Innovative ways for control centers at the evalink Online Conference

It was magic! The third edition of the evalink Online Conference explored the latest trends, technologies, and solutions in alarm management with top industry experts. Were you looking for a recap? Here's what we discussed and learned in our first session hosted by Peter Monte and Lukas Kaiser, CEO and CPO at Sitasys

The first session explored the changing customer and installer behavior due to digitization and the resulting opportunities for advanced control centers and security providers. Dr. Peter Fey, long-time management consultant and member of the management board of Dr. Wieselhuber & Partner GmbH, joined the expert talk online from Munich, and Darian Haun, sales representative of the renowned CD Büttner Sicherheitstechnik GmbH from Hamburg. 

Blog Article - ENG Image.png


Customer behaviors are changing: How can control centers address their customers’ needs online?

As a starting point for the discussion, the experts used a Gartner forecast, according to which around 80% of sales activities will take place via digital channels by 2025. Also, Gartner's report predicts that 60% of sales organizations will move from experience-based sales processes to data-driven sales channels by 2025. The trend is clearly toward offering customers convenient services based on data in the future. Here, the COVID-19 pandemic and the associated increased relevance of the Internet are critical drivers for the fact that digital channels will play an increasingly central role in customer interaction.

Potential customers steadily find their way into the digital world, both professionally and privately. On the one hand, it was determined that it would be necessary to enhance digital security systems. On the other hand, it will also become increasingly important to establish and expand digital channels from and to customers to a security company or control center.

Since many security providers count both B2B and private clients among their customer portfolios, the discussion raised how security providers can best meet these differentiated needs.

We highlighted:

  • B2B customers are more often looking for integrated security solutions (see Session 2) 
  • Private customers are better informed than ever, thanks to their Internet research. 
  • Private customers make their purchase decision before even getting in touch with the respective security provider.

There was widespread agreement that personal contact still represents the highest lead qualification despite the increasing shift of customer interaction to the Internet. To enable the customer to make an informed decision, helping to develop customer knowledge through an open flow of information is essential. Not only in the field of highly complex alarm management can interested parties, therefore, benefit from corporate blogs to expand their horizons and know-how. 

Beyond that, the most important thing for companies is the creation of transparency: What exactly makes services in the field of security high-quality in the first place, and what is already possible today? Insights into a company’s certifications and technologies are a good reference point.   

Which technology drives trends in the security industry? 

How do overarching technological trends influence security technology in the long term?  

Dr. Peter Fey presented one of these trends, which has received increased attention in recent months but is still relatively unknown in the security technology industry: The EU's Gaia-X initiative, dedicated to data standards and networks, secures data infrastructures, among others. Today, the standards for handling highly technical, security-relevant data are set.

Data-driven business models in the security industry

Recently, it has been observed that so-called "data-driven business models" are increasingly moving into the limelight, in which data becomes the critical resource of a company. Companies with a data-driven business model base their core business on the acquisition, evaluation, or use of data to generate added value.

Picking up on this trend, the experts at the evalink Online Conference discussed how to get additional value out of data by cleverly combining generic data from safety technology which then could be used to optimize processes. Although security technology already today has many sensors at its disposal that provide a plethora of data, these are currently still being used somewhat cautiously. Security companies today usually do not exceed classic centralized data use.

Security companies that understand how to network the knowledge areas of classic security technology intelligently and data-driven information and communications technology will make their processes more efficient in the future.

This will enable them to offer their customers optimized benefits and added value. It is of the utmost importance to handle data sensitively and in a customer-compliant manner, following current data protection ordinances and regulations on data security. To ensure this for the alarm management platform evalink talos, it was equipped with the latest technology in its recompilation three years ago, guaranteeing its users maximum data security.

Addressing the subject of networking, we noted that the importance of intelligent data exchange between security systems is constantly growing. Although security systems have traditionally tended to be compartmentalized, this does not necessarily imply that the surrounding systems should not be used. A constructive flow of information and data between the methods could be facilitated by creating defined interfaces, making the designs more permeable in a controlled manner.

Control center viewpoints

Simplicity along with maximum high security - An impossibility?

Darian Haun from C.D. Büttner Sicherheitstechnik summed up the fact that digitization and the resulting changes in customer ideas, needs, and wishes can be quite a challenge for security providers: "In principle, it's exactly the balancing act that you have to manage: Offering a high level of security on the one hand and interfering as little as possible in everyday life on the other. There is a contradiction: the customer wants to have the highest level of security possible but wants to have to do the minimum in return," says Darian Haun. Particularly in the private sector, security technology is confronted with the challenge of striking a healthy balance when defining a well-rounded concept with the customer that brings together the various security installations into one single system.

Cloud solutions - The future of security?

However, in the commercial B2B sector, a classic heterogeneous security landscape is the norm in many cases. It would allow all these different systems to be connected to an emergency control center simplified while complying with the relevant security aspects, making using cloud solutions evident. They also allow companies with multiple venues to manage their sites centrally and conveniently from their headquarters.

However, the insights into the everyday life of a security service provider as represented by Mr. Haun also show that even though this already works very well in practice, e.g., with Brivo on the German market, large companies in the commercial sector are still very reluctant when it comes to the cloud.

This clearly shows that large companies that have already successfully moved their business activities to the cloud are role models for adoption. Nevertheless, a happy migration to the cloud requires a certain level of user trust, which security vendors must provide. "Security isn’t automatically improved when compartmentalized," reflects Lukas Kaiser, CPO of Sitasys AG. "There have to be local systems that run even when the Internet is unavailable. But again, to improve monitoring or data analysis, that does not mean you can't use other systems in the cloud."

Thus, it is becoming increasingly important for security companies to address the issues of "ease of use" and "trust in cloud solutions" in their communications. In addition, continuity continues to play an essential role in security. "Whether you're connected to the Internet or not, you shouldn't rest on an illusion of security. You have to consider continually: How can I protect myself against current and future threats?" was Lukas Kaiser's concluding food for thought to the first part of the evalink Online Conference participants.

Watch on-demand the evalink Online Conference Session 1: