Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Gimme Some Disruptive Innovation!

By Steve Hunt
January 1, 2008


Last month I had a vibrant discussion on my blog about innovation in the security industry. I wrote that IT powerhouses like Cisco, Novell, IBM and Oracle are flirting with the physical security industry, but the effort seems muted. It sometimes sounds like those vendors are trying to re-invent the wheel - no, that’s not it. It’s worse than that. It sounds like they are trying to do what other companies are doing quite well already. Like they don’t have any special difference, any special value. They sound like “me too” vendors.

I apparently wasn’t the only one who thought that way. Commentators on the blog left further observations. One fellow expounded on my reference to disruptive innovation.

Innovations Aplenty?

Large, mature corporations generally do not spearhead disruptive innovation. It’s indeed the core of the theory of disruptive innovation (Clayton Christensen - Innovator’s Dilemma). Rather, these organizations tend to acquire innovators, package and streamline the distribution of these innovations. Christensen’s theory (which is the most well regarded on innovation) is that incumbents have difficulties with fostering disruptive innovation because of adverse incentives. The new markets and opportunities are too small and the margins too low relative to the mature markets they are dominating (classic example DEC and the minicomputer). By contrast, small companies have better motivations to tackle markets that are initially small. The smaller company gains expertise and skills over the years as they grow that business.

Another comment went further pointing out that as innovators innovate, and acquirers acquire, new standards will develop and that’s how the industry ultimately changes.

What is going to occur ultimately is these big companies (Cisco, IBM, etc.) are going to purchase the small innovative companies; and thus new standards will be born as this convergence really takes hold. The market still isn’t “certain” that the investment should be made towards better, IP-based solutions because their businesses by-and-large in the old-fashioned way of doing things hasn’t been impacted enough. The big players entering the market threaten the way many of these legacy firms will do business in the future. I wish I could point to them taking specific action (rather than just acquiring) toward disruptive technologies, but the truth is you are right – they aren’t!

If you look at how these trends affect the economy – either of an industry or a specific company – the outlook may not be rosy.

Growth Needs Alterations

The physical security market’s growth in the last 5 years has been strengthened by the global war on terror and the strong domestic economy. The country does not seem highly motivated to expand the former and the latter is slowing down. As such, it’s not hard to imagine that physical security demand will slow over the next few years.

Combine the lack of value IT companies have generated in physical security with a recession and the senior managers at these IT companies will be motivated to cut their losses into what is for them a small, peripheral and mildly attractive segment.

Six years ago I saw these big IT companies retreat in other new markets they were pursuing and would not be surprised if many do the same soon in physical security.

Though I am a believer in the long-term power of IT to transform physical security, the short-term outlook does not bode well for big IT companies to deliver those changes.

The thread goes on and on. It’s a great read. But in the end we have some cold water splashed on the IT companies and on the large, under-producing brands of physical security. It’s frustrating because I want so much change. I want transformation. I want the IT companies to ROCK the physical security industry!

I want them to create a great story and build solutions (products and services) that inspire and turn on physical security and logical security folks alike instead of preaching convergence – especially not the convergence of physical security teams with logical security teams. This would be a subtle but profound difference – but one that separates a ho-hum non-strategy from a game-changing value-creating growth strategy.

C’mon IT folks. Bring IT to the physical security industry. Bring the software, the hardware, the networks, the processes, the people, the best practices and the innovation. We’ll all be glad you did.

SIDEBAR: Data Leakage Stories Wanted

On another note, I am collecting stories for a future column about data protection and data leakage. Do you have any stories you cans share about trade secrets that slipped away, or confidential documents heading out the door, or the wrong people touching the wrong data? What did your company do about it? I’ll keep all responses completely confidential. Reply to me. Steve@securitydreamer.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Heartland of Security Innovation

    See More
  • Innovation Sets The Tone

    See More
  • Gimme Shelter

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing