Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementVideo SurveillanceCybersecurity News

How to Choose a Trusted Vendor

A Guide for SMBs Navigating the Security Landscape

By Aaron Saks
cyber-SMB
January 15, 2019

Small and mid-sized businesses (SMBs) face unique challenges when choosing a security solution. While large businesses enjoy entire departments devoted to addressing the many facets of security – video surveillance cameras, video management, access control, network infrastructure – SMBs have limited resources to help them select and maintain a security solution. Cybersecurity threats that can damage or permanently ruin a business are also becoming big risks to SMBs via the very same security systems they choose to protect them. When evaluating security providers, it’s essential for SMBs to conduct research and carefully consider the numerous options available.

Here are some important questions SMBs should ask when navigating the security landscape.

 

What is the right solution? One size does not fit all.

Beware of security vendors that offer a “one size fits all” solution. SMBs come in many shapes and sizes, and their needs vary, as well. A security vendor should have enough depth and breadth to their project lineup to be able to offer multiple solutions. Some SMBs might want to focus on access control while others might be interested in video surveillance. Some want a small camera installation now, but in the future want to scale to hundreds of cameras. This is where choosing a provider that manufacturers its own products is very important: they will have more differentiation in their lineup. Choosing a manufacturer that OEMs someone else’s products will have fewer options and will be more likely to push a one size fits all option.

 

Does the vendor manufacture its own products?

There are a great number of security manufacturers – both known and unknown. When choosing a vendor, ask the representative if the company manufactures its own products. Oftentimes, a company OEMs the product – placing its logo on a product made by another company. This can lead to many problems: uncertainty about the quality of the product’s components, inability to find replacement parts, the amount of time to fix or replace the product, poor software support and cyber threats. When a vendor manufactures its own products, they know where the product was assembled, with what parts, how it works with other systems, how to fix it and how long it will take. They also have engineers on staff to address those issues that might escalate beyond a known problem.

 

Is the security solution easy to use?

When SMB owners invest in a security solution, they are going to be more interested in using the product and not learning it. When evaluating security products, it’s essential to evaluate the product’s ease of use. The best technology won’t make a difference if users can’t quickly and easily learn the product. Video Management Software (VMS), for example, can be sophisticated, but it can also be functional. SMBs often use a handful of tasks – viewing live video, using a mobile app, taking a snapshot to send to management or law enforcement – and these tasks should be easy to learn. SMBs cannot afford to send employees to time-consuming training. The vendor should provide efficient yet thorough training as well as webinars, online training modules and educational collateral for continued education. They should also have a reliable technical support department that’s responsive and works with customers to answer inquiries and quickly resolve issues.

 

How does the vendor approach cybersecurity, cyber threats and vulnerabilities?

Most associate physical security with video surveillance cameras or access control credentials and for good reason: these tools help protect property and employees from physical threats and help resolve issues once they occur. But advances in technology and the reliance of security products on IT networks and the internet have given cybercriminals an opportunity to invade security components, making companies vulnerable to costly data breaches and malware. Large businesses are often the target of cybercrime, but they are better prepared to protect themselves because they have more resources.

Just because an SMB is smaller, however, an owner can’t have the attitude that they won’t be a target. Cybercriminals seek out the easiest targets and they might assume that a video surveillance camera is an easy way to hack into a connected network. It’s absolutely essential to choose a trusted security provider that treats cybersecurity as a priority. One way to evaluate this is to ask the potential vendor about their commitment to Research and Development (R&D) and any routine testing they conduct to ensure their products are secure and exceed the highest of standards.

 

What does the vendor do when a breach happens?

Ask the potential security vendor how they treat cyber threats. They should have a team dedicated to addressing security vulnerabilities that responds promptly any time an issue is reported. If it’s a software issue, they should make a patch available as soon as possible and communicate the resolution in an efficient manner. A company that is decisive and transparent about cyber breaches is one that can be trusted.

KEYWORDS: cyber risk management cyber threats security technology small and midsized business (SMB) security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Aaron saks
Aaron Saks is Product and Technical Manager at Hanwha Techwin America.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Cables plugged in

Chinese Supercomputer Allegedly Hacked, 10 Petabytes of Data Stolen

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Abstract shape

What Are Security Experts Saying About Claude Mythos and Project Glasswing?

Padlock with computer keys

Breach of FBI Surveillance System Considered a “Major Incident,” Security Experts Weigh In

AI

AI Startup Mercor, Which Works With Open AI and Anthropic, Confirms Data Breach

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 30, 2026

Building a Campus-Wide Culture of Security and Shared Responsibility

In today’s higher education environment, where institutions face evolving and multifaceted incidents, safety must be embedded into the fabric of campus culture. Learn strategies for generating collective buy-in from faculty, staff, students and senior leadership. 

May 7, 2026

Beyond Cameras: Revolutionizing Perimeter Security with LiDAR, AI and Digital Twins

In this webinar, we will explore how LiDAR‑based detection, AI‑powered analytics and digital twins are transforming the future of perimeter protection with 3D detection, real-time situational awareness and unified operational views.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • driver_enews

    How to Choose a Security-Trained Driver (And Why You Need One)

    See More
  • Strong Cybersecurity: The Critical Role of Lifecycle Management - Security Magazine

    The trusted supply chain and cybersecurity

    See More
  • smart access control system

    How to choose the right access control system

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing