SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

How do personal electronics impact what customers expect from security?

21 Jan 2022

How do personal electronics impact what customers expect from security?
Larry Anderson
Larry Anderson
21 Jan 2022

Editor Introduction

The intersection of consumer electronics and the physical security marketplace is a fertile sector for growth and innovation. Consumers increasingly have the same high expectations for the operation of their workplace technologies as they are accustomed to in the digital world at large. We asked this week’s Expert Panel Roundtable: How do developments in personal electronics impact customer expectations in the physical security market?


Card image cap
Paul Speariett Yardi

Our phones are nearly permanently attached to us (for better or worse!). We bank, shop, and use our phones to make social connections. Our phone’s ability also to securely identify and provide access to secure environments means that our phones can replace physical passes. In the world of commercial real estate where we offer visitor management, we are still navigating how this works without barriers, such as having to download a specific app. With the advent of new openness to the secure wallets of phones, rapidly deployable secure access for both long-term users and short-term visitors will soon become a reality, and without a doubt, there will be a high expectation from customers to deliver on this.

Card image cap
John Davies TDSi

The most major impact has been the smartphone and its adoption across society globally. The intuitive nature of the software and apps on these devices has driven behaviors and expectations of how users want to interact with security software and systems. Security systems users and managers now expect to have the relevant information and control at their fingertips and not have to schlep into an office to interact with a client PC. This has driven the development and release of more user-friendly software management systems, as well as the migration of services to the Cloud environment to deliver access anywhere and at any time. Although the security industry is at the cutting edge of technology, it is important to remember that our customers need these solutions to work seamlessly with their other personal electronics and business systems, to successfully deliver the required service requirements of the real world. 

Card image cap
Rebecca Wormleighton Zendelity

Personal electronics, specifically the smartphone, have changed everything. Today, there’s an “app for that.” Now homeowners can access applications to plan and manage family time, implement video surveillance, lock doors remotely, find lost keys, track who is driving the car, manage chores lists, etc. As a customer, we expect the same to be true in business. Yet as we walk across the store, hotel, school, hospital, etc., what do we see but the standard video cameras, guards, cleaners, maintenance, all doing their part to keep us safe? Beyond that, we see the paper, tickets on the fire extinguishers, checklists in the bathroom, sign-in sheets, people with clipboards, and it makes you think. As a customer, I look at how those applications have enabled me to save time and money, imagining what businesses could do if they also digitally transformed operations and compliance with safety and security requirements. It would be amazing.

Card image cap
Deon Chatterton Safetrust Inc.

Three things quickly come to my mind. They are:

  • Feature upgrades or bug fixes come quickly and easily over the air. Just a couple of clicks and you have the latest advances, functions, features, and security.
  • These devices communicate with each other and other control devices using standards like BLE or WiFi, making setup and operations super simple.
  • Edge devices continually get less expensive, smarter, and more feature-rich. Who wants a watch anymore that just tells the time?

Smart security managers recognise these trends and choose systems and devices that can deliver intelligent services and communications at the edge. They refuse to spend another dollar of their valuable budget on the archaic paradigm of having dumb edge devices connecting to a panel that simply locks you into a single manufacturer.


Editor Summary

Smartphones are transforming day-to-day life and helping to shape human interaction in the 21st century. The monumental impact of personal electronic devices on the public at large is spilling over into customer expectations in the physical security market. Why shouldn’t my smartphone be just as useful – and have just as much functionality – at work as at home? Each of us always carries with us a pocket-sized PC. Tying that device into physical security systems is an ongoing challenge, as is a need to incorporate the ease-of-use typical of personal electronic devices into the technologies that protect our enterprises.

  • Related links
  • TDSi CCTV software
  • TDSi Mechanical digital locks
  • TDSi Access control software
  • TDSi IP cameras
  • TDSi Access control readers
  • TDSi Electronic locking devices
  • TDSi Electronic keypads
  • TDSi Network video recorders (NVRs)
  • TDSi Access control cards/ tags/ fobs
  • Related categories
  • CCTV software
  • Mechanical digital locks
  • Access control software
  • Access control readers
  • Electronic locking devices
  • IP cameras
  • CCTV monitors
  • Access control cards/ tags/ fobs
  • Electronic keypads
  • Network video recorders (NVRs)
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Discover how personal electronics influence customer security expectations in our expert round-table discussion on cutting-edge security solutions.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec