Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Successful Relationship Management

By Jason Oakley
December 1, 2010

At the heart of customer relationship management (CRM) is the recognition that the customer is central to all business activities of the systems integrator, and that the success of the company is dependent on how well this is understood across all business operations. In practice, CRM is a partnership with the customer that goes well beyond the sales transaction by providing added value beyond the worth of the product. A true partnership equally benefits both the customer and the systems integrator.

 

Even with the best products and practices, system integrators who cultivate customer relationships/partnerships as an integral way of doing business will benefit in terms of financial success as well as name recognition and reputation that can be leveraged as a competitive advantage in a highly aggressive marketplace. The pay-off for the customer and how they go about realizing the benefits of the partnership, is equally as important. 



Moving Beyond the Sale

First, a systems integrator who is a technical partner provides solutions to integrate and manage security systems and processes and solve real business needs for the customer. Systems integrators, by their nature, have the expertise to design, procure and install video surveillance and security systems, but not all of them extend their service to include expertise that can help the customer achieve more efficiency in the operations and ultimately a safer and more secure environment.

An integrator partner (versus a sales organization) is not limited to designing systems or deploying applications but also offers expert guidance to the customer for decisions regarding repair or replacement; helps security and IT staff with budgeting; provides predictable costs for support and maintenance through a single contact; assures lowest cost of ownership and best ROI (return on investment); future proofs investments with scalable systems, and more.

Skilled integrator partners also have an in-depth knowledge of the system components and take responsibility for their operation. And from the customer’s perspective, issues such as trouble-shooting, diagnosing and problem resolution will be accomplished much faster with a single partner than when trying to work with several different manufacturers.


Focusing on the Customer

Next, the systems integrator partner understands the customer’s business as well as their security goals in order to deliver the best technology/product solution. With surveillance and security system technology changing at a rapid pace, customers need an experienced integrator partner who is continually up to date. Having the right partner to help sort through a variety of options can save time and resources and allow the customer to focus on their core responsibilities rather than on technical or product issues.

For instance, in the gaming industry an integrator partner will have knowledge of current rules and regulations that govern the use of cameras, and will be aware of the regulations regarding access to money areas per jurisdiction. A system integrator who knows how to install a software-based physical information management system, but does not know how the customer can improve business operations with its use, is not providing full value for the customer’s investment.

Security and surveillance products are teeming with features but the benefits must be clearly tied to a need/want of the customer if the feature is to have value. The resolution of a megapixel camera is wasted if the images are only displayed on a standard CRT monitor, whereas the “pop-up” video feature in an intelligent software control system can alert security to suspicious activity. Similarly, multiple video analytics exist that can provide a wide array of features not just in security, but marketing as well. This is value an integrator can provide to their customers.


Communication is Key

Finally, both the systems integrator and the customers who have established a successful, long-term working relationship know that communication is key. Regular sharing of information enables compromise and better management of expectations on both sides as well as establishing trust – and trust can lead to a willingness to be open to new opportunities, strategies, ideas and products. No one wants to be “sold” and by establishing trust through regular communication, the customer and the integrator can develop the basis of a strong business relationship.

In my experience, relationship management is more than just putting the customer first. It is an all-out effort to change the relationship to one of “person to person” rather than “client to vendor.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jason Oakley is CEO at North American Video, a leading provider of security systems integration technology and services. NAV has built a reputation for excellence by delivering solutions to clients in the gaming, education, corporate, transportation, critical infrastructure, government, healthcare, and hospitality, financial and retail markets.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Elements of a Successful Security Project

    See More
  • Reliable, Robust Networks Provide Foundation for Successful IP Implementations

    See More
  • Why It’s Time to Consider Managed Services

    See More

Related Products

See More Products
  • 9780128147948.jpg

    Effective Security Management, 7th Edition

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing