Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Have You Hugged Your Integrator Today?

By Mark McCourt
April 1, 2007


Perhaps no other link in the security market supply chain has undergone more dynamic change than that of systems integrators. As technology has added complexity to the design, implementation, training and maintenance (i.e. COST) of security systems, the risk associated with hiring the right partner has grown.

During roundtables and focus groups, some of you have shared that your integrator is a trusted advisor and that you would be unlikely to make a security decision without their involvement and endorsement. Others have flat out stated, “All integrators lie. You can’t trust them and have to keep them at arms length. They are, at best, only vendors.”

Why the significant gap in experiences and opinions? Perhaps it begins with your expectations and the process you employ to find and hire an integrator in the first place. Or is it the broad landscape of players that declare themselves “systems integrators” making the decision tougher and riskier?

While most of your time is dedicated to addressing security issues that have business risk, the best integrators partner by helping you tackle those business issues that have security risk. In this month’s cover story centering on the 10 questions to ask your integrator, Editor Bill Zalud shares the secrets to a perfect partnership and the process for building and growing a long-term relationship with the right integrator for your enterprise.

Great Knowledge Leads to Great Insights

Each month, our thought leading columnists share their experience and expertise with you. Please allow me to highlight them in this column:

Jeff Dingle is an instructor and manager of security training at Lockmaster Security Institute. Each month his Get Into Access column on access controls give in-depth coverage on trends, best practices and technologies.

Cynthia Freschi is founder and president of North American Video and named a “System Integrator of the Year” by our sister publication, SDM. Specializing in video surveillance for the bleeding edge casino market, Cyndi’s Video Integration column provides insights on what works and what doesn’t in the complicated and fast changing video arena.

Steve Hunt’s Business Matters column bridges the worlds of logical and physical security by aligning them with organizational goals. One of the world’s most influential security analysts, board member of the Open Security Exchange, the 2006 “Industry Visionary” CSO Compass Award Winner, and named one of 25 Most Influential Security Executives by the readers, advisors and editors of Security Magazine, his insightful columns bring valuable discourse each month.

Michael Khairallah’s Systems Design column comes to you with over 25 years of successful expertise in project development and system delivery. He is the author of two leading books on security design and implementation and the president of Security Design Solutions of Covington, La. Each month, Michael shares his experience and knowledge.

Be sure to visit their columns each month and share your feedback with us at zaludb@bnpmedia.com.

SIDEBAR: You’re Invited to the 2007 Security 500 Conference!

On behalf of Bill Zalud; Bob Hayes, executive director of the CSO Executive Council; Steve Hunt, CEO of 4Ai; and myself, we are pleased to invite you to attend the Security 500 Conference November 14th at the Roosevelt Hotel in New York City.

This year’s program: “Security Executive Management: The State of the Art” features the research and best practices for security management from the CSO Executive Council. Bob’s organization is an international professional membership organization for leading senior security executives spanning all industries, both the public and private sectors, and the globe.

The program will cover the key challenges for security executives including executive leadership skills, metrics and measurement, risk assessment, technology/critical information protection and more, including the 2007 Security 500 Report profiling the biggest and the best security programs. Space will be limited at this one-day high-powered event, so watch your e-mail for registration and program details in the coming month.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mark McCourt was once the publisher of Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Man walking with briefcase

The Rising Tide of Executive Protection: Corporations Ramp Up Security in an Era of Heightened Threats

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • vet-enews

    Why You Should Hire Those Who Have Served as Your Next CISO

    See More
  • SEC1119-awareness-Feat-slide1_900px

    Cybercrime Breaches Cost Corporate Boards Big Time: Have You Done Your Due Diligence?

    See More
  • SEC1019-talk-Feat-slide1_900px

    Have You Chosen the Right Person to Lead Your SOC?

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing