CISCO: security gorilla?

October 2011 Integrated Solutions

The term convergence has been bandied about the security industry for quite some time. In many instances, those in the security industry give scant attention to the concept in favour of ‘business as usual’, despite the growth of IP (Internet Protocol) in various fields, from cameras to alarms.

One of the issues these companies face in poor economic times, especially the small- to mid-range companies, is that they are more focused on getting deals done and moving on to the next one, without considering the future. But the real threat to the security industry comes not only from IP-savvy competition in the market, but from the IT industry where margins are lower and the system integrators have their service processes honed. Moreover, these companies are intimately familiar with IP and all its benefits (and difficulties) as it is the backbone to almost all networks around the world, including the Internet.

How many security operations are geared to compete with these companies? Very few. Yet, competing with them is something that will happen, both on a small and large scale.

One of the main players in the IT market is networking giant Cisco. Its kit is found in the majority of networks around the globe. One can say it is a gorilla in the IP market. To date, the security industry’s interaction with Cisco and its products remains primarily in integrating security products and services with Cisco customers’ networks. The company has had a range of physical security products – which for simplicity we define as IP cameras and access control solutions – but they have not made enormous inroads into this market. But that is due to change.

Hi-Tech Security Solutions was fortunate to speak to Steven Collen, director of product management and business development, Cisco Systems Emerging Technology Group, who told us what Cisco’s plans are in the physical security space, as well as why this market is one the networking vendor will not ignore.

Revenue generation potential

The reason Cisco is determined to gain a part of the security market, according to Collen, is because of its vast installed base in almost all segments of the public and private markets. Furthermore, he says that the company finds that for every $1 spent on physical security products, $3 to $5 is spent on networking infrastructure. That constitutes a significant amount of revenue to the network partner of choice.

He gives an example of an urban security deployment (city surveillance solution) Cisco is involved in where the security solution is costing $100 million, while the communications components cost up to $500 million. Not everyone plays at that level, but the bottom line benefits are obvious.

South Africa is an important market for Cisco and Collen says the company wants to sell its full range of solutions here, as in other territories, where security and communications products are tied into Cisco services, such as planning, design and implementation. The services component adds in another $2 or $3 to the costs above.

Cisco is still committed to working with its partners in this regard and will not change its channel focus of the past, which is good news for installers and integrators that are qualified. He notes, however, that the services game is somewhat different and Cisco has various models of customer engagement that includes providing the service with or through partners as well as what he calls a mentored installation – basically handholding partners through the process.

IP is the key

Naturally, these solutions are all based on IP. The company’s experience is that it is able to deliver its solutions better when working with IT departments since they are more aware of the various aspects of IP networking than the traditional security managers are. When you talk the same language, the project runs more smoothly.

Five years ago the company prioritised partnering with existing security players in its efforts to enter the security market, but found these companies, while good at the installation of cameras and other products, were generally unable to effectively configure networks. The result was poor performance. Cisco therefore currently targets IT resellers who handle the communications aspects of the installation and use physical security specialists to install products.

This should be an area of concern to many of the traditional security installers. It is more than simply knowing how to set up a camera on a network, as larger companies need to integrate these systems with their overall infrastructure and management solutions. As more companies want surveillance and access control solutions that run on their existing IP networks, the skills to effectively manage this infrastructure to allow business communications to continue unhindered while still transmitting video will be key.

Of course, Cisco is not the only traditionally IT company incorporating security products into its portfolio. South Africa has seen a few large service providers adding physical security to their portfolios over the past few years. If they already manage the customer’s network, it is a no-brainer to add cameras and access control to the contract. Interestingly, many of the brands doing this are also Cisco partners.

It may also be time for security players that have not yet made the change to an IP focus to blow the dust off the old and sometimes overused ‘solutions’ mindset. Customers are not looking for a camera installer, but someone to deliver an integrated solution on top of their existing infrastructure. And part of that solution will be the post installation services that deliver measurable business value.

For example, a key issue at this year’s Retail Risk conference in August was that surveillance systems or alarms linked to armed response companies are not enough for retailers. Companies want solutions that provide video images and alert response companies to problems, but they want the added value they can measure and they do not want multiple networks that demand constant attention.

Plug-and-play

On the technical front, Cisco develops IP cameras and access control units in-house to ensure they meet specific requirements the company has. These products are then sent for manufacture by its partners. However, it also has an OEM agreement with Pelco (now owned by Schneider) for a limited number of IP cameras.

Collen says that Cisco’s IP cameras are designed to configure themselves and manage their bandwidth when attached to a network running Cisco’s medianet – “an end-to-end IP architecture that helps to enable pervasive media experiences”. The access control products similarly have automatic recognition and some auto-configuration capabilities.

Even with this capability, installers still need to have the required skills to fine-tune installations and the management of security transmissions. On the positive front, these companies also need people with experience in security installations to help in determining positions and priorities, such as which cameras need to stream live and which will only broadcast on an event.

Cisco cameras have processors that are dedicated to analytics which the company does not produce, but rather makes use of third-party technology in the market already. It is also able to provide drivers for other camera brands, but as a member of ONVIF, it hopes the standards body will drive standards forward to allow other compliant cameras to operate seamlessly on its infrastructure.

So while the talk of convergence continues in the security industry, it may be time for the industry to take a serious look beyond its traditional borders and see where its competition of the future will come from. It is an easier route for IT companies like Cisco to add physical security products to the infrastructures they already know and manage in the quest for new sources of revenue, than for the traditional security companies to move into the world of IT. At the end of the day, customers will choose companies they have a trust relationship with and a demonstrable track record. Everyone likes a winner.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security industry embraces mobile credentials, biometrics and AI
AI & Data Analytics Access Control & Identity Management Integrated Solutions
As organisations navigate an increasingly complex threat landscape, security leaders are making strategic shifts toward unified platforms and emerging technologies, according to the newly released 2025 State of Security and Identity Report from HID.

Read more...
From the editor's desk: Interesting times
Technews Publishing News & Events
We certainly live in interesting times. From delaying the budget speech because the ANC doesn’t see any reason why VAT shouldn’t be increased by 2%, to crime fighters being set up and prosecuted in ...

Read more...
World-first safe K9 training for drug detection
Technews Publishing SMART Security Solutions Editor's Choice News & Events Security Services & Risk Management Government and Parastatal (Industry)
The Braveheart Bio-Dog Academy recently announced the results of its scientific research into training dogs to accurately detect drugs and explosives without harming either the dogs or their handlers.

Read more...
Nice launches DC Blue Astute garage door motor
Nice Group South Africa Technews Publishing News & Events Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Nice Systems SA has launched the Nice DC Blue Astute, a garage door motor for the South African market featuring a pre-installed lithium-ion battery instead of traditional lead-acid batteries.

Read more...
Insurance provider uses Net2 For access management
Paxton Access Control & Identity Management Integrated Solutions Healthcare (Industry)
BestMed selected Paxton Net2 for its access control requirements because of its simplicity of installation and ease of navigation for end users, as well as the 5-year warranty.

Read more...
On the ball or unaware
Technews Publishing Information Security Security Services & Risk Management
Whether an organisation is operating at a high level of information security maturity or has dangerous vulnerabilities that could put an entire business at risk, advanced, strategic penetration testing can uncover its true state of IT security.

Read more...
The power of knowing your client
Ideco Biometrics Access Control & Identity Management Integrated Solutions
One of the most effective ways to combat the threat of fraud, identity theft, and financial crime threats is through a robust Know Your Client (KYC) process, which safeguards both businesses and clients.

Read more...
From the Editor's desk: Apathy is a cybercriminal
Technews Publishing News & Events
      Welcome to SMART Security Solutions’ first print publication of the year, the SMART Access & Identity Handbook 2025. This year’s print issue is smaller than usual, so we include some articles in the ...

Read more...
Federated identity orchestration
Technews Publishing SMART Security Solutions Editor's Choice Access Control & Identity Management Security Services & Risk Management AI & Data Analytics
Understanding exactly who resides at the end of a digital device is key, and simple identity number verification by the Department of Home Affairs is no longer a viable solution on its own.

Read more...
Managing identities for 20 years
Ideco Biometrics Technews Publishing SMART Security Solutions Access Control & Identity Management Integrated Solutions IoT & Automation
Many companies are now more aware of the risks associated with unauthorised access to locations and sensitive data and are investing in advanced identity authentication technologies to mitigate these threats.

Read more...