Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Making Changes, Not Taking Chances

By Steve Hunt
February 1, 2008


Something is different. When I speak to security executives who use or oversee the use of security technologies, it is obvious that there is a disconnect between the manufacturers and the end-users. It is as if the wind has changed but many product makers haven’t trimmed their sails – or something to that effect. So I was pleased to find IBM showing remarkable agility, turning a very big ship and reorienting sales to work for the customer rather than against.

Doesn’t it often seem that vendors are pitched in battle with customers, trying merely to extract as much revenue as possible, delivering as little value in return? That approach is evident in side-stepped standards discussions, limited product functionality, and reduced support after the sale.

Thinking Outside the Box

IBM did something different in January. Its entire Systems Technology Group, known as STG, shifted from a technology focus to customer-orientation. Here’s what I mean. STG had been divided into several operating groups centered on the different product brands or technology types. Each brand, such System Z or Digital Video and Surveillance had its own sales reps in the field, who reported to sales managers and on up to VPs within that product brand group. Each product had its own sales people.

IBM structured itself that way in the 1990s because it seemed better to have account managers and support personnel experts in a specific technology. Back in those days, you see, an end-user was looking for best of breed technologies and wanted a vendor’s account team to meet a specific technical need.

The genius of IBM is recognizing that customers are no longer saying, “I need a faster blade server to do this,” or, “I gotta have cameras to watch the back door,” as much as they are saying, “Help me build a better surveillance system.” The customers’ interaction with account managers and product executives is more related to reducing complexity, reducing physical space and power consumption. That’s a lot different than head to head product comparisons with a best-of-breed mentality.

Take this story told to me by a security executive at a SecurityDreamer event in Chicago last fall. He said that when he was researching different approaches to solve a parking lot surveillance problem, he was dissatisfied with the response. His integrator just wanted to, “take the order and install the cameras.” The manufacturer’s rep just wanted to talk about pixels and lumens and to beat up his competitors. Even the consultant didn’t see that the parking lot security problem was related to event management in the entire facility, impacting everything from employee safety to loss prevention, access control and property protection. The cameras were just a small piece in the puzzle. For this security executive to achieve the business value he was looking for, everyone needed to work toward the same goal, but they all spoke different languages. A “solution” cannot be described merely in terms of pixels, labor hours, coverage area.

Younger is Better

In the security industry, the young companies get it. VidSys, Proximex, Quantum Secure and Steelbox seem to understand intuitively that the key to creating a security solution is to help the customer put together the puzzle – to build a total solution around the core technology of the vendor. After all, that is obviously what security executives want. Buyers and end-users of security technology get less turned on by power over Ethernet and more jazzed about cutting costs in loss prevention or improving emergency response times.

In the last few months, I’ve heard Lenel, Tyco and Bosch strenuously pitch their “best-of-breed” stories, with barely a nod to the problems of integrating with other companies’ products. Integrators are used to that sort of oblivion. At the Security 500 conference in December, one integrator quipped to me that manufacturers live in their own world and leave the problem solving to us.

It might take a while for the big vendors to change their approach. But IBM did it. Tyco, Honeywell, or even the presumably more lithe Lenel can, too. I think manufacturers should imitate IBM’s value-oriented approach. When manufacturers, integrators, consultants and end-users are all focused on solving the customer’s business problem, customers will be happier, business cases for spending money will be more easily made, and manufacturers will make more money.

An attitude of protectionism isn’t relevant anymore. IBM and the startups are setting the pace. Let’s watch to see how long it takes the established physical security vendors to catch on.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is CEO of Hunt Business Intelligence, an industry analysis and advisory firm. He also authors the popular Blog securitydreamer.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Police Changes Will Not Harm Olympic Games Security

    See More
  • criminal records

    Continuous Evaluation Supports and Fosters Second Chances for Those Formerly Incarcerated

    See More
  • Buying and Selling In the New Security Environment

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing