Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Knowledge Metrics: Integration Moves to Next Level

By Sandy Jones
March 16, 2006


If you think about what were the most significant change drivers in security, you probably would include the digital dialer, microprocessors, the Internet and the tragic events of September 11th.

There is another one just around the corner that we can add to this short list – IP video. It’s already changing how you approach your investment in security, the technologies, the industry landscapes, channels to market and role of each of the participants. For those integrators and manufacturers who understand the value they provide there is opportunity and growth. For the others, get ready or get out of the way for what’s just around the corner.

At $5 to $6 billion globally, the video equipment and installation market is already a significant part of the security industry. It is expected to grow an estimated 10-20 percent over the next few years; but that growth will now be shared or even a significant amount lost to those outside the traditional industry – a trend that end-users can exploit.



IP revolution

The long term impact of IP includes the simplification of currently complex video systems that may include several types of cameras, large scale matrix switching devices, multiplexers, digital recorders, PCs and analytical software packages. The straight-forward transmission of IP video direct to a software-controlled PC that includes viewing, switching and recording is not far away.

Who will this simplified architecture most benefit? Certainly end-users who will witness cost reductions, economies of scale from their increased network productivity and flexibility to purchase security products from both security and IT vendors.

Who will be most adversely affected by this same innovation? Traditional security integrators, unless they recognize their value and are willing to adjust their selling methods and overhead costs. The reduction of complexity in new systems design will certainly downgrade the need for system integrators as we know them today. “Network appliances” and “plug and play” are IT standards that are rapidly crossing over into many other technology-based industries such as security. IT suppliers tend to provide more comprehensive technical assistance to their users immaterial of purchase channel. I’ve seen this trend duplicated by some traditional camera suppliers upon introduction of their IP product lines.

Integrators can expect change and a greater proliferation of cameras bought and sold for applications outside of the security industry. First and foremost, integrators working with security will more often get involved with a client’s IT department. If they understand your business challenges and goals, the same IP cameras you use for security can also function for any type of information gathering. The benefits can provide a faster return on investment.

Toffler was right, “knowledge is power” and by using IP cameras for security plus other business functions and information gathering you empower your mission, add efficiency, reduce cost and provide a better business experience.

When involving IT, there are new and non-traditional metrics which all tie to “knowledge.” The following are just some examples of what you can do to flip it from grudge to real value.

Improve productivity. Use IP cameras to “visit” locations that can now be addressed from any location over a secure network. Turn visiting one location a day into visiting multiple locations in one day.

Obtain marketing and customer data. By using the same cameras but with some adjustment to placement, you can capture buying patterns.

Improve customer service, satisfaction and their experience. Examples range from improved staffing levels and relocating service people to insuring their safety and the appearance of the facility.

Drive revenue. By having cameras at toll booths and other unmanned areas where payments/fees are received, you can verify and count people to revenue.

You know how to share. Let them know you can co-exist on the same network without interfering or creating damage to the information and data that already get.

Change information overload into real-time actionable information by adding analytics to a camera system.



Links

  • Sandra Jones and Company
  • Sandra Jones and Company

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sandy Jones of Sandra Jones and Company provides revenue development, strategic planning, marketing and M&A support services to integrators, manufacturers, investors and IT companies in all segments of the commercial security and fire market. Jones is considered one of the leading resources in the security industry and a founder of the annual Securing New Ground conference, cosponsored by Security Magazine and SDM Magazine. For more information please go to www.sjandco.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Overcoming Silos

    Building Bridges: Overcoming Silos to Bring Organizations to the Next Level

    See More
  • Get to the Next Level Online

    See More
  • SEC0521-Multicare_Feat-slide1_900px

    Case Study: MultiCare Health System takes security to the next level

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing