Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Publishers’ Letter: Things No One Asked For

By Mark McCourt
March 17, 2006
Mark McCourt


Henry Ford was asked why he didn’t research demand for the automobile before building the first automotive assembly line. His answer, “Because they would have asked for faster horses.”

The history of technology-driven change is rich with similar stories. In studies of perceived future needs, the personal computer, the Internet, e-mail and iPods were never identified by the eventual customer.

Similarly, security solutions, innovations and technology were not top of mind until the Sept. 11, 2001 terrorist attacks. And even then, many customers could not articulate what they would need to secure their business. Since then, focus on security, the subsequent investment in new technologies and the resultant applications of these technologies have skyrocketed.

So, perhaps it is a little reassuring to know that while you were not surveyed nor did you ask for physical and logical security to converge; it is happening. And your role is to leverage its benefits by understanding that what you are managing is first and foremost a business issue. From this base, Fredrik and I penned these thoughts on possible blind spots and thoughts on the business of security in today's enterprise.



COST
What is the cost of implementing a security plan, including convergence?

Cost should be measured in several ways such as risk and total cost of ownership (TCO). Once the risk of a potential security event is measured, the question becomes dollars and cents: What if we do mitigate? What if we don't? The tipping point has come and most measured "understood" risk is mitigated as best possible. TCO: Cost is the total cost of buying, installing and maintaining "anything" – in this case a security system. While it is logical that networked and IP telephony are more efficient platforms for security applications, the total cost should be measured. Request TCO projections from the integrators and dealers that supply your solutions. TCO will become more prevalent.

POWER
Does convergence means a loss of security’s management control and responsibilities?

No, convergence actually brings the organization together. While IT will focus on delivering the technology platform, this enables you to be the pure application and execute your security plan as IT’s customer. Finance automated with data processing departments long ago. Today, finance runs finance. IT runs IT. And as partners, they accomplish tasks that could not be reached without collaboration.

DIFFICULTY

Yes. A successful convergence project takes a lot of effort to plan and execute. But no more than any other transition from one system to another. Agreed, this is not the sales database, this is “SECURITY” and proper execution is critical. But let’s understand that a successful project will not happen by itself.

If you work together to increase communication between organizational silos, identify the business outcomes and focus on the benefits, not ownership, then successful convergence implementations will happen through your leadership.



RELIANCE ON TECHNOLOGY

Does convergence give too much responsibility to IT for the execution of a sound and successful security policy? Let’s look at a few arguments.

  1. Convergence and integration are too complex and unreliable. Actually, IT systems have much higher reliability than security systems. IT systems are essential for business continuity and there are all kinds of redundant systems available.
  2. There is too much dependence on ever-changing computer and communications technologies. The opposite is true. It may be negligent to not take advantage of available technologies.
  3. There is a loss of integrity in the “pure, unique” security mission. Partnering with IT allows more focus on the application and more integrity.

Whether the study results would identify the desire for faster horses or faster guards, it is these revolutionary applications that drive change. Convergence is happening and you should use the service and reliability of IT to achieve your goals.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Encryption Future - Security Magazine

    Disappearing DNS: DoT and DoH, Where one Letter Makes a Great Difference

    See More
  • Publisher's Letter: The Business of Security Era Has Arrived

    See More
  • No Dodging Risk

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing