Top 5 Mistakes IT People Make in Physical Security

Author: John Honovich, Published on Mar 19, 2009

IT convergence creates high anticipation and anxiety. New people entering physical security is one of the most emotional. The security systems market is a lot like Las Vegas - growing quickly, few of us are actually natives of the security industry; Over the last decade, most of us have migrated from IT (including myself).

A lot of the debate centers around whether IT will save or destroy physical security. Certainly Cisco is the most visible representation of this issue but the same concern arises each time major new IT companies or executives enter the space. This week, traditional leader Pelco hired an executive from Nortel, last month a video surveillance company hired an executive from Apple. By contrast, IP market leader Axis has recently hired a string of security system executives from Lenel, Honeywell and Panasonic.

Not Primarily a Conflict Between IT and Security

From reviewing dozens of video surveillance companies, I think the perceived conflict between IT and Security is misleading. While there is certainly tension among companies and inside of companies, that's usually not the root cause.

Security vs. Other Business Units

Security is obviously different from IT but the bigger difference is between security and other business units - marketing, accounting, operations, etc. Most (or all) of the other business units that IT serve are fundamentally far different than security. Bringing in expectations and practices that work in other business units tend to fail badly in security.

Not Just a Cost Center

Most industry people have heard the expression that "security is a cost center." I think this is valid but incomplete in describing the challenges for security.

Business activities that do not generate revenue certainly have harder times justifying projects. This should not be overlooked However, security is not alone as a cost center - so is accounting and HR. This does not stop these other business units from commanding and deploying expensive IT projects.

Security Deals with Rare and Frequently Hard to Predict Events

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

Organizations tend to prefer funding projects that show tangible results. Security projects frequently cannot accomplish this (no way to show greater sales plus it's hard to show losses prevented).

When you cannot clearly show results, spending tends to be limited and driven emotionally. For instance 9/11 is an extreme example of the spending variation that occurs in security. It's difficult to predict many security incidents (especially the most damaging) so before one occurs, you generally see significant under-investment in security. Then as soon as an event does occur, organizations over-compensate and flood spending into security. This makes security very sensitive to booms and busts (a bust I believe we could face in the next few years unless a new security threat emerges). It also makes it very easy for organizations to cut spending on security when faced with budget cuts.

Small Security Organizations and Limited Losses To Reduce

Because security is a cost center and because it's often hard to predict security incidents, many security organizations are small and underfunded. This is certainly an aspect that outsiders have great difficulty accepting.

Making things more difficult is that security losses are generally fairly limited. That is to say, most organizations do not have much losses and those that do are not easy to address. Specifically, even when you look at retail (where total dollar loss is high), addressing that loss with video surveillance technology is very difficult to achieve.

This is why advocating video surveillance to help operations and marketing is so desired by vendors. The problem is that no one in video surveillance has yet built a large mainstream business doing this. All attempts have either failed or are still trying to solve this 'holy grail' problem.

The State of Physical Security

As a whole, physical security typically has:

  • no ways to make money for an organization
  • limited losses to reduce
  • limited staff to cut

This is why IT people frequently come to hate the physical security market and want to get out of it. Unlike other business functions, there are few ways to immediately improve business results.

This does not mean that you cannot make money in physical security. It's just that it is not as easy and not as responsive to techniques used in other business units.

The Top 5 Mistakes

Given this situation, here are the 5 top mistakes I see made:
  • Not Realizing How Tight Budgets Can Be
  • Expecting Spending to Go Up Because IT is Involved
  • Not Understanding How Long the Sales Process Can Take
  • Expecting Rapid Change
  • Being Arrogant

Budgets in security are tight and it's hard to allocate additional funds (with the massive exception of anti-terrorism funding). Even if you present 'better' products or solutions, it is difficult even for Fortune 500 companies to find significantly more funding.

To overcome this, IT people often talk about selling ROI and complain about security people's unsophistication in understanding value based selling, etc. The irony is that regardless of the financial model you use, it's hard to justify increased spending because of the limitations within security (described above). Organizations spend little on security not because of the security department but because the activity of security is difficult for most organizations to justify more spending on. Regardless of who issues the PO, it will be hard to justify spending more unless it increases benefits to the organization.

For projects where money is tight, it often frequently takes a long time to get money approved. This creates another problem that IT is not as accustomed to - long sales cycles even for relatively small deals (under $100,000 USD). Because security systems rarely make big immediate impacts or enable revenue growth, the pace of approval and deployment tends to be slow.

When you take slow sales cycles and limited abilities to disrupt, this results in a long process of incremental change. No one can come into the security industry and make wholesale changes in a few years (Cisco is in year 3 and is still figuring out the basics). Look at Axis - an amazing success story for the physical security market. They are in year 13 in the industry and still have less than 10% share of video surveillance cameras. Even the most successful companies in video surveillance can only penetrate slowly.

The final issue I see repeatedly is the level of arrogance from IT people entering physical security. One element of this is systematic misunderstanding or blindness to the issues above. IT people again and again think they can rapidly disrupt or change physical security despite the fact that people have been trying unsuccessfully for more than a decade. It comes off as arrogance and can hurt in relationship building with veterans (colleagues, partners or customers) who appreciate these issues first-hand.

Recommendations

Lots of people have successfully made the transition from IT to physical security. While you can certainly change the industry, you need to accept the challenges and constraints specific to the physical security industry. Patience and persistent are much more likely to help you win than disruption.

2 reports cite this report:

Training: Basics for the Video Surveillance Business on May 17, 2010
This report provides a 48 minute video presentation that teaches the basics of the video surveillance business including: Size and structure of...
Recommendations for Surveillance Startups / Investors on Aug 08, 2009
While there are many startups in video surveillance, many of them have under-achieved, especially the most prominent, VC backed companies in the...
Comments : PRO Members only. Login. or Join.

Related Reports

Security Sales Course Summer 2018 on Jul 13, 2018
Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security Sales Course Summer 2018 This...
Arecont Acquisition By Costar on Jul 11, 2018
Arecont Vision acquisition by Costar Technologies has been approved by the court, concluding the bankruptcy process triggered by Arecont's...
Eastern and SavvyTech Merge, Form ENS, Targets ADI on Jul 09, 2018
ADI, ENS is coming for you. Or, at least, they hope. Two US distributors, NY based EasternCCTV and California based SavvyTech have merged, to...
Arlo IPO Filing Reveals Key Financial and Competitive Details on Jul 09, 2018
Arlo is going to IPO at a projected valuation greater than Axis. Now, Arlo has released their 175-page Form S1 Registration Statement for its...
Drops Dahua, Fenner Becomes ISS CMO on Jul 09, 2018
Hired to improve Dahua's miserable marketing just last year, Janet Fenner has quit Dahua, joining VMS manufacturer ISS as Chief Marketing...
Pelco Is For Sale on Jun 27, 2018
Pelco is for sale, being shopped by an investment bank, IPVM has confirmed from multiple sources. The company, acquired by Schneider Electric in...
Snap Surveillance Profile on Jun 26, 2018
There are not a lot of video surveillance companies that survive 9 years with only one feature that makes their product stand out. In the case of...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...

Most Recent Industry Reports

Axis ~$100 Camera Tested on Jul 17, 2018
Axis has released their lowest cost camera ever, the Companion Eye Mini L, setting their sights on a market dominated by Hikvision and Dahua. Can...
Amazon Ring Alarm System Tested on Jul 16, 2018
Amazon Ring is going to hurt traditional dealers, and especially ADT, new IPVM test results of Ring's Alarm system underscore. IPVM found that...
Hikvision Wins Chinese Government Forced Facial Recognition Project Across 967 Mosques on Jul 16, 2018
Hikvision has won a Chinese government tender which requires that facial recognition cameras be set up at the entrance of every single mosque...
Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...
Security Sales Course Summer 2018 on Jul 13, 2018
Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security Sales Course Summer 2018 This...
US Tariffs Hit China Video Surveillance on Jul 13, 2018
Chinese video surveillance products avoided tariffs for the first two rounds. Now, in the third round, many video surveillance products will be...
Last Chance - July 2018 IP Networking Course on Jul 12, 2018
Registration ends today, Thursday. Register now. This is the only networking course designed specifically for video surveillance...
4 Most Difficult Camera Installs (Statistics) on Jul 12, 2018
Heavy housings, cumbersome brackets, heavy ladders required, and tricky field of view requirements will cause difficulties no matter the camera...
Axis Perimeter Defender Video Analytics Tested on Jul 12, 2018
Axis 'high security' video analytics offering is Perimeter Defender, OEMed / developed with Digital Barriers. But how good is Perimeter Defender?...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact