IT is not transforming Security

Author: John Honovich, Published on May 03, 2008

IT professionals evidently believe the Patriots should replace Belichick with the trainer. According to IT professionals, because injuries are so prevalent in football, salaries are so high and health is so important to winning, the trainer must run the team to win the SuperBowl.

This is clearly absurd but the premise that physical security is being transformed by IT is equally absurd. Our IT associates are mistaking the essence of security with the tools that support security.

Security is not being transformed. Security is assimilating IT into security.

IT tools are important for physical security just like they are important for marketing, finance, operations, etc. And just like in all those other fields, IT will be assimilated and the professionals running those disciplines will learn how to use IT tools to maximize their organization's success.

Security management and physical security are about so much more than the tools they use. As a technology person, studying for the PSP was an eye opener in how many non-technology elements were necessary to design and manage physical security systems. And physical security is simply one small discipline within security management.

So why is IT doing this?

They pretend they are strong but really they are weak. They are the ones that are dying. Because they are dying they are grasping at new markets to slow their demise.

In the IT world, most IT projects fail. This is legendary in the field and one of the most discussed topics. IT would like you to believe that they 'transform' business. If physical security failed as much as IT, half the country would have been destroyed by terrorists in the last 5 years.

IT is fundamentally flawed. Getting talented technology people is expensive and difficult. It's even worse in big corporations that offer technologists very little incentive to join. So, you wind up with moderately to poorly skilled individuals who have great difficulties solving problems.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

And because of those fundamental flaws, IT is being broken up. First, packaged software companies drove this. CEOs realized that companies specializing in developing software could build better products than their own IT departments. This was the first wave of breaking down IT.

Next, CEOs looked at their underperforming and expensive IT departments and realized that this could be done much more efficiently in India. So, for the last 5 years, big corporations have been heavily and continuously outsourcing and further shrinking IT.

Now, it's become clear that cloud computing and web-hosted software is the future. From office applications to niche business programs, IT is being delivered online. This makes the traditional IT program even less important.

Information technology is not disappearing but it is being assimilated at lower costs and with more convenience and stability.

But what about Cisco?

You might say: "Cisco is going to destroy the physical security companies. They are so big and so powerful."

Look at their stock price. For the past 7 years, Cisco's stock has basically been flat. It dropped 75% after the bust and basically never recovered. Investors are essentially saying that Cisco has matured and is no longer disrupting businesses.

Cisco is the Yankees of physical security. They won a couple of championships a while ago, they have a big reputation and will be in the mix of things, but they are no longer winners.

Their physical security products like so many of these big IT companies are un-innovative. They essentially compete on brand and distribution.

What does this mean for security managers?

It is clear to me that security managers are adapting. Just like accountants and marketing people did, they are learning the implications and issues involved. This new information is being incorporated into their extensive skills and expertise in general security management.

Security managers should just keep learning and adapting. Don't worry about these IT guys. Yes, they are generally arrogant but they are a dying bread. If they have talent they will move towards the web and if they don't they will be outsourced. 5 years from now, security managers will still be running security, stronger than ever, using the tools of IT as part of the overall security strategy.

Related Reports on Tools

How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Cap Connector "You Can't Screw Up" Profile on Mar 31, 2017
One company, CaP Connectors, is marketing their coax connectors as “The 30-second Connector You Can’t Screw Up”, by claiming to combine the best...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Hikvision Firmware Decrypted on Mar 09, 2017
A developer has decrypted Hikvision's firmware, allowing examination of Hikvision's device source code and contents. In this report, we overview...
Integrator Service Vehicle Guide on Jan 23, 2017
Few assets are as commonly used by integrators and installers as their service vehicles. 125 integrators explained to IPVM in detail about their...
Smart Power Tools For Security Installs on Jan 18, 2017
Installing a smart camera? Perhaps you should use a 'smart' drill. The intelligent appliance / IoT trend has hit power tools. In this note, we...
Calculating Video Surveillance Storage / Bandwidth on Dec 29, 2016
Calculating surveillance bandwidth is complex, and inexperienced users can easily underestimate bandwidth, leading to reduced storage durations...
Power Drill Selection Guide on Dec 06, 2016
Boring holes is a basic part of running cables for most security system projects. To do so, you will need to choose the right drills for various...
Camera Roof Mounting / Parapet Mount Installation Guide on Sep 14, 2016
One of the most common camera mounts are parapet mounts, and they can be found on the roofs of all types of buildings; old and new, used to hold...
Universal Camera Tester Tested (IPC-8600) on May 20, 2016
Setting up cameras is often a pain. A number of test tools exist but are frequently limited on camera support or have a small screen, slow...

Most Recent Industry Reports

H.265 / HEVC Codec Tutorial 2017 on May 25, 2017
Since 2013, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Camera Course Summer 2017 on May 25, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Most Respected Manufacturer Competitors on May 25, 2017
Manufacturers told IPVM what competitor they most respected. In terms of total revenue, Hikvision, Dahua and Axis are certainly tops but would...
CyPhy 'Unlimited' Flight Time Security Drone Examined on May 25, 2017
Drones face several issues as commercial security platforms - legal restrictions (e.g., in the US, the FAA), costs, and limited flight durations...
Milestone Entry Level Mobile Password Vulnerability Disclosed on May 24, 2017
While many manufacturers have only addressed cybersecurity vulnerabilities after public disclosures were made (or threatened), Milestone has...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...
Hikvision Marketer Caught Spamming, Fails at Coverup, Fired on May 23, 2017
A Hikvision marketing employee was caught by IPCamTalk trying to surreptitiously disparage IPVM and IPCamTalk. This is an outgrowth of Hikvision's...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact