Should IT Take Over Physical Security?

Author: John Honovich, Published on Jan 18, 2009

Frequent discussions of IT taking over physical security often turn to not simply if it will happen but when it will happen. Such convergence is viewed broadly as a key issue in the future of the security industry.

Perhaps more important than will it happen is should it happen. Would it be better for end user organizations to have IT run physical security? Would we save money or be more secure or possibly both?

The Case for IT Taking Over

Proponents see 3 major advantages for IT taking over physical security:

  • Physical security systems are becoming increasingly more sophisticated
  • IT personnel can quickly learn what they lack in physical security
  • IT personnel are strong at maximizing business benefits of technology

The rise of IP telephony is the most commonly cited example of a domain that IT has successfully taken over.

Why IT Should Not Take Over

I believe it would be dangerous for IT to take over physical security. If IT did take over, this would increase security and liability risks.

Unlike telephony, physical security is significantly more involved than integrating and deploying the technologies employed. It is impossible to manage physical security simply through technology. Physical security, by its nature, requires extensive expertise in physical construction, organizing responders and interacting with suspects/attackers. Indeed, physical security is intricately intertwined with security management (e.g., see the US Army physical security guide).

Physical security practitioners offer three 3 characteristics that will be difficult to impossible for IT to successfully replace:

  • Toughness to physical conditions and physical threats
  • Ability to handle deception and lies
  • Deep domain expertise in criminal justice

The technologies used in physical security help security execute their responsibilities but do not and will eliminate the need for these characteristics.


Security managers routinely deal with violence or threats of violences – it is an essential and necessary part of the job. Even if you get an image of the person on your IP video system, you still need to deal with the person (an especially difficult issue when dealing with internal issues).

Security managers, often with a military or police background, have years of training dealing with violence and threats. As such they tend not to be intimidated or overwhelmed when faced with this.

Most IT managers lack the temperament and training to be competent in these situations . If the IT manager is handling incidents, it is an easy and obvious choice for the suspect to intimidate the IT manager.

Deception and Lies

Most suspects will not immediately admit full guilt. This is the whole point of investigations – which is a key element of security organizations both in the public and private sector. Security managers need to be trained and able to handle this type of interaction.

IT managers do not have any of this training. This could lead to lower cases resolved, less restitution and if they conduct the investigation inappropriately to lawsuits.

Criminal Justice

What is legal is a key element in security decisions every day. From how suspects can be treated to how policies and procedures are setup, criminal justice issues are critical to properly running security.

We often talk about the IT needing to learn about lenses, camera positioning, recording duration, etc but that's just a small part of real security management. Check the PSP and CPP certification requirements and you can see the hundreds of elements involved.

Maybe IT Can Just Runs the Systems?

Some people may argue: Let security handle all the criminal and investigation aspect, just let IT handle physical security systems.

Accounting and sales provides a good examples (indeed, counter examples to telephony). The accounting and sales organization are heavily dependent on information systems. However, the IT department rarely selects the software. While the IT department absolutely has influence and makes recommendations, the accounting and sales organization ultimately choose the system that best meets their particular goals. This practice is equally sound for physical security.


Physical security is much more than physical security systems. Organizations are best served by physical security experts selecting technologies that best serve overall security plans with input from the IT department on technical issues.

1 report cite this report:

Security Manager Statistics and Surveys 2009 on Oct 03, 2009
The needs and constraints of security end users are key elements in determining the selection of security technologies such as video surveillance....

Related Reports on Sales

Free Trip To China - CCTV.Net / Univew on Mar 15, 2018
Pack your bags? 'Closer than you think'? Well, a non-stop flight from NYC to Shanghai is 15 hours plus another 100 miles to Hangzhou...
Panasonic Selling Off Security Camera Factory on Mar 14, 2018
Panasonic is OEMing cameras from Dahua, as IPVM testing confirmed in 2017. Now, Panasonic is selling their security camera factory, according to...
Favorite Camera Manufacturers 2018 on Mar 12, 2018
A number of major moves in integrator's favorite camera rankings for 2018: Two manufacturers make major moves up One major manufacturer moves...
Avigilon Breaks $400 Million Revenue, Quadruples Profit, Weakens Competitiveness on Mar 07, 2018
The last annual Avigilon financials are here. With the imminent Motorola acquisition completion, Avigilon will cease to be an independent publicly...
Hanwha Techwin Spins Out Security Business on Mar 06, 2018
In an era of security acquisitions and mergers, with most recently Avigilon being acquired by Motorola and Bosch merging its security businesses,...
ADT: "Hate That Company" Loses Billion On Amazon Ring Deal on Mar 02, 2018
It has not been a good 2018 for ADT. And this week has been even worse. In the aftermath of Amazon acquiring Ring for a billion plus, ADT's...
Avigilon Admits Contacting 70 Bidders on Mar 01, 2018
A new Avigilon financial disclosure shows that Avigilon, via its banker, had contacted 70 bidders in a formal 'sales process' conducted in late...
Favorite Integrator Sales Quote Software (Statistics) on Feb 23, 2018
What application do integrators use the most to issue sales quotes? Nothing? Spreadsheet? MS Project? Online software? Of the many offerings out...
Aruba Networks Profile on Feb 22, 2018
Aruba Networks' presence in the video surveillance market has historically been limited. With a company focus on Wi-Fi first and switching...
Arlo, Bigger Than Avigilon, More Valuable Than Axis on Feb 08, 2018
Arlo, the wireless IP camera offering that Netgear bought ~5 years ago for a few tens of millions is now doing more revenue than Avigilon and...

Most Recent Industry Reports

May 2018 Camera Course on Mar 16, 2018
Our next course starts on May 8th. Register now for the Spring 2018 Camera Course This is the only independent surveillance camera course, based...
ADT Hammered Again, Loses Another Billion In Market Cap on Mar 16, 2018
ADT's CEO told investors that, 'in baseball terms', ADT was batting 5 for 5. But investors told ADT's CEO, 'in baseball terms', that he was...
Camera Form Factor Guide on Mar 16, 2018
When selecting surveillance cameras, users may choose from a number of different form factors, each with its own unique strengths and weaknesses,...
Free Trip To China - CCTV.Net / Univew on Mar 15, 2018
Pack your bags? 'Closer than you think'? Well, a non-stop flight from NYC to Shanghai is 15 hours plus another 100 miles to Hangzhou...
Access Control - Restricted Keys Guide on Mar 15, 2018
Not all doors, even in larger facilities, can justify using electronic access control. And even for doors that do have electronic access control,...
Rack Mounting NVRs Tutorial on Mar 14, 2018
Rack mounting recorders is common in professional systems, but manufacturers are making it difficult, with simple design failures causing multiple...
Network Addressing for Video Surveillance Guide on Mar 14, 2018
The goal of this guide is to explain addressing devices on IP networks, focusing on how IP cameras and recorders are used in those networks. For...
Panasonic Selling Off Security Camera Factory on Mar 14, 2018
Panasonic is OEMing cameras from Dahua, as IPVM testing confirmed in 2017. Now, Panasonic is selling their security camera factory, according to...
Favorite Electrified Locks 2018 on Mar 14, 2018
Electronic lock manufacturing is dominated by 3 conglomerates (alphabetically) Allegion, Assa and Dormakaba holding numerous electronic lock...
Hikvision Chairman Joins China National Government (NPC) on Mar 13, 2018
Hikvision Chairman and Communist Party Secretary Chen Xongnian has joined the People's Republic of China's government - the National People's...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact