Should IT Take Over Physical Security?

Author: John Honovich, Published on Jan 18, 2009

Frequent discussions of IT taking over physical security often turn to not simply if it will happen but when it will happen. Such convergence is viewed broadly as a key issue in the future of the security industry.

Perhaps more important than will it happen is should it happen. Would it be better for end user organizations to have IT run physical security? Would we save money or be more secure or possibly both?

The Case for IT Taking Over

Proponents see 3 major advantages for IT taking over physical security:

  • Physical security systems are becoming increasingly more sophisticated
  • IT personnel can quickly learn what they lack in physical security
  • IT personnel are strong at maximizing business benefits of technology

The rise of IP telephony is the most commonly cited example of a domain that IT has successfully taken over.

Why IT Should Not Take Over

I believe it would be dangerous for IT to take over physical security. If IT did take over, this would increase security and liability risks.

Unlike telephony, physical security is significantly more involved than integrating and deploying the technologies employed. It is impossible to manage physical security simply through technology. Physical security, by its nature, requires extensive expertise in physical construction, organizing responders and interacting with suspects/attackers. Indeed, physical security is intricately intertwined with security management (e.g., see the US Army physical security guide).

Physical security practitioners offer three 3 characteristics that will be difficult to impossible for IT to successfully replace:

  • Toughness to physical conditions and physical threats
  • Ability to handle deception and lies
  • Deep domain expertise in criminal justice

The technologies used in physical security help security execute their responsibilities but do not and will eliminate the need for these characteristics.

Toughness

Security managers routinely deal with violence or threats of violences – it is an essential and necessary part of the job. Even if you get an image of the person on your IP video system, you still need to deal with the person (an especially difficult issue when dealing with internal issues).

Security managers, often with a military or police background, have years of training dealing with violence and threats. As such they tend not to be intimidated or overwhelmed when faced with this.

Most IT managers lack the temperament and training to be competent in these situations . If the IT manager is handling incidents, it is an easy and obvious choice for the suspect to intimidate the IT manager.

Deception and Lies

Most suspects will not immediately admit full guilt. This is the whole point of investigations – which is a key element of security organizations both in the public and private sector. Security managers need to be trained and able to handle this type of interaction.

IT managers do not have any of this training. This could lead to lower cases resolved, less restitution and if they conduct the investigation inappropriately to lawsuits.

Criminal Justice

What is legal is a key element in security decisions every day. From how suspects can be treated to how policies and procedures are setup, criminal justice issues are critical to properly running security.

We often talk about the IT needing to learn about lenses, camera positioning, recording duration, etc but that's just a small part of real security management. Check the PSP and CPP certification requirements and you can see the hundreds of elements involved.

Maybe IT Can Just Runs the Systems?

Some people may argue: Let security handle all the criminal and investigation aspect, just let IT handle physical security systems.

Accounting and sales provides a good examples (indeed, counter examples to telephony). The accounting and sales organization are heavily dependent on information systems. However, the IT department rarely selects the software. While the IT department absolutely has influence and makes recommendations, the accounting and sales organization ultimately choose the system that best meets their particular goals. This practice is equally sound for physical security.

Conclusion

Physical security is much more than physical security systems. Organizations are best served by physical security experts selecting technologies that best serve overall security plans with input from the IT department on technical issues.

1 report cite this report:

Security Manager Statistics and Surveys 2009 on Oct 03, 2009
The needs and constraints of security end users are key elements in determining the selection of security technologies such as video surveillance....

Related Reports on Sales

Hikvision Attacks IPVM on Mar 20, 2017
Hikvision has attacked IPVM repeatedly over the last month, both in the international press and in its dealer communications. Attacks Listed On...
Dahua US Imports - Here Is Their #1 Customer By Far on Mar 17, 2017
We have been reviewing shipping records of both Dahua and Hikvision products coming in to the US. This is to help prepare the Dahua OEM and...
Burglar Alarm Screens Tutorial on Mar 14, 2017
Many residential alarm subscribers arm their alarms before going to bed at night. Wiring window screens allow these subscribers to leave their...
Axis: Minimal Made In China Products, Ending This Year (Except For In China Sales) on Mar 13, 2017
A member recently asked about where Axis is made because a school had raised concerns about the "security of Chinese manufactured cameras."  Here...
Nightingale Security Drones Profile / Gain Key Legal Clearance on Mar 10, 2017
Nightingale was the first drone targeted at security, and now they are the first drone security company to receive 2 key FAA exemptions, allowing...
OEMs, Dump Dahua on Mar 08, 2017
OEMs, get smart and dump Dahua. Dahua OEMs to many companies including some big brands (e.g. FLIR, Honeywell and Tyco). Dahua has proven to be a...
Amazon Distributor Favorability Results on Mar 03, 2017
Amazon is not a security distributor, but they often have more stock, better prices, and faster shipping on certain components than many...
Arecont Cuts 4 Rep Firms on Mar 02, 2017
Arecont Vision has cut 4 rep firms and will be replacing them with direct employees. Inside this note, we review the details of the move, provide...
Avigilon Shifts Strategy To Maximizing Profitability (Q4 2016 Results) on Mar 01, 2017
Avigilon had previously been known for big spending, hiring a large sales force and throwing lavish partner parties at tradeshows like ISC West....
Avigilon Favorability Results on Feb 27, 2017
One of the fastest growing companies has turned into one of the rockiest, as cooling growth, management turnover and a roller coaster stock price...

Most Recent Industry Reports

Everbridge Mass Notification Service Examined on Mar 24, 2017
Everbridge is expanding in the security space. In January 2017 Everbridge acquired PSIM platform IDV, and have also begun integrating with other...
Hikvision Removing Auto 'Phone Home' on Mar 24, 2017
Facing pressure over their cameras auto phoning home and their Chinese government ownership, Hikvision has begun quietly removing automatic...
Axis Camera Vulnerabilities From Google Researcher Analyzed on Mar 23, 2017
A Google security researcher has reported 6 vulnerabilities for Axis cameras, affecting multiple models and firmware versions. In this report, we...
OpenEye Takes Aim At Exacq on Mar 23, 2017
First Milestone targeted Exacq with a takeover offer, and now OpenEye is gunning for them with an offer to swap out Exacq for their cloud-managed...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Broken Browser Support for Video Surveillance on Mar 22, 2017
Modern web browsers have left the security industry behind. Current Chrome, Firefox, and Microsoft Edge browsers do not support NPAPI plugins,...
ADI Favorability Results on Mar 22, 2017
150 North American integrators provided feedback on 6 distributors, and why they do (or do not do) business with ADI. ADI is clearly a big name in...
1 Million Dahua Devices Exposed To Backdoor on Mar 22, 2017
Statistics show that 1 million Dahua devices are publicly exposed and vulnerable to the Dahua backdoor. Despite this, Dahua has downplayed the...
Hikvision Hires Crisis Communication Writer on Mar 21, 2017
Hikvision has hired a crisis communication writer as the company ramps up its efforts to deal with the 'crisis' it feels it is facing. 'Crisis...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact