Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Security in a J.A.R.

By Gates Robert D.
March 1, 2009

By now, we’ve all seen it: Businesses and organizational leaders are scaling back their internal investments, and are more concerned with surviving the economic turmoil of our time than enhancing (or sometimes even continuing to support) the services and programs that we feel protect the company in the best possible way.
     
We might consider this a flaw of our businesses and management, but perhaps it’s a flaw of our own making. Consider this: How well do we truly know the risk tolerance of our business? If we know it at all, have we been measuring all our security proposals, purchases and processes against it?


Is Security Oversold?

Security industry growth has been booming for much of the past decade. We’ve witnessed an explosion of security options, vendors, products and techniques, along with no shortage of consultants and organizations offering expertise and opinion, and a plethora of government funding initiatives. But have we really achieved any more security in our places of business and personal dealings? Do we really accomplish more by throwing more resources at a perceived risk or suspected problem?
     
Has security been oversold? Are we confusing technology with security? Has the fundamental purpose of security been obscured by the desire for perfect security?
     
The U.S. economic climate may serve as a catalyst for change in our industry. To best accomplish our mission and, more important, to earn general respect within centers of influence, we must stop striving for perfect security and aspire to provide J.A.R. Security: Just About Right.
     
J.A.R. security does not rely upon fancy titles, obscure initiatives or increased complexity. J.A.R. security is based upon the recognition of the following:
  • Security does not have to be perfect, just suitable to the risk tolerance of the business.
  • Security does not have to achieve the unachievable.
  • Security does not have to rely upon the grandness of the effort.
  • Basic application of trusted and time-tested techniques will mitigate most risk scenarios.
  • Users and stakeholders are comfortable with security solutions, not amazed.
When we evaluate an existing application or assess a future risk, we must recognize that arriving at the “just about right” point will undoubtedly satisfy most of the needs of the business without the encumbrances of mysterious, overly complicated, and expensive solutions. Coming to the “just about right” solution keeps security in perspective and in balance with the overall goal, mission, and economic survival of an organization.
     
In short, J.A.R. security allows for effective and profitable use of the business’ property, systems, facilities and processes; and in a tough economy, “just about right” is much more appealing to corporate management than flashy and complex.


Making the Case for Better Security

Yet J.A.R. security does more than keep security cost-effective; it often makes for better security. A basic challenge for security practitioners is the changing nature of the threat environment. For years, the security industry has promoted the idea that security threats are dynamic, yet recommended solutions are typically static. Security video, access control and intrusion detection technologies, for instance, are all static solutions engineered for specific applications based upon the present situation. A high level of sophisticated technology often creates an expensive illusion of security at the moment, rather than addressing an ever-changing, multi-risk environment that will remain useful for years to come.
     
J.A.R. security encourages us to consider the big picture rather than individual, static, expensive solutions that may not easily adapt to dynamic risks. When a doctor treats a patient holistically, the health of the patient overall is improved without the intervention and cost of individually complicated treatments. The security industry needs to similarly view a protected organization in a holistic fashion. By treating security risks “just about right” overall, we address the needs of the whole business instead of a collection of individualized segments. Arguing for complex security technology solutions to mitigate risks coupled with unreasonable proclamations of doom may make for interesting theater, but it has limited value in business operations.
     
When security is perceived as merely an expense, security solutions need to be “just about right” in terms of financial investment, perceived effectiveness, and future viability. To remain credible and professionally relevant, security professionals need demonstrative results that are “just about right.”   


Links

  • www.securityexecutivecouncil.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Robert D. Gates is a member of the Security Executive Council and a security executive at a Fortune 100 company. The Security Executive Council is a member organization for senior security and risk executives from corporations and government agencies responsible for corporate and/or IT security programs.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security for An Aging Population – A Case Study in Access Control for A Retirement Community

    See More
  • s500w-robert-jones

    Securing a Seat at the C-Suite in 2016: A Security 500 West Overview

    See More
  • inspect-enews

    A Day in the Life of a Security Consultant

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • security book.jpg

    Security Investigations: A Professional’s Guide

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing