With the nature of security quickly evolving to encompass both physical and cybersecurity at its very core, software manufacturers and security experts are finding themselves in a precarious situation – balancing between what is required and what is needed.