Owning the End User

Author: John Honovich, Published on Sep 13, 2011

Integrators routinely block end users from the best solutions, steering users to offerings that maximize the integrator's probability of success and profit. However, end users rarely understand the dynamics involved. In this report, we explain the problem, the issues involved and potential solutions.

Owning the End User

The nastiest battles between manufacturers and integrators is over who "owns" the end user. It is very common for integrators to demand that manufacturers only speak to "their" end users when approved and chaporoned by the integrator. Many integrators feel, and want, to 'own' the end user relationship. Manufacturers who set up meetings directly with end user often results in phone calls highlighted by screaming, yelling and cursing. We have been on both sides of such encounters.

The process of an integrator screening manufacturers has advantages and disadvantages:

  • On the positive side, the integrator can vet manufacturers, rejecting ones that obviously are a poor fit. This saves the end user time and headache.
  • On the negative side, the integrator can block manufacturers who do not provide them favorable terms or who are aligned with rival integrators. This prevents the end user from considering promising solutions.

The Problem

The incumbent integrator often has adverse incentives to their end user. Since the integrator already has the customer's business, the most immediate tactical concern is to protect the status quo. As such, incumbent integrators are often conservative because changing products can trigger reviews of new suppliers or new bidding.

On a local level, the integrator account manager of a large customer has a lot riding on continued business from that customer:

  • Not only is the account manager's income overwhelmingly dependent on that client, losing their main customer could cost them their job. 
  • By contrast, the upside of switching to a new platform or product is low to the account manager since they are already generating significant revenue and commission on existing sales.
  • Finally, the current platform or products being sold by the integrator often is a line that the integrator has good pricing or restricted access. Moving to something new can disrupt their existing competitive advantage.

However, the outside integrator's tactics often run contrary to the best interests of the end user:

  • The outside integrator is motivated to criticize the current solution, regardless of the quality level. If the end user is not convinced a product or platform change is needed, switching integrators is much harder.
  • The outside integrator will likely recommend products they have better pricing for and or have restricted access to sell (i.e., they are dealers but the incumbent is not).
  • The outside integrator is motivated to over sell new technologies to motivate the customer to switch. However, these technologies may be immature or work poorly in your environment.

What to Do?

There is no simple way to determine who is the good guy or bad guy as the quality and committment levels of integrators range widely. However, the first step is to appreciate that these drivers do exist and commonly shape what is recommended.

Here are some considerations for end users with their incumbent integrator:

  • Do not give your integrator power to reject products or manufacturers without first consulting you. This is too much power and can lead to abuse.
  • Challenge your integrator to regularly offer new manufacturer's products or platforms. At the very least they should explain the options, pros and cons of each (keeping in mind they might be motivated to discourage you to change).

Likewise, when evaluating new products directly from manufacturers or from rival integrators:

  • Be skeptical of pitches for new technology. Vet references carefully. Do real on-site tests. Your current integrator may very well be trying to protect you from a shady operator trying to take advantage of you.
  • Inquire over what terms or restrictions the outside integrator has on the products they are recommending you. Remember they might be pushing a specific thing mainly because it is their best chance of ousting the incumbent.

It would be nice to think that all suppliers have end user's best interests at heart. However, often they do not. End users would be well served to watch out for these specific patterns of bias.

Related Reports

Integrator Managing Projects Statistics on Dec 14, 2017
Who actually manages projects for security integrators? Does the average security integrator have dedicated project managers, or are technicians,...
Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...
Integrator GPS Vehicle Tracking Statistics and Success Examined on Dec 08, 2017
GPS vehicle tracking is a growing but somewhat controversial topic. On the plus side, tracking may increases productivity by providing greater...
Security Integrator IT Expertise Statistics on Dec 07, 2017
20 years ago, putting physical security systems on IP networks was just emerging. Today, almost every system is networked in some way, IP cameras...
Risks Of Managing End User Passwords (Statistics) on Dec 05, 2017
Integrators know admin passwords for nearly all end-user systems, according to IPVM statistics. But how do they manage them? How do they ensure...
Top Recommended Home Video Surveillance Systems By Integrators on Dec 01, 2017
Friends regularly ask security integrators for their recommendations for video surveillance systems, trying to tap into the expertise of their...
Favorite Surveillance Monitors Statistics on Nov 29, 2017
What monitors are most commonly used for video surveillance? Are they more typically consumer or professional? Are there specific brands that...
The Race To The Bottom Is Over on Nov 28, 2017
The race to the bottom in video surveillance is over. After 3 years of aggressive price cuts and heavy sales and marketing expenditures, the...
Camera Multi-Streaming Usage on Nov 22, 2017
IP cameras typically support multiple streams, allowing a single camera to transmit multiple streams at different resolutions, frame rates and even...
Law Breaking Longse Enters USA on Nov 22, 2017
Longse has established itself as world class, at least in spamming the industry, ripping off Milestone and Video Insight as well as Hikvision. But...

Most Recent Industry Reports

Integrator Managing Projects Statistics on Dec 14, 2017
Who actually manages projects for security integrators? Does the average security integrator have dedicated project managers, or are technicians,...
Hikvision NVR Load Testing on Dec 14, 2017
IPVM members recently debated Hikvision NVR's performance under load in Hikvision 30+ Cameras On NVR - Apps And Client Really Slow Down And CPU...
Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...
BBC Features Dahua on Dec 13, 2017
Hikvision is not the only mega-Chinese video surveillance manufacturer getting global attention. Last month, the WSJ investigated Hikvision and now...
Hiring Camera Calculator Product Manager on Dec 12, 2017
We are working on making the Camera Calculator even better and hoping you can help us find the right person to join our team. IPVM is hiring a...
Testing $20 WyzeCam, The Money Losing Amazon Vet Startup on Dec 12, 2017
This startup is perfecting the old adage: We lose money on every sale, but make it up on volume But it is no joke. The company, Wyze Labs, is...
Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks on Dec 12, 2017
The Chinese manufacturer whose products were primarily responsible for the 2016 Mirai botnet attack has a new critical vulnerability, confirmed by...
Robot Vandalism on Dec 11, 2017
Vandalism of security systems is a common concern. It is so common that camera vandalism statistics show that designers routinely sacrifice camera...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact