Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Security in a J.A.R.

By Gates Robert D.
March 1, 2009

By now, we’ve all seen it: Businesses and organizational leaders are scaling back their internal investments, and are more concerned with surviving the economic turmoil of our time than enhancing (or sometimes even continuing to support) the services and programs that we feel protect the company in the best possible way.
     
We might consider this a flaw of our businesses and management, but perhaps it’s a flaw of our own making. Consider this: How well do we truly know the risk tolerance of our business? If we know it at all, have we been measuring all our security proposals, purchases and processes against it?


Is Security Oversold?

Security industry growth has been booming for much of the past decade. We’ve witnessed an explosion of security options, vendors, products and techniques, along with no shortage of consultants and organizations offering expertise and opinion, and a plethora of government funding initiatives. But have we really achieved any more security in our places of business and personal dealings? Do we really accomplish more by throwing more resources at a perceived risk or suspected problem?
     
Has security been oversold? Are we confusing technology with security? Has the fundamental purpose of security been obscured by the desire for perfect security?
     
The U.S. economic climate may serve as a catalyst for change in our industry. To best accomplish our mission and, more important, to earn general respect within centers of influence, we must stop striving for perfect security and aspire to provide J.A.R. Security: Just About Right.
     
J.A.R. security does not rely upon fancy titles, obscure initiatives or increased complexity. J.A.R. security is based upon the recognition of the following:
  • Security does not have to be perfect, just suitable to the risk tolerance of the business.
  • Security does not have to achieve the unachievable.
  • Security does not have to rely upon the grandness of the effort.
  • Basic application of trusted and time-tested techniques will mitigate most risk scenarios.
  • Users and stakeholders are comfortable with security solutions, not amazed.
When we evaluate an existing application or assess a future risk, we must recognize that arriving at the “just about right” point will undoubtedly satisfy most of the needs of the business without the encumbrances of mysterious, overly complicated, and expensive solutions. Coming to the “just about right” solution keeps security in perspective and in balance with the overall goal, mission, and economic survival of an organization.
     
In short, J.A.R. security allows for effective and profitable use of the business’ property, systems, facilities and processes; and in a tough economy, “just about right” is much more appealing to corporate management than flashy and complex.


Making the Case for Better Security

Yet J.A.R. security does more than keep security cost-effective; it often makes for better security. A basic challenge for security practitioners is the changing nature of the threat environment. For years, the security industry has promoted the idea that security threats are dynamic, yet recommended solutions are typically static. Security video, access control and intrusion detection technologies, for instance, are all static solutions engineered for specific applications based upon the present situation. A high level of sophisticated technology often creates an expensive illusion of security at the moment, rather than addressing an ever-changing, multi-risk environment that will remain useful for years to come.
     
J.A.R. security encourages us to consider the big picture rather than individual, static, expensive solutions that may not easily adapt to dynamic risks. When a doctor treats a patient holistically, the health of the patient overall is improved without the intervention and cost of individually complicated treatments. The security industry needs to similarly view a protected organization in a holistic fashion. By treating security risks “just about right” overall, we address the needs of the whole business instead of a collection of individualized segments. Arguing for complex security technology solutions to mitigate risks coupled with unreasonable proclamations of doom may make for interesting theater, but it has limited value in business operations.
     
When security is perceived as merely an expense, security solutions need to be “just about right” in terms of financial investment, perceived effectiveness, and future viability. To remain credible and professionally relevant, security professionals need demonstrative results that are “just about right.”   


Links

  • www.securityexecutivecouncil.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Robert D. Gates is a member of the Security Executive Council and a security executive at a Fortune 100 company. The Security Executive Council is a member organization for senior security and risk executives from corporations and government agencies responsible for corporate and/or IT security programs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Security for An Aging Population – A Case Study in Access Control for A Retirement Community

    See More
  • s500w-robert-jones

    Securing a Seat at the C-Suite in 2016: A Security 500 West Overview

    See More
  • inspect-enews

    A Day in the Life of a Security Consultant

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing