Introducing return on security ­investment (ROSI)

August 2013 Integrated Solutions

Today’s volatile economic climate demands that each corporate investment be supported by a strong business case. Justifying security management solutions is no exception, especially when executives expect security professionals to prove return on security investment (ROSI).

Older methods for calculating ROSI were complex and relied on soft data to derive numbers. A more tangible way to justify security investments is to organise ROSI into three levels: security effectiveness, risk reduction, and business efficiency.

The security infrastructure can easily and cost-effectively be integrated with other building systems.
The security infrastructure can easily and cost-effectively be integrated with other building systems.

1. Security effectiveness: Protecting people and assets

The first level of security effectiveness represents the basic reason why executives invest in security management solutions: to protect people and assets. Common and visible systems are used, such as security cameras and access control devices.

Organisations can realise lower capital expenditure (CapEx) costs and lower operating expenses (OpEx) by integrating these disparate technologies onto a single IT network.

Proving the value of security effectiveness alone is problematic because businesses cannot determine with certainty whether incidents simply did not occur, or whether the security solution prevented the potential incidents from taking place. At a basic level, security effectiveness ensures a secure business environment.

2. Risk reduction: Enhancing business continuity

The second level is risk reduction, which aligns with the goals of executive management. Security leaders identify internal and external risks to the business by asking: “How will the organisation benefit financially by securing itself against these risks?” This type of solution provides better situational awareness, bolsters business continuity, and helps organisations avoid financial ramifications of unexpected incidents.

Schneider Electric helped a global leader in the medical research field reduce risk when new government regulations threatened to disrupt existing processes. Management inventoried the substances subject to the regulations and designed new security processes relevant to them, providing protection for the business and facilitating compliance. After 30 months, the team realised:

* 30% less time needed to respond to an event.

* 430% reduction in nuisance alarms.

* Reduced guard staff costs.

* Lower administrative costs for generating compliance reports.

Assigning monetary value to risk reduction is possible because most executives can readily quantify the hourly or daily cost of a business shutdown. They can also estimate the potential financial liability if an accident were to occur.

3. Business efficiency: Enhancing business performance

The most impactful ROSI level is business value that transcends security – when security becomes an essential contributor to business success, profitability, and continuity. This is achieved by determining how security technology can add value by making core business processes more efficient.

For example, Schneider Electric helped a major car manufacturer realise added business value at its manufacturing plant. Optical turnstiles were integrated with access control devices at each assembly line to count workers and ensure credentials at the beginning of the day. The production line would not operate if all qualified staff members were not present, reducing the risk of costly mistakes and quality compromises, and ensuring smooth operations.

In order to achieve maximum ROSI, the key is to make security an essential part of corporate culture. When people, process, and technology work together in an intentionally designed symmetry, organisations reap benefits that cross operational boundaries.

Schneider Electric has global security expertise and a proven portfolio of successful implementations that reflect all three levels of ROSI. Our security solutions can integrate many different security disciplines into a single system. The resulting single-seat view of the entire security domain delivers real-time, actionable information that enables better decision making and faster response to events. To drive even more value, the security infrastructure can easily and cost-effectively be integrated with other building systems such as, lighting, energy management, building management, power management, and IT management.

Source: Pelco Press Summer 2013. Used with permission.

For more information contact Pelco, +27 (0)12 254 6400, malcom.govender@schneider-electric.com, www.pelco.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Building a nervous system for smart cities
Issue 1 2020, Pinnacle Instruments SA , Integrated Solutions
Build a central nervous system for smart cities, by employing real-time situation reporting and analysis that unites the powers of cloud computing, AI, IoT and big data.

Read more...
The secret to 5G security? Turn the network into a sensor
Issue 1 2020 , Integrated Solutions
We are about to make the leap from being a civilisation that uses networks to one that runs on them in a fundamental and inextricable way.

Read more...
The move to services and RMR
Issue 1 2020, Merchant West, G4S South Africa, Technews Publishing , Integrated Solutions
Project work used to be the staple diet for system integrators, but that was before the services model changed the way businesses buy and use their security systems.

Read more...
Global security industry adopts servistisation models
Issue 1 2020 , Integrated Solutions
New as-a-service business models are gaining traction because they reduce capital expenditure and cost of ownership, finds Frost & Sullivan.

Read more...
Looking ahead with mobile access technologies
Access & Identity Management Handbook 2020, Technews Publishing, HID Global, dormakaba South Africa, Salto Systems Africa, Suprema, Gallagher , Access Control & Identity Management, Integrated Solutions
Given the broad use of smartphones around the world and the numerous technologies packed into these devices, it was only a matter of time before the access control industry developed technology that would ...

Read more...
Scalable access solution
Access & Identity Management Handbook 2020 , Access Control & Identity Management, Integrated Solutions
Bosch Building Technologies makes access management simple, scalable and always available with Access Management System 2.0.

Read more...
Securing perimeters of secure locations
November 2019, Axis Communications SA, Modular Communications, Hikvision South Africa, Nemtek Electric Fencing Products, Technews Publishing, Stafix , Government and Parastatal (Industry), Perimeter Security, Alarms & Intruder Detection, Integrated Solutions
Hi-Tech Security Solutions asked a number of companies offering perimeter security solutions for their insights into protecting the boundaries of national key points.

Read more...
The safe city and its need for interoperability
November 2019 , Integrated Solutions, CCTV, Surveillance & Remote Monitoring
Interoperability continues to present one of the greatest challenges, particularly with video management systems, video recording devices and cameras.

Read more...
Analytics-driven solutions for smart infrastructure
November 2019, Bosch Building Technologies , Integrated Solutions
Video analytics technology can bring intelligence to infrastructure by delivering solutions for traffic flow, improved safety, smart parking, and data collection.

Read more...
A platform approach to innovation and value
CCTV Handbook 2019, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
Moving to the platform model of doing business holds tremendous advantages for end users and smaller developers, but also for the whole technology supply chain.

Read more...