SSI logo

Technology on Security’s Terms

Holiday technology wishes for manufacturers, integrators and end users.

By ·

Just like that, another year comes full circle, marked as it is each December by SSI’s annual Technology Issue. Of course, we cover this topic month in and month out as it is core to the business of security. However, I believe it is important to review some of the latest and greatest technologies introduced during a given 12-month stanza (2013’s Top 30 Technology Innovations) as well as examine those shaping the industry’s future (VMS/PSIM; hosted video; integration).

As a fervent technology enthusiast, when I entered the security industry more than 15 years ago I wondered why many cutting-edge technologies, scientific breakthroughs, and computing and electronics advancements embraced by hobbyists and consumers were not prominent in the security community. It was the age of videogame consoles like PlayStation and movies like “The Matrix,” for heaven’s sake — you mean to tell me things like crystal-clear video surveillance and biometrics were not ubiquitous?!

I came to realize there were good reasons for this. Security through the eyes of Hollywood and the media was closer to fantasy than reality, and the discipline of security with its mission to protect people and property required a methodical and circumspect approach to new technologies and products. I learned the world of security was not a place to adopt or deploy technology merely for technology’s sake. Technology had to be thoroughly vetted and proven before seriously considered. Once I understood, it made perfect sense.

While those principles still hold true, the landscape has dramatically shifted in several ways since the late 1990s. The events of 9/11 irrevocably elevated everyone’s awareness level, their realization for the need to improve and interest of applying new technologies to security. That coincided with the onset of the digital revolution that flowed into huge leaps in computing power, the Internet and broadband, wireless devices and communications, networked infrastructures, sensors and automation, smartphones and apps, and the cloud. These factors accelerated the pace of technology migrating into security for the purposes of both superior functionality and satisfying a new breed of more tech-savvy end users.

These developments have also made it more challenging than ever for security practitioners to judiciously evaluate leading- vs. bleeding-edge technology. When in doubt, most responsible for others’ or their own organization’s security are going to error on the side of caution — which is how it should be and something that must not be compromised.

In the spirit of the season, this issue’s theme and the quest for universal understanding, let’s look closer to contrast the collective mindsets of manufacturer, dealer and user, and contemplate each faction’s security technology holiday wish.

MANUFACTURERS — Larger suppliers are under pressure to justify their R&D expenditures and satisfy investors/stockholders; smaller ones seek to push innovation (in some cases disruption) into the marketplace and establish their brand; both are after profits and growth, and see dealers/integrators as both facilitators and hindrances to market penetration. Holiday security technology wish: For dealers/integrators to more quickly train on and sell new products.

DEALERS/INTEGRATORS — They are excited about opportunities and the potential of new technologies but leery of becoming in effect beta testers of unproven products, want to get staff in place and trained on IT-based solutions, are concerned about manufacturers circumventing the channel to sell direct, and are looking to increase the value proposition to customers and RMR. Holiday security technology wish: For manufacturers to honor the channel and offer true interoperability, and for users to have realistic expectations.

END USERS — Commercial clients need system scalability, reliability, flexibility, affordability and value-adds pleasing to executive management that also offer operational efficiencies and are obsolescence resistant; residential customers expect simplicity, convenience, immediacy, thriftiness and fun. Holiday security technology wish: To obtain enhancements in safety, productivity and lifestyle.

You know what? All those wishes just may come true. And with that, good security technology to all and to all good security technology!

Editor-in-Chief Scott Goldfine has spent more than 15 years with SECURITY SALES & INTEGRATION. Follow him online via the Under Surveillance blog at

Article Topics
Business Management · Between Us Pros · New Technologies · All Topics

About the Author
Scott Goldfine
Scott joined SECURITY SALES & INTEGRATION in October 1998 and has distinguished himself by producing award-winning, exemplary work. His editorial achievements have included blockbuster articles featuring major industry executives, such as Tyco Electronic Products Group Managing Director Gerry Head; Protection One President/CEO Richard Ginsburg; former Brink’s Home Security President/CEO Peter Michel; GE Interlogix President/CEO Ken Boyda; Bosch Security Systems President/CEO Peter Ribinski; and former SecurityLink President/CEO Jim Covert. Scott, who is an NTS Certified alarm technician, has become a respected and in-demand speaker at security industry events, including presentations at the Central Station Alarm Association (CSAA) Annual Meeting; California Alarm Association (CAA) Summer and Winter Conferences; PSA Security Network Conference; International Security Conference and Exhibition (ISC); and Security Industry Association (SIA) Forum. Scott often acts as an ambassador to mainstream media and is a participant in several industry associations. His previous experience as a cable-TV technician/installer and running his own audio company -- along with a lifelong fascination with electronics and computers -- prepared Scott well for his current position. Since graduating in 1986 with honors from California State University, Northridge with a degree in Radio-Television- Film, his professional endeavors have encompassed magazines, radio, TV, film, records, teletext, books, the Internet and more. In 2005, Scott captured the prestigious Western Publisher Maggie Award for Best Interview/Profile Trade for "9/11 Hero Tells Tale of Loses, Lessons," his October 2004 interview with former FDNY Commander Richard Picciotto, the last man to escape the Ground Zero destruction alive.
Contact Scott Goldfine:
View More by Scott Goldfine
Between Us Pros, New Technologies