Know Your Disruptions
Clayton M. Christensen is a Harvard Business School professor and author of two best selling books, The Innovator’s Dilemma and The Innovator’s Solution. In The Innovator’s Dilemma, he explains how disruptive innovations, new products, services or business models evolve to take a leadership position in the marketplace and change how an organization is managed and business is done. Disruptive innovations are inevitable and when they take place, their impact is far reaching and forever changing to those organizations it impacts. Voice Over IP or VoIP is one example that has converged IT and security strategically, if not physically.
The Innovator’s Solution studies how new innovations are created and break the myth that innovation is random. Rather innovation comes from a disciplined approach that can be replicated. As the security market continues its growth and innovation becomes more of a process, you can expect disruptive technologies to come at you at a greater pace and from other directions, not just the IT department.
In this month’s issue, we take a look at the Innovations and Technologies that have most disrupted the security profession. Managing At The Speed of Tech, What’s Now, What’s Next and Everything in Between explores how new products, services and technologies will benefit or disrupt security strategy and execution.
During the Security 500 Research project (September 2006 Security Magazine), we learned that “people” are both what you spend the most money to secure and what you spend the most money to secure against. As a follow-up to this significant investment, Bill Zalud writes, “Tracking People in the Enterprise” and how proactive nursing homes, retail stores and building lobby management are using identification technologies including analytics to keep people secure and to be secure.
If you have been reading about the looming deadlines of HSPD-12, then welcome to Earth. While manufacturers and their installation partners have been tacking the upcoming compliance requirements, many end-user organizations are just beginning to be impacted by these new access control regulations. Security’s HSPD12 feature gives an insightful look at its impact on security management.
How many fax machines does your organization have? Who owns responsibility, enterprise-wide, for privacy-protected documents? HR? IT? Legal? You? Compliance with HIPAA and securing intellectual property can be improved with digital systems. To learn more, check out our Faxing and HIPAA security feature.
While the beginning of my column addressed innovation, it is important to note that nearly half of the security budget dollar is spent on officers. Many organizations outsource their officers and their management, and yet others have a blend as they manage diverse requirement. In our Solutions feature, Security presents the business cases for contract and proprietary guard programs.
As always, we are especially proud of our unique line-up of industry thought-leading columnists. Be sure to visit with Steve Hunt on Business Matters, Jeff Dingle on Access Control, Cynthia Freschi on Video Surveillance and our special guest columnist Michael McCann. Michael was the chief of security at the United Nations.