Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Be your own Consumer Reports (And Don’t Believe Anybody!)

By Steve Hunt
September 13, 2006

I asked a group of security directors what product or service was most glaringly missing in the security industry. The unanimous response: Consumer Reports. Each one said they wished there was some independent, reliable source for product reviews, quality testing, and usability evaluations. In information technology, those sorts of reviews are all over the place. The team I ran at Forrester for a number of years and others like it, such as Yankee Group and Gartner Group, collect customer stories of what works and what doesn’t and report findings not unlike Ralph Nader’s famous advocacy magazine.

But the physical security industry doesn’t have anything like that. Sure, the trade magazines write “reviews” that basically restate marketing documents. And you can buy data reports about how much money is being spent on this technology or that. But independent testing and advocacy for the consumer is virtually absent. Therefore until I find a trustworthy source of product recommendations, my advice is “don’t believe anybody!”

BASIC VALUE PROPOSITIONS

I am an industry analyst, so many marketing folks believe I am an influencer of the market. As a result literally hundreds of technology companies pitch their products to me each year. My team and I take 30 minute briefings to understand the basic value proposition of each company and we keep our notes for later reference.

If a company is particularly interesting, we follow up with more conversations with technical staff, a demo and even calls to current customers. This is the best way to weed through the more than one thousand manufacturers and service providers serving the industry today.

So I’ll share with you some of the criteria we use to tell at a glance whether the company has their act together, or whether they are snake oil salesmen.

First, when the sales or marketing person starts talking, one of the first things you should hear is a description of a real problem that you are facing in the words you would probably use. That will show that the vendor has done his homework and understands what you and other security managers like you are facing.

I see a lot of vendors trying to sell products they created in a lab, far removed from the real life problems of the companies they are selling to. This annoys me. So I watch for the telltale signs of a company with a product in search of a problem to solve: Is there a lot of jargon and abbreviations in the presentation? If so, then either the presenter is a technical person who is not likely able to relate the technology to your problems, or the sales person is trying to hide the fact that he really doesn’t understand what he’s talking about. Either way, the vendor is not connected to the customer and probably has not designed the product to solve your specific problem.

Other vendors tell you that their solution is the greatest thing since sliced bread. But if you don’t get a clear description of what the product does NOT do, you should not believe the vendors’ claims of what the product does. Comments about competition reveal the best clues. The vendor should present two or more competitors and say how their own product differs. If you only hear that competitors are bad, then you can be sure that this sales person has no idea how to get value from his own product, let alone his competitors.

Keep an eye on my web site (www.4ai.com). I’ll soon publish a list of the companies with the best sales and marketing content and those with the cheesiest or most misleading. In the meantime, use some of these tips be become your own Consumer Reports.

On the Web Info Sources

Security Magazine columnist Steve Hunt is gearing up to provide the pros and cons of sales and marketing content through his Web site. In the meantime, try out the following:

Zalud's Blog provides a unique, daily twist on security technologies, products, about the security business and solutions at http://blog.securitymag.com.

The Security Industry Association, a trade group headquartered in Alexandria, Va., offers a free email-delivered news service that covers 15 topics of news and reports researched by LexisNexis from newspapers, journals, transcripts and other media sources. Go to http://go.reachmail.biz/SIA/ to sign up for one to all 15 of the newsletters. Subscribers receive headlines and links to full text. Four newsletters broadcast weekdays while the other 11 broadcast every other weekend.

Check out these sources.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Doorway to Cybersecurity

    Consumer Reports to Include Cybersecurity and Privacy in Product Reviews

    See More
  • holiday

    May your digital payments be secure & your APIs be merry and bright

    See More
  • Sustainability? Don’t Believe the Frog!

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing