The ROI and TCO of surveillance

CCTV Handbook 2017 Surveillance, Asset Management, Security Services & Risk Management

Organisations spend a lot of money on their surveillance systems and want the assurance that their investment will not only deliver their requirements over the long-term, but that the costs over the life of the installation won’t escalate dramatically. With technology advancing rapidly, organisations need to consider the expected lifespan of a surveillance installation and how to make sure it gains a return on its investment while managing the long-term cost of ownership.

Neil Cameron.
Neil Cameron.

Typical surveillance system longevity

Like any technology-based system, a CCTV solution will require an initial layout, with ongoing investment for maintenance and to ensure appropriate upgrades in identified high-risk areas.

A CCTV solution comprises the peripherals – the cameras and technology deployed in the field – and a server, the network recording system. The network recorder will need to be upgraded regularly as patches and OS upgrades are released.

As for the peripherals, the technologies used will determine the lifespan of the equipment. Newer IP cameras that are interoperable typically have a 10-year lifespan, but technology is advancing rapidly, which may prompt upgrades. In high-risk areas, for example, advanced features such as HD and 360-degree viewing, motion detection and intelligent learning algorithms can be highly beneficial.

Organisations looking to extend the longevity and optimise the performance of their systems need to ensure they have suitable maintenance agreements or service-level agreements (SLAs) in place.

Service-level agreements

SLAs are a key requirement in the implementation of any CCTV solution, helping to optimise performance and functionality. There are usually three phases that need to be taken into consideration: the initial installation; system refinement, which occurs as occupants move into a facility and identify their high-risk areas (e.g., the finance office, areas reserved for specialised personnel, or where high value assets are kept); and the system enhancements that are triggered when a breach or incident occurs. This last phase is reactive.

In order to effectively manage the costs of an SLA, service providers should build a proactive assessment of risk into the SLA. This will allow them to ensure they deploy suitable equipment for their client. For example, very specific approaches will be applied to manage access, protect the business from pilferage, protect assets and even protect the business from disgruntled employees.

This will enable the surveillance system to do what the organisation needs it to do in terms of managing risks, performing at a high level, and ensuring that costs remain predictable.

Let’s talk ROI

It’s easy to talk about a return on investment (ROI), but organisations need to be able to show their board of directors that the spend on surveillance is worth the money – it needs to be measurable.

In South Africa, crime is a reality and the threat to property, assets and people is tangible. Surveillance and security systems are an essential part of every responsible business. The ROI can be found in the form of protection against, prevention of, and early detection of threats.

However, surveillance equipment that is sufficiently advanced can also be used to directly add value to a business. With the right intelligence driving them, cameras can be used to identify specific behaviour and trigger alerts. For example, alerts can be triggered when queues in a retail store become too long, or the movement of customers in a store indicates preferences for certain goods, leading to the decision to stock them more often.

Surveillance as a service

Organisations not looking to make a heavy investment into infrastructure can look at subscription-based solutions, which offer the option to make security and surveillance an operational expenditure (OpEx) item.

In order to maximise the effectiveness of the solution, it will be critical to ensure that upgrades are part of the agreement. At a more advanced level, a software-as-a-service solution could also give the business access to solutions that may otherwise be too expensive to deploy. For example, access to a platform that integrates analytics, monitoring facility performance and systems, and alerting the right people if equipment fails or other anomalies occur; or integrates external intelligence, such as Twitter feeds, to provide real-time alerts of potential threats, such as strike action.

It is important to note, though, that when using a subscription service, organisations need to remain aware of the risk and ensure they keep their options open. By financing the security equipment separately, for example, and building SLAs and exit clauses into the subscription contract, the business is not tied to any one provider. At the same time, building a relationship with a security provider is important. Over time, a specialist provider will get to know the business, assisting it to identify risk and address it, applying the most suitable technologies – technologies that may well add considerable value to the business.

Risk and reward clauses based on the objectives of the customer can be built into the contract, incentivising the provider to perform well and add value to the business. As with any service provider contract, the business should ensure it is can quickly recover and remedy the situation in the case of the provider not delivering on the contract requirements or going out of business.

For more information contact Johnson Controls, +27 (0)11 921 7141, neil.cameron@jci.com, www.johnsoncontrols.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Verification is reshaping South Africa’s labour market
Security Services & Risk Management Asset Management Commercial (Industry)
Hiring faster, trusting less: in a labour market defined by both constraint and potential, the ability to hire with confidence may well become one of the most important competitive advantages.

Read more...
When your security starts thinking with you
Secutel Technologies Surveillance Perimeter Security, Alarms & Intruder Detection AI & Data Analytics
If you manage a warehouse or logistics environment, you already understand how quickly risk can escalate during the day and after hours. The question is: how quickly can you respond?

Read more...
Africa’s opportunity to shape the future of human-centred AI
AI & Data Analytics Security Services & Risk Management
Across the Global South, countries are not yet locked into decades of legacy AI systems, energy-intensive infrastructure, or governance frameworks designed for a different technological era. That creates something rare in technology development: a cleaner slate.

Read more...
AURA appoints Taryn Winer as global head of people
News & Events Security Services & Risk Management
Following its €13,5 million Series B funding round last year and accelerating international expansion, particularly across the United States, AURA has appointed Taryn Winer as global head of people.

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Genetec launches Cloudlink 2210
Genetec Infrastructure Surveillance
New cloud-managed appliance addresses the practical challenges when adopting a cloud-managed model at scale, including storage costs, support for devices that do not enable direct-to-cloud connectivity, and the need to maintain local operation during connectivity disruptions

Read more...
95% do not have full trust in cybersecurity vendors
Information Security Security Services & Risk Management
Trust in cybersecurity vendors is fragile, difficult to measure, and increasingly shaping risk posture at both operational and board levels. Lack of verifiable transparency undermines cybersecurity decision-making, according to Sophos-backed research.

Read more...
Smarter surveillance in a connected world
Securex South Africa Surveillance IoT & Automation
The security sector is moving rapidly towards integrated, intelligence-led environments. Organisations want systems that communicate with each other, deliver meaningful insight, and support operational efficiency without compromising cybersecurity or privacy.

Read more...
Enhancing control room operations
iFacts Security Services & Risk Management Surveillance
As South Africa faces complex and more advanced security challenges, the demand for advanced surveillance solutions, including CCTV and security control rooms, continues to surge, but what about the people in front of the screens?

Read more...
The AI goldrush has a credibility problem
Refraime Editor's Choice Surveillance AI & Data Analytics
The single most important question a surveillance buyer can ask is deceptively simple: “Was this system programmed or was it trained?” That question alone will reveal more about what you are evaluating than any feature list or marketing video.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.