Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Axis Event Focuses on Becoming Better Partners for End Users

axis-event1
End users and Axis professionals discuss the current state of cybersecurity risks. From left to right: Ryan Zatolokin (Axis Communications), Gil Brodnitz (Cybis), Joe McDonald (Switch), Dylan Hayes (Seattle Children’s Hospital) and Steve Surfaro (Axis Communications).
axis-event2
Perimeter protection, including thermal sensors, audio sensors and motion detection, was a hot topic for end users and integrators at the Axis Connect and Converge Conference looking to increase their ROI and mitigate risk in remote areas.
axis-event3
“Strategy first, then the technology,” said Mike Howard, CSO for Microsoft, at the ACCC on November 8 in Seattle.
axis-event4
James Stark, Director of Loss Prevention of Pier 1 Imports, was the first end user speaker at the Axis Connect and Converge Conference in Seattle this week, discussing the importance of cultivating loyal customers instead of just customer loyalty.
axis-event5
Fredrik Nilsson, Vice President, Americas, of Axis Communications, opened the conference by discussing knowledge, trust and value.
axis-event1
axis-event2
axis-event3
axis-event4
axis-event5
November 9, 2017

The annual Axis Connect and Converge Conference (ACCC), held this week in Seattle, typically provides the camera solutions company’s partners – integrators, vendors, consultants and more – an opportunity to see upcoming products and solutions, network, discuss industry trends and develop new business strategies. While there was plenty of opportunity for that this year, the keynotes, panels and breakout sessions frequently featured one major theme: Do you know what your end customer needs?

“Strategy first, then the technology,” said Mike Howard, CSO for Microsoft, during a morning keynote session. When it comes to building up his virtual security operations center, he reminded attendees that he and other end users are always looking to address “business processes with a digital construct,” but it always comes back to the business impact, not just the security impact.

James Stark, Director of Loss Prevention for Pier 1 Imports, reminded attendees that “cameras are not just for apprehensions and deterrence anymore,” especially with the addition of analytics and the value surveillance systems can provide other departments. The wide variety of solutions and potential benefits available today means that Stark has to pick strategic partners – not just vendors – who will listen to his needs and requirements and help him achieve the vision for the business.

Kevin Wren, a security leader from Rock Hill School District, addressed attendees about the potential benefits of Axis IP audio speakers for intrusion response as well as his district’s aggression detection pilot program, which is intended to detect verbal aggression between students before it escalates to a physical fight. “If I can translate my security project into a higher graduation rate, that’s ROI for my district,” he said.

There were still plenty of products and technologies to be discussed, from IP audio encoders and speakers to more advanced cameras for mass transit to access control readers enabled with HID’s mobile access capabilities and more. However, at the heart of the conference was the discussion of how to tailor those products and services to further a security director’s goal of becoming a stronger business enabler, like Traegon Hon, Director of Global Security Infrastructure for Starbucks Coffee, who builds up “strategic justification” for his security program requests through TCO and ROI metrics. (Check in later this month for an exclusive interview with Hon about his work at Starbucks and building effective metrics.)

This insight for integrators and vendors was geared to change the conversation away from “what can I sell you” to “what challenge can I help you solve.” Multiple end user panelists and speakers reiterated the challenges they’re facing, with mounting risks and responsibilities including cyber, supply chains, insider threats and more, adding that they cannot be experts in all fields, so they’re relying on external partners – trusted vendors, integrators and consultants – to help.

As James Stark of Pier 1 quoted: “If you do today what you did yesterday, you’re a day behind.” The Axis Communications event worked to facilitate a shift in the industry conversation away from the solely sales-driven focus of yesterday and toward business-enablement, partnerships and fostering loyal customers for years to come. 

KEYWORDS: business enabler business strategy security risk management security technology

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing