Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Talk ColumnVideo Surveillance

Understanding the DIY Security Trend

When know-how information, or knowledge, is scarce, customers overcome it by doing it themselves.

May 9, 2013

When know-how information, or knowledge, is scarce, customers overcome it by doing it themselves.  This isn’t a new trend; it happens in every industry that experiences significant change within a short period of time. Customers who are eager to apply leading-edge technologies are forced to develop know-how, pay a significant premium, or wait until the knowledge becomes a commodity. The only problem with these choices in the early years is that technology advances faster than know-how, until the technology itself becomes commoditized. So for several years the DIY, or “Do It Yourself,” demographic rapidly expands. These customers truly finance the innovative and transformational technologies.  Without them, the status quo would prevail for longer periods of time.   

 

Discontinuous Innovation

Types of innovation that require significant behavioral change for the users within a marketplace are disruptive. In order to facilitate behavior change, a great deal of learning must take place prior to the behavior change. Within the surveillance industry these innovations are digital recording, IP cameras, mega-pixel resolution, analytics and video management software. Several innovations are converging to create a surveillance platform that is discontinuous from the old analog CCTV world. Early adoption of a discontinuous innovation requires a certain type of individual, one that is self-directed in their ability to learn. These early adopters will always include some business consultants, forward-thinking end-users, and innovative systems integrators who are all willing to change their behaviors.

           

Self-Directed Surveillance “On The Job - Know How”

The challenge for many DIYers is gaining access to the information necessary to begin learning.  Many manufacturers of these new technologies are not mature businesses yet, so they lack the necessary support resources for their customers. Nor do they fully understand themselves what is the required know-how. This typically forces many DIYers to purchase a system first, and then learn on the job. These on-the-job experiences are typically not good at first because there are many know-how problems with the systems, causing relationships among the suppliers, partners and end-users to become strained. If the new systems being deployed are in a production environment, this can cause additional strained relationships between the security department and the internal IT departments. However, if the approach was to learn using a proof of concept in a non-production environment many of these experiences of on the job learning could be improved. Last, it’s critical for the proof of concept to be set up as a learning initiative. This will establish the correct expectations for the DIY demographic.

 

DIY and/or SI Partner

The surveillance industry has revealed a lot about this DIY market over the past five years. The DIY demographic is not only thriving but is a huge purchasing force that if thought of as a partner “channel,” it would be in some cases as big as the actual systems integrator partner “channel.”  The reality is when you analyze the DIY “channel” purchasing power, it is typically made up of very large end-users that purchase thousands of ports of networked surveillance a year for several years, behaving much like an annuity, and as these types of relationship expand they have a compounding effect on the manufacturer’s sales volumes. DIY customers are very loyal, and year-after-year, they like to make big-platform-like decisions, which allow them to leverage their resulting know-how and will scale their solution.

 

Mitigating Customer Conflicts

With such a lack of competency within the early adoption phase of the IP surveillance market, customer conflicts will grow, often a result of unclear or realistic expectations typically developed during the design phase or presales phase of a project. In addition, most of the customer budget typically is used during the installation process leaving little to nothing for customer training or system maintenance. This leads to the DIY end-user having to invest additional resources and budget themselves to address these needs.

 

Next Big Thing - Managed Services

As the DIY customers mature they often will look to outsource the management of these large deployments what was the new discontinuous innovation, often a result of an increasing annual expense that needs to be lowered. This is the next phase of the IP surveillance market and systems integrators are working to build offering for the DIYs. The rise of “managed” services also isn’t a new concept; if you look at the evolution of the IT industry as a model, you can see the same market transitions. Today, almost all IT systems integrators provide managed services of some type. While these offerings within the surveillance industry are very limited today, they will expand as a natural evolution of the market. This evolution – managed services as a means of improving customer relationships – will be the discussion for my next couple of monthly columns. 

 

About the Columnist:

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries.


Read moreSurveillance Strategies online at
 SecurityMagazine.com/Columns/Surveillance

 

 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The DIY Threat to Security

    See More
  • cloudnetwork

    SASE is the security trend of the decade

    See More
  • the cloud

    Migrating Physical Security to the Cloud: Understanding the Total Cost of Ownership

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products

Events

View AllSubmit An Event
  • February 20, 2025

    Ideological Tensions in the Workplace: Understanding and Mitigating Risks of Violence

    ON DEMAND: Organizations face evolving threats, including workplace violence stemming from ideological tensions, political polarization, economic disparities, and other factors.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing