Should IT Take Over Physical Security?

Author: John Honovich, Published on Jan 18, 2009

Frequent discussions of IT taking over physical security often turn to not simply if it will happen but when it will happen. Such convergence is viewed broadly as a key issue in the future of the security industry.

Perhaps more important than will it happen is should it happen. Would it be better for end user organizations to have IT run physical security? Would we save money or be more secure or possibly both?

The Case for IT Taking Over

Proponents see 3 major advantages for IT taking over physical security:

  • Physical security systems are becoming increasingly more sophisticated
  • IT personnel can quickly learn what they lack in physical security
  • IT personnel are strong at maximizing business benefits of technology

The rise of IP telephony is the most commonly cited example of a domain that IT has successfully taken over.

Why IT Should Not Take Over

I believe it would be dangerous for IT to take over physical security. If IT did take over, this would increase security and liability risks.

Unlike telephony, physical security is significantly more involved than integrating and deploying the technologies employed. It is impossible to manage physical security simply through technology. Physical security, by its nature, requires extensive expertise in physical construction, organizing responders and interacting with suspects/attackers. Indeed, physical security is intricately intertwined with security management (e.g., see the US Army physical security guide).

Physical security practitioners offer three 3 characteristics that will be difficult to impossible for IT to successfully replace:

  • Toughness to physical conditions and physical threats
  • Ability to handle deception and lies
  • Deep domain expertise in criminal justice

The technologies used in physical security help security execute their responsibilities but do not and will eliminate the need for these characteristics.

Toughness

Security managers routinely deal with violence or threats of violences – it is an essential and necessary part of the job. Even if you get an image of the person on your IP video system, you still need to deal with the person (an especially difficult issue when dealing with internal issues).

Security managers, often with a military or police background, have years of training dealing with violence and threats. As such they tend not to be intimidated or overwhelmed when faced with this.

Most IT managers lack the temperament and training to be competent in these situations . If the IT manager is handling incidents, it is an easy and obvious choice for the suspect to intimidate the IT manager.

Deception and Lies

Most suspects will not immediately admit full guilt. This is the whole point of investigations – which is a key element of security organizations both in the public and private sector. Security managers need to be trained and able to handle this type of interaction.

IT managers do not have any of this training. This could lead to lower cases resolved, less restitution and if they conduct the investigation inappropriately to lawsuits.

Criminal Justice

What is legal is a key element in security decisions every day. From how suspects can be treated to how policies and procedures are setup, criminal justice issues are critical to properly running security.

We often talk about the IT needing to learn about lenses, camera positioning, recording duration, etc but that's just a small part of real security management. Check the PSP and CPP certification requirements and you can see the hundreds of elements involved.

Maybe IT Can Just Runs the Systems?

Some people may argue: Let security handle all the criminal and investigation aspect, just let IT handle physical security systems.

Accounting and sales provides a good examples (indeed, counter examples to telephony). The accounting and sales organization are heavily dependent on information systems. However, the IT department rarely selects the software. While the IT department absolutely has influence and makes recommendations, the accounting and sales organization ultimately choose the system that best meets their particular goals. This practice is equally sound for physical security.

Conclusion

Physical security is much more than physical security systems. Organizations are best served by physical security experts selecting technologies that best serve overall security plans with input from the IT department on technical issues.

1 report cite this report:

Security Manager Statistics and Surveys 2009 on Oct 03, 2009
The needs and constraints of security end users are key elements in determining the selection of security technologies such as video surveillance....

Related Reports on Sales

Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Milestone Favorability Results on Dec 06, 2016
In our second installment of manufacturer favorability results (first was Pelco), we turn to Milestone. 100+ integrators rated and explained what...
Hikvision CEO Declares 'We Do Not Cut Rates" on Dec 02, 2016
Hikvision has led another press trip to China, and this time Hikvision's CEO is sharing insights into their competitive strategy, including...
Top Surprises in the Video Surveillance Industry 2016 on Nov 29, 2016
  The top 3 surprises of 2016 for integrators surveyed by IPVM were: The race to bottom, repeating 2015's Top Surprise Result New -...
3VR Sales And Marketing Execs Out, Company Shifting on Nov 22, 2016
Two executives are out at 3VR, both after relatively short tenures at the company. 3VR's CEO says this is part of a shift to cover new markets....
Top Manufacturers Gaining and Losing 2016 on Nov 21, 2016
Hikvision has been the top gaining manufacturer in IPVM's annual integrator survey the past 2 years (see 2015 results and 2014 results). Can they...
Dahua Launches Aggressive Hikvision Style Sale on Nov 16, 2016
If you can't beat 'em, join 'em. This seems to be Dahua's strategy, first mimicking Hikvision in portraying themselves as an American treasure,...
Longse vs Dahua and Hikvision Tested on Nov 16, 2016
For many, even $100 cameras are too expensive. That is where spam king Longse comes in with their relentless offer of ~$20 cameras. In our past...
Avigilon Stock Surges 40% On Strong Growth (Q3 2016) on Nov 15, 2016
The roller coaster continues. After a brutal Q2 heading down, Avigilon's Q3 growth is strongly up. Inside this note, we examine what powered...
Sony and Bosch Combine Forces on Nov 15, 2016
Two of the biggest brands in the video surveillance industry are joining forces. Following a wave of industry consolidation and the race to the...

Most Recent Industry Reports

The Russian SMP Security Robot on Dec 08, 2016
A Russian manufacturer, SMP, has a commercially available outdoor security robot, at a lower price and with much less marketing than their main...
How Hikvision Beats Its OEMs on Dec 08, 2016
Hikvision GM declared that they are not aggressive with their competitors. But some of their own OEM partners disagree. Inside, we reveal a key...
Dahua Discontinuing H.264 Only Products on Dec 08, 2016
Dahua has taken a stand for H.265 and is discontinuing its H.264 only products. We examine the shakeup inside this...
Last Day Save $50 IP Networking Course January 2017 on Dec 08, 2016
Today is the last day to save $50 on next month's IP networking course. This is the only networking course designed specifically for video...
Hikvision vs Dahua Mobile Apps Tested on Dec 07, 2016
With smartphone use and low-cost video recorders surging, many user's main interface to their surveillance system is their phone. With mobile video...
Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Axis Partner Elder Care Video Analytics (Smartervision) on Dec 07, 2016
Can video analytics be used to improve the care of the elderly? Axis and a video analytics startup, Smartervision, are working together to do so....
Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...
Power Drill Selection Guide on Dec 06, 2016
Boring holes is a basic part of running cables for most security system projects. To do so, you will need to choose the right drills for various...
Milestone Favorability Results on Dec 06, 2016
In our second installment of manufacturer favorability results (first was Pelco), we turn to Milestone. 100+ integrators rated and explained what...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact