Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

WHEN BUSINESS MATTERS: Cisco Entry Marks Quickened Make Over

By Steve Hunt
April 2, 2006


The airplane doors were closing and I was shutting down my Treo when a message popped up that Cisco bought SyPixx, a small video surveillance technology company. During the bumpy ascent, I thought about how the security industry is in store for some turbulence.

The facts have been pouring in for a couple years now. Yet it wasn’t until 2004 that I understood the magnitude of the change uprooting years of tradition in security: In five years, the systems on which nearly all physical security deployments will rely will be software and networking applications sold by information technology companies.

That places the IT industry in a position to influence and even replace giant sectors of the security industry. One example: Hewlett-Packard. With its state-of-art software development; efficient hardware manufacturing of cameras and panels; a global distribution channel; and relationships with executives in every major corporation in the world – the day HP decides to get into the security business, it’s game-over for hundreds of traditional security suppliers.

Cisco is there already. The market-leading network technology vendor just proclaimed physical security to be their next “emerging technology.” In Cisco-speak, that means they expect to earn an extra $1 billion a year from it.

The IT world isn’t going to wait for the physical security vendors to get their act together. Intel, Oracle, Microsoft, Symantec, EMC and many other IT giants are setting their sights on the $120 billion security industry, too.

Collateral benefits for security executives

Just like Cisco’s vision, a security director ought to be able to link disparate camera systems to different keyboards and joysticks, and to manage different access control systems with a single software interface. And while you’re at it, why not coordinate identity and access management with logical and network privileges?

Security executives who organize surveillance, access control, alarm and environmental control over the IT infrastructure reap rewards of faster and more accurate response times, streamlined and less expensive processes, fewer errors and better overall security. In addition, senior executives will appreciate the thorough auditing and compliance to regulations. Overall, security will be more efficient, more effective and more appreciated.

Being appreciated is one of those rare conditions of the security professional. Normally, we are happy not to be noticed, since our work is associated with bad things happening. But the security executive is key to enterprise success when you can actively express value. Software makes it easier to measure and demonstrate that value. Actually, outside of the security department, nearly every other metric in the organization is measured with software and network-based reports. That’s what the business unit managers turn in to the CFO, and what the CFO shows the auditors, and what the auditors discuss with the board. Sales people, middle managers and even manufacturing floor personnel all rely on software and networking applications to do their jobs and to show their effectiveness. It’s only natural that physical security does it too.

Come to think of it, quite a lot of security is managed and measured with software and networking already. IT security protects the intellectual property, data storage, communications lines, personal privacy, research and development systems and productivity tools of a company. Clearly, the “other” security ought to leverage the benefits of software and networking.

And now that Cisco is about to become one of the dominant physical security providers, chief technology officers and chief information officers will exert more influence and oversight of physical security. Fasten your seatbelts, everything is about to change.

Converging from IT Side

Last month, San Jose, Calif.-based Cisco Systems, Inc., said it agreed to acquire SyPixx Networks, Inc. of Connecticut. That firm has network-centric video surveillance software and hardware enabling existing analog video surveillance systems to operate as part of an open IP network. Then, days later, Sun Microsystems said its working with Activ Identity on HSPD-12 physical and network access controls.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Classroom with rows of desks facing a chalkboard

The AI Powered Classroom Network of the Future: Because Hackers Never Take Recess

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Cloud icon

Google Cloud Service Exploited in New Phishing Campaign

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • When Business Matters: Forget Security! Focus on Business

    See More
  • Business Matters: Imagine – More Security Value, Less Money

    See More
  • Business Matters: Data Never Dies

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing