Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Thinking Out of the Box for Stronger Security

What major risks/issues are your security executives facing?

By John Nemerofsky
integrator feat
October 1, 2013

We are seeing several of our largest multi-location and multinational customers being forced to take on great expenses to hire outside firms to help them develop global security standards and very elaborate RFI and RFP processes in an attempt to leverage multiple installing and servicing VAR resources on a job by job basis,” says John Nemerofsky, Vice President of Global Vertical Market Solutions for STANLEY Security. “We are being told that this not only raises costs, but detracts from the core competence of the security team left managing multiple projects and different integrators. From the integrator perspective, extensive RFP responses add further complexity and expense to the job that will need to be recuperated, encouraging creative practices in the gray areas to be competitive.  

“The government trend is to achieve compliance at the lowest possible cost; focused on their primary mission (like the Veteran Administration’s role is to take care of their veterans), compliance is not the highest priority. It is understood that requirements must be met, but customers in this field are looking for out-of-the-box thinking and creative solutions to help them stretch the dollar as far as possible.”

What other trends is Nemerofsky seeing?

 

What major risks/issues are your security executives facing?

We still see many gaps and risk areas between security and facilities with many of our large customers, mainly around mechanical access control hardware and key control. Many security teams routinely mask door forced or open alarms in the access control system because they do not know with certainty who has override keys. The gap exists in cases where the key holder’s access level is different from the card holder’s, or where one group (facilities) is issuing mechanical keys that fit doors controlled by a security-monitored access system.

 

How are your security executive customers addressing cyber security in their enterprises and how are you assisting with that?

From a credential logon perspective, we know that LACS is a FICAM requirement and most agencies are currently moving toward using the PIV as the credential and associated PKI to keep cyber thieves out. Also, the PACS has now also been officially designated as a FISMA compliant inventory item, so, per FISMA, PACS must be reported as part of the IT inventory, as PACS is now an IT system. Thus, as an IT inventory item, it falls into having to use the PIV to log on to the PACS as well, so we are now supporting our customers by assuring the PACS we provide can conform to the IT requirements for LACS.

Do you see your security executive customers looking to upgrade their analog video systems, or are now they asking for IP video systems?

Definitely. We have seen a significant uptick in budget and immediate pricing requests to migrate from analog to IP and VMS solutions. This is driven by reductions in costs in technology, and many manufacturers have started talking about end of life cycles of the older analog solutions. We educate our end-users on the overall benefits of the IP technology solutions available versus analog, and we translate that into ROI, because it helps the CSO or IT team get the budget blessing.

Projects may start with the wish or desire to move to IP but if budget cuts take place, they start talking about having to use a lot of the existing systems. When new systems are planned, they are motivated by costs and how the overall VMS is designed and integrated at the man/machine level than just the technology of the camera.

When video assessment is a real criteria for command and control centers and the locations are disparate and widespread, IP is the approach simply to make it feasible to get the video back efficiently.

 

What types of specific access control trends are you seeing with your security executive customers?

Because of the move toward managing authentication at the portal and the complexities of the new FICAM PACS to support this, along with legacy systems that need to be replaced, agencies are now looking for cloud solutions and ways to easily manage disparate systems and also more efficient ways to remove revoked personnel from the system. Customers are now directed to remove individuals from the system within 18 hours of revocation. In the past, there was no such thing as certificate-based revocation from a central PKI-based source, and the removal was dependent on someone telling the PACS administrator to remove the person without oversight or OMB mandates. Hence, the PACS management function is more complex and customers want to become compliant as efficiently and cost effectively as possible.

 

What is the most unique installation that you have recently done?

A recent installation, being completed in phases at a major public utility facility and operations center at Riverside Public Utilities’ facilities in Riverside, CA, totals 22 sites. Features of the installation include a Corporate Commander, 155 megapixel IP cameras, integrated access control and monitoring – with microwave beam detectors, door contacts and motion detectors – an integrated paging/intercom system, integrated security lighting and integrated fire
annunciation. 

 

About the Author:

John Nemerofsky is Vice President of Global Vertical Market Solutions for STANLEY Security. 

KEYWORDS: security compliance security integrator video surveillance news

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John nemerofsky 500

John Nemerofsky is chief operating officer for Kent, Ohio-based Sage Integration. His experience includes serving as president of SST, where John grew the company to $140 million in yearly sales with offices throughout the US and Canada. In 2009, John became the Senior Vice President of Stanley Security Systems. During his tenure at Stanley, John oversaw wide-scope projects that included several turnaround initiatives, operational changes, sales and market expansions, and customer acquisitions. He managed an $800M P&L and a team of 13 managers with a dotted line to more than 500 team members. In 2017, John took his management experience to an entrepreneurial endeavor as President of CGL Technologies. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • building

    Building an Integrated Security System for the SMB

    See More
  • Regulatory Changes Top C-Suites’ List of Enterprise Risks for 2017

    Selling Security to the C-suite

    See More
  • Access card reader, ominous

    OSDP: The future of access control

    See More

Related Products

See More Products
  • Physical-Security-and-Safet.gif

    Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!