Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Visions: Pushing Security’s Boundaries

By Diane Ritchey
March 1, 2010
John Romanowich suggests that networked automated sensors will avail tremendous ROI and new services to provide greater security at a lower cost.


John Romanowich is the president and CEO of SightLogix, a manufacturer of automated outdoor video surveillance systems for perimeter and buffer zone security. His business and technical background includes post graduate studies at Rutgers Graduate School of Management, Columbia University and the New Jersey Institute of Technology. He is a former executive director and co-founder of Pyramid Vision Technologies (Sarnoff spinoff), a pioneer in intelligent video surveillance now owned by L3 Communications. He has also held management positions with Intel, IBM and the Sarnoff Corporation in video related technologies.

We spoke with Romanowich to get his perspective on the state of the industry relative to the professional security industry’s migration to an IP platform, justifying system acquisitions and emerging trends. His observations follow.

In the next 5-10 years, we’ll see more video surveillance cameras being automated, unlocking tremendous value for the $100 billion manpower market. At the same time, the costs to produce such “smart” systems will decrease to the point at which they become negligible relative to the value unlocked. The process of detection, which is now being performed by people, will be achieved by intelligent sensors that excel at determining – with great accuracy – if and when a security violation has occurred. Automation frees people to focus their attention where it is best suited, on making the appropriate response decisions.

We’re already seeing advancements in smart sensor technologies, which help personnel to make better decisions with greater efficiency. This is especially important when protecting large areas, such as those outdoors. These smarter systems are leveraging existing IT platforms as a standard business function with measurable accountability. Moving forward, as more sophisticated sensor technologies emerge and move onto the network, security systems will come to be managed just as any other information system, supported by the IT function, just as other departments across the enterprise are supported by IT today (e.g., accounting, manufacturing, CRM, etc.).

The functionality and capabilities of new automated solutions have risen over the past 18 months. Simultaneously, the economy has become intensely focused on ROI, and the key to ROI is automation that extends manpower efficacy to do more with less. Security automation leverages the strengths of networked intelligent sensors, which excel at monotonous events like detection without tiring or distraction, and aggregating that information onto the network. This streamlines the effectiveness and timeliness of security information. In essence, automation creates more effective security at less cost.

A perfect example of this involves the hundreds of thousands of PTZ cameras in use today. Even with vigilant operators, these cameras are inevitably looking in the wrong direction when a security violation occurs, akin to trying to find a needle in a haystack. The good news is that solutions are emerging that address this concern by automatically directing PTZ cameras to view an intruder, prompting accurate decision making and capturing vital details that would have been missed. Automatically controlling surveillance assets in this manner will form a major component of security deployments in
the future.

With the advent of networked automated sensors, there really is no reason why an organization has to own and maintain all of the elements of a security implementation. Instead, great economies of scale will be obtained by outsourcing security systems the way we outsource network operations today. By moving equipment and systems offsite a model of “security as a service” will shift capital expenses to operational expenses. Accordingly, security investments can be amortized over time, while organizations will benefit from best practices and the latest technologies.

With proper planning, security management will always strive to utilize the best technologies they can afford to mitigate and minimize consequences should a security event occur. Our brightest customers are those who develop a security plan for pre- and post-event mitigation, and deploy systems that support their security strategy. That’s what resiliency is all about – first preventing an intrusion and then minimizing consequences. One of the keys is to push security boundaries beyond buildings’ walls to the perimeter of the venue and further. This allows security management to preempt events and minimize risk and potential damage. Having events intercepted outside of your perimeter makes organizations less vulnerable.


John Romanowich of SightLogix predicts that:

1. The number of automated video
surveillance cameras will increase.
2. Smart sensor technologies will increasingly help manage security systems.
3. The key to ROI in security is automation.
4. Outsourcing security systems the way we outsource network operations today will shift capital expenses to operational expenses.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Visions: Moving Beyond “Fork-Lift Conversions”

    See More
  • IP Makes Smart Intercom Talk

    See More
  • Steve Spiegelhalter

    Guarding Against Fraud in a Global Economy

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing