Real words or buzzwords?: Enterprise Class - Part 1

May 9, 2017
A combination of tech trends has redefined what it means to have a true enterprise system

Editor’s note: This is the eighth article in the “Real words or Buzzwords?” series from contributor Ray Bernard about how real words can become empty words and stifle technology progress.

I’ve wanted to write about "Enterprise Class" for some time now. The term, along with "Open" and "Future Proof/Future Proofing" are the most-requested topics for me to address in this article seriesBy the way, you can go here to suggest a term or phrase you would like to see covered in greater depth.

Almost two years ago, security industry veteran Perry Levine, now Director of Strategic Alliances for BCDVideo, wrote a short LinkedIn article titled, "If You are Not Cloud, You are Not Enterprise." Levine wrote that what used to be considered an "Enterprise System" for physical security system applications "had changed," which is quite an understatement.  Levine also listed five of the new requirements:

  • A Real-Time Web Interface
  • 100% Mobile Device Functionality
  • Access from Anywhere, Anytime on Any Device
  • Data and Cybersecurity Protection
  • Redundancy and High Availability

He also referenced a good phrase coined by BluBØX, "Enterprise at any size."

"Enterprise at any size" is a clever way of expressing the concept that no matter what size of system or organization you have, you get enterprise-class features at your level of subscription price. "Enterprise at any size" is made possible by several important technology trends:

  • Consumerization
  • Digitalization
  • Standardization
  • Cloud computing


Information technology advances used to arrive in the physical security products as the third stage of the technology development. For decades, after an advanced information technology was developed, it would appear first in business products, next in consumer products, and finally in security industry products. This constituted a three- to five-year lag in the information technology being available for electronic physical security systems. The consumerization trend has permanently changed that picture.

According to Gartner’s IT Glossary: Consumerization is the specific impact that consumer-originated technologies can have on enterprises. It reflects how enterprises will be affected by, and can take advantage of, new technologies and models that originate and develop in the consumer space, rather than in the enterprise IT sector. Consumerization is not a strategy or something to be "adopted." Consumerization can be embraced and it must be dealt with, but it cannot be stopped.

This means information technology advances can now be incorporated into electronic security products and systems at the same time as they begin appearing in businesses. The three- to five-year lag is no longer necessary for many technologies. For example, formerly very pricey security technologies, such as custom-built high-resolution security monitors, are now replaced by affordable consumer technology you can get at places like Best Buy or Amazon. 4K video cameras first appeared as consumer products, and then very quickly the technology was adapted for security camera use.

This trend makes perfect sense of the actions by Canon—a consumer camera manufacturer—in acquiring two security industry companies: Axis Communications (cameras) and Milestone Systems (video management). The consumerization trend is playing a big role in making security system technology more affordable, and at the same time easier to use (a consumer technology requirement).


Digitalization is the integration of digital technologies into everyday life by the conversion of analog information into digital forms. One of the many results of digitalization is that everything can go over local networks and the Internet, making the use of cloud-based security applications feasible, resulting in "anywhere, anytime, any device" capabilities.


Information technology standards are what make integration between security applications and business systems practical, especially for cloud-based applications.

Cloud Computing

Affordable access to high-power computer processing and global networking is made possible by cloud computing, and is the basis for high-performance real-time web interfaces, mobile device connectivity, redundancy and high availability for cloud-based systems. Strong data and cybersecurity protection are more affordable in a cloud computing environment.

The Full Scope of Enterprise Class

This article presents just a few of the many important requirements of Enterprise Class security systems technology. Part two will present more of the picture and delve deeper into the aspects of Enterprise Class that are fast becoming the key differentiators between true Enterprise Class offerings that those that are just wearing the label. Part three will follow with a checklist that integrators, specifiers and end-users can use to evaluate and compare offerings that are labeled "Enterprise Class."

About the Author:

Ray Bernard, PSP CHS-III, is the principal consultant for Ray Bernard Consulting Services (RBCS), a firm that provides security consulting services for public and private facilities ( He is the author of the Elsevier book Security Technology Convergence Insights available on Amazon. Mr. Bernard is a Subject Matter Expert Faculty of the Security Executive Council (SEC) and an active member of the ASIS International member councils for Physical Security and IT Security.

About the Author

Ray Bernard, PSP, CHS-III

Ray Bernard, PSP CHS-III, is the principal consultant for Ray Bernard Consulting Services (, a firm that provides security consulting services for public and private facilities. He has been a frequent contributor to Security Business, SecurityInfoWatch and STE magazine for decades. He is the author of the Elsevier book Security Technology Convergence Insights, available on Amazon. Mr. Bernard is an active member of the ASIS member councils for Physical Security and IT Security, and is a member of the Subject Matter Expert Faculty of the Security Executive Council (

Follow him on LinkedIn:

Follow him on Twitter: @RayBernardRBCS.

(Photo courtesy
Several security industry companies have asserted that network-friendly meant 'works well over a network,' but their concept of 'works well' was too shortsighted. It is one thing to work well when three devices are talking on a benchtop network. It’s completely another to work well in a corporate network environment with hundreds or thousands of active devices connected.
(Image courtesy
Manufacturers and their product development teams need to take a very close look at how the term 'open' should be applied not only in the design and development of products and systems, but in the explanations that they provide to sales people, channel partners and customers.