Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Visions: Pushing Security’s Boundaries

By Diane Ritchey
March 1, 2010
John Romanowich suggests that networked automated sensors will avail tremendous ROI and new services to provide greater security at a lower cost.


John Romanowich is the president and CEO of SightLogix, a manufacturer of automated outdoor video surveillance systems for perimeter and buffer zone security. His business and technical background includes post graduate studies at Rutgers Graduate School of Management, Columbia University and the New Jersey Institute of Technology. He is a former executive director and co-founder of Pyramid Vision Technologies (Sarnoff spinoff), a pioneer in intelligent video surveillance now owned by L3 Communications. He has also held management positions with Intel, IBM and the Sarnoff Corporation in video related technologies.

We spoke with Romanowich to get his perspective on the state of the industry relative to the professional security industry’s migration to an IP platform, justifying system acquisitions and emerging trends. His observations follow.

In the next 5-10 years, we’ll see more video surveillance cameras being automated, unlocking tremendous value for the $100 billion manpower market. At the same time, the costs to produce such “smart” systems will decrease to the point at which they become negligible relative to the value unlocked. The process of detection, which is now being performed by people, will be achieved by intelligent sensors that excel at determining – with great accuracy – if and when a security violation has occurred. Automation frees people to focus their attention where it is best suited, on making the appropriate response decisions.

We’re already seeing advancements in smart sensor technologies, which help personnel to make better decisions with greater efficiency. This is especially important when protecting large areas, such as those outdoors. These smarter systems are leveraging existing IT platforms as a standard business function with measurable accountability. Moving forward, as more sophisticated sensor technologies emerge and move onto the network, security systems will come to be managed just as any other information system, supported by the IT function, just as other departments across the enterprise are supported by IT today (e.g., accounting, manufacturing, CRM, etc.).

The functionality and capabilities of new automated solutions have risen over the past 18 months. Simultaneously, the economy has become intensely focused on ROI, and the key to ROI is automation that extends manpower efficacy to do more with less. Security automation leverages the strengths of networked intelligent sensors, which excel at monotonous events like detection without tiring or distraction, and aggregating that information onto the network. This streamlines the effectiveness and timeliness of security information. In essence, automation creates more effective security at less cost.

A perfect example of this involves the hundreds of thousands of PTZ cameras in use today. Even with vigilant operators, these cameras are inevitably looking in the wrong direction when a security violation occurs, akin to trying to find a needle in a haystack. The good news is that solutions are emerging that address this concern by automatically directing PTZ cameras to view an intruder, prompting accurate decision making and capturing vital details that would have been missed. Automatically controlling surveillance assets in this manner will form a major component of security deployments in
the future.

With the advent of networked automated sensors, there really is no reason why an organization has to own and maintain all of the elements of a security implementation. Instead, great economies of scale will be obtained by outsourcing security systems the way we outsource network operations today. By moving equipment and systems offsite a model of “security as a service” will shift capital expenses to operational expenses. Accordingly, security investments can be amortized over time, while organizations will benefit from best practices and the latest technologies.

With proper planning, security management will always strive to utilize the best technologies they can afford to mitigate and minimize consequences should a security event occur. Our brightest customers are those who develop a security plan for pre- and post-event mitigation, and deploy systems that support their security strategy. That’s what resiliency is all about – first preventing an intrusion and then minimizing consequences. One of the keys is to push security boundaries beyond buildings’ walls to the perimeter of the venue and further. This allows security management to preempt events and minimize risk and potential damage. Having events intercepted outside of your perimeter makes organizations less vulnerable.


John Romanowich of SightLogix predicts that:

1. The number of automated video
surveillance cameras will increase.
2. Smart sensor technologies will increasingly help manage security systems.
3. The key to ROI in security is automation.
4. Outsourcing security systems the way we outsource network operations today will shift capital expenses to operational expenses.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Diane 2016 200

Diane Ritchey was former Editor, Communications and Content for Security magazine beginning in 2009. She has an experienced background in publishing, public relations, content creation and management, internal and external communications. Within her role at Security, Ritchey organized and executed the annual Security 500 conference, researched and wrote exclusive cover stories, managed social media, and authored the monthly Security Talk column.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Person holding phone to smart lock

Why it’s Time to Move on From Legacy Access Control Systems

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Visions: Moving Beyond “Fork-Lift Conversions”

    See More
  • IP Makes Smart Intercom Talk

    See More
  • The Rising Role of Women in Security - Security Magazine

    2018 Security Leadership Issue: The Rising Role of Women in Security

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing