What I Learned from Honeywell’s Scott Harkins in a Pre-ISC West Google Hangout

I, along with 9 other media professionals dedicated to the security industry, was privileged to participate in a Google Hangout with the President of Honeywell Security Products Americas, Scott Harkins. In this informal and rather candid, pre-ISC West Show event, complete with coffee in hand, Harkins' goal was to explain consumer trends and how each trend connects to the home space as well as business. Overall, consumer trends are changing as consumer's expectations are changing, and the way the security industry responds is the key to success.

According to Harkins, there are six trends that are shaping the way in which the security industry must respond to consumers, whether in the residential or business sector.

Smartphones – These devices are becoming the way that we, as a society, interact with the world. In fact, Smartphones have taken command of the market by becoming 75% of all cell phones within society. Therefore, whatever type of security product that a consumer purchases, it needs to interact with a Smartphone to create ease-of-use.

Pervasiveness of Broadband – Basically, whoever wants the Internet has it, so the security industry must find a way to fill this pipeline by providing products that interact with the Internet as well as the consumer.

Touchscreen – Consumers are seeking an interactive experience with the world around them due to Smartphones, televisions, computers, cars, etc. all having touchscreen capability. Historically, the security industry utilized no touchscreens, with only 2% of the whole industry implementing keypads.

Integration – Consumers are expecting more and more from their security systems. They want products that will turn the lights off and on, lock and unlock doors, adjust temperatures as well as protect their environments. Basically, consumers are seeking connections, so products must be able to do more than one task.

The Cloud – "Approximately 74% of all businesses use some sort of cloud service," said Harkins. He believes that the term "cloud" is a overused, but agrees that it is the beginning of a significant transition that allows security product solution providers to create and deploy systems at a cheaper cost and pass the savings on to the consumer.

Overall User Experience – Every interaction with a security product must impact consumers, whether they are the end users or the dealers. From how a product is packaged to how it comes out of the packaging to how it hangs on the wall to providing an app to control other things, the consumer expects each of these experiences to provide them with some type of impact.

How is Honeywell responding to these consumer trends?

Honeywell invested, and is still investing thousands, of dollars to interview numerous consumers to determine their expectations when it comes to security products. So far, Honeywell has learned that consumers want to make sure the experience in their home, at their wall, with their security system is rich. Consumers do not want to be totally dependent on their Smartphones or tablet to interact with their system, although they do want this option offered to them. So, Honeywell makes sure that each of their products is intuitive, easy-to-install, and provides life safety and life style functionality.

"The reality is trying to understand what the consumer wants," said Harkins. And, by taking such a proactive approach to learning the consumers needs and wants seems to be one of the keys to Honeywell's overall success in the security industry.

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

    CISA Kicks Off 20th Anniversary of Cybersecurity Awareness Month

    The Cybersecurity and Infrastructure Security Agency (CISA) recently announced the kickoff of the 20th Cybersecurity Awareness Month. Throughout October, CISA and the National Cybersecurity Alliance (NCA) will focus on ways to “Secure Our World” by educating the public on how to stay safe online. Read Now

  • Cybersecurity Awareness Month: Top Five Action Items to Elevate Your Data Security Posture Management and Secure Your Data

    October is Cybersecurity Awareness Month, and every year most tips for security hygiene and staying safe have not changed. We’ve seen them all – use strong passwords, deploy multi-factor authentication (MFA), be vigilant to spot phishing attacks, regularly update software and patch your systems. These are great recommended ongoing tips and are as relevant today as they’ve ever been. But times have changed and these best practices can no longer be the bare minimum. Read Now

  • Boosting Safety and Efficiency

    Boosting Safety and Efficiency

    In alignment with the state of Mississippi’s mission of “Empowering Mississippi citizens to stay connected and engaged with their government,” Salient's CompleteView VMS is being installed throughout more than 150 state boards, commissions and agencies in order to ensure safety for thousands of constituents who access state services daily. Read Now

  • Live From GSX: Post-Show Review

    Live From GSX: Post-Show Review

    This year’s Live From GSX program was a rousing success! Again, we’d like to thank our partners, and IPVideo, for working with us and letting us broadcast their solutions to the industry. You can follow our Live From GSX 2023 page to keep up with post-show developments and announcements. And if you’re interested in working with us in 2024, please don’t hesitate to ask about our Live From programs for ISC West in March or next year’s GSX. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3