This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
SDMmag logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
SDMmag logo
  • Home
  • Magazine
    • Current Issue
    • Digital Editions
    • Archives
    • Monitoring Today
    • Professional Security Canada
  • Products
  • Newswire
  • Exclusives
    • SDM 100 Report
    • Top Systems Integrators Report
    • Annual Industry Forecast
    • State of the Market Series
    • Dealer of the Year
    • Systems Integrator of the Year
    • TMA Monitoring Center Excellence Awards
    • Blog
    • PSA Leadership Institute
  • Topics
    • Trends & Industry Issues
    • Video Solutions
    • Access Control & Identification
    • Smart Home
    • More SDM Topics
  • Columns
    • Editor's Angle
    • 5-Minute Tech Quiz
    • Security & the Law
    • Security Networkings
    • Digital Shuffle
    • Technology @ Work
    • Insider News & Business
    • Today's Systems Integrator
    • Marketing Madmen
    • Sales Stars
    • Smart Insights
  • Events
    • Industry Calendar
    • SDM 100 Gala @ ESX
    • Webinars
  • More
    • Videos
    • Podcasts
    • ISC West 2019
    • Photo Galleries
    • Newsletters
    • Classified Ads
    • SDM Store
    • White Papers
    • Sponsor Insights
    • More Resources
  • Directories
    • Buyers Guide
    • Take a Tour
    • Guide to Distributors
    • Guide to Central Stations & Monitoring
  • Contact
  • Advertise
Home » Business Intelligence Is Music to My Ears
Editor's Angle

Business Intelligence Is Music to My Ears

Editor's Angle Feature Image
October 17, 2012
Laura Stepanek
KEYWORDS lost business / operating hours / security intelligence
Reprints
No Comments

Technology traditionally deployed to reduce crime also can offer a vast amount of business intelligence.

Many of my friends and family own small businesses and I appreciate hearing about their successes and failures, their opportunities and challenges. Since the recession, things have been different for them. They hustle harder for the business they get, and they never take for granted how they find new customers or how customers find them.

One such example is my friend who owns a small music store in a busy suburban town. He mostly caters to young musicians, offering lessons, instrument rental or purchase, sheet music and music accessories. On most days, his store opens at 2:00 p.m. and closes at 9:00 p.m., because many of his customers are students who are otherwise in school until that time.

It was business as usual for many years, until one day my friend considered that he might be losing sales by not opening earlier in the day. To find out if his theory was correct, he parked across the street from his store practically every day for about four weeks and just watched activity around the store. He was surprised at what he saw: nearly each day, at least one person walked up to entrance, checked the hours and walked away. Did these people represent lost sales? My friend thought so, so he eventually hired someone to work mornings. This turned out to be a mixed bag, as some of these “customers” were just stopping by during a lunch break to try out the expensive guitars they never intended to buy or inquire about prices for music lessons — something they could have learned by visiting the website.

Because I didn’t hear my friend’s story until months after it happened, it was too late for me to suggest he get a video camera installed — not only for security purposes, but to gather the business intelligence he sought about his operating hours. It would have saved him the time spent spying from his car, and he would have benefitted from better security as well.

This is just an example — on the very low end of the scale — of how technology traditionally deployed to reduce crime also can offer a vast amount of “intelligence.” From the small music store to the nationwide chain of hundreds of stores, and even to public applications such as monitoring shorelines as described in this month’s cover story — the opportunities to provide BI for your customers are endless. And why not? As IP-based security systems become more prevalent, the industry evolves by engineering more ways in which security integrators can serve their customers. BI is one of the most interesting solutions to come along in a long time.

In the article, “Today’s Business Intelligence Environment,” SDM Senior Editor Heather Klotz-Young quotes Arecont Vision’s Jason Schimpf about this new opportunity. “With megapixel video enabling the video side of ‘intelligence,’ end users are making business cases that reduce shrink, which ultimately increases their bottom line, and the video allows them to improve people flow, product placement, manufacturing layout, warehouse transport efficiencies, etc., which directly affects their top line. Now, the benefit is coming from the top and bottom line,” Schimpf describes in the article, beginning on page 60.

Megapixel video certainly is not the only enabling technology, notes Aaron Kuzmeskus from Schneider Electric. “One corporation uses each morning’s access control data to determine how many meals to prepare in its own company cafeteria. Since this practice has come into play, the company has reduced a significant amount of waste and hence reduced food costs,” he describes.

PSA Security Network’s Bill Bozeman details the various technologies that can be utilized to facilitate business intelligence. “Analytics, storage, access control databases and other security control devices provide a goldmine of data for improving and providing business BI…A strong case could be made that security decision-makers on both sides of the fence are often at fault for underutilizing the power of the collected security data,” he says.

You can translate underutilizing to mean opportunity. Security technology-based BI applications represent a vast opportunity for savvy security integrators. Start by getting to know the professionals and the companies that are already providing BI — and thus improve your business intelligence.

 

Audio Interview  with Todd Pedersen

SDM’s 2011 Dealer of the Year, Vivint, announced an agreement to be acquired for more than $2 billion by the Blackstone Group. The story is reported on page 17 of this issue. In addition, Todd Pedersen, CEO of Vivint, joined SDM on an exclusive podcast to discuss the details of the company’s acquisition. Find it on the SDM Editors’ Podcasts page at www.SDMmag.com/media/podcasts.

Subscribe to SDM Magazine

Recent Articles by Laura Stepanek

Messages from 14th ACCC: Openness & Partnerships

Strive to Be Easier

Interlogix to Shut Down in U.S. & Canada; Dealers Express Disappointment

Preferred Brands Among the Top Systems Integrators

How to Get Smart About Business Intelligence

Laura-stepanek-200

As Editor of SDM, Laura Stepanek is responsible for the overall editorial direction of the magazine, its supplements, e-newsletters and website. She works with the SDM editorial staff to develop content that helps security dealers and systems integrators operate successful businesses. Laura represents SDM at trade shows and conferences, often presenting the results of exclusive research studies such as the SDM Industry Forecast. She writes and edits a variety of articles, and manages the annual SDM 100 and Top Systems Integrators reports. Laura joined SDM in 1984. She holds a bachelor’s degree in English from Barat College of DePaul University. Contact Laura with article ideas.

Related Articles

How to Get Smart About Business Intelligence

Make Technology Intelligence Your Business

How Fire Alarm Technology Is Evolving

I Spy With My Little Eye

Related Products

Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition 2nd Edition

Introduction to Security, 10th Edition

The Facility Manager's Guide to Safety and Security

The Complete Guide to Physical Security

Related Events

Artificial Intelligence in Surveillance: A How-To Primer

Related Directories

Pioneer Music Company

Pioneer Music Co.

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • SDM eNewsletter & Other eNews Alerts
  • Online Registration
  • Subscription Customer Service

More Videos

Sponsored Content What Is Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the SDM audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

Close
Featureimage_900x550__ovl0jlkbbj__
Sponsored By
Schneider Electric

New Digital Load Management System Drives Productivity and Enables New Business Models

Motor starter selection and configuration has always been a labor-intensive task. To address this challenge, machine builders and system integrators must adopt new technologies that simplify motor starter selection, installation, configuration and maintenance.

Popular Stories

Dealer of the Year(2019)

SDM 2019 Dealer of the Year: CPI Security of Charlotte, NC

ACT365-ipad

3 Reasons You Should Be Offering Cloud-Based Access Control

STANLEY

STANLEY Security Partners With Indianapolis Colts to Honor Local ‘Security Champion’

GettyImages-1087183206

Whatever Happened to the Prediction of a Mass Extinction of Security Dealers?

Aiphone

Go Above & Beyond for Effective Emergency Communication/Notification

SDM 2019 Top Systems Integrators Report

Events

January 1, 2030

Webinar Sponsorship Information

For webinar sponsorship information, visit www.bnpevents.com/webinars or email webinars@bnpmedia.com.

View All Submit An Event

Poll

Hiring Women in Security

Has your company made any efforts in the past year to specifically hire and/or promote women in managerial/executive positions? (Please select the best answer.)
View Results Poll Archive

Products

Contemporary Security Management, 4th Edition

Contemporary Security Management, 4th Edition

 Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. 

See More Products

SDM Magazine

_FC_SDM1219 cover 144x192

2019 December

Check out SDM Magazine’s December 2019 issue, featuring "CPI’s Key to Success Is Controlling ‘the Experience’ in-House", "Monitoring Services: The Cutting Edge", and much more.

Check back throughout the month for new content!

View More Create Account
  • Resources
    • List Rental
    • Online Exclusives
    • Industry Innovations
    • Partners
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing