This is the fourth article in the award-winning “Real Words or Buzzwords?” series about how real words become empty words and stifle technology progress, also published on SecurityInfoWatch.com.
By Ray Bernard, PSP, CHS-III
Originally adopted from the IT domain, the term “Best of Breed” has frequently been misapplied in the physical security industry.
★ ★ ★ GET NOTIFIED! ★ ★ ★
SIGN UP to be notified by email the day a new Real Words or Buzzwords? article is posted!
Real Words or Buzzwords?
The Award-Winning Article Series
#1 Proof of the buzzword that killed tech advances in the security industry—but not other industries.
#2 Next Generation (NextGen): A sure way to tell hype from reality.
#3 Customer Centric: Why all security industry companies aren't customer centric.
#4 Best of Breed: What it should mean to companies and their customers.
#5 Open: An openness scale to rate platforms and systems
#6 Network-friendly: It's much more than network connectivity.
#7 Mobile first: Not what it sounds like.
#8 Enterprise Class (Part One): To qualify as Enterprise Class system today is world's beyond what it was yesterday.
#9 Enterprise Class (Part Two): Enterprise Class must be more than just a top-level label.
#10 Enterprise Class (Part Three): Enterprise Class must be 21st century technology.
#11 Intuitive: It’s about time that we had a real-world testable definition for “intuitive”.
#12 State of the Art: A perspective for right-setting our own thinking about technologies.
#13 True Cloud (Part One): Fully evaluating cloud product offerings.
#14 True Cloud (Part Two): Examining the characteristics of 'native-cloud' applications.
#15 True Cloud (Part Three): Due diligence in testing cloud systems.
#16 IP-based, IP-enabled, IP-capable, or IP-connectable?: A perspective for right-setting our own thinking about technologies.
#17 Five Nines: Many people equate high availability with good user experience, yet many more factors are critically important.
#18 Robust: Words like “robust” must be followed by design specifics to be meaningful.
#19 Serverless Computing – Part 1: Why "serverless computing" is critical for some cloud offerings.
#20 Serverless Computing – Part 2: Why full virtualization is the future of cloud computing.
#21 Situational Awareness – Part 1: What products provide situational awareness?
#22 Situational Awareness – Part 2: Why system designs are incomplete without situational awareness?
#23 Situational Awareness – Part 3: How mobile devices change the situational awareness landscape?
#24 Situational Awareness – Part 4: Why situational awareness is a must for security system maintenance and acceptable uptime.
#25 Situational Awareness – Part 5: We are now entering the era of smart buildings and facilities. We must design integrated security systems that are much smarter than those we have designed in the past.
#26 Situational Awareness – Part 6: Developing modern day situational awareness solutions requires moving beyond 20th century thinking.
#27 Situational Awareness – Part 7: Modern day incident response deserves the help that modern technology can provide but doesn’t yet. Filling this void is one of the great security industry opportunities of our time.
#28 Unicity: Security solutions providers can spur innovation by envisioning how the Unicity concept can extend and strengthen physical access into real-time presence management.
#29 The API Economy: Why The API Economy will have a significant impact on the physical security industry moving forward.
#31 The Built Environment: In the 21st century, “the built environment” means so much more than it did just two decades ago.
#32 Hyper-Converged Infrastructure: Hyper-Converged Infrastructure has been a hot phrase in IT for several years, but do its promises hold true for the physical security industry?
#33 Software-Defined: Cloud-computing technology, with its many software-defined elements, is bringing self-scaling real-time performance capabilities to physical security system technology.
#34 High-Performance: How the right use of "high-performance" can accelerate the adoption of truly high-performing emerging technologies.
#35 Erasure Coding: Why RAID drive arrays don’t work anymore for video storage, and why Erasure Coding does.
#36 Presence Control: Anyone responsible for access control management or smart building experience must understand and apply presence control.
#37 Internet+: The Internet has evolved into much more than the information superhighway it was originally conceived to be.
#38 Digital Twin: Though few in physical security are familiar with the concept, it holds enormous potential for the industry.
#39 Fog Computing: Though commonly misunderstood, the concept of fog computing has become critically important to physical security systems.
#40 Scale - Part 1: Although many security-industry thought leaders have advocated that we should be “learning from IT,” there is still insufficient emphasis on learning about IT practices, especially for large-scale deployments.
#41 Scale - Part 2: Why the industry has yet to fully grasp what the ‘Internet of Things’ means for scaling physical security devices and systems.
#42 Cyberspace - Part 1: Thought to be an outdated term by some, understanding ‘Cyberspace’ and how it differs from ‘Cyber’ is paramount for security practitioners.
#43 Cyber-Physical Systems - Part 1: We must understand what it means that electronic physical security systems are cyber-physical systems.
#44 Cyberspace - Part 2: Thought to be an outdated term by some, understanding ‘Cyberspace’ and how it differs from ‘Cyber’ is paramount for security practitioners.
#45 Artificial Intelligence, Machine Learning and Deep Learning: Examining the differences in these technologies and their respective benefits for the security industry.
#46 VDI – Virtual Desktop Infrastructure: At first glance, VDI doesn’t seem to have much application to a SOC deployment. But a closer look reveals why it is actually of critical importance.
#47 Hybrid Cloud: The definition of hybrid cloud has evolved, and it’s important to understand the implications for physical security system deployments.
#48 Legacy: How you define ‘legacy technology’ may determine whether you get to update or replace critical systems.
#49 H.264 - Part 1: Examining the terms involved in camera stream configuration settings and why they are important.
#50 H.264 - Part 2: A look at the different H.264 video frame types and how they relate to intended uses of video.
#51 H.264 - Part 3: Once seen as just a marketing term, ‘smart codecs’ have revolutionized video compression.
#52 Presence Technologies: The proliferation of IoT sensors and devices, plus the current impacts of the COVID-19 pandemic, have elevated the capabilities and the importance of presence technologies.
#53 Anonymization, Encryption and Governance: The exponential advance of information technologies requires an exponential advance in the application of data protection.
#54 Computer Vision: Why a good understanding of the computer vision concept is important for evaluating today’s security video analytics products.
#55 55 Exponential Technology Advancement: The next 10 years of security technology will bring more change than in the entire history of the industry to now.
More to come about every other week.
Best of Breed originally, and still, refers to the winning animal of its breed at a dog show. For each breed category established for a show, there is one dog that is selected by the show’s judges as best representing its breed. For each breed, there are written standards of perfection on which the entered dogs are judged.
Stages of Software Advancement
Later, the IT world adopted the term to identify the best software product of its type. At the time the label came into use, it was a marketing term whose purpose was to position a single application from one vendor as being better than the corresponding application included in a competitor’s software suite. Here are the key stages software advancement has followed:
- Standalone applications from multiple vendors
- Interfaced applications from multiple vendors
- Integrated suites of applications from a single vendor (“enterprise solutions”)
- Integrated “Best of Breed” applications from multiple vendors
Standalone applications (#1 above) were problematic because they couldn’t share data and interact. There was a lot of duplicate manual data entry, which introduced data errors. There was also no coordination or automation of workflow.
Interfaced applications (#2) were an advance, but a too-troublesome advance. The middleware between the integrated systems would “break” when the individual software applications were updated. It was disruptive and costly to maintain the integrations.
Integrated suites of business (#3) applications from a single vendor eliminated the customers’ integration problems, because the vendor assured that the applications could talk to each other. However, it was also a step backwards, because typically one application in each suite was an advanced application related to the vendor’s specialty, but the other applications the vendor developed or acquired often were mediocre.
Best of Breed product and system utilization (#4) was made possible by standards created specifically to improve cross-vendor integration capabilities Thus it became possible to integrate leading applications from different vendors successfully. That’s when leading applications were labelled “Best of Breed”, and the term stepped into the limelight. The concept was for customers to create the best possible set of enterprise software solutions by integrating leading applications from a variety of vendors. The objective was to best fit the needs of the different parts of the business (sales, accounting, payroll, manufacturing, warehouse management, and so on).
Physical Security Industry Echoes IT
Because physical security systems are built using information technology (computer, network, database, and software technology), the same product stages occurred in our security industry. However, when the term Best of Breed caught on with our industry’s marketing and sales folks, its use began almost simultaneously with its use in the IT world. The problem was that the technology in the security industry had not caught up yet! That is why you could hear some sales people saying, “Our integrated suite of applications is Best of Breed!” No! That’s the same thing as saying, “Our integrated suite of proprietary applications is really a separate single application that integrates with other vendor’s separate applications.” It’s a nonsense statement. The term “Best of Breed” sounded good, but didn’t really mean what it was supposed to, and so became meaningless to the ears of customers. Or worse than meaningless to customer IT folks, because it said, “We’re clueless about the current state of software.”
A New Era is Dawning
However, thanks in large part to IT advances in web services and service oriented architectures, as well as their utilization in cloud-based applications, we are entering an era where integration capabilities are advancing by leaps and bounds, at the same time as emerging technology is bringing many new technological capabilities to the table.
When asked, at the 2014 Gartner Data Center Conference, about the effects of technology advances and the impacts of digital disruption on General Electric, Chris Drumgoole, then Chief Operating Officer of GE’s cloud division (now Chief Technology Officer of GE), said, “There is really not a single thing that we do in IT, today, that we’ll do the same way two years from now. I struggle to name a single process within our organization that isn’t going to change dramatically over the next two years or three years.”
Drumgoole also said, in a 2014 InfoWorld interview, “We really believe that the world is changing from engineered-systems to an integrated-systems world, where the component is no longer the most important piece. It’s around systemic behavior, where systems exist to serve apps.”
Focus on Application Value
We are already starting to see security apps emerge that will help us build a new generation of security systems. We’ll have many more sensors and 3rd party sources of data to integrate than we do cameras and credential readers, and none of these new devices will be “owned” by Security.
We’re approaching the ideal situation for Best of Breed applications: ubiquitous networking, widely adopted integration standards, and open systems to help bring it all together. These conditions make it possible to assemble a highly effective arsenal of advanced software tools, with powerful cloud-based analytics systems that do in minutes what used to take days. This “integration of top applications” approach is referred to in the IT world as the Best of Breed Strategy.
The Miami International Airport already has video analytics capabilities (from Qognify) that enable spotting individuals who left a package behind, and finding the paths that they walked before and after, right up to their current location if they are still in the airport. This now takes minutes, where it used to take hours or days of after-the-fact video review. While this is impressive, consider that this and other security technologies of today are not standing still. What will they be like next year?
We are now approaching the time when intelligent systems and devices can bring actionable information together in real time that simply wasn’t possible before, no matter how many staff a security department had.
So, at upcoming trade shows, be on the lookout for improved real-time system capabilities, and new technology integration scenarios. And if someone says “Best of Breed” to you, you can and should feel free to ask, “What breed of application?”, “Exactly how is it the best?”, and “What kinds of integrations are possible?”
Ray Bernard, PSP CHS-III, is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities (www.go-rbcs.com). He is the author of the Elsevier book Security Technology Convergence Insights available on Amazon. Mr. Bernard is a Subject Matter Expert Faculty of the Security Executive Council (SEC) and an active member of ASIS International.