Tag Archives: Integration

Consultative Selling: The Key to New Client Acquisition

This is a reasonable process map for the BtB sales cycle & pipeline management. It touches on opportunity analysis and sales strategy, where my passion lies. In this piece, I will build the case for a particular business model in … Continue reading

Posted in Business, Data Security, Information Security, Integration, Physical Security, Technology | Tagged , , , , , , , , , , , , , , , | Leave a comment

The Most Basic Physical Security Vulnerability

Mechanical Key Override I am so often amazed to see Security Integrators uninterested in the end-user/owner’s decision how to manage a mechanical key override solution for electronic access control. This is the most severe, easily recognized vulnerability in the entire … Continue reading

Posted in Identity Management, Integration, Physical Security, Technology | Tagged , , , , , , , | Leave a comment

Differentiating System Integration as a Service

Professional Services Role in Physical Security I find it interesting to note that most manufacturers in the security industry call their channel partners “Security Integrators”, rather than Security Contractors. It represents a fundamental misunderstanding of system delivery business models. Does … Continue reading

Posted in Integration, Physical Security, Technology | Tagged , , , , , , , , , , , , | Leave a comment

A Vision for Effective Application of Technology

Common Technology Oversights In my experience, there are three very common discoveries when I reach out to new potential partners: A lack of awareness that their existing systems have much more potential functionality than they currently utilize. A realization they … Continue reading

Posted in Integration, Physical Security, Technology | Tagged , , , , , , , , , , , | 1 Comment