needs.


Editor Summary

The race to the bottom may be alive and well, but the pace has clearly slowed. Concerns about cybersecurity are undermining any customer tendency to buy lower-cost, ‘good enough' products. There are new perceived risks associated with these less expensive products. Spending a little more for a more cyber-secure camera is seen as a necessity among many buyers, which impairs any effort to sell products based solely (or mostly) on price.

  • Related links
  • Genetec CCTV software
  • IDIS CCTV software
  • IDIS CCTV cameras
  • Oncam CCTV software
  • Oncam CCTV cameras
  • Pelco CCTV cameras
  • Pelco CCTV software
  • TDSi CCTV cameras
  • TDSi CCTV software
  • Surveillance Software CCTV software
  • Related categories
  • CCTV cameras
  • CCTV software
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Discover how cybersecurity fears challenge the security industry's race to the bottom, impacting low-end products and boosting suppliers' offerings.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec