Getting the most out of security consultants

April 2013 Security Services & Risk Management

How can a vendor-neutral consultant help its customers to negotiate the costly minefield of security technology installations and upgrades?

How does a client decide between installations and upgrades? What factors influence this decision?

Making a choice on whether to embark upon a new installation or whether to upgrade an existing technology installation may be a daunting decision for clients to take. Factors that may well influence it are as follows:

* Does the existing installation allow for any significant sort of upgrade in terms of system and/or obsoleteness?

* If the installed system is restrictively upgradeable, would the client miss future upgrades and waste a valuable investment or would their system requirements hold good for the foreseeable future.

* What is the existing monthly cost of repair and maintenance?

* Has it increased significantly or still within budget and what is envisaged within the next year or two?

* What kind of budget does the client have available for upgrade or installation?

* Are there existing maintenance programmes on site to allow for phased upgrades within an agreed monthly cost?

Clients may expect an independent consultancy to develop and establish a security master plan that serves as a strategic road map for the client’s organisation. Such a plan would typically cover a 3 –5 year period and address all components of the client’s physical protections system, namely: physical infrastructure, security organisation, enabling security technology solutions and physical security processes.

A comprehensive security master plan, if professionally developed, would serve the client well in easily deriving at the solution of whether to install, upgrade or apply a layered combination of the two choices.

Should a customer not have a security master plan, a prudent approach would be for a vendor neutral security management consulting company to perform a thorough security review of the existing security technology system, if any, develop and recommend a conceptual design road map that needs to answer this very daunting question for and on behalf of clients.

Can a hybrid installation be as effective as pure analogue/IP?

The essence of any enabling security technology system is centred in the customer’s user/system requirements, which is realistically offset against the available budget. Should a technology solution system deliver on what is required then a hybrid system may well be as effective as a pure system.

Further to the above, any system is as good as the processes that govern it. Security processes (policy, standards, SOPs, etc.) form the framework of a physical protection system and without it, all the technology in the world means very little

Just think of the number of companies you have visited with hi-tech access control systems installed where employees access different areas of their business via proximity cards or biometric fingerprint readers yet visitors manually complete a no-technology visitor register.

There is certainly a case to be made for Internet-protocol (IP) based enabling-technology, as it is the predominant way forward from a development perspective. This notwithstanding, we would have to stand firm that each customer’s needs are different and would determine what is best.

When are IP systems the systems of choice? When is analogue a good choice?

Before a decision is made to procure any closed circuit television (CCTV) equipment, it is imperative that the client seeks unbiased professional advice that is vendor neutral. This advice should be packaged in the form of a comprehensive physical protection system (PPS) assessment where not only the CCTV requirements are assessed but the entire client PPS to ensure that the client ends up with a cost-effective total security solution comprising a suitable mix of all PPS components.

The solution should consistently achieve the client’s security system objectives, which may include detection, deterrence and timely response to prevent loss events and/or security incidents. Once the assessment has been conducted and the client is presented with a conceptual design for any required system upgrades, then the composition of the CCTV system can be measured against the following considerations:

* What is the desired application requirement of the CCTV equipment?

* What is the client’s available budget?

* What are the client’s desired expectations in respect of the upgraded CCTV system? What should it be able to do?

* Would the existing communications backbone on site support and cope with a significant system upgrade or would it need to be reconfigured or even replaced?

* What are the site-specific network requirements?

* Are there currently analogue cameras on site that can be re-integrated?

* What is the status and requirement of currently installed enabling technology with respect to integration? For example, access control interfaces, perimeter protection etc.

* Does the system proposed align with the clients’ strategic security plan?

When the above considerations have been measured the client should have a better idea of what the best choice is in respect of CCTV selection.

How does the customer decide that spending a lot of money on improvements and/or a new installation will be worth it? In other words, how does the customer determine the ROI potential of a security installation?

Unfortunately major security technology installations tend to happen once a serious security problem was discovered and the customer loses money. In such cases ROI can easily be justified against the increasing loss, should the problem not be remedied.

Business fraud trends clearly show that fraud is usually perpetrated over several years before being detected (mostly by chance). Financial reporting as an internal control is by no means sufficient protection against fraud, pilferage or theft. Fraudsters are often a network of long-serving employees in key positions who know how to manipulate the customer’s business processes without being detected.

Although very few customers formally measure the ROI of installed security systems or the cost-effectiveness of their total security programme for that matter, there are well-established methodologies to provide clear ROI indicators. These may include:

* Security performance metrics specifically formulated to measure ROI against the security threats exposed prior to and after installation.

* Security programme ROI formula where the cost of the security program is measured against prevented losses, losses recovered and actual losses.

* Security Risk Assessment Equation method where threat probability, threat interruption probability and consequence are calculated prior to and after installation.

For more information contact Physical Risk, +27 (0)21 851 2963, [email protected], www.physicalrisk.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Rewriting the rules of reputation
Technews Publishing Editor's Choice Security Services & Risk Management
Public Relations is more crucial than ever in the generative AI and LLMs age. AI-driven search engines no longer just scan social media or reviews, they prioritise authoritative, editorial content.

Read more...
How can South African organisations fast-track their AI initiatives?
AI & Data Analytics Security Services & Risk Management
While the AI market in South Africa is anticipated to grow by nearly 30% annually over the next five years, tapping into the promise and potential of AI is not easy.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Stallion repositions itself as a services provider
News & Events Security Services & Risk Management
Stallion has rebranded as Stallion Integrated Solutions to reflect its expanded capabilities beyond traditional security services to delivering integrated solutions that enhance safety, asset management, and operational efficiency.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Cybersecurity best practice
Information Security Security Services & Risk Management
Breach and attack simulation has become an essential element of cybersecurity strategies in any modern business by allowing companies to actively detect and resolve vulnerabilities through real-world attack simulations.

Read more...
Historic Collaboration cuts ATM Bombings by 30%
Online Intelligence Editor's Choice News & Events Security Services & Risk Management
Project Big-Bang, a collaborative industry-wide task team, has successfully reduced ATM bombings in South Africa by 30,7% during the predetermined measurement period of November, December and January 2024/5.

Read more...
Keeping safety central to enterprise risk management
Zulu Consulting Security Services & Risk Management
[Sponsored] As employee safety becomes an ever-more critical aspect of corporate risk management, Risk-IO assists risk managers in ensuring a safe working environment, whether in an industrial setting, an office, or anywhere.

Read more...
Empower individuals to control their biometric data
Information Security Access Control & Identity Management Security Services & Risk Management
What if your biometrics, now embedded in devices, workplaces, and airports, promising seamless access and enhanced security, was your greatest vulnerability in a cyberattack? Cybercriminals are focusing on knowing where biometric data is stored.

Read more...
Strategies for combating insider threats
Information Security Security Services & Risk Management
In Africa, insider threats pose an increasingly significant risk to businesses, driven by economic uncertainty, labour disputes, and rapid digital transformation. These threats can arise from various sources, including disgruntled employees and compromised third-party service providers

Read more...