When it comes to understanding where security is headed, few people have their finger on the pulse quite like Jon Polly. As a key advisor to HiveWatch and a veteran of the security industry, Jon spends his days helping organizations navigate the increasingly complex landscape of security technology. We caught up with him to get his take on industry trends and what's keeping security leaders up at night.
"I geek out over security technology and tell people about them," says Jon Polly, breaking down his role as a security technology consultant. With 24 years in the industry, starting as a police officer before moving into consulting, Polly brings a practical perspective to the complex world of security solutions.
Finding the Right Solutions
"The best technology in the world, for the wrong use case, is the wrong technology," Polly emphasizes. This philosophy drives his approach to consulting. Rather than pushing specific products, he focuses on understanding the complete picture – from the business processes to pain points.
"I want to know their use case and what they're trying to accomplish," he explains. "It's not just about security solutions anymore; it's about business intelligence."
The Reality of Cloud Technology
When it comes to cloud solutions in security, Polly is direct: "Cloud is part of every conversation. If you don't have a cloud solution, you don't get a seat at the table." But he's pragmatic about its application. "Cloud may not be the right solution for everyone, but without one, you don't get to discuss the options."
The Future of Security Operations Centers
Looking at how security monitoring is evolving, Polly sees significant changes ahead. "I see digital twin technology being used more and more," he notes. While traditional security operation centers won't disappear, he predicts a shift toward more integrated approaches that correlate data from multiple sources.
Common Implementation Mistakes
One recurring issue Polly observes is the lack of integration between systems. "Companies often aren't looking at broader business intelligence," he points out. "Security teams typically aren't reaching out to other stakeholders, even though those departments have budget and are willing to invest in technology."
Another common mistake? "Throwing different technologies at individual problems instead of looking for comprehensive solutions."
AI in Physical Security
On artificial intelligence (AI), Polly takes a measured approach. While AI is revolutionizing security departments through improved workflows and automation, he cautions that not all AI solutions are equal. "Some versions are significantly better than others," he notes.
He also emphasizes the importance of regulatory compliance: "Twenty-seven states and the European Union (EU) have active legislation around privacy and AI. Organizations need to understand their local laws about biometrics and generative AI before implementation."
The Human Factor
Despite being an early adopter of technology, Polly strongly believes in maintaining human oversight. "I like highly automated systems because they help people make more educated decisions," he explains. "But I don't want an autonomous security system. You need that human element to verify: 'Is that correct?'"
Emerging Trends
Looking ahead, Polly identifies several key developments:
- AI and digital twin technology
- Interoperability over unified systems
- User experience driving adoption
- Decentralized identity based on Web3
ROI and Business Value
When it comes to return on investment, Polly is realistic. "Security has traditionally had no ROI – we're the insurance policy nobody wants to use," he admits. His solution? Look beyond traditional security metrics to business intelligence and departmental impact.
Advice for Modernization
For organizations looking to upgrade their security infrastructure, Polly's advice is straightforward: "Look at what you're trying to do and where you're trying to go. Don't just stick with legacy systems because that's what you've always done."
He advocates for thinking beyond traditional security applications and considering how different systems can work together to achieve broader business goals. Sometimes, that means replacing existing systems entirely – but the key is making sure the solution fits the actual need.
As security technology continues to evolve, success lies in finding the right balance between innovation and practical application. It's about understanding not just the technology itself but how it fits into the bigger picture of an organization's needs and goals.
Learn how to create your own tech stack in this ebook.