SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

What are the security challenges of protecting SMBs?

5 Mar 2021

What are the security challenges of protecting SMBs?
Larry Anderson
Larry Anderson
5 Mar 2021

Editor Introduction

Small and medium-sized businesses (SMBs) make huge contributions to the economy overall. Considered individually, they may not be as large as companies in the enterprise market, but they have big requirements when it comes to security. SMBs also present unique challenges to security manufacturers and integrators seeking to serve their needs. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting small and medium-sized businesses (SMBs)?


Card image cap
John Davies TDSi

Small and medium-sized businesses generally have an aversion to large capital costs as they lack the resources to cover them easily. Often these are fledgling businesses looking to grow and thrive, so a significant drop in their cash reserves can be potentially disastrous. At the same time, these businesses need to protect their physical and cybersecurity just as much as anyone else. This is where Security as a Service (SaaS) comes in. The security sector is well placed to deliver its services in the same way you would buy a mobile phone, house, or a new car, by spreading the cost over a fixed-term contract with sensible incremental costs. That way the supplier continues to own the systems but also has a regular fixed income by delivering the service. This approach enables SMBs to enjoy the latest security systems without the fear of an unexpected capital cost.

Card image cap
Hank Monaco Johnson Controls, Inc.

All businesses want the best solutions and services to protect their occupants and assets. But due to the pandemic, resources are already stretched thin, especially for small and medium-sized businesses. As a result, finding a security strategy that can fit within budget while meeting their needs is definitely a challenge. From the latest in AI-enabled video surveillance to touchless access controls, SMB owners and facility managers should not have to sacrifice performance and security to save on costs. By investing in integrated solutions and services that can serve multiple purposes and be tailored to their unique needs, SMBs can maximise their dollars to reach their security goals. With the right strategy in place, organisations of any size can have a security approach that rivals the business giants.

Card image cap
James Reno Alarm.com

The biggest challenge is getting SMB owners to simplify the systems that protect their business by selecting a platform over security products. Commercial systems that are disparate by design – separate vendors for intrusion, video and access – can create more problems than they solve. Instead, SMBs would benefit most by using a single platform solution that covers all their security needs. Smart business platforms that also feature insights and intelligence help SMB owners better protect their property and manage their business and employees. These systems provide peace of mind that the business will be automatically secured if left undone, and deliveries are made safely through video verification. They also offer customer experience data on details like customer activity, high traffic areas and line queues. Plus, added solutions like smart temperature monitoring can benefit any business with specific climate control needs.

Card image cap
Bill Hobbs 3xLOGIC, Inc.

SMBs face unique challenges in securing their estate. If COVID has taught us anything it is that at any moment you may not have access to your normal business routines, so remote access can quickly become a vital asset. Having all your security systems and data tucked away in an IT closet is no longer in the best interests of many SMB enterprises. Push Notifications, remote viewing of video, video verification, and cloud services are now mainstream for SMB customers and their security solutions must support these capabilities. The SMB owner has to be able to access these security systems and features from anywhere, at any time, and from any device. The ability to move security solutions to the cloud is an easy, effective way to accomplish these goals with a robust, reliable platform that ensures the security of SMB’s people, assets, and property.

Card image cap
Richard Brent Louroe Electronics

Many small and medium-sized businesses have been hard-hit by the COVID-19 pandemic. From stay-at-home-orders to ever-changing compliance regulations to declining revenue, SMBs have had to grapple with a lot. Whatever budget was previously earmarked for security installations might be even smaller now. Integrators are tasked with providing solutions to SMB customers that provide a heightened level of security, functionality, and now safety while also being cost-efficient. One way to do this is for integrators to offer economical add-ons or upgrades to a customer’s existing system. For example, adding an intelligent, two-way audio device to a surveillance system is an attractive option for customers as it expands monitoring coverage, enhances situational awareness, enables secondary source alarm verification, and can broadcast social distancing reminders as organisations continue to follow COVID-19 safety protocols.

Card image cap
Per Björkdahl ONVIF

Cybersecurity is a very big topic of concern for SMBs, as many of them do not have an in-house IT team and small enterprises might not really see a need to implement comprehensive cybersecurity measures. Small and medium-sized businesses might even see security as a necessary evil, or a grudge expense, that does not require much of their attention – therefore they might be less concerned or aware of issues such as intrusion or hacking. There is a lack of awareness that a threat is not always on their physical premises, but that all these small computing devices can be used to launch attacks in consumer’s homes and businesses. If they are hacked on-site, the business might be unconcerned, but they forget that a camera or other sensor is a device on the network and is vulnerable to other attacks. These are just some of the unattended consequences of this knowledge gap.

Card image cap
Jamie Connor Safetrust Inc.

Small and medium-sized businesses often lack administrative resources. Their security solutions are often unable to be reactive, easily accessed, and resilient to training in order to manage and maintain it. Most SMBs want the security an enterprise solution brings and may have no problem with a large, one-time purchase of a complex security system. However, they do not deploy such solutions to avoid staffing or specialised training to manage it. Costs for network developments and administration for remote access are usually avoided. Without dedicated security and IT personnel, SMBs can put the reporting and access management in the client's hands with easy out-of-the-box security administration using apps on their mobile phones. They can download the security application and log in with their email or phone number without having to go through complicated set-ups, integrations, and licenses, and start managing their security systems right away.

Card image cap
Paul Hefty Aiphone Corp.

Managing access and finding the right solution are perhaps the biggest challenges faced by small to medium-sized businesses. Today many business environments have gone from an open-door policy in their lobbies so that customers can access services, such as at a bank, to now needing to periodically restrict access. The challenge for these business types is managing the ability to permit non-employees to enter in a controlled manner that also does not require an individual to physically unlock a door allowing each person to enter. As a result, more businesses are looking at how to leverage their existing access control solution to better manage visitors or invest in an entry management system that can help them with this process.

Card image cap
Nada Ebeid Genetec, Inc.

SMBs typically need to achieve a lot with limited resources. When it comes to physical security, oftentimes their choice of technology, such as cameras, is driven by cost considerations. Many end up rolling out disparate solutions for access control and video surveillance as and when they find the resources, rather than developing a strategic plan to upgrade their system as a whole. This can put them at far greater risk of cyberattacks as all it takes is a single unprotected or improperly secured device to compromise an entire system. SMBs tend to think that, because they are not dealing in billions of dollars, cybercriminals won’t bother attacking their networks. However, SMBs are actually at a greater risk that their business might not survive the fallout or clean-up. A comprehensive approach to physical security that involves choosing trusted vendors is essential to a strong cybersecurity posture.

Card image cap
Sean Foley Interface Systems LLC

SMBs are frequently budget-constrained and do not have the luxury of large, sophisticated internal loss prevention and security resources. Unfortunately, this frequently leads to under-spec’ing the solution for a business's unique requirements. It is critical to spend the extra time educating customers and prospects on the latest technologies and to ensure any proposed solutions directly address their specific challenges. SMBs want to know the impact on the bottom line, they want easy-to-use applications and they want the implementation to be seamless. Accordingly, security solutions providers must clearly articulate why that upgrade from basic burglar alarm to the video-verified alarm is worth the investment. We need to show them the savings of, say, replacing a security guard with interactive virtual guard service. When proposing new video analytics applications, demonstrate a quantifiable impact on revenue. Every SMB customer has unique loss prevention requirements as well as business goals.


Editor Summary

SMBs tend to choose products rather than systems and often face integration problems as a result. They are more likely to buy security systems on a piecemeal basis, sometimes without a view toward a coherent and highly functional whole. SMBs also face challenges such as tight budgets, a lack of in-house IT talent, and fewer administrative resources. They are at particular risk when it comes to cybersecurity — and less likely to be adequately protected. Furthermore, the SMB market has faced unparalleled disruption in the time of COVID-19. In short, small and medium-sized businesses need to deploy the technologies of the security marketplace now more than ever.

Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Understanding AI-powered video analytics

Understanding AI-powered video analytics

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
Related articles
IDIS launches new AI PTZ cameras for enhanced security

IDIS launches new AI PTZ cameras for enhanced security

Everon & Alarm.com unify commercial security solutions

Everon & Alarm.com unify commercial security solutions

Axis joins CISA Secure by design for cybersecurity

Axis joins CISA Secure by design for cybersecurity

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Round table discussions
About this page

Discover top security challenges faced by SMBs and effective strategies for comprehensive protection, safeguarding data and assets.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec