SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

How trustworthy are integrators and/or manufacturers in security?

20 Dec 2024

How trustworthy are integrators and/or manufacturers in security?
Larry Anderson
Larry Anderson
20 Dec 2024

Editor Introduction

Trust is the foundation of successful relationships between buyers and sellers in the security marketplace. Trust facilitates collaboration, reduces risk, improves decision-making, and ultimately drives business growth and profitability. Transactions often involve significant investments, and trust minimises the perceived risk for buyers, making them more likely to commit to a purchase. Our Expert Panellists weigh in on the subject of trust in response to this week’s Roundtable: A security end user asks: How trustworthy are integrators and/or manufacturers?


Card image cap
Steve Bell Gallagher Security

Trustworthiness is very much a personal attribute, but it needs to be empowered by the leadership team of a company who, in the best case, value honesty, openness, and transparency. So, what are some of the signs to look for when identifying a trustworthy manufacturer? I guess the key time for assessing trustworthiness is when things are going wrong. For manufacturers, this is most likely to be when there are product problems or faults. A manufacturer that backs their hardware will have extended warranty periods, protecting the end user from issues in the component or manufacturing of a product. In a similar vein, cybersecurity issues and the openness with which these are communicated, is where trustworthy companies openly report Common Vulnerabilities and Exposures (CVEs) in the Mitre.org database. This provides transparency to end users and allows them to assess the issue and mitigate or upgrade to resolve in a way that best suits them.

Card image cap
Alex Wojcik Salient Systems

Overall, most companies in the industry are trustworthy, although true reliability often becomes apparent when a project encounters challenges. Reputable integrators and manufacturers typically adhere to industry standards, hold relevant certifications, and have a proven track record of successful projects and callable references to support their claims. It's essential to research a company's history by looking for customer testimonials and case studies demonstrating their expertise and reliability. More importantly, it’s wise to talk with other end-users who have faced issues and how those were resolved. Consider how the representative responded and how the company handled the situation. Transparency is another key indicator of trustworthiness. Reliable companies are open about their processes, technologies, and third-party partnerships while prioritising ongoing support and updates as security needs evolve. Does a manufacturer communicate with the end-user when an issue arises, or do they shift blame? Engaging with companies that put the customer first and take responsibility for mistakes typically leads to the most trustworthy relationships, as these companies have nothing to hide and everything to gain by earning trust.

Card image cap
Daniel May Consort Architectural Hardware

When it comes to the security, safety and accessibility of our built environment and its many systems, stakeholder trust is critical. As new solutions flood the market and information is more accessible than ever before, conscious manufacturers are building relationships by demonstrating complete transparency in their product communications – offering decision makers and end users clear evidence of product performance through testing methods, certifications, and environmental product declarations, for example. For those offering end-to-end solutions, it’s important to review and discuss track records also, opening communications on timelines, potential challenges, technical support, and long-term maintenance commitments as a way of building trust across the entire supply chain. In general, there is often evidence of reliable products being integrated heavily, but should end users remain unsure, it’s important to conduct further research into a manufacturer’s reputation. Reviews and case studies can show tangible examples of a product’s performance, however, where information is withheld or a well-established company is not seen to be working with many others, end users are encouraged to question why before it becomes too late.

Card image cap
Daniel Reichman Ai-RGUS

Integrators and manufacturers are as trustworthy as their experience and the reputability of the technology they offer. As in hiring an employee, it is important to speak with references or to review case studies with existing customers to understand how the company does business. Verifying their certifications and licences is another way that integrators and manufacturers can build trust.


Editor Summary

In many respects, trust comes down to open and honest communication among end users, integrators, and manufacturers. Simply put, more trust leads to better problem-solving and decision-making.

  • Related categories
  • Power supplies & batteries
  • Bollards
  • Barricades
  • Storage
  • Barriers
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Discover how trust in security integrators and manufacturers drives collaboration, reduces risk, and enhances decision-making for profitable business growth. Explore insights from expert panellists on building strong industry relationships.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec