Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Successful Relationship Management

By Jason Oakley
oakley
December 1, 2010

At the heart of customer relationship management (CRM) is the recognition that the customer is central to all business activities of the systems integrator, and that the success of the company is dependent on how well this is understood across all business operations. In practice, CRM is a partnership with the customer that goes well beyond the sales transaction by providing added value beyond the worth of the product. A true partnership equally benefits both the customer and the systems integrator.

 

Even with the best products and practices, system integrators who cultivate customer relationships/partnerships as an integral way of doing business will benefit in terms of financial success as well as name recognition and reputation that can be leveraged as a competitive advantage in a highly aggressive marketplace. The pay-off for the customer and how they go about realizing the benefits of the partnership, is equally as important. 



Moving Beyond the Sale

First, a systems integrator who is a technical partner provides solutions to integrate and manage security systems and processes and solve real business needs for the customer. Systems integrators, by their nature, have the expertise to design, procure and install video surveillance and security systems, but not all of them extend their service to include expertise that can help the customer achieve more efficiency in the operations and ultimately a safer and more secure environment.

An integrator partner (versus a sales organization) is not limited to designing systems or deploying applications but also offers expert guidance to the customer for decisions regarding repair or replacement; helps security and IT staff with budgeting; provides predictable costs for support and maintenance through a single contact; assures lowest cost of ownership and best ROI (return on investment); future proofs investments with scalable systems, and more.

Skilled integrator partners also have an in-depth knowledge of the system components and take responsibility for their operation. And from the customer’s perspective, issues such as trouble-shooting, diagnosing and problem resolution will be accomplished much faster with a single partner than when trying to work with several different manufacturers.


Focusing on the Customer

Next, the systems integrator partner understands the customer’s business as well as their security goals in order to deliver the best technology/product solution. With surveillance and security system technology changing at a rapid pace, customers need an experienced integrator partner who is continually up to date. Having the right partner to help sort through a variety of options can save time and resources and allow the customer to focus on their core responsibilities rather than on technical or product issues.

For instance, in the gaming industry an integrator partner will have knowledge of current rules and regulations that govern the use of cameras, and will be aware of the regulations regarding access to money areas per jurisdiction. A system integrator who knows how to install a software-based physical information management system, but does not know how the customer can improve business operations with its use, is not providing full value for the customer’s investment.

Security and surveillance products are teeming with features but the benefits must be clearly tied to a need/want of the customer if the feature is to have value. The resolution of a megapixel camera is wasted if the images are only displayed on a standard CRT monitor, whereas the “pop-up” video feature in an intelligent software control system can alert security to suspicious activity. Similarly, multiple video analytics exist that can provide a wide array of features not just in security, but marketing as well. This is value an integrator can provide to their customers.


Communication is Key

Finally, both the systems integrator and the customers who have established a successful, long-term working relationship know that communication is key. Regular sharing of information enables compromise and better management of expectations on both sides as well as establishing trust – and trust can lead to a willingness to be open to new opportunities, strategies, ideas and products. No one wants to be “sold” and by establishing trust through regular communication, the customer and the integrator can develop the basis of a strong business relationship.

In my experience, relationship management is more than just putting the customer first. It is an all-out effort to change the relationship to one of “person to person” rather than “client to vendor.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jason oakley cropped

Jason Oakley is CEO at North American Video, a leading provider of security systems integration technology and services. NAV has built a reputation for excellence by delivering solutions to clients in the gaming, education, corporate, transportation, critical infrastructure, government, healthcare, and hospitality, financial and retail markets.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Elements of a Successful Security Project

    See More
  • Reliable, Robust Networks Provide Foundation for Successful IP Implementations

    See More
  • Why It’s Time to Consider Managed Services

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing