IT is not transforming Security

Author: John Honovich, Published on May 03, 2008

IT professionals evidently believe the Patriots should replace Belichick with the trainer. According to IT professionals, because injuries are so prevalent in football, salaries are so high and health is so important to winning, the trainer must run the team to win the SuperBowl.

This is clearly absurd but the premise that physical security is being transformed by IT is equally absurd. Our IT associates are mistaking the essence of security with the tools that support security.

Security is not being transformed. Security is assimilating IT into security.

IT tools are important for physical security just like they are important for marketing, finance, operations, etc. And just like in all those other fields, IT will be assimilated and the professionals running those disciplines will learn how to use IT tools to maximize their organization's success.

Security management and physical security are about so much more than the tools they use. As a technology person, studying for the PSP was an eye opener in how many non-technology elements were necessary to design and manage physical security systems. And physical security is simply one small discipline within security management.

So why is IT doing this?

They pretend they are strong but really they are weak. They are the ones that are dying. Because they are dying they are grasping at new markets to slow their demise.

In the IT world, most IT projects fail. This is legendary in the field and one of the most discussed topics. IT would like you to believe that they 'transform' business. If physical security failed as much as IT, half the country would have been destroyed by terrorists in the last 5 years.

IT is fundamentally flawed. Getting talented technology people is expensive and difficult. It's even worse in big corporations that offer technologists very little incentive to join. So, you wind up with moderately to poorly skilled individuals who have great difficulties solving problems.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

And because of those fundamental flaws, IT is being broken up. First, packaged software companies drove this. CEOs realized that companies specializing in developing software could build better products than their own IT departments. This was the first wave of breaking down IT.

Next, CEOs looked at their underperforming and expensive IT departments and realized that this could be done much more efficiently in India. So, for the last 5 years, big corporations have been heavily and continuously outsourcing and further shrinking IT.

Now, it's become clear that cloud computing and web-hosted software is the future. From office applications to niche business programs, IT is being delivered online. This makes the traditional IT program even less important.

Information technology is not disappearing but it is being assimilated at lower costs and with more convenience and stability.

But what about Cisco?

You might say: "Cisco is going to destroy the physical security companies. They are so big and so powerful."

Look at their stock price. For the past 7 years, Cisco's stock has basically been flat. It dropped 75% after the bust and basically never recovered. Investors are essentially saying that Cisco has matured and is no longer disrupting businesses.

Cisco is the Yankees of physical security. They won a couple of championships a while ago, they have a big reputation and will be in the mix of things, but they are no longer winners.

Their physical security products like so many of these big IT companies are un-innovative. They essentially compete on brand and distribution.

What does this mean for security managers?

It is clear to me that security managers are adapting. Just like accountants and marketing people did, they are learning the implications and issues involved. This new information is being incorporated into their extensive skills and expertise in general security management.

Security managers should just keep learning and adapting. Don't worry about these IT guys. Yes, they are generally arrogant but they are a dying bread. If they have talent they will move towards the web and if they don't they will be outsourced. 5 years from now, security managers will still be running security, stronger than ever, using the tools of IT as part of the overall security strategy.

Related Reports on Tools

Access Control Job Walk Guide on Sep 26, 2017
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Favorite Integrator Tablets 2017 on Sep 11, 2017
What percentage of integrators use tablets? Which tablets do they prefer? Apple? Android? Windows? Tablets have become popular integrator tools...
Favorite Network Termination Tools on Sep 06, 2017
Thomas Carlyle said "Man is a tool-using animal. Without tools he is nothing, with tools he is all." For security integrators, their tools are...
Vulnerability Directory For Access Control Cards on Aug 14, 2017
Knowing which access credentials are insecure can be unclear, especially because most look and feel the same. Even the most insecure 125 kHz types...
Hikvision Security Code Cracked on Aug 08, 2017
Hikvision's 'security code' feature has been cracked and a program generating security codes is being distributed online. IPVM has obtained and...
Directory of 40 IP Camera Manufacturer Discovery Tools on Jun 19, 2017
Locating the IP address of a DHCP client or factory defaulted device on a network is often a difficult task.  In another report, we discussed...
Bluebeam Revu Security Floorplan Estimation App Test on Jun 15, 2017
Bluebeam Revu is a construction design markup tool that claims it is "used by 94% of top US contractors", but what role does it have for physical...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Cap Connector "You Can't Screw Up" Profile on Mar 31, 2017
One company, CaP Connectors, is marketing their coax connectors as “The 30-second Connector You Can’t Screw Up”, by claiming to combine the best...
Hikvision Firmware Decrypted on Mar 09, 2017
A developer has decrypted Hikvision's firmware, allowing examination of Hikvision's device source code and contents. In this report, we overview...

Most Recent Industry Reports

Uniview Recorder Backdoor Examined on Oct 20, 2017
A Chinese research group has identified a vulnerability in Uniview recorders that allows backdoor access in a method similar to the Dahua...
Hikvision Access Control Tested on Oct 19, 2017
Hikvision aggressive pricing and marketing combined with generally reliable hardware and free software has made them a major player in video...
Verkada, Silicon Valley VSaaS Startup, Targets Enterprise on Oct 19, 2017
Verkada says they are building an enterprise-class VSaaS offering, calling it "The new platform for video security". This is a departure from the...
Exacq Unbreaks Avigilon Integration on Oct 18, 2017
For nearly 4 years, Exacq had broken and effectively blocked use with Avigilon cameras, as IPVM reported in January 2014. Now, Exacq has...
Search More Important Than Live Monitoring - Statistics on Oct 18, 2017
Search is overall more important than live monitoring to integrators, according to new IPVM statistics.  The key themes found in integrator...
Axis 'Sold Out' P3707-PVE Multi-Imager Tested on Oct 18, 2017
Axis faced significant product shortages over the summer. Perhaps the most notorious and significantly sold out model was the Axis P3707-PE 8MP...
Dahua Removes Auto Rebooting on Oct 17, 2017
For years, Dahua has automatically programmed its IP cameras to reboot weekly, a highly atypical and questionable practice. Following IPVM...
Deep Learning Tutorial For Video Surveillance on Oct 17, 2017
Deep learning is a growing buzzword within physical security and video surveillance. But what is 'deep learning'? In this tutorial, we explain...
Multipoint Lock Access Control Tutorial on Oct 17, 2017
Doors are notoriously weak at stopping entry, and money can be misspent on wrong locks that leave doors quite vulnerable. While closed and locked...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact