Should IT Take Over Physical Security?

Author: John Honovich, Published on Jan 18, 2009

Frequent discussions of IT taking over physical security often turn to not simply if it will happen but when it will happen. Such convergence is viewed broadly as a key issue in the future of the security industry.

Perhaps more important than will it happen is should it happen. Would it be better for end user organizations to have IT run physical security? Would we save money or be more secure or possibly both?

The Case for IT Taking Over

Proponents see 3 major advantages for IT taking over physical security:

  • Physical security systems are becoming increasingly more sophisticated
  • IT personnel can quickly learn what they lack in physical security
  • IT personnel are strong at maximizing business benefits of technology

The rise of IP telephony is the most commonly cited example of a domain that IT has successfully taken over.

Why IT Should Not Take Over

I believe it would be dangerous for IT to take over physical security. If IT did take over, this would increase security and liability risks.

Unlike telephony, physical security is significantly more involved than integrating and deploying the technologies employed. It is impossible to manage physical security simply through technology. Physical security, by its nature, requires extensive expertise in physical construction, organizing responders and interacting with suspects/attackers. Indeed, physical security is intricately intertwined with security management (e.g., see the US Army physical security guide).

Physical security practitioners offer three 3 characteristics that will be difficult to impossible for IT to successfully replace:

  • Toughness to physical conditions and physical threats
  • Ability to handle deception and lies
  • Deep domain expertise in criminal justice

The technologies used in physical security help security execute their responsibilities but do not and will eliminate the need for these characteristics.

Toughness

Security managers routinely deal with violence or threats of violences – it is an essential and necessary part of the job. Even if you get an image of the person on your IP video system, you still need to deal with the person (an especially difficult issue when dealing with internal issues).

Security managers, often with a military or police background, have years of training dealing with violence and threats. As such they tend not to be intimidated or overwhelmed when faced with this.

Most IT managers lack the temperament and training to be competent in these situations . If the IT manager is handling incidents, it is an easy and obvious choice for the suspect to intimidate the IT manager.

Deception and Lies

Most suspects will not immediately admit full guilt. This is the whole point of investigations – which is a key element of security organizations both in the public and private sector. Security managers need to be trained and able to handle this type of interaction.

IT managers do not have any of this training. This could lead to lower cases resolved, less restitution and if they conduct the investigation inappropriately to lawsuits.

Criminal Justice

What is legal is a key element in security decisions every day. From how suspects can be treated to how policies and procedures are setup, criminal justice issues are critical to properly running security.

We often talk about the IT needing to learn about lenses, camera positioning, recording duration, etc but that's just a small part of real security management. Check the PSP and CPP certification requirements and you can see the hundreds of elements involved.

Maybe IT Can Just Runs the Systems?

Some people may argue: Let security handle all the criminal and investigation aspect, just let IT handle physical security systems.

Accounting and sales provides a good examples (indeed, counter examples to telephony). The accounting and sales organization are heavily dependent on information systems. However, the IT department rarely selects the software. While the IT department absolutely has influence and makes recommendations, the accounting and sales organization ultimately choose the system that best meets their particular goals. This practice is equally sound for physical security.

Conclusion

Physical security is much more than physical security systems. Organizations are best served by physical security experts selecting technologies that best serve overall security plans with input from the IT department on technical issues.

1 report cite this report:

Security Manager Statistics and Surveys 2009 on Oct 03, 2009
The needs and constraints of security end users are key elements in determining the selection of security technologies such as video surveillance....

Related Reports on Sales

Amazon Sales of Hikvision China Cameras on Jan 12, 2017
Hikvision has become widely available in the US, including on popular retail outlets like Amazon, with over 2,600 results: 4MP Hikvision outdoor...
How Axis Can Beat Hikvision on Jan 09, 2017
Hikvision has rocked the industry globally, bullying former video surveillance revenue leader Axis even in the Western world. What can Axis...
Distributor's #1 Challenge on Jan 04, 2017
Manufacturers and integrators are not the only ones challenged in the security market, distributors are also impacted, fighting to maintain margins...
Hikvision Sales and Support Conflict Over Discontinuation on Dec 28, 2016
Numerous Hikvision technical support employees have confirmed that the iVMS-4500 will be discontinued. Some Hikvision sales people say this is...
12 Video Surveillance Poll Results 2016 on Dec 28, 2016
IPVM has conducted more than 100 polls this year. Here are a selection of 12 of the most interesting results, receiving 4,500+ votes: Hikvision vs...
The Future of Video Surveillance Distribution on Dec 22, 2016
40+ video surveillance distributors around the world told us what they see as the present and future of distribution. The key positive: solutions....
OnSSI Favorability Results Poor Hurt By Milestone Breakup on Dec 21, 2016
The one time key Milestone partner and the 2015 acquirer of VMS provider Seetec, OnSSI has navigated from its origins as a VMS re-seller into its...
API / SDK Tutorial on Dec 18, 2016
While Application Programming Interfaces (APIs) are key to 'open' platforms, they are frequently misunderstood and over-hyped in physical security....
No One Should Ever Use Simplisafe on Dec 12, 2016
Simplisafe, the upstart DIY intrusion alarm system, is increasingly Public Enemy Number One in the alarm business. Recently, Security Sales ran an...
'Solution' Manufacturers Threaten Integrators on Dec 09, 2016
The race to the bottom has driven manufacturers to become 'solution' providers, threatening integrators. Axis shift to 'solution' sales might be...

Most Recent Industry Reports

Top ISC West 2017 Booth Trends on Jan 16, 2017
There are significant moves among many major manufacturers on the ISC West show floor, and very few prime spaces left unoccupied. In this report we...
Genetec Favorability Results on Jan 16, 2017
In the race to the bottom and flight to 'solutions', Genetec has taken a contrary path. The company remains independent, focusing up market,...
Free VMS Software Directory on Jan 13, 2017
Many Video Management Software (VMS) providers offer free versions, either open source, for a limited number of cameras or for a limited amount of...
Milestone Essential Subscription Removed on Jan 12, 2017
Subscriptions may be the future for Milestone and VMSes but not right now. Responding to negative feedback, Milestone has removed subscriptions...
Alarm Reporting Formats Overview on Jan 12, 2017
Alarm reporting formats are methods for communicating complicated information quickly, using plain old telephone service. It is still the main...
Amazon Sales of Hikvision China Cameras on Jan 12, 2017
Hikvision has become widely available in the US, including on popular retail outlets like Amazon, with over 2,600 results: 4MP Hikvision outdoor...
Last Day IP Networking Course January 2017 on Jan 12, 2017
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
ONVIF Favorability Results on Jan 11, 2017
ONVIF has been one of the most debated aspects of the video surveillance industry. On the one hand, its aim to increase interoperability has been...
Honeywell Ademco Vista Intrusion System Tested on Jan 11, 2017
One of the biggest brands in security holds one of the most common intrusion lines. We bought and tested a Honeywell Vista 15P intrusion...
ADI Battles Manufacturer Partners on Jan 11, 2017
ADI is battling their manufacturer partners, building up their own competitive house brand W-Box, while manufacturers still fund ADI's business...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact