SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video analytics
  • Home
  • About
  • White papers
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

What is the Internet’s role in researching security equipment?

29 Sep 2022

What is the Internet’s role in researching security equipment?
Larry Anderson
Larry Anderson
29 Sep 2022

Editor Introduction

How has the security end user’s ‘buying journey’ changed in the age of the Internet? If nothing else, the online age has simplified access to information about various security products and systems. However, easily accessible information could enable a customer to delay contacting a manufacturer or systems integrator until further along the decision-making process. We asked this week’s Expert Panel Roundtable: What role should the Internet play when customers are researching new equipment purchases for security?


Card image cap
Hiroshi (Huey) Sekiguchi i-PRO

The internet, via Google (or other search engines), is the first stop for most customers when researching future purchases, and the physical security industry is no different. As everyone knows, it can be hard to find reliable and trustworthy sources when searching for information. Some of the best research sources are case studies written on behalf of customers who describe in detail their challenges and how a system integrator and various manufacturers provided a solution. Educational articles and videos are also popular as a way to give customers information without overtly selling them on any one solution. The guiding philosophy at i-PRO is that a well-educated customer will make the best choice for their company’s unique requirements. As a manufacturer, if you’ve listened to the market’s needs and developed the right products and services, you should be successful. However, customers still need to be able to find you, and that’s where the Internet is invaluable.

Card image cap
Tim Purpura Morse Watchmans

The Internet is an essential research tool for customers and, as such, great attention should be paid toward your brand’s online presence. After all, your website is the only member of your sales team that works 24/7/365. But online presence is about so much more than just sales; it’s about education. While customers often search online with the intent of finding a security solution to purchase, much of the time customers are searching online to be educated — about the latest security technologies, market trends, or how they can best solve their problems. When the education of your customers comes before sales, both online and in the real world, customers have a better understanding of why a certain security solution can better solve their pain points over another. This makes high value content such as blogs, editorials, and case studies essential online tools for both customers and brands.

Card image cap
Nick Mercer TDSi

The Internet already plays a major role in customer choices and selection of security purchases. Even a decade ago, much of the customer education process with regards to products was driven by sales activities, but now the Internet has taken a key position in this, meaning sales teams are more focused on how best to design and engineer the overall solution. Many savvy customers now have a good understanding of how products compare and how they work but will probably still need advice on the wider integration possibilities. Naturally, gaining accurate pricing is more of a challenge online, although retail prices may be available for some items. This is where manufacturers and expert installers must fill in the gaps and demonstrate value through the delivery of complete solutions (not just widgets!). A good security provider will help a customer build upon their knowledge gained online, offering a consultative approach that helps them find the best overall solution for their needs.


Editor Summary

The Internet can provide a valuable tool when it comes to educating customers, and an educated customer is a better customer. Easy availability of information on products and systems is changing the processes involved when it comes to procuring security technologies, and manufacturers and integrators should adapt their marketing strategies to maximise success in the changing environment.

  • Related links
  • Morse Watchmans Access control software
  • TDSi CCTV software
  • TDSi Access control software
  • Biometric Access control software
  • Access Control Software Access control software
  • Control Software CCTV software
  • Broadcast Messenger Access control software
  • Detection Software CCTV software
  • Contact Access control software
  • Card Printer Access control software
  • Mifare Access control software
  • IP Surveillance Software CCTV software
  • Proximity Access control software
  • Central Monitoring Option Access control software
  • Management Software CCTV software
  • Centrally managed access solution Access control software
  • Combined online/offline solution Access control software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Door Monitoring Option Access control software
  • Face Recognition Software Access control software
  • Guard Tour Access control software
  • ID Badging Software License Access control software
  • Keypad Commands/Intrusion Zones Access control software
  • Management Systems Upgrade Access control software
  • NetVue Interface to Nice Systems Access control software
  • Remote software for telecode door entry phone system Access control software
  • Server software for MSDE Access control software
  • Visitor Management tool Access control software
  • Related categories
  • CCTV software
  • Access control software
Related white papers
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Open credential standards and the impact on physical access control

Open credential standards and the impact on physical access control

Download
What is a universal RFID reader?

What is a universal RFID reader?

Download
Related articles
2026 Trends in retail security: Interface Systems insights

2026 Trends in retail security: Interface Systems insights

Why open matters in the age of AI

Why open matters in the age of AI

Verkada: AI-driven security revolution & $5.8B valuation

Verkada: AI-driven security revolution & $5.8B valuation

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video analytics
  4. News
  5. Round table discussions
About this page

Explore top security solutions: boost safety with researched equipment, online tools and expert consultations for reliable protection.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec