Making the Case

Creating a special opportunity for salespeople

Established security integrators often deal with prospects who are also considering solutions that let them eliminate live monitoring and keep an eye on their homes via smartphone. They see it as not only saving money and avoiding a monthly contract, but also as a way to keep control of the system in their hands without having to deal with a third party.

This creates a special opportunity for salespeople. They can emphasize the importance of choosing live, around-the-clock monitoring as an essential part of a comprehensive home security system.

SELF-MONITORING ISN’T AS EASY AS IT SEEMS

They can start by pointing out the disadvantages of a “monitor-it-yourself ” (MIY) solution. To a customer, the concept is simple: When there’s an alarm, they’re alerted via smartphone and can contact authorities from wherever they are. If they’ve got video cameras, they might even try to verify what’s going on. They see themselves as being in control of the situation.

It sounds easy and inexpensive, but there are some serious flaws in the MIY model. At the very least, alarm response through MIY will be slower than professionally monitored systems. At worst, MIY users won’t be able to get help at all.

Here are some valuable points that salespeople can make to emphasize the advantages of live monitoring over an MIY solution.

911 EFFECTIVENESS DEPENDS ON LOCATION

Most people expect instant assistance when they dial 911. Even children know that when there’s trouble, it’s the first thing you do. But with home security, it’s not that simple – especially when you’re away from home.

The best way to communicate this to a prospect is through an analogy. Let’s say they live in Dallas, but they’re on vacation in San Diego. With MIY, they get an alarm notification and use their smartphone to see that there’s an intruder. The next step is to dial 911.

Here’s the problem: If they dial 911 in San Diego, they’re not going to get authorities who are near their home. Instead, they’ll be connected with law enforcement closest to their location, since a cellphone automatically sends its signal to the nearest cell tower. When their home in Dallas is being burglarized, 911 in San Diego isn’t going to be much help.

This can even be true within the same metropolitan area, since major cities and suburbs can be far apart. If you’re too far away, you’ll get 911 for the area you’re in at the time. The prospect should understand that while they’re frantically searching for the number for law enforcement near their home, precious minutes of response time are slipping away.

SMARTPHONE COVERAGE CAN BE AN ISSUE

Just because they’ve got a smartphone doesn’t mean they’re protected. Remind them that they won’t always have access or coverage. Using the previous example, in the time it takes to fly from Dallas to San Diego, the smartphone is likely to be in airplane mode. They won’t see any alarm notification until they land, which could be hours after the actual alarm.

There are other situations where it’s just job or in a building that doesn’t allow good reception (signals can often be blocked by metal or concrete, such as a parking garage). Cellphone connections can drop or be blocked for any number of reasons. Professional monitoring is available around the clock, regardless of the situation.

THERE’S NO SUBSTITUTE FOR TRAINING

An alarm is often triggered by incidents like an intruder, fire or carbon monoxide leak. When a user determines the cause of an alarm, it takes a great deal of discipline and self-control to take the right steps. An untrained person is prone to panic or to be unsure what to do and when to do it.

“That’s why we place so much emphasis on preparation for our monitoring operators,” said Grant Graham, director of monitoring operations at MONI Smart Security. That includes more than 96 hours of classroom training along with eight weeks of hands-on mentoring, as well as ongoing quality assurance checks.

“We want to create an environment where there’s a consistent protocol for handling alarms,” Graham said. “Our agents are likely to encounter all types of situations, and they understand the importance of following procedures that are constantly being practiced and refined. They know that calm, controlled response is crucial for effective alarm resolution.”

DON’T DITCH THE SMARTPHONE

A smartphone isn’t the best way of monitoring an alarm event, but it’s still an essential part of the equation. The ideal situation is live monitoring that allows the central station to quickly verify an alarm while providing real-time status updates to the homeowner.

MONI has adopted that process through patented ASAPer technology, which creates an interactive messaging hub that allows customers to communicate with their emergency contacts via text, chat or email. They also receive constant updates from MONI until the alarm is resolved.

“Communication means everything during an alarm event,” Graham said. “ASAPer provides faster resolution than traditional methods by streamlining the communication process and making it interactive. Everyone benefits by having the latest information about the status of an alarm.”

THE BIGGEST BENEFIT OF LIVE MONITORING

It can be difficult to convince potential customers that it’s not just about making a sale. By emphasizing the benefits of live monitoring instead of MIY, you’ll be helping them understand the importance of speed, convenience and assurance that they can’t get from a phone – no matter how smart it is.

This article originally appeared in the November 2017 issue of Security Today.

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.