IT Speak

When selling IP-based physical security systems, it's best to know the language.

The first thing any system integrator should realize when talking to a customer's IT department is that they're the experts.

"You probably won't be able to tell them anything about IT that they don't know," said Mike Tarras, a consultant with Security Consultants International.

That's particularly true when it comes to the infrastructure. Your job, then, is to quiet fears about technology and its impact on the customers' systems. You want to make sure you are well prepared to answer their technical questions and demonstrate your own IT knowledge. That will help gain their respect and position your solution for success.

The idea is for you to progress quickly from an "us versus them" dialogue to a cooperative session. In most cases, an IT department will quickly test your knowledge with some pertinent questions, and if you pass, you'll move on to a working relationship.

Here are some tips on how to win over an IT department.

Walk in with an open-platform, open-architecture solution. IT departments place a high value on open-platform solutions. They want solutions that are extensible and allow third-party hardware or software integration.

What they dislike are proprietary solutions. They've been burned in the past by solutions that do not allow third-party integration and fail to do everything they need them to do. They like solutions with legs that can support a wide range of hardware and software products so they can build the best solution for the price. They want the solution to work with their existing hardware, software, storage solutions and networking technology.

"IT departments are very picky about the technology they let into their server room and brands of equipment they purchase," Tarras said.

If your solution limits what they can do behind closed doors, they're going to show you the door. If a solution allows them to make their own decisions on the equipment they use, you will walk out the door a winner.

Do the math for them. Bandwidth is a major concern for an IT department. If you're presenting an IP video surveillance solution, they will worry about added traffic and the network's extra storage requirements.

The best way to combat bandwidth concerns is to tell IT exactly how much bandwidth your solution will require. Start with the bitstream per camera and take them through the math. Validate the claims you made in your response to the RFP. Also mention the many ways—H.264 compression, frame rate and use of motion detection—to tweak a video surveillance system's bandwidth needs and explain that almost every modern network can handle the load. If the IT people still aren't convinced, give them something really hard to argue with: setting up a separate physical network or a virtual local area network for your solution.

Directly address their security fears. IT has spent years on IP security and has to continuously fight new threats. Your solution is perceived as one of these threats. You need to show them that you have battened down the hatches. For instance, you should validate that you're using 802.1x-port-based authentication to ensure that only a specific device, such as a camera, can send information through a specific port. You need to show them you have secure sockets layer login for remote clients. You need to speak to user authorization and management.

A big plus is having a solution that supports common industry workhorses such as Microsoft Active Directory® for user authentication. That puts the keys to using your solution directly in IT's control, which is exactly what they want. They don't have to have another user management system on top of what they already have. Of course, if you're setting up a separate network or a VLAN, a lot of IT's security concerns will be moot.

Make storage a nonissue. Some IP-based security systems, in particular IP video surveillance, are going to raise big caution flags with IT when it comes to storage. Fortunately, the cost of a terabyte of storage is constantly dropping. Still, video data takes up a tremendous amount of space, and IT will want to know how you plan to address it. The best video management solutions use a cost-effective, dual-stage archiving model with fast, local disks for shortterm recording and affordable network storage for long-term archiving.

For instance, these solutions can use small computer system interface drives or solid-state drives for first-day recording and serial advanced technology attachment arrays for archiving. This improves both write performance and reliability since SCSI and solid-state drives are fast and more reliable for applications that frequently write to disk.

SATA drives, on the other hand, are not designed for the frequent writing to disk required in first-day recording. They are inexpensive and consequently make an excellent cost-effective solution for long-term archiving. If an IT department doesn't have its own solution for storage, this might make an excellent suggestion.

Make version control easy for IT. Any time new hardware or software applications are added to the network, version control becomes a concern. With security products, it could be firmware updates on cameras or smart client updates for an IP video management system. You need to demonstrate to IT that distributing new versions and updates can be done without disrupting performance or security.

What IT departments particularly appreciate are solutions that allow them to take a staggered approach to updates. For instance, an IP video management solution with 100 percent backward compatibility will enable IT to roll out a new version at their own pace, perhaps completing one server or client at a time so the entire system doesn't have to go offline during the installation of the new version.

The same goes for a camera firmware update utility. The best ones enable a staggered rollout. After all, if you take 100 cameras offline at once, who's watching the store?

Clicks to completion. If the product you're recommending has a truly intuitive interface—particularly if it's Microsoft-like—demonstrate it. IT will want to know that it can perform necessary tasks quickly and easily. Take IT through a few typical tasks, such as installing a device with a hardware wizard or configuring a group of similar devices simultaneously. Show them how your solution reduces clicks and uses industry standard techniques, such as storing system, event, audit, rule and alert log entries in a centralized Microsoft SQL database. The more something works like the other solutions they use, the more comfortable they'll feel.

Handling the processing. Face it, some security systems, such as IP video surveillance, can be processing-intensive, particularly if a system is running large numbers of cameras. This could bog down an individual server. IT will want to see a solution for that, specifically the ability to cluster servers to handle larger volumes of processing.

Virtualization also is a big buzzword today. Demonstrating that your solution can run in virtualized environments also will score points, particularly in environments looking for green solutions that have underused servers.

Helping IT become more physically secure. One often neglected area in the physical security of many organizations is the IT department itself. One way to get IT on your side is to show them how your solution—whether it's an access system, a video surveillance system or, perhaps, an integrated solution of both those—could also help IT protect a server room. Do a gentle cross sell.

Perhaps all that is required is a more advanced lock on their server room door or a few cameras to watch sensitive areas after hours. Think of the benefit to IT if, when there's a problem on the weekend, they could zoom in on a server and actually see that its status light is off. There's nothing like having IT buy into a system because of self interest.

IT and physical security departments have more in common than you think. While it's commonly pointed out that IT and physical security people are radically different, they both have a similar task: protecting the organization's assets. In one case, the assets are the IT infrastructure; in the other, the physical infrastructure and people.

Both are always looking for ways to prevent the unexpected. They're never 100 percent secure, yet they're always working toward 100 percent security. Both appreciate solutions that help them do their jobs better and keep incidents to a minimum.

Be sure that IT understands your system is the right solution and not something they'll be firefighting for years to come. This is where customer testimonials from other IT departments, market penetration and ecosystem can be important trump cards.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”