A fresh look at TCO

CCTV Handbook 2020 Editor's Choice

Total Cost of Ownership (TCO) is a well-established concept in many industries, not the least in IT, as a way for strategic buyers to move beyond looking at the upfront price to understanding all costs associated with procuring, deploying and operating a system.

In a previous post, we presented a model for Total Cost of Ownership in IP security and how that applied to a hypothetical project. The project was an enterprise 1500-camera city surveillance deployment. In this example, the costs for the project were divided equally between product related costs and ‘other’ costs – such as labour – not related to the specific price of the products purchased.

How a TCO can help buyers

Over the past year, from working with the TCO approach at Axis, we can see two clear benefits for adopting TCO when buying products:

The TCO allows you to look closely at your long-term commitment with the system and identify areas of improvement. For example, if the TCO shows that labour costs in operation make up a large share of the costs, perhaps it would be worthwhile to look at automating certain processes.

The TCO creates a better foundation for comparing proposals from sellers and making a more informed decision. Instead of focusing only on negotiating the upfront price, you can see how to reduce your total cost of ownership and challenge vendors about other costs that the system will incur – costs that are probably as big as or even bigger than the initial price.

Using TCO for better business decisions

To understand the usefulness of TCO, let’s look at a simple example. A buyer is considering two different systems: vendor A and vendor B. Vendor A is a premium supplier, with a higher upfront price but more long-term reliability, while vendor B is a lower-cost option with less focus on quality and operation. In the left figure, only price is part of the picture and clearly B offers a lower price.


In the middle figure, deployment costs, such as installation, training and project management have been added. Let’s assume that A can demonstrate that its system can be installed faster and require less training. For example, vendor A offers more advanced design and installation tools that speed up deployment. Or vendor A’s products come out-of-the-box ready to mount, while vendor B’s products are shipped in pieces that need assembly. The total costs are now similar for A and B, with a slight cost advantage for B. But it still only shows costs that occur during the first year.

In the figure to the right, we look beyond year 1, across the whole expected lifespan of the system. We add operation costs, maintenance, failure and other ongoing costs. Let’s assume that A provides credible proof that system A requires less maintenance, has a higher uptime and lower power consumption. For example, vendor A could prove that the products are field-tested to work in the customer’s environment, or provide case studies that demonstrate low failure rates. Now, the TCO shows that vendor B is more expensive over the lifetime of the system.


The evolvement of TCO

Over the past years, the TCO concept has evolved and matured. As more factors are brought into the scope of the TCO, it becomes even more useful as a methodology for understanding the complete investment associated with a system.

Of particular interest to the security industry is the discussion around cost of risk.

Risk management is, of course, a science in itself, and your company needs to find its own method to assess the probability of various scenarios and the potential negative impact of those. But regardless of methodology, we would argue that the cost of risk should be considered as part of the TCO and thus impact the buying decision.

Here are a selection of risk areas that should be of particular interest to you when considering a purchase:

Risk of losing critical business data. For example, if you have a camera system for loss prevention integrated with point-of-sales systems, you expect to get reliable video for each transaction. If the system goes down and you have no video for your transactions, what are the costs?

Risk of cyberattacks. What would be the cost for you if your system is attacked, leading to system downtime, loss of data, and perhaps most damaging, lost customer trust?

Risk to your brand. What would be the cost for you if it turns out your supplier is not meeting sustainability standards, whether in environmental, social, economic or ethical aspects? How would that impact your brand?

Let’s assume that the buyer in our previous case has made a risk assessment and further qualified vendor A and B from a risk perspective. In this case, vendor B is considered a greater risk for the buyer and the cost for that is added to the model in the figure below. Now, the arguments for vendor A are even stronger.

Five things to consider in the TCO

Working with TCO might seem complex, but it doesn’t have to be. We recommend starting small with factors that you can quantify and that you believe are important and then expand over time. Here are five steps to get started:

Scrutinise price. Take a close look at what’s actually included in the price. Does one product require mounting accessories, while the other is out-of-the-box ready? Does one camera model need additional lights, while the other has enough light sensitivity to manage without?

Look at key factors in deployment. How easy or difficult is it to install the system? How easy is it to integrate with your existing systems? How much training will your staff need?

Look at key factors of operation. How much time will you need to spend on maintenance? What are the typical failure rates? Be on the lookout for costs appearing in other parts of the system – for example, an IP camera system will likely require you to expand your network and storage, so products with high bandwidth requirements will increase your costs. And what about costs for power consumption?

Look at ‘hidden’ costs. For example, how easy will it be to change and adapt your system in the future? How much time will your staff spend on using the system? Are there freight or warehouse costs?

Look at cost of risk. What are the key risks with the systems? Even if you can’t fully quantify the cost of the risks, at least identify the risks and weigh them carefully into your business decision.

Additional benefits of the TCO

In this article, we argue for the importance and usefulness of TCO as a tool for strategic buying, a fact that has been proven in many industries.

The TCO method has another great benefit: it provides a foundation for a discussion around the value, or the return on investment (ROI), of the system.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A closed security concept for test halls and perimeter
Dallmeier Electronic Southern Africa Editor's Choice
At its factory facilities in Vilsbiburg, Germany, Flottweg SE relies on tailored video security technology from Dallmeier for perimeter security and workplace safety.

Read more...
Two all-in-one pendant speakers
Axis Communications SA Products
Axis Communications has announced the AXIS C1510 and AXIS C1511 network pendant all-in-one speakers, which make audio announcements smart and easy.

Read more...
Advanced server performance and energy efficient design
Editor's Choice IT infrastructure Products
Dell PowerEdge server portfolio expansion offers more performance, including up to 2.9x greater AI inferencing while Dell Smart Flow design and Dell Power Manager software advancements deliver greater energy efficiency.

Read more...
Free-to-use solar score for South African homes
Technews Publishing Editor's Choice
The LookSee Solar Score is one of the first of its kind to provide insight into the potential of solar power for South Africa’s residential properties.

Read more...
Best practices for cybersecurity and network health in 2023
Axis Communications SA IT infrastructure
Securing a network from outside threats while making it easily accessible to employees can be challenging. What are the tell-tale signs of poor network security, and what should organisations do to secure their networks?

Read more...
Fast, reliable and secure cloud services
Technews Publishing Editor's Choice Cyber Security IT infrastructure
Security and speed are critical components of today’s cloud-based services infrastructure. Cloudflare offers a range of services supporting these goals beyond what most people think it does.

Read more...
Axis launches P3265-LVE dome camera
Axis Communications SA Products CCTV, Surveillance & Remote Monitoring
Based on ARTPEC-8 — the latest Axis system-on-chip (SoC) — Axis’ latest dome high-performance camera includes a deep learning processing unit (DLPU), and cybersecurity features.

Read more...
Fire-fighting force at Vergelegen
Editor's Choice Fire & Safety Residential Estate (Industry)
Vergelegen wine estate in Somerset West, and its neighbours, are set to enjoy greater peace of mind this summer, thanks to the delivery of a brand new fire truck .

Read more...
Sasol ensures Zero Trust for SAP financials with bioLock
Technews Publishing Editor's Choice Cyber Security Security Services & Risk Management
Multi-factor authentication, including biometrics, for SAP Financials from realtime North America prevents financial compliance avoidance for Sasol.

Read more...
KPMG 2022 CEO Outlook, South African edition
Editor's Choice News
Mid-November saw the release of the latest KPMG 2022 CEO Outlook, South African edition, aptly sub-titled ‘Potential Growth in Uncertain Times’.

Read more...