Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Bob Beliles Exclusive Blog from ASIS: Virtualization Means Less Gear, Less Complexity

October 14, 2010

Virtualization, it’s a word and a concept I heard several times today at ASIS and it’s a technology that you should become more familiar with.  I am going to try to give you two perspectives, one from the end-user and one for the systems integrator and dealer.  You will have to read SDM and Security blogs, and at least parts of both to get my take on why it makes sense for end-users as well as dealers / integrators. 

First, what is virtualization?  It is an enabling capability of software or a combination of software and hardware to appear or act as another piece of software or a device.  Not so clear? Let’s try an example, or two, to make sure that we are all on the same page.  While this may not be a perfect example, we’ll try pop culture as you might have seen the movie Avatar.  In this movie, a human, with the aid of software and hardware, is able to function as an alien-being on a planet that would not otherwise support us “normal oxygen-breathing humans”.  But rather than strapping an oxygen tank on a human, the human controls an alien body and breathes that planet’s noxious air; the Avatar (alien body) is a kind of “virtual” body for the human that controls it.  

Didn’t see the movie?  Ok let’s try a business / IT application that is a bit closer to home and that has become widely popular:  server virtualization software.  VMware and Microsoft, among others, offer server virtualization software. It is valuable to businesses because, among other things, it saves money, power, and IT resources and reduces complexity by allowing applications to be configured and deployed on a far more predictable and consistent basis, regardless of the underlying hardware and operating system. 

So what are physical security vendors doing with virtualization? Plenty of vendors have or support virtualization in different forms.  NVR vendors, along with Ethernet switches, "virtualized" (e.g. eliminated the need for) video matrix switches several years ago.   A few access control vendors (such as HID and ISONAS) are using virtualization to eliminate access control panels by implementing panel functions as a combination of access control configuration and management software that runs on a PC/server and intelligent credential readers, that contain an authorized user list and policies database. 

But at this year’s ASIS conference, I am seeing new uses of virtualization.  HID is talking about virtual credentials.  Rather than the tried and true ID badges / cards, you could use a cell phone equipped with Near Field Communications technology.  The phone can not only be “something you have” like the ID badge / RFID or smart card, it can also provide multifactor authentication by also becoming a PIN pad to provide authentication via “something you know” (such as a PIN code).  Not ready to say goodbye to ID badges?  Consider that studies have shown that people realize that they have misplaced / lost their phone in 6 minutes.  I have gone hours, if not an entire weekend, before I realized that I misplaced my ID badge.  And you can send commands to help locate and/or deactivate your phone.  So security is enhanced with this sort of smart / virtual credential.

Raytheon has implemented a virtual world module in their command and control software that allows users and integrators to simulate events in the real world to help train operators and gauge their response / performance to events.  This virtual event simulation saves time and money as opposed to having real-life drills. 

And finally, while IP camera manufacturers have had the ability to send video direct to storage, without the aid of a DVR or NVR for a while, there are now a couple of vendors (such as IPVision Software and Mobotix) that offer VMS software that virtualizes (eliminates) recording servers, a.k.a DVRs and NVRs.  This type of virtualization, which has nothing to do with using VMware on PC / servers, allows for a single instance of the VMS software (and one server) to support hundreds of cameras.  Obviously, with that kind of scalability, you aren’t going to need as many copies / licenses for the VMS software and you are going to save  a lot of money by not having to buy, maintain, power, and cool those underlying servers.

Does this sound too good to be true? Just ask your IT counterparts.  They love server virtualization.  And they will tell you that VoIP business phone systems, which virtualized (eliminated) the PBX, have not only made adds, moves and changes easier, but it opened up a bunch of other capabilities, including unified messaging (getting voicemail, SMS texts, faxes and emails from one source).

So what does virtualization mean to enterprise security end-users?  Virtualization is going to reduce your security system costs in terms of system level purchase prices.  You just won’t have to buy as much gear.  Because you are not buying as much, you don’t have as much to pay for in terms of installation and in long term operational maintenance expenses.  Beyond cost savings, in many cases, you will find these virtualized products reduce complexity, without sacrificing operational functionality.  In fact, you may find these virtualized products enable new capabilities that your traditional security systems and devices couldn’t begin to offer. 

You can probably find a few other examples of virtualization in security. The point is virtualization is a capability that you should be looking for in your next security products / system. You can probably find a few examples in security. The point is virtualization is capability that you should be looking for in your next security products.

Bob Beliles is president at B2 Convergence Consulting. Previously he was vice president of enterprise business development for Hirsch Electronics.

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!