SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Are end users willing to be ‘Locked In’ to a single manufacturer?

26 Apr 2022

Are end users willing to be ‘Locked In’ to a single manufacturer?
Larry Anderson
Larry Anderson
26 Apr 2022

Editor Introduction

It’s a debate almost as old as the security industry itself: open systems versus end-to-end solutions. The argument goes that end-to-end solutions from a single manufacturer tend to “lock in” an end-user to a certain company’s technology platform. In contrast, open systems offer greater flexibility over the long haul. However, the popularity of end-to-end solutions suggests a healthy continuing market for these systems. We asked this week’s Expert Panel Roundtable: How willing are end-users to be “locked-in” to a single manufacturer’s system? What role do such systems play in the market?


Card image cap
Rebecca Wormleighton Zendelity

How willing depends on what matters most to the buyer. With enterprise solutions, a buyer has two choices. They can either buy from a single vendor who provides an end-to-end solution, or they can go best in class and build a custom solution by integrating the best technology from each category of the end-to-end solution. With a single vendor, the buyer has a “single throat to choke” if something goes wrong and a faster response time. But because the vendor’s R&D resources can only go so far, the product is not as feature-rich as compared to the leader in the segment. On the flip side, integrating solutions from multiple vendors creates a more feature-rich solution but it's more expensive due to the development resources required. The role of single manufacturer solutions is to make the technology accessible to the masses, whereas multi-vendor solutions deliver innovation because they invest deeply in a specific area.

Card image cap
John Davies TDSi

Interestingly there are plenty of “buyer beware” messages out there in the marketplace regarding locked-in systems, but some buyers still choose them despite the fact they may not be best-of-breed or capable across all the silos of the security spectrum. For some security customers, buying all your security systems from one supplier ensures it all works together seamlessly and there is one point of contact should problems arise. For some buyers that are time-poor or technically less well-versed, this may be an advantage. However, anyone who delves a bit deeper will understand that with modern well-integrated systems, there is no need to “make do” with being locked in anymore. Many good quality security systems will easily integrate (especially with the assistance of a good integrator/installer) so there are big advantages to taking this “mix and match” approach to finding the ideal combination of performance and cost.

Card image cap
Francis Lachance Genetec, Inc.

While it might be tempting to go with the perceived lower upfront costs of subscription-based closed/proprietary systems, focusing on the short-term by investing in closed solutions can throw a wrench in a business’s operations. When an organisation’s needs outgrow their physical security system or when they want to use their existing investments to expand their operations beyond security, they’re either forced to accept the closed system’s limitations or replace their entire system. An open platform, unified security solution can help end-users achieve greater long-term value and choose the devices and systems that fit their unique needs while presenting them together in a unified fashion. With a unified platform customers can adopt new technologies and hardware as their business and security needs change. All systems are managed from a common infrastructure, making system functionality consistent across all tasks.

Card image cap
Kami Dukes AMAG Technology, Inc.

When security systems came to market in the 1980s, end users expected a complete solution. The early access control manufacturers did just that by providing simple software, panels, and readers. Fast forward to 2022, and end users’ expectations are no different. They expect a complete solution, too. The difference between then and now is how we get to the complete solution. It spans well beyond simple access control. The total solution involves effortlessly weaving multiple security technologies into various business systems and workplace cultures. To do this, systems must be developed with open-architecture hardware and software, meaning multiple applications can communicate with any part of the system. End users are not willing to be “locked” into a single system at all. The conversation shifts away from technology and is about service and support. A manufacturer that makes its components provides trusting product control, and reliable solutions, and alleviates the risks associated with those relying on third-party components.    

Card image cap
Sean Foley Interface Systems LLC

End-users always leap when investing in a certain manufacturer's system. The larger the enterprise, the bigger the effort and the more embedded a system becomes in the day-to-day activities of the organisation. Leadership must proceed with caution, conducting significant vetting in the selection process. Some end-users have learned the hard way to avoid proprietary systems, especially those that are incompatible with common equipment or will not operate without the payment of high recurring monthly fees. For video solutions, a lower upfront Capex may look attractive, but when it is time to make a change, buyers can find themselves in a situation where they have a system that doesn't play well with others. Failure to pay the high monthly fees results in cameras that won’t work with any other system. Being locked in can mean a complete rip-and-replace is required if a system doesn’t continue to meet an organization's requirements.

Card image cap
Dan Berg Salient Systems

In the past, end-users were more willing to be locked into a proprietary system. Looking back to 20-or-so years ago, major solutions were only compatible with their software and hardware and nothing else. As video surveillance has moved into the IT space, it has become more open-platform allowing organisations to choose what works best for their needs and budget. Servers, switches, cameras, software, and routers all need to work together, and the key to that is standards. ONVIF is a good example of a standards group that is facilitating this. Cameras and software that conform to those standards can be used interchangeably and easily upgraded with the latest technology. When integrators opt for a proprietary system, the end-user is stuck with that. However, if they had gone with a standard open platform, to begin with, they could easily replace faulty software, cameras, or servers and not be stuck with a solution that cannot be adapted or upgraded.

Card image cap
Bill Hobbs 3xLOGIC, Inc.

Every technology seems to follow roughly the same curve from birth to maturity. Along the way, adoption is driven by how non-proprietary the technology becomes. Early adopters may find themselves locked in because competitors are unable to keep up and/or technology developers leap-frog each other. However, technology eventually becomes more of a commodity, which is the result of developing competing but similar advancements. The point where the proprietary nature of a product intersects with the period where the cost/benefit of the technology is still fresh enough to remain desirable is the sweet spot for end users. The dilemma of competing attitudes leads to what we call the Proprietary Trap. Early adopters run the risk of being locked into a proprietary solution that falls out of favour. When this happens, end-users face the prospect of a “forklift upgrade.” As interoperability improves, end users are less likely to adopt a proprietary solution.


Editor Summary

As one panelist noted, the growing popularity of subscription-based closed/proprietary systems is the latest wrinkle in the debate between proprietary and open systems. In the end, the tradeoff of such systems is clear. Should an end-user trust a single company to provide an entire system, knowing that the approach could limit their options as the system needs to change in the future? Is it worth the additional integration costs and hassle of incorporating “best-of-breed” components from multiple manufacturers? Is the simplicity of dealing with a single manufacturer worth the possible downside? One end-user might be perfectly comfortable expecting that a well-suited system installed today could continue to deliver results for years to come. Another might need more flexibility to adapt their security systems to a growing or changing enterprise. In the end, it comes down to customer preference.  

  • Related links
  • AMAG Access control software
  • AMAG CCTV software
  • Genetec Access control software
  • Genetec CCTV software
  • Salient Systems CCTV software
  • TDSi Access control software
  • TDSi CCTV cameras
  • TDSi CCTV software
  • Genetec IP cameras
  • TDSi IP cameras
  • Related categories
  • CCTV cameras
  • CCTV software
  • Access control software
  • IP cameras
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Round table discussions
About this page

Discover end-to-end security solutions, avoid vendor lock-in and easily integrate multi-brand systems for a fully customised approach. Access our insightful guide now.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec