Top 5 Mistakes IT People Make in Physical Security

Author: John Honovich, Published on Mar 19, 2009

IT convergence creates high anticipation and anxiety. New people entering physical security is one of the most emotional. The security systems market is a lot like Las Vegas - growing quickly, few of us are actually natives of the security industry; Over the last decade, most of us have migrated from IT (including myself).

A lot of the debate centers around whether IT will save or destroy physical security. Certainly Cisco is the most visible representation of this issue but the same concern arises each time major new IT companies or executives enter the space. This week, traditional leader Pelco hired an executive from Nortel, last month a video surveillance company hired an executive from Apple. By contrast, IP market leader Axis has recently hired a string of security system executives from Lenel, Honeywell and Panasonic.

Not Primarily a Conflict Between IT and Security

From reviewing dozens of video surveillance companies, I think the perceived conflict between IT and Security is misleading. While there is certainly tension among companies and inside of companies, that's usually not the root cause.

Security vs. Other Business Units

Security is obviously different from IT but the bigger difference is between security and other business units - marketing, accounting, operations, etc. Most (or all) of the other business units that IT serve are fundamentally far different than security. Bringing in expectations and practices that work in other business units tend to fail badly in security.

** *********** ******* **** ************ *** *******. *** ****** ******** physical ******** ** *** ** *** **** *********. *** ******** systems ****** ** * *** **** *** ***** - ******* quickly, *** ** ** *** ******** ******* ** *** ******** industry; **** *** **** ******, **** ** ** **** ******** from ** (********* ******).

* *** ** *** ****** ******* ****** ******* ** **** save ** ******* ******** ********. ********* ***** ** *** **** visible ************** ** **** ***** *** *** **** ******* ****** each **** ***** *** ** ********* ** ********** ***** *** space. **** ****, *********** ****** ***** ***** *********** **** ******, **** ***** * ***** ************ ******* ***** ** ********* from *****. ** ********, ** ****** ****** **** *** ******** hired * ****** ** ******** ****** ********** *********,*********************.

Not ********* * ******** ******* ** *** ********

**** ********* ****** ** ***** ************ *********, * ***** *** perceived ******** ******* ** *** ******** ** **********. ***** ***** is ********* ******* ***** ********* *** ****** ** *********, ****'* usually *** *** **** *****.

Security **. ***** ******** *****

******** ** ********* ********* **** ** *** *** ****** ********** is ******* ******** *** ***** ******** ***** - *********, **********, operations, ***. **** (** ***) ** *** ***** ******** ***** that ** ***** *** ************* *** ********* **** ********. ******** in ************ *** ********* **** **** ** ***** ******** ***** tend ** **** ***** ** ********.

[***************]

Not **** * **** ******

**** ******** ****** **** ***** *** ********** **** "******** ** a **** ******." * ***** **** ** ***** *** ********** in ********** *** ********** *** ********.

******** ********** **** ** *** ******** ******* ********* **** ****** times ********** ********. **** ****** *** ** ********** *******, ******** is *** ***** ** * **** ****** - ** ** accounting *** **. **** **** *** **** ***** ***** ******** units **** ********** *** ********* ********* ** ********.

Security ***** **** **** *** ********** **** ** ******* ******

************* **** ** ****** ******* ******** **** **** ******** *******. Security ******** ********** ****** ********** **** (** *** ** **** greater ***** **** **'* **** ** **** ****** *********).

**** *** ****** ******* **** *******, ******** ***** ** ** limited *** ****** ***********. *** ******** */** ** ** ******* example ** *** ******** ********* **** ****** ** ********. **'* difficult ** ******* **** ******** ********* (********** *** **** ********) so ****** *** ******, *** ********* *** *********** *****-********** ** security. **** ** **** ** ** ***** **** *****, ************* over-compensate *** ***** ******** **** ********. **** ***** ******** **** sensitive ** ***** *** ***** (* **** * ******* ******* **** ** *** **** *** *********** * *** ******** ****** *******). ** **** ***** ** very **** *** ************* ** *** ******** ** ******** **** faced **** ****** ****.

Small ******** ************* *** ******* ****** ** ******

******* ******** ** * **** ****** *** ******* **'* ***** hard ** ******* ******** *********, **** ******** ************* *** ***** and ***********. **** ** ********* ** ****** **** ********* **** great ********** *********.

****** ****** **** ********* ** **** ******** ****** *** ********* fairly *******. **** ** ** ***, **** ************* ** *** have **** ****** *** ***** **** ** *** *** **** to *******. ************, **** **** *** **** ** ****** (***** total ****** **** ** ****), ********** **** **** **** ***** surveillance ********** ** **** ********* ** *******.

**** ** *** ********** ***** ************ ** **** ********** *** marketing ** ** ******* ** *******. *** ******* ** **** no *** ** ***** ************ *** *** ***** * ***** mainstream ******** ***** ****. *** ******** **** ****** ****** ** are ***** ****** ** ***** **** '**** *****' *******.

The ***** ** ******** ********

** * *****, ******** ******** ********* ***:

  • ** **** ** **** ***** *** ** ************
  • ******* ****** ** ******
  • ******* ***** ** ***

**** ** *** ** ****** ********** **** ** **** *** physical ******** ****** *** **** ** *** *** ** **. Unlike ***** ******** *********, ***** *** *** **** ** *********** improve ******** *******.

**** **** *** **** **** *** ****** **** ***** ** physical ********. **'* **** **** ** ** *** ** **** and *** ** ********** ** ********** **** ** ***** ******** units.

The *** * ********

***** **** *********, **** *** *** * *** ******** * see ****:
  • *** ********* *** ***** ******* *** **
  • ********* ******** ** ** ** ******* ** ** ********
  • *** ************* *** **** *** ***** ******* *** ****
  • ********* ***** ******
  • ***** ********

******* ** ******** *** ***** *** **'* **** ** ******** additional ***** (**** *** ******* ********* ** ****-********* *******). **** if *** ******* '******' ******** ** *********, ** ** ********* even *** ******* *** ********* ** **** ************* **** *******.

** ******** ****, ** ****** ***** **** ***** ******* *** and ******** ***** ******** ******'* **************** ** ************* ***** ***** selling, ***. *** ***** ** **** ********** ** *** ********* model *** ***, **'* **** ** ******* ********* ******** ******* of *** *********** ****** ******** (********* *****). ************* ***** ****** on ******** *** ******* ** *** ******** ********** *** ******* the ******** ** ******** ** ********* *** **** ************* ** justify **** ******** **. ********** ** *** ****** *** **, it **** ** **** ** ******* ******** **** ****** ** increases ******** ** *** ************.

*** ******** ***** ***** ** *****, ** ***** ********** ***** a **** **** ** *** ***** ********. **** ******* ******* problem **** ** ** *** ** ********** ** - **** sales ****** **** *** ********** ***** ***** (***** $***,*** ***). Because ******** ******* ****** **** *** ********* ******* ** ****** revenue ******, *** **** ** ******** *** ********** ***** ** be ****.

**** *** **** **** ***** ****** *** ******* ********* ** disrupt, **** ******* ** * **** ******* ** *********** ******. No *** *** **** **** *** ******** ******** *** **** wholesale ******* ** * *** ***** (***** ** ** **** 3 *** ** ***** ******** *** *** ******). **** ** Axis - ** ******* ******* ***** *** *** ******** ******** market. **** *** ** **** ** ** *** ******** *** still **** **** **** **% ***** ** ***** ************ *******. Even *** **** ********** ********* ** ***** ************ *** **** penetrate ******.

*** ***** ***** * *** ********** ** *** ***** ** arrogance **** ** ****** ******** ******** ********. *** ******* ** this ** ********** **************** ** ********* ** *** ****** *****. IT ****** ***** *** ***** ***** **** *** ******* ******* or ****** ******** ******** ******* *** **** **** ****** **** been ****** ************** *** **** **** * ******. ** ***** off ** ********* *** *** **** ** ************ ******** **** veterans (**********, ******** ** *********) *** ********** ***** ****** *****-****.

***************

**** ** ****** **** ************ **** *** ********** **** ** to ******** ********. ***** *** *** ********* ****** *** ********, you **** ** ****** *** ********** *** *********** ******** ** the ******** ******** ********. ******** *** ********** *** **** **** likely ** **** *** *** **** **********.
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Dahua Distributor Bad Breakup on Mar 27, 2017
A Dahua distributor in Europe claims that Dahua took over his top customers, revoked his distributorship status, and left him with a large amount...
Hikvision Attacks IPVM on Mar 20, 2017
Hikvision has attacked IPVM repeatedly over the last month, both in the international press and in its dealer communications. Attacks Listed On...
Dahua US Imports - Here Is Their #1 Customer By Far on Mar 17, 2017
We have been reviewing shipping records of both Dahua and Hikvision products coming in to the US. This is to help prepare the Dahua OEM and...
Burglar Alarm Screens Tutorial on Mar 14, 2017
Many residential alarm subscribers arm their alarms before going to bed at night. Wiring window screens allow these subscribers to leave their...
Axis: Minimal Made In China Products, Ending This Year (Except For In China Sales) on Mar 13, 2017
A member recently asked about where Axis is made because a school had raised concerns about the "security of Chinese manufactured cameras."  Here...
Nightingale Security Drones Profile / Gain Key Legal Clearance on Mar 10, 2017
Nightingale was the first drone targeted at security, and now they are the first drone security company to receive 2 key FAA exemptions, allowing...
OEMs, Dump Dahua on Mar 08, 2017
OEMs, get smart and dump Dahua. Dahua OEMs to many companies including some big brands (e.g. FLIR, Honeywell and Tyco). Dahua has proven to be a...
Amazon Distributor Favorability Results on Mar 03, 2017
Amazon is not a security distributor, but they often have more stock, better prices, and faster shipping on certain components than many...
Arecont Cuts 4 Rep Firms on Mar 02, 2017
Arecont Vision has cut 4 rep firms and will be replacing them with direct employees. Inside this note, we review the details of the move, provide...
Avigilon Shifts Strategy To Maximizing Profitability (Q4 2016 Results) on Mar 01, 2017
Avigilon had previously been known for big spending, hiring a large sales force and throwing lavish partner parties at tradeshows like ISC West....

Most Recent Industry Reports

Chinese Government Spies on Churches With Video Surveillance on Mar 27, 2017
The Chinese government is using video surveillance to spy on churches in China, reports UCANews, explaining: The [Chinese government]...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Dahua Distributor Bad Breakup on Mar 27, 2017
A Dahua distributor in Europe claims that Dahua took over his top customers, revoked his distributorship status, and left him with a large amount...
Everbridge Mass Notification Service Examined on Mar 24, 2017
Everbridge is expanding in the security space. In January 2017 Everbridge acquired PSIM platform IDV, and have also begun integrating with other...
Hikvision Removing Auto 'Phone Home' on Mar 24, 2017
Facing pressure over their cameras auto phoning home and their Chinese government ownership, Hikvision has begun quietly removing automatic...
Axis Camera Vulnerabilities From Google Researcher Analyzed on Mar 23, 2017
A Google security researcher has reported 6 vulnerabilities for Axis cameras, affecting multiple models and firmware versions. In this report, we...
OpenEye Takes Aim At Exacq on Mar 23, 2017
First Milestone targeted Exacq with a takeover offer, and now OpenEye is gunning for them with an offer to swap out Exacq for their cloud-managed...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Broken Browser Support for Video Surveillance on Mar 22, 2017
Modern web browsers have left the security industry behind. Current Chrome, Firefox, and Microsoft Edge browsers do not support NPAPI plugins,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact