Should IT Take Over Physical Security?

Author: John Honovich, Published on Jan 18, 2009

Frequent discussions of IT taking over physical security often turn to not simply if it will happen but when it will happen. Such convergence is viewed broadly as a key issue in the future of the security industry.

Perhaps more important than will it happen is should it happen. Would it be better for end user organizations to have IT run physical security? Would we save money or be more secure or possibly both?

The Case for IT Taking Over

Proponents see 3 major advantages for IT taking over physical security:

  • Physical security systems are becoming increasingly more sophisticated
  • IT personnel can quickly learn what they lack in physical security
  • IT personnel are strong at maximizing business benefits of technology

The rise of IP telephony is the most commonly cited example of a domain that IT has successfully taken over.

Why IT Should Not Take Over

I believe it would be dangerous for IT to take over physical security. If IT did take over, this would increase security and liability risks.

Unlike telephony, physical security is significantly more involved than integrating and deploying the technologies employed. It is impossible to manage physical security simply through technology. Physical security, by its nature, requires extensive expertise in physical construction, organizing responders and interacting with suspects/attackers. Indeed, physical security is intricately intertwined with security management (e.g., see the US Army physical security guide).

Physical security practitioners offer three 3 characteristics that will be difficult to impossible for IT to successfully replace:

  • Toughness to physical conditions and physical threats
  • Ability to handle deception and lies
  • Deep domain expertise in criminal justice

The technologies used in physical security help security execute their responsibilities but do not and will eliminate the need for these characteristics.


Security managers routinely deal with violence or threats of violences – it is an essential and necessary part of the job. Even if you get an image of the person on your IP video system, you still need to deal with the person (an especially difficult issue when dealing with internal issues).

Security managers, often with a military or police background, have years of training dealing with violence and threats. As such they tend not to be intimidated or overwhelmed when faced with this.

Most IT managers lack the temperament and training to be competent in these situations . If the IT manager is handling incidents, it is an easy and obvious choice for the suspect to intimidate the IT manager.

Deception and Lies

Most suspects will not immediately admit full guilt. This is the whole point of investigations – which is a key element of security organizations both in the public and private sector. Security managers need to be trained and able to handle this type of interaction.

IT managers do not have any of this training. This could lead to lower cases resolved, less restitution and if they conduct the investigation inappropriately to lawsuits.

Criminal Justice

What is legal is a key element in security decisions every day. From how suspects can be treated to how policies and procedures are setup, criminal justice issues are critical to properly running security.

We often talk about the IT needing to learn about lenses, camera positioning, recording duration, etc but that's just a small part of real security management. Check the PSP and CPP certification requirements and you can see the hundreds of elements involved.

Maybe IT Can Just Runs the Systems?

Some people may argue: Let security handle all the criminal and investigation aspect, just let IT handle physical security systems.

Accounting and sales provides a good examples (indeed, counter examples to telephony). The accounting and sales organization are heavily dependent on information systems. However, the IT department rarely selects the software. While the IT department absolutely has influence and makes recommendations, the accounting and sales organization ultimately choose the system that best meets their particular goals. This practice is equally sound for physical security.


Physical security is much more than physical security systems. Organizations are best served by physical security experts selecting technologies that best serve overall security plans with input from the IT department on technical issues.

1 report cite this report:

Security Manager Statistics and Surveys 2009 on Oct 03, 2009
The needs and constraints of security end users are key elements in determining the selection of security technologies such as video surveillance....

Related Reports on Sales

Axis Video Revenue Down on Oct 20, 2016
An important milestone. Axis revenue for video products is down year over year. But Axis is now focusing on 'diversification'. In this report, we...
IndigoVision Going Head-To-Head Against Milestone, Genetec on Oct 12, 2016
Cameras are commodities, the money is in VMS. This is the new philosophy of IndigoVision, long known as a closed end-to-end systems provider. The...
Lead Hikvision Ezviz Direct-to-Customer Sales on Oct 10, 2016
Hikvision continues to ramp up its direct-to-customer sales. And you can lead the team. In this note, we examine what Hikvision is seeking, what...
VSaaS Startup Raises $5 Million For Global Expansion on Oct 04, 2016
There is money to be made in VSaaS. At least that is what the investors of Morphean believe. The Swiss company received a $5M investment to expand...
The 'Last Chance to Save' On Hikvision Is Here on Sep 29, 2016
It is over. After at least 8 across the board price cuts in the past 10 months, including an unprecedented back to back 20% off, Hikvision has...
Hiring Spree At Aimetis 6 Months After Being Acquired on Sep 28, 2016
Aimetis was acquired in April 2016, and is now expanding almost all of their departments, hiring employees from Axis and other industry...
Axis Secretly Paid Anixter Sales People To Push Axis NVRs on Sep 26, 2016
Internal Axis communication shows how Axis paid Anixter and Tri-Ed sales people with secret bonuses to push Axis NVRs. In this report, we examine...
ACTi Refuses Race To The Bottom, Shifts To Solutions on Sep 23, 2016
The original low cost IP camera disruptor was ACTi. Back in the 2008 - 2010 time frame, Taiwanese manufacturer ACTi challenged the Western and...
Milestone Ends Development of "Enterprise" VMS on Sep 22, 2016
Milestone 'Enterprise' was one of the first enterprise video management software offerings, selected by many early adopters of IP video. However,...
History of Video Surveillance on Sep 22, 2016
This is a concise history of video surveillance covering the past decade.  The goal is to help professionals newer to the industry understand...

Most Recent Industry Reports

China Hot For Intelligent Video on Oct 27, 2016
The clear top theme at the 2016 Security China show has been intelligent video. This is a big shift from past years, and China's historical focus...
Flying Security Guard Startup Aptonomy Examined on Oct 27, 2016
Backed by Silicon Valley's biggest incubator and led by two robotics PhDs, Aptonomy is set to launch, what they describe, as 'flying security...
Bidding Divisions (08, 26, 27, 28) For Security Systems Guide on Oct 27, 2016
Navigating the world of system specifications and bidding work can be complex and confusing, but a standard format exists, and understanding it...
Dahua Says They Are Botnet Attack 'Victims' on Oct 26, 2016
'Victim' or 'accomplice'? Dahua has issued a new press release, referring to their products as 'victims' of the massive botnet attacks hitting the...
Milestone Launches $50,000 Developer Contest on Oct 26, 2016
Milestone wants independent developers to enhance XProtect. In a hackathon-style contest Milestone is soliciting developers to submit ideas for a...
Smart H.265 Samsung Test on Oct 26, 2016
In our first test of H.265 cameras (including Samsung and Vivotek), H.265 benefits were essentially nil, both versus leading H.264 cameras and,...
The Xiongmai Botnet 'Recall' Will Not Work on Oct 25, 2016
The Xiongmai 'recall' has been the topic of global news, following the unprecedented bot net attacks that use their equipment, among...
Hikvision Partners With Intel Movidius For Artificial intelligence Cameras on Oct 25, 2016
The world's largest camera manufacturer is partnering with the worlds largest semiconductor company to create a series of intelligent...
Intel Movidius Targets Video Surveillance Market on Oct 25, 2016
The most commonly used chips in IP cameras come from Ambarella, Hisilicon or TI. Now, Movidius, who Intel announced acquiring in September, is...
Favorite Access Control 2016 on Oct 25, 2016
Integrators told us "What is your favorite access control management software/system? Why?", and the responses are interesting indeed. While no...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact