Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Talk ColumnVideo Surveillance

Understanding the DIY Security Trend

When know-how information, or knowledge, is scarce, customers overcome it by doing it themselves.

DIY feat
May 9, 2013

When know-how information, or knowledge, is scarce, customers overcome it by doing it themselves.  This isn’t a new trend; it happens in every industry that experiences significant change within a short period of time. Customers who are eager to apply leading-edge technologies are forced to develop know-how, pay a significant premium, or wait until the knowledge becomes a commodity. The only problem with these choices in the early years is that technology advances faster than know-how, until the technology itself becomes commoditized. So for several years the DIY, or “Do It Yourself,” demographic rapidly expands. These customers truly finance the innovative and transformational technologies.  Without them, the status quo would prevail for longer periods of time.   

 

Discontinuous Innovation

Types of innovation that require significant behavioral change for the users within a marketplace are disruptive. In order to facilitate behavior change, a great deal of learning must take place prior to the behavior change. Within the surveillance industry these innovations are digital recording, IP cameras, mega-pixel resolution, analytics and video management software. Several innovations are converging to create a surveillance platform that is discontinuous from the old analog CCTV world. Early adoption of a discontinuous innovation requires a certain type of individual, one that is self-directed in their ability to learn. These early adopters will always include some business consultants, forward-thinking end-users, and innovative systems integrators who are all willing to change their behaviors.

           

Self-Directed Surveillance “On The Job - Know How”

The challenge for many DIYers is gaining access to the information necessary to begin learning.  Many manufacturers of these new technologies are not mature businesses yet, so they lack the necessary support resources for their customers. Nor do they fully understand themselves what is the required know-how. This typically forces many DIYers to purchase a system first, and then learn on the job. These on-the-job experiences are typically not good at first because there are many know-how problems with the systems, causing relationships among the suppliers, partners and end-users to become strained. If the new systems being deployed are in a production environment, this can cause additional strained relationships between the security department and the internal IT departments. However, if the approach was to learn using a proof of concept in a non-production environment many of these experiences of on the job learning could be improved. Last, it’s critical for the proof of concept to be set up as a learning initiative. This will establish the correct expectations for the DIY demographic.

 

DIY and/or SI Partner

The surveillance industry has revealed a lot about this DIY market over the past five years. The DIY demographic is not only thriving but is a huge purchasing force that if thought of as a partner “channel,” it would be in some cases as big as the actual systems integrator partner “channel.”  The reality is when you analyze the DIY “channel” purchasing power, it is typically made up of very large end-users that purchase thousands of ports of networked surveillance a year for several years, behaving much like an annuity, and as these types of relationship expand they have a compounding effect on the manufacturer’s sales volumes. DIY customers are very loyal, and year-after-year, they like to make big-platform-like decisions, which allow them to leverage their resulting know-how and will scale their solution.

 

Mitigating Customer Conflicts

With such a lack of competency within the early adoption phase of the IP surveillance market, customer conflicts will grow, often a result of unclear or realistic expectations typically developed during the design phase or presales phase of a project. In addition, most of the customer budget typically is used during the installation process leaving little to nothing for customer training or system maintenance. This leads to the DIY end-user having to invest additional resources and budget themselves to address these needs.

 

Next Big Thing - Managed Services

As the DIY customers mature they often will look to outsource the management of these large deployments what was the new discontinuous innovation, often a result of an increasing annual expense that needs to be lowered. This is the next phase of the IP surveillance market and systems integrators are working to build offering for the DIYs. The rise of “managed” services also isn’t a new concept; if you look at the evolution of the IT industry as a model, you can see the same market transitions. Today, almost all IT systems integrators provide managed services of some type. While these offerings within the surveillance industry are very limited today, they will expand as a natural evolution of the market. This evolution – managed services as a means of improving customer relationships – will be the discussion for my next couple of monthly columns. 

 

About the Columnist:

Keven Marier is the founder and CEO of Connex International, Inc. He has a 20-year background in technology consulting, publishing and educating within the physical security technology and enterprise IT industries.


Read moreSurveillance Strategies online at
 SecurityMagazine.com/Columns/Surveillance

 

 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1120-talk-Feat-slide1_900px

    ‘Tis the season for security grants

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing