SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Retail security
  • Home
  • About
  • White papers
  • Case studies
  • News
  • Expert commentary
  • Security beat
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

How are customer expectations changing in the physical security market?

How are customer expectations changing in the physical security market?
2 May 2017

Editor Introduction

Meeting a customer’s expectations is a key component of success for any business, including the physical security market. However, understanding customers’ expectations is a big challenge, which is made even more difficult because those expectations are a moving target. We asked this week’s Expert Panel Roundtable: How are customer expectations changing in the physical security market? Their wide-ranging answers highlight elements from technology expectations to adaptability to change. 


Card image cap
Corey Tyriver Security 101

End users of physical security equipment have become far better educated about the products and systems protecting their organisation’s people and assets. Looking at other industries, they’ve seen the better performance, tighter integration and greater convenience IT-based products provide. Now they are demanding the same. This puts pressure on integrators and manufacturers to meet those demands. Customers want to make choices based on performance and price, not being forced into proprietary systems and they want to know their choices will easily integrate with existing systems. They want simplicity and convenience in their security function. They want a road map for consolidating disparate systems. That requires a sophisticated integrator to sort through the customer’s needs and produce one centrally managed control solution. Today’s security customers know what they want; but as technology changes, so will their demands. Smart integrators and manufacturers will find a way to meet them.

Card image cap
Richard Brent Louroe Electronics

The physical security market has demonstrated significant advancements over the last 20 years. Technologies in network video, two-way audio capture and recognition, analytics, biometric identification and video management software have truly redefined situational awareness. The evolution of these technologies has also resulted in greater and metric-managed expectations from customers, resulting in a total, integrated solution. In the past, end users deployed video, audio and access control systems that were developed independently from each other. Today, customers want an integrated, end-to-end solution in which all systems can operate with fluid interoperability, be controlled through a master software system, and operate from one central location. This shift has resulted in greater collaboration among physical and virtual security suppliers as well as new, state-of-the-art products that simplify integration and enhance ease-of-use.

Card image cap
Arjan Bouter Nedap Security Management

Customers are expecting more and more services that provide them with a secure environment and that can adapt to changes. This means there is an increasing interest in cloud-based solutions. When implementing these, however, the security of these solutions need to be considered. In line with the expectations for services, people expect that the same services can be implemented and used in their entire company, even around the globe. In this respect, we see an increasing demand for standardised procedures and standardised security solutions for companies that operate on a global scale.

Card image cap
John Davies TDSi

Security consumers have come to expect technology that is “plug & play,” much in line with the smartphones and apps they use all the time. There is a definite assumption that these systems will be easy and intuitive to operate right out of the box. This is totally understandable. As security systems have become more complicated than ever before, it is even more important that the user interface is straightforward and allows the operator to make full use of the many important functions and features. While much of the security sector has embraced this user-friendly technology approach, unfortunately some players in the market are still struggling to understand the benefits for both customers and providers. As well as offering the market more powerful and easy-to-use solutions, these systems additionally provide a healthy and continuous revenue stream for savvy security providers.

Card image cap
Reinier Tuinzing Milestone Systems

Consumer tech is bleeding into business life; people expect to be able to use the same conveniences and innovations both personally and at work. They want to integrate new applications into their core business system as easily as downloading an iPhone app. A new groups of users include IT professionals, who have a different set of technical skills and expectations. The IT market has an established standard of preventive maintenance processes, support, backup, and upgrades. They are used to paying for Service Level Agreements (SLAs), expecting high reliability and performance levels. Physical Security customers used to be only be concerned about viewing and capturing the video. Now they are asking: What else can I do with this video? Can I count people/cars? What about slip and fall, or metadata associated with objects or people? Can the video be triggered by temperature changes? Can I visually measure the size of objects?

Card image cap
Robert Jones Applied Research Associates, Inc.

Customer expectations are continually evolving in the physical security market for one simple reason:  They are starting to realize that “perimeter security” means so much more than just providing detection and monitoring capability along the physical perimeter of a structure. Detecting threats when they’re at the walls of your facility is too late. Whether you see the threat or not, damage will occur and losses ensue. Customers today are demanding more. They want the ability to detect threats and prepare an effective response before damage or intrusion can take place. One way they are becoming more successful is by detecting threat surveillance activity. Since most threats conduct extensive reconnaissance and surveillance of their intended target beforehand, learning to effectively detect surveillance-related activity early on allows customers to ward off the threat without taking on the losses.

Card image cap
Melissa Stenger

How are customer expectations changing? In a word, rapidly. In the last few years, the expansion of big data, the Internet of Things (IoT), and cloud-based software has impacted customers’ expectations when interacting with physical security and technology in general. Customers want simplicity, flexibility, low maintenance, and choice.  As customers’ access to information increases, so too does their knowledge of products, setting their expectations higher. Previous expectations of physical security were low. In the past, customers accepted panels, DVR recorders, and large proprietary systems. With customers’ access to information and the incorporation of new technologies into their personal life, they expect mobile access, friendly user interfaces and work flows, and simplicity in their security systems as well. As the convergence of access to information and technology drives more simplicity into customers’ lives, they will continue to expect that same experience in their professional lives.

Card image cap
Katharine Dahl Rave Mobile Safety

According to Gallup, higher workplace engagement leads to 41 percent fewer safety incidents. With the growing globalisation of the workforce, employers expect to engage their workforce through mobile technology to protect employees wherever they are located. With the increasing borderless workforce, employers must overcome communication challenges to stay connected with employees to keep them safe. As workers become more dispersed, organisations should consider technology that enables two-way communication with any employee, at any time and in any location during an emergency.


Editor Summary

Today’s customers are better educated about the industry’s technologies. They are more tech-savvy. They are accustomed to using personal electronics devices, and want similar attributes available in their security systems. They want integrated, end-to-end solutions that are plug-and-play. They want standardisation, simplicity, flexibility and low-maintenance. They want to do more with less effort. In short, customer expectations in today’s security market are higher than ever. Only manufacturers and integrators with a thorough understand of those expectations have any hope of meeting them.

  • Related links
  • ISONAS Access control systems & kits
  • ISONAS Access control software
  • Milestone CCTV software
  • Nedap AEOS Access control software
  • Nedap AEOS Access control systems & kits
  • TDSi CCTV software
  • TDSi Intruder detectors
  • TDSi Access control software
  • TDSi Access control systems & kits
  • Milestone Network video recorders (NVRs)
  • TDSi Network video recorders (NVRs)
  • Related categories
  • Access control software
  • Intruder detectors
  • Digital video recorders (DVRs)
  • CCTV software
  • Access control systems & kits
  • Audio, video or keypad entry
  • Network video recorders (NVRs)
Related white papers
Physical access control

Physical access control

Download
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Retail security in 2021 and beyond

Retail security in 2021 and beyond

What security technologies are impacting the retail market?

What security technologies are impacting the retail market?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Retail security
  4. News
  5. Round table discussions
About this page

Explore evolving customer expectations in the physical security market and how new technologies drive demand for customised, integrated solutions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec