Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Business vs. Sales 101

By Steve Hunt
April 1, 2009

Have you read some of the press and marketing campaigns coming from vendors (manufacturers) lately? It’s like they live on another planet. I sometimes think there is an alternate reality where vendors, some consultants and trade magazines live in perfect harmony piecing nonsensical words together, feeding them to each other and then having a community cud-chewing festival.

Lately, the things I have read regarding the industry rarely relates to the conversations I have with CSOs, COOs and risk management executives. When I tell this to manufacturers, frequently, they squirm and declare that they know their customer better than anybody. Maybe so. But that would simply mean that the CSO, COO or risk management executives I’m talking to and not their customers.

Hmmm.

Maybe these vendors are content selling to facilities managers and the security directors who’ve been buying access control and DVRs for years. That would make sense. Those folks are competent security professionals who understand the technical and procedural requirements of access and surveillance.  So of course the vendors enjoy selling access and surveillance equipment and services to this crowd.
But then why do executives think things look askew?

Two reasons: Because neither the vendors nor the security directors have been successful describing the business value of specific security initiatives in terms of measured economic impact; and because neither the vendors nor the security directors think of physical security departments as business units. Therefore, they feel no need to use business language, set up common business processes, and report on metrics the way other business units do.

Small Expectations?

It could simply be a matter of not selling high enough. The senior executives tell me that they see physical security as essentially screwed up. “How did physical security get so messed up” was the exact quote of one of these execs last week, after he investigated the processes of risk management in his very large corporation.

He expected to find a business unit with standard processes for setting goals and quantifying performance metrics. Instead, he saw a 1970s police department with what he described as an archaic operation of “security for the sake of security.”

“How do the words ‘command and control’ fit into my business?” he exclaimed with frustration.
In short, physical security is not run like a business, from the business executive’s point of view. It is run like a police department, or a military base. There is nothing wrong with that, intrinsically, of course. Law enforcement and military operations are very effective for managing risk – if your organization is a city or university or war zone. If we are talking about a business, however, security should be run differently. It should be run like a business.



Do They Get It?

Vendors don't get that, it seems. So they don't sell that message, which often also means they don't create products that enable security directors to run a business.

Here are my three humble suggestions for security executives to do right now when attempting to solve the real problems faced by their companies:

1. Request solutions in terms of business service management. Ask for sound, believable measurements of ROI (return on investment), TCO (total cost of ownership) and overall economic impact for each solution. Have your vendor map out every major function of its product to specific business requirements. Basically, you want to empower yourself with the message of business value up the ladder.

2. Have your superior sign off on the system. If you can't convince your COO that this is the best product or system to purchase, then maybe you shouldn't be buying it at all. My point is that a product or service purchased in the organization should be valued and appreciated by the COO. If it's not, then one of two things is wrong: your overall goal or the product specifications. Investigate new business development methods to propel an idea to senior executives. You'll save money for your company in the end, and you'll help solve bigger problems at the same time.

3. Figure out the relative weights of your requirements; that's when you'll be able to see how closely the product you're looking to buy might actually solve the problem at hand. Some features are more important than others. Work with your integrator and manufacturer to figure out what those important features are for your organization.

In this economy, no one can afford to pass on opportunities that provide the highest value.



Links

  • Security Dreamer

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve Hunt is founder of the Chicago-based research firm, 4A International, www.4ai.com. Contact him at info@4ai.com or visit his blog, www.SecurityDreamer.com.

SecurityDreamer is growing up fast. Since lauching Security- Dreamer in November 2006, readership has steadily grown. According to Hunt, he has recently added a daily email with recent updates. The site will soon feature more IT and IT security content -- especially information that relates to collaboration and communication across the lines of physical and homeland security with IT.

SecurityDreamer will host forums, or discussion boards, for topics like intelligent video, PSIM, security management best practices, endpoint security, FIPS 201 and needed technology standards.  Watch for a Wiki, too.  We are even going to list more than a hundred vendors and invite your comments on each.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • First Convergence Casualty

    See More
  • PSIM Stresses Analysis

    See More
  • Twitter, Chrome, Wiki and the New Lingo of Security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing