IT is not transforming Security

Author: John Honovich, Published on May 03, 2008

IT professionals evidently believe the Patriots should replace Belichick with the trainer. According to IT professionals, because injuries are so prevalent in football, salaries are so high and health is so important to winning, the trainer must run the team to win the SuperBowl.

This is clearly absurd but the premise that physical security is being transformed by IT is equally absurd. Our IT associates are mistaking the essence of security with the tools that support security.

Security is not being transformed. Security is assimilating IT into security.

IT tools are important for physical security just like they are important for marketing, finance, operations, etc. And just like in all those other fields, IT will be assimilated and the professionals running those disciplines will learn how to use IT tools to maximize their organization's success.

Security management and physical security are about so much more than the tools they use. As a technology person, studying for the PSP was an eye opener in how many non-technology elements were necessary to design and manage physical security systems. And physical security is simply one small discipline within security management.

So why is IT doing this?

They pretend they are strong but really they are weak. They are the ones that are dying. Because they are dying they are grasping at new markets to slow their demise.

In the IT world, most IT projects fail. This is legendary in the field and one of the most discussed topics. IT would like you to believe that they 'transform' business. If physical security failed as much as IT, half the country would have been destroyed by terrorists in the last 5 years.

IT is fundamentally flawed. Getting talented technology people is expensive and difficult. It's even worse in big corporations that offer technologists very little incentive to join. So, you wind up with moderately to poorly skilled individuals who have great difficulties solving problems.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

And because of those fundamental flaws, IT is being broken up. First, packaged software companies drove this. CEOs realized that companies specializing in developing software could build better products than their own IT departments. This was the first wave of breaking down IT.

Next, CEOs looked at their underperforming and expensive IT departments and realized that this could be done much more efficiently in India. So, for the last 5 years, big corporations have been heavily and continuously outsourcing and further shrinking IT.

Now, it's become clear that cloud computing and web-hosted software is the future. From office applications to niche business programs, IT is being delivered online. This makes the traditional IT program even less important.

Information technology is not disappearing but it is being assimilated at lower costs and with more convenience and stability.

But what about Cisco?

You might say: "Cisco is going to destroy the physical security companies. They are so big and so powerful."

Look at their stock price. For the past 7 years, Cisco's stock has basically been flat. It dropped 75% after the bust and basically never recovered. Investors are essentially saying that Cisco has matured and is no longer disrupting businesses.

Cisco is the Yankees of physical security. They won a couple of championships a while ago, they have a big reputation and will be in the mix of things, but they are no longer winners.

Their physical security products like so many of these big IT companies are un-innovative. They essentially compete on brand and distribution.

What does this mean for security managers?

It is clear to me that security managers are adapting. Just like accountants and marketing people did, they are learning the implications and issues involved. This new information is being incorporated into their extensive skills and expertise in general security management.

Security managers should just keep learning and adapting. Don't worry about these IT guys. Yes, they are generally arrogant but they are a dying bread. If they have talent they will move towards the web and if they don't they will be outsourced. 5 years from now, security managers will still be running security, stronger than ever, using the tools of IT as part of the overall security strategy.

Related Reports on Tools

Access Control Job Walk Guide on Sep 26, 2017
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Favorite Integrator Tablets 2017 on Sep 11, 2017
What percentage of integrators use tablets? Which tablets do they prefer? Apple? Android? Windows? Tablets have become popular integrator tools...
Favorite Network Termination Tools on Sep 06, 2017
Thomas Carlyle said "Man is a tool-using animal. Without tools he is nothing, with tools he is all." For security integrators, their tools are...
Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
Hikvision Security Code Cracked on Aug 08, 2017
Hikvision's 'security code' feature has been cracked and a program generating security codes is being distributed online. IPVM has obtained and...
Directory of 40 IP Camera Manufacturer Discovery Tools on Jun 19, 2017
Locating the IP address of a DHCP client or factory defaulted device on a network is often a difficult task.  In another report, we discussed...
Bluebeam Revu Security Floorplan Estimation App Test on Jun 15, 2017
Bluebeam Revu is a construction design markup tool that claims it is "used by 94% of top US contractors", but what role does it have for physical...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Cap Connector "You Can't Screw Up" Profile on Mar 31, 2017
One company, CaP Connectors, is marketing their coax connectors as “The 30-second Connector You Can’t Screw Up”, by claiming to combine the best...
Hikvision Firmware Decrypted on Mar 09, 2017
A developer has decrypted Hikvision's firmware, allowing examination of Hikvision's device source code and contents. In this report, we overview...

Most Recent Industry Reports

PoE Powered Access Control Tutorial on Jan 19, 2018
Powering access control with Power over Ethernet is becoming increasingly common.  However, access requires more power than cameras, and the...
If You Have 4 Cameras, You Can Throw Them Away, If You Have 400, They Throw You Away on Jan 19, 2018
Do users care about anything but price? Do user care about cybersecurity? Do users care about trusting their supplier? These have become...
Chinese Government Hikvision Surveillance System On US Government Network on Jan 18, 2018
Hikvision, the Chinese government-owned manufacturer, has publicly claimed that their products are running on a US government network. Moreover,...
Winter 2018 Camera Course on Jan 18, 2018
Learn video surveillance and get certified. Register now. Save $50 on the course, ending this Thursday the 18th, plus get access to 2 class times...
VSaaS Usage Statistics 2018 on Jan 18, 2018
VSaaS has been a 'next big thing' for more than a decade. The prospect of managing, storing and streaming video from the cloud rather than...
Vivint Streety Video Strengthens Door Knocking on Jan 17, 2018
Vivint is famous (or infamous depending on your perspective) for mastering large scale door to door selling. The company has skyrocketed from a...
Axis: "It’s A Question Of Trust And Who You Want To Be Associated With" on Jan 17, 2018
Who do you trust? Who do you want to be associated with? Axis is raising hard questions to start 2018. In this note, we examine these questions,...
Software House Vulnerability Allows Inside Attacker To Open Doors on Jan 17, 2018
A vulnerability in Software House IP-ACM modules allows an attacker to potentially unlock doors, or perform other actions, on affected systems....
'Defiant' Hikvision 'Strikes Back' At WSJ And US on Jan 16, 2018
The fight is on. Hikvision and their owner, the Chinese government, 'strikes back' against the Wall Street Journal and US politicians raising...
The 2018 Surveillance Industry Guide on Jan 16, 2018
The 300 page, 2018 Video Surveillance Industry Guide, covering the key events and the future of the video surveillance market, is now available,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact