IT is not transforming Security

By: John Honovich, Published on May 03, 2008

IT professionals evidently believe the Patriots should replace Belichick with the trainer. According to IT professionals, because injuries are so prevalent in football, salaries are so high and health is so important to winning, the trainer must run the team to win the SuperBowl.

This is clearly absurd but the premise that physical security is being transformed by IT is equally absurd. Our IT associates are mistaking the essence of security with the tools that support security.

Security is not being transformed. Security is assimilating IT into security.

IT tools are important for physical security just like they are important for marketing, finance, operations, etc. And just like in all those other fields, IT will be assimilated and the professionals running those disciplines will learn how to use IT tools to maximize their organization's success.

Security management and physical security are about so much more than the tools they use. As a technology person, studying for the PSP was an eye opener in how many non-technology elements were necessary to design and manage physical security systems. And physical security is simply one small discipline within security management.

So why is IT doing this?

They pretend they are strong but really they are weak. They are the ones that are dying. Because they are dying they are grasping at new markets to slow their demise.

In the IT world, most IT projects fail. This is legendary in the field and one of the most discussed topics. IT would like you to believe that they 'transform' business. If physical security failed as much as IT, half the country would have been destroyed by terrorists in the last 5 years.

IT is fundamentally flawed. Getting talented technology people is expensive and difficult. It's even worse in big corporations that offer technologists very little incentive to join. So, you wind up with moderately to poorly skilled individuals who have great difficulties solving problems.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

And because of those fundamental flaws, IT is being broken up. First, packaged software companies drove this. CEOs realized that companies specializing in developing software could build better products than their own IT departments. This was the first wave of breaking down IT.

Next, CEOs looked at their underperforming and expensive IT departments and realized that this could be done much more efficiently in India. So, for the last 5 years, big corporations have been heavily and continuously outsourcing and further shrinking IT.

Now, it's become clear that cloud computing and web-hosted software is the future. From office applications to niche business programs, IT is being delivered online. This makes the traditional IT program even less important.

Information technology is not disappearing but it is being assimilated at lower costs and with more convenience and stability.

But what about Cisco?

You might say: "Cisco is going to destroy the physical security companies. They are so big and so powerful."

Look at their stock price. For the past 7 years, Cisco's stock has basically been flat. It dropped 75% after the bust and basically never recovered. Investors are essentially saying that Cisco has matured and is no longer disrupting businesses.

Cisco is the Yankees of physical security. They won a couple of championships a while ago, they have a big reputation and will be in the mix of things, but they are no longer winners.

Their physical security products like so many of these big IT companies are un-innovative. They essentially compete on brand and distribution.

What does this mean for security managers?

It is clear to me that security managers are adapting. Just like accountants and marketing people did, they are learning the implications and issues involved. This new information is being incorporated into their extensive skills and expertise in general security management.

Security managers should just keep learning and adapting. Don't worry about these IT guys. Yes, they are generally arrogant but they are a dying bread. If they have talent they will move towards the web and if they don't they will be outsourced. 5 years from now, security managers will still be running security, stronger than ever, using the tools of IT as part of the overall security strategy.

[premium_content]

Related Reports on Tools

Camera Configuration Manager Shootout - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision on May 01, 2019
Which camera manufacturer has the best management tool? We tested 6 manufacturers - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision to find...
Locking Down Network Connections Guide on Apr 23, 2019
Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected...
Pole Mount Camera Installation Guide on Apr 11, 2019
Poles are a popular but challenging choice for deploying surveillance cameras outdoors. Poles are indispensable for putting cameras at the right...
Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...
Large US University End-User Video Surveillance Interview on Mar 18, 2019
Schools have become targets in modern days of active shooters and terrorist fears. The need for video and access security is high. Universities...
Installation Course Fall 2019 on Mar 14, 2019
Register for the Fall 2019 Video Surveillance Install Course. For early registration save $50 off the course's normal $299 price. This is a...
City Physical Security Manager Interview on Mar 14, 2019
This physical security pro is the Physical Security Manager for the City of Calgary. He is a criminologist by training with an ASIS CPP credential....
Security Installation Tools Guide - 22 Tools Listed on Feb 19, 2019
In this guide, we cover 22 tools that security installers frequently use. This is one part of our upcoming Video Surveillance...
Ideal SecuriTest IP Vs Unbranded IP Camera Install Tool Tested on Nov 21, 2018
In our recent IP camera installation tool shootout, multiple members questioned the Ideal SecuriTest IP's features compared to low-cost unbranded...
ISC East 2018 Mini-Show Final Report on Nov 16, 2018
This is our second (updated) and final show report from ISC East. ISC East, by its own admission, is not a national or international show, billed...

Most Recent Industry Reports

Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Inside Look Into Scam Market Research on May 17, 2019
Scam market research has exploded over the last few years becoming the most commonly cited 'statistics' for most industries, despite there clearly...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Panasonic 32MP Multi Imager Camera Tested (WV-X8570N) on May 16, 2019
Panasonic has released their first multi imager models including the 32MP (4x4K) WV-X8570N, claiming "Extreme image quality for evidence capturing...
Trump Signs 'Huawei Ban' - Executive Order Targeting Foreign Adversary Technology on May 16, 2019
US President Donald Trump has signed an executive order targeting technology provided by 'foreign adversaries', in what is widely being called a...
Bank Security Manager Interview on May 15, 2019
Bank security contends with many significant threats - from fraudsters to robbers and more. In this interview, IPVM spoke with bank security...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
San Francisco Face Recognition Ban And Surveillance Regulation Details Examined on May 14, 2019
San Francisco passed the legislation 8-1 today. While the face recognition 'ban' has already received significant attention over the past few...
Security Fail: ASISNYC Auto Emails Passwords In Plain Text on May 14, 2019
ASIS NYC automatically emails a user with the password the user just entered, in plain text, when one registers for the site / event, as the...
Hikvision VP On Muslim Oppression on May 14, 2019
Hikvision has won tens of millions of dollars, at least, in direct contracts with the Chinese government that oppresses Muslims, including a forced...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact