The conversations have taken place. The thought leaders have been sourced. And now it is time to engage the voices of the community in The Great Conversation in Security. Are you ready to climb outside your box?
Silos of Excellence. Look up. You see clearly, but narrowly. They stand alone. Sometimes an object of admiration until suddenly the world demands a level of value that can only come through collaboration; at the technology, program, department or partner level. How do you quantify the value of collaboration or, as we say in this article, the sum of the parts....
It is critical to have a technology roadmap along side your security program strategy and plan. When it comes to intelligent communications, you must start with the ability to hear the voice under any circumstances. Voice is now digital and it should be defensible and scalable on your IP network. And it should interoperate with existing access control and video. Children's learned that lesson as we see in this article republished for The Great Conversation in Security.
We use a fob to open the car door, smart phones to order consumer goods online, control our home lighting, make purchases at the coffee shop and then, one day, we arrive on a campus and have to use a plastic card to open a door. If we are going to use smart phones for credentials, what should we be thinking about?
There is a lifecycle of product evolution within markets. The evolution naturally creates a red ocean. Red oceans are caused by companies (sharks) feeding off the same prey. We had one of our Great Conversation leaders help us understand how to prevent this death spiral in the video surveillance market.