SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Is the security industry shifting toward end-to-end solutions?

Is the security industry shifting toward end-to-end solutions?
25 Oct 2017

Editor Introduction

Products are the building blocks of systems and solutions. How those products are combined, and where the integration happens, is a variable in the physical security market. Before the advent of open systems, a single manufacturer typically combined his own products, using proprietary connections, into end-to-end solutions for customers. Open systems undermined that paradigm to some degree and made it possible for customers to pick and choose products from multiple manufacturers to be integrated into a solution. Lately, the pendulum has again swung toward “system solutions,” or end-to-end systems provided by a single manufacturer … Or has it? We asked this week’s Expert Panel Roundtable: Is the industry shifting from a focus on products to emphasising end-to-end solutions? How is that a good (or bad) thing? 


Card image cap
Jonathan Lewit Pelco, Inc

For years, the security industry has successfully provided end users with security products such as cameras, ID cards, and electronic door locks. Increasingly, security end users want more than products: they want solutions, and the security industry is changing to respond to that need. The difference is important. For complex security problems, the solution almost always requires more than one product, usually from more than one manufacturer, and likely services too. A handful of products – camera, cables, and monitor – can provide basic video monitoring. Today, a security solution combines these on a flexible and scalable platform with a video management system (VMS) that delivers situational awareness to accurately detect abnormal behaviors and trigger alerts. Unlike products, solutions can help investigate incidents and possibly even end potentially dangerous situations before they cause harm. Manufacturers and integrators that provide solutions will foster lasting relationships and help to mitigate risk.

Card image cap
John Davies TDSi

The industry is moving towards end-to-end solutions as customers want a full solution and don’t want to worry about the specifics that drive it. There is no reason why this should be a bad thing for the security industry, but it does mean that we sometimes need to “think outside the box” to offer exactly what customers want. This will undoubtedly involve embracing true open protocol systems, which have rapidly become an industry must-have as they give real choice to customers. Card-to-phone credentials have also become popular, and people are far more aware of the benefits of data mining to drive economies. The general move towards IoT will undoubtedly encourage even greater usage of data mining and ultimately, security systems will just be seen as part of the whole technology ecosystem. Customers will simply want these solutions to be reliable and to work efficiently.

Card image cap
Michael Sherwood Milestone Systems

Many low-cost manufacturers have entered the physical security market in recent years. To combat price pressure and to ensure end-users get the most out of their investments, systems integrators have indeed shifted to an emphasis on solutions. Manufacturers have reacted by either building their own end-to-end solutions or growing their community of partners to address the need through best-of-breed options. While the total solution should be the focus of any installation, there is risk in deploying a complete end-to-end solution from a single manufacturer as you may not be leveraging the best technology for each functional requirement. In addition, tackling a full solution as a single project adds complexity and introduces installation challenges which can ultimately lead to issues with customer satisfaction. It is always my recommendation to implement and tune your core technologies first; once proven stable, continue by adding best-of-breed products that leverage and complement the core technologies.

Card image cap
Fredrik Nilsson Axis Communications

The industry is in a state of evolution as the shift to end-to-end solutions is becoming more popular, specifically within small- and medium-sized systems that prefer openness. IP began in the enterprise and as the market matured, it made its way to small and medium businesses as they also want flexibility, better image quality, etc. and for those systems it is more important to have an end-to-end solution that is easy to sell, easy to install, and easy to use. However, in enterprise systems the best of breed, open system is still preferred by most end customers and integrators.


Editor Summary

Customers buy end-to-end systems, not individual products. Or even more to the point, they buy solutions to their problems, not technology. But what is the most cost-effective and efficient means of providing an end-to-end solution? Should it be integrated at the manufacturer level or by an integrator and based on open systems? Our Expert Panel Roundtable offers several views on the subject, all focused on the need to provide customers with exactly the systems they need. Does the best solution come pre-packaged from a manufacturer or should it be assembled by an integrator using best-in-breed solutions? The answer may depend on the market or even the individual customer. In our large industry with its range of use cases and technology approaches, it seems both options will remain in play for the foreseeable future. Choice is a good thing.

  • Related links
  • Axis Communications Access control software
  • Axis Communications CCTV software
  • Milestone CCTV software
  • Pelco CCTV software
  • TDSi Access control software
  • TDSi CCTV software
  • Axis Communications IP cameras
  • Pelco IP cameras
  • TDSi IP cameras
  • TDSi Electronic locking devices
  • Pelco CCTV monitors
  • TDSi Access control cards/ tags/ fobs
  • Axis Communications Storage
  • Seagate Storage
  • Related categories
  • Access control software
  • CCTV software
  • Electronic locking devices
  • IP cameras
  • CCTV monitors
  • Access control cards/ tags/ fobs
  • Storage
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

AI security solutions by Artificial Intelligence Technology

AI security solutions by Artificial Intelligence Technology

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Explore the security industry's shift towards end-to-end solutions, enhancing integration, simplifying management, and boosting end-user experience.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec