The BIG Three for the 21st Century Integrator
In general security is becoming more prominent in society. One only has to look at the amount of spending generated to protect the Olympic games for a global example. Add to this the nature of electronic crime that continues to plague our networked society. The risk to reward ratio so favors criminal behavior at this time that current levels of identity, product fraud and intellectual property theft will accelerate. Add in a poor global economy and traditional physical theft and insider criminal activities are also on the rise. This all means that an integrated security policy that protects all business assets: human, physical and electronic will be expected from security integrators.
- Web 2.0
This is another combination of technology and societal behavior that has broad implications for society and your business model. Simply put it’s all about “individual innovation.” Early in my career, the IT department rolled out technical innovations on their timetable. Today, my kid can create an app for his Apple iPhone. We are living in a global community where collaboration and sharing ideas is the coin in trade. Nowhere is this more evident then in social networking trends (Facebook, Twitter, LinkedIn) or in the video based, user content generated culture of YouTube. Innovative integrators will integrate these social applications with real time Web 2.0 security solutions.
- Internet Protocol (IP)
Everything over IP is the direction: voice, video and data. But ask yourself as question: “As an integrator do I really understand how to protect and defend these critical packets of information in this environment?” Be honest. Steve Jobs is a genius. He invented the pc (arguably), replaced it with the laptop, and is displacing the laptop with our handheld. Critical information over IP is in more places and is touching more people then ever before in recorded history. Can you say security issue! Integrators must deploy a socially flexible, collaborative and productive information-sharing environment (supply chain). Security will be built into the IP fabric and equally importantly; the “security culture” of the organization must be addressed. In the future, your margins on security education may be a pleasant (and repeatable) surprise!