Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Visions: Moving Beyond “Fork-Lift Conversions”

By Diane Ritchey
July 1, 2010


David Wilhite, president and chief operating officer of Quintron, believes that security vendors need to sell product upgrades and enhancements, rather than fork lift conversions. Read more about his thoughts on other industry trends.

Where do you see the security industry going in the next 5-10 years?

Security is an unusual industry in that it demonstrates the ability to grow when economic times are good and at times grow more when economic times are not so good. It can be viewed as an industry of many niche products and solutions, from guard services to high-tech products. All in all, worldwide, physical and logical security has become a core function of almost every significant and successful enterprise regardless of size or type. I believe a key trend already taking shape is integration across multiple security types and levels, where security is seen from a more holistic viewpoint covering all enterprise interactions rather than just facility or personnel security. I also think we will see more drive toward less restrictive hardware/software combinations to support continuous upgrades while not having to completely replace existing infrastructure. Of course, we are already a good ways along this particular path, and I think that is a strong advantage for us or any vendor that is selling upgrades and enhancements rather than fork-lift conversions.

What do you see as the next industry product or technology trend?

Along with more system integration and platform independence, I see mobile access to security related data, transaction, events, alarms and surveillance video as an important development area. The enterprise is evolving from a historical view of business in semi-isolated environments to a real time, instantaneous view of all aspects of the business and when it comes to elevating the safety and security of your people, places, products, networks and customers – nothing beats real time command and control.

Who is your best and brightest customer? What are they doing well?

We cannot identify the customer for security reasons but you can assume they are a high-tech company that is a household name around the world. They are forging ahead to build a global security system managed from a network of security operations centers that will equal or exceed the high availability of any mission critical enterprise class information management system, while also providing a global view of the security status of all sites in real time along with the ability to seamlessly communicate to any and all security and safety responders regardless of location or type of voice system in use. The commitment by this customer in terms of investment, technology and value is second to none in our experience. We expect this system to set a standard for global enterprises around the world that will be second to none.  

What are the blind spots in the industry?

The increase in M&A activity can trigger significant landscape changes in vendors, resellers and also to end users interest in products and solutions. We must stay on top of our own game and remain vigilant to changes in our competitor’s status to reduce the chance of being surprised from unanticipated developments. Along these same lines, we have forged some very significant partnerships with other premier industry companies that augment capabilities on both sides to mutual benefit. This approach has been successful for us in extending what we can offer customers in the way of package solutions and also to extend our ability to compete against some much larger organizations with success.

What tips do you have for the security executive to help propel his/her company via security?

Do whatever is needed to ensure your customers that doing business with your firm will be a safe and secure experience from your bricks and mortar locations to your online and social networking sites. Be sure they understand that loss of privacy and compromise of customer’s safety and security are situations that will not be tolerated by your enterprise.

Many security executives have to tighten the budget and do more with less: Do you have any tips on defending ROI (return on investment) and/or the business case for security during tough economic times?

In today’s socially connected, customer-driven world, any enterprise that slips on the security banana peel from tossing out otherwise justified improvements or additions to physical and logical security solutions will take a major hit in industry profile and probably a corresponding hit in revenue. This should be driven home as key secondary consideration to the more traditional payback/ROI issues of liability, facility and IP losses, for instance.

What is one thing you learned that you apply to your career? Or, what is your catchphrase or mantra?

I believe the most important driver to success as an individual or corporation is to simply take care of the customer, first and foremost. We all sell different things to different entities, but the end result is always dependent on how well we keep those customers satisfied. Also, I think is it important to always keep an ear to your customers on what they are thinking or are concerned about. This should be major driver for product plans, along with your own knowledge and experience. It’s always easier to make repeat sales than to find new customers.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Dennis Quiles: From Farm to Fork

    See More
  • Visions: Pushing Security’s Boundaries

    See More
  • 6 Public-Private Partnerships that Push Beyond Information-Sharing

    See More

Related Products

See More Products
  • The Complete Guide to Physical Security

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing