Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Guards, Guns, Gates and Google

By Steve Hunt
June 5, 2006
A visitor to the “Googleplex” Google headquarter in Mountain View, California makes himself a name badge and signs a non-disclosure agreement. Photograph by Erik Möller


The first time I Googled myself, I was connected to the Internet at a Starbucks Hot Spot. Before I could blink, up popped dozens of my past articles, lectures and comments other people had published about me. I loved seeing that.

Then I Googled my boss. I found some juicy stuff I could use (if needed!). Then one of my clients – a press release that helped me to understand a dynamic about his business I hadn’t grasped before.

Google headquarters in Mountain View, Calif., is the epicenter of a seismic shift affecting security executives. Google is the search engine that – slowly at first, but then comprehensively – we all made the centerpiece of our individual Internet experience. It is the search engine that gives me the best, fastest information, and that seems nearly to read my mind. Google’s mission is to plug into a world of information technology and put all the world’s information at my fingertips and yours.

As we see in this month’s lead feature, Here Come the Techs, the entire information technology (IT) industry looks at the world of the security executive as bits and bytes, structured and unstructured data – in a word, “information.” Video images become valuable information as soon as the camera captures fraud, attempted theft or injury. Alarms are electronic signals that convey important information about a door opening or temperature dropping. Even the electronic requests from a card reader to the electric strike and back to the access control server are information the accuracy of which is mission critical to most companies.

Security executives surround themselves with systems running on computers, using the latest software and data repositories (Microsoft Active Directory, Oracle databases, etc.), and transmitting information across network cabling infrastructures. Security executives surround themselves with information technology.

Security is information built around information technology, so you can be sure that our customers – the business unit managers and senior executives of our organizations – will want to see it, use it, critique it. Like you, your superiors and customers Google information all the time. They want the most relevant information, quickly and instantly accessible – simple reports that prioritize the information of security and suggest remediation. Modifications in personal privileges will follow the IT model of self-service – individuals will use a secure transaction on the network or over the Internet to change their privileges to certain doors or buildings. Business managers, marketing managers, partners throughout the supply chain and the foreman at the loading dock all want instant access to some video images forwarded to their phones or handhelds to help them ensure supply, anticipate demand, avoid loss and increase productivity and profit.

The list goes on. Try it yourself. Think of two or three more ways that the information of security may be used by people outside of the security department. Is your security operation ready for that? Microsoft, Symantec, Oracle, Intel, Cisco and Google are actively training your constituents and the whole world that information – especially the information of security – is coursing through wires and radio waves all around and may be put to use right now.

Become Google-friendly

Here are some tips to help you be more relevant and appreciated in the executive suite.
  • When acquiring security technologies, make sure the manufacturer - not only the integrator – has strategic partnerships with IT companies and talk comfortably about IT.
  • Seek software that adds reporting, process and workflow across disciplines that you’ve historically segregated, like video, access control and incident response.
  • Ensure that security policies and regulatory compliance efforts are coordinated with the policy and compliance teams in IT.
  • And, most importantly, keep an open mind about new technology.
Your security operation is in many respects an extension of the IT infrastructure – with all that software and computers and networking that you are using. v

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Calendar with pins

The Most Dangerous 6 Weeks of the Year

Padlock opened with computer keys

630M Passwords Stolen, FBI Reveals: What This Says About Credential Value

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 2012 Security Leadership Issue: The Security Leader: Beyond Guns, Guards and Gates

    See More
  • Circle of people on cell phones

    From gates, guns & guards to encryption, endpoints & erasure

    See More
  • There Are Gates, And There are GATES

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing