Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Be your own Consumer Reports (And Don’t Believe Anybody!)

By Steve Hunt
September 13, 2006

I asked a group of security directors what product or service was most glaringly missing in the security industry. The unanimous response: Consumer Reports. Each one said they wished there was some independent, reliable source for product reviews, quality testing, and usability evaluations. In information technology, those sorts of reviews are all over the place. The team I ran at Forrester for a number of years and others like it, such as Yankee Group and Gartner Group, collect customer stories of what works and what doesn’t and report findings not unlike Ralph Nader’s famous advocacy magazine.

But the physical security industry doesn’t have anything like that. Sure, the trade magazines write “reviews” that basically restate marketing documents. And you can buy data reports about how much money is being spent on this technology or that. But independent testing and advocacy for the consumer is virtually absent. Therefore until I find a trustworthy source of product recommendations, my advice is “don’t believe anybody!”

BASIC VALUE PROPOSITIONS

I am an industry analyst, so many marketing folks believe I am an influencer of the market. As a result literally hundreds of technology companies pitch their products to me each year. My team and I take 30 minute briefings to understand the basic value proposition of each company and we keep our notes for later reference.

If a company is particularly interesting, we follow up with more conversations with technical staff, a demo and even calls to current customers. This is the best way to weed through the more than one thousand manufacturers and service providers serving the industry today.

So I’ll share with you some of the criteria we use to tell at a glance whether the company has their act together, or whether they are snake oil salesmen.

First, when the sales or marketing person starts talking, one of the first things you should hear is a description of a real problem that you are facing in the words you would probably use. That will show that the vendor has done his homework and understands what you and other security managers like you are facing.

I see a lot of vendors trying to sell products they created in a lab, far removed from the real life problems of the companies they are selling to. This annoys me. So I watch for the telltale signs of a company with a product in search of a problem to solve: Is there a lot of jargon and abbreviations in the presentation? If so, then either the presenter is a technical person who is not likely able to relate the technology to your problems, or the sales person is trying to hide the fact that he really doesn’t understand what he’s talking about. Either way, the vendor is not connected to the customer and probably has not designed the product to solve your specific problem.

Other vendors tell you that their solution is the greatest thing since sliced bread. But if you don’t get a clear description of what the product does NOT do, you should not believe the vendors’ claims of what the product does. Comments about competition reveal the best clues. The vendor should present two or more competitors and say how their own product differs. If you only hear that competitors are bad, then you can be sure that this sales person has no idea how to get value from his own product, let alone his competitors.

Keep an eye on my web site (www.4ai.com). I’ll soon publish a list of the companies with the best sales and marketing content and those with the cheesiest or most misleading. In the meantime, use some of these tips be become your own Consumer Reports.

On the Web Info Sources

Security Magazine columnist Steve Hunt is gearing up to provide the pros and cons of sales and marketing content through his Web site. In the meantime, try out the following:

Zalud's Blog provides a unique, daily twist on security technologies, products, about the security business and solutions at http://blog.securitymag.com.

The Security Industry Association, a trade group headquartered in Alexandria, Va., offers a free email-delivered news service that covers 15 topics of news and reports researched by LexisNexis from newspapers, journals, transcripts and other media sources. Go to http://go.reachmail.biz/SIA/ to sign up for one to all 15 of the newsletters. Subscribers receive headlines and links to full text. Four newsletters broadcast weekdays while the other 11 broadcast every other weekend.

Check out these sources.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

Coding

Epstein File Data Security Update: Raw Code Found in Emails

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

NFL footballs

Security Risks Around Super Bowl LX: What Security Leaders Should Be Watching

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Doorway to Cybersecurity

    Consumer Reports to Include Cybersecurity and Privacy in Product Reviews

    See More
  • holiday

    May your digital payments be secure & your APIs be merry and bright

    See More
  • Sustainability? Don’t Believe the Frog!

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing