This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Blogs » Security Blog » Axis Event Focuses on Becoming Better Partners for End Users

Axis Event Focuses on Becoming Better Partners for End Users

axis-event1
End users and Axis professionals discuss the current state of cybersecurity risks. From left to right: Ryan Zatolokin (Axis Communications), Gil Brodnitz (Cybis), Joe McDonald (Switch), Dylan Hayes (Seattle Children’s Hospital) and Steve Surfaro (Axis Communications).
axis-event2
Perimeter protection, including thermal sensors, audio sensors and motion detection, was a hot topic for end users and integrators at the Axis Connect and Converge Conference looking to increase their ROI and mitigate risk in remote areas.
axis-event3
“Strategy first, then the technology,” said Mike Howard, CSO for Microsoft, at the ACCC on November 8 in Seattle.
axis-event4
James Stark, Director of Loss Prevention of Pier 1 Imports, was the first end user speaker at the Axis Connect and Converge Conference in Seattle this week, discussing the importance of cultivating loyal customers instead of just customer loyalty.
axis-event5
Fredrik Nilsson, Vice President, Americas, of Axis Communications, opened the conference by discussing knowledge, trust and value.
axis-event1
axis-event2
axis-event3
axis-event4
axis-event5
November 9, 2017
KEYWORDS business enabler / business strategy / security risk management / security technology
Reprints

The annual Axis Connect and Converge Conference (ACCC), held this week in Seattle, typically provides the camera solutions company’s partners – integrators, vendors, consultants and more – an opportunity to see upcoming products and solutions, network, discuss industry trends and develop new business strategies. While there was plenty of opportunity for that this year, the keynotes, panels and breakout sessions frequently featured one major theme: Do you know what your end customer needs?

“Strategy first, then the technology,” said Mike Howard, CSO for Microsoft, during a morning keynote session. When it comes to building up his virtual security operations center, he reminded attendees that he and other end users are always looking to address “business processes with a digital construct,” but it always comes back to the business impact, not just the security impact.

James Stark, Director of Loss Prevention for Pier 1 Imports, reminded attendees that “cameras are not just for apprehensions and deterrence anymore,” especially with the addition of analytics and the value surveillance systems can provide other departments. The wide variety of solutions and potential benefits available today means that Stark has to pick strategic partners – not just vendors – who will listen to his needs and requirements and help him achieve the vision for the business.

Kevin Wren, a security leader from Rock Hill School District, addressed attendees about the potential benefits of Axis IP audio speakers for intrusion response as well as his district’s aggression detection pilot program, which is intended to detect verbal aggression between students before it escalates to a physical fight. “If I can translate my security project into a higher graduation rate, that’s ROI for my district,” he said.

There were still plenty of products and technologies to be discussed, from IP audio encoders and speakers to more advanced cameras for mass transit to access control readers enabled with HID’s mobile access capabilities and more. However, at the heart of the conference was the discussion of how to tailor those products and services to further a security director’s goal of becoming a stronger business enabler, like Traegon Hon, Director of Global Security Infrastructure for Starbucks Coffee, who builds up “strategic justification” for his security program requests through TCO and ROI metrics. (Check in later this month for an exclusive interview with Hon about his work at Starbucks and building effective metrics.)

This insight for integrators and vendors was geared to change the conversation away from “what can I sell you” to “what challenge can I help you solve.” Multiple end user panelists and speakers reiterated the challenges they’re facing, with mounting risks and responsibilities including cyber, supply chains, insider threats and more, adding that they cannot be experts in all fields, so they’re relying on external partners – trusted vendors, integrators and consultants – to help.

As James Stark of Pier 1 quoted: “If you do today what you did yesterday, you’re a day behind.” The Axis Communications event worked to facilitate a shift in the industry conversation away from the solely sales-driven focus of yesterday and toward business-enablement, partnerships and fostering loyal customers for years to come. 

Blog Topics

Security Blog

On the Track of OSAC

Recent Comments

Insufficient information

Thankyou so much for sharing such an informative...

I just wish my mechanical lock had a...

security

Security

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

cybersecurity breach

The Top 12 Data Breaches of 2019

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing