The ROI and TCO of surveillance

CCTV Handbook 2017 Surveillance, Asset Management, Security Services & Risk Management

Organisations spend a lot of money on their surveillance systems and want the assurance that their investment will not only deliver their requirements over the long-term, but that the costs over the life of the installation won’t escalate dramatically. With technology advancing rapidly, organisations need to consider the expected lifespan of a surveillance installation and how to make sure it gains a return on its investment while managing the long-term cost of ownership.

Neil Cameron.
Neil Cameron.

Typical surveillance system longevity

Like any technology-based system, a CCTV solution will require an initial layout, with ongoing investment for maintenance and to ensure appropriate upgrades in identified high-risk areas.

A CCTV solution comprises the peripherals – the cameras and technology deployed in the field – and a server, the network recording system. The network recorder will need to be upgraded regularly as patches and OS upgrades are released.

As for the peripherals, the technologies used will determine the lifespan of the equipment. Newer IP cameras that are interoperable typically have a 10-year lifespan, but technology is advancing rapidly, which may prompt upgrades. In high-risk areas, for example, advanced features such as HD and 360-degree viewing, motion detection and intelligent learning algorithms can be highly beneficial.

Organisations looking to extend the longevity and optimise the performance of their systems need to ensure they have suitable maintenance agreements or service-level agreements (SLAs) in place.

Service-level agreements

SLAs are a key requirement in the implementation of any CCTV solution, helping to optimise performance and functionality. There are usually three phases that need to be taken into consideration: the initial installation; system refinement, which occurs as occupants move into a facility and identify their high-risk areas (e.g., the finance office, areas reserved for specialised personnel, or where high value assets are kept); and the system enhancements that are triggered when a breach or incident occurs. This last phase is reactive.

In order to effectively manage the costs of an SLA, service providers should build a proactive assessment of risk into the SLA. This will allow them to ensure they deploy suitable equipment for their client. For example, very specific approaches will be applied to manage access, protect the business from pilferage, protect assets and even protect the business from disgruntled employees.

This will enable the surveillance system to do what the organisation needs it to do in terms of managing risks, performing at a high level, and ensuring that costs remain predictable.

Let’s talk ROI

It’s easy to talk about a return on investment (ROI), but organisations need to be able to show their board of directors that the spend on surveillance is worth the money – it needs to be measurable.

In South Africa, crime is a reality and the threat to property, assets and people is tangible. Surveillance and security systems are an essential part of every responsible business. The ROI can be found in the form of protection against, prevention of, and early detection of threats.

However, surveillance equipment that is sufficiently advanced can also be used to directly add value to a business. With the right intelligence driving them, cameras can be used to identify specific behaviour and trigger alerts. For example, alerts can be triggered when queues in a retail store become too long, or the movement of customers in a store indicates preferences for certain goods, leading to the decision to stock them more often.

Surveillance as a service

Organisations not looking to make a heavy investment into infrastructure can look at subscription-based solutions, which offer the option to make security and surveillance an operational expenditure (OpEx) item.

In order to maximise the effectiveness of the solution, it will be critical to ensure that upgrades are part of the agreement. At a more advanced level, a software-as-a-service solution could also give the business access to solutions that may otherwise be too expensive to deploy. For example, access to a platform that integrates analytics, monitoring facility performance and systems, and alerting the right people if equipment fails or other anomalies occur; or integrates external intelligence, such as Twitter feeds, to provide real-time alerts of potential threats, such as strike action.

It is important to note, though, that when using a subscription service, organisations need to remain aware of the risk and ensure they keep their options open. By financing the security equipment separately, for example, and building SLAs and exit clauses into the subscription contract, the business is not tied to any one provider. At the same time, building a relationship with a security provider is important. Over time, a specialist provider will get to know the business, assisting it to identify risk and address it, applying the most suitable technologies – technologies that may well add considerable value to the business.

Risk and reward clauses based on the objectives of the customer can be built into the contract, incentivising the provider to perform well and add value to the business. As with any service provider contract, the business should ensure it is can quickly recover and remedy the situation in the case of the provider not delivering on the contract requirements or going out of business.

For more information contact Johnson Controls, +27 (0)11 921 7141, neil.cameron@jci.com, www.johnsoncontrols.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Edge AI-powered night vision
Surveillance Products & Solutions
By eliminating the need for supplemental lighting, the VIVOTEK Chroma24 low-light full-colour AI camera series provides quiet, unobtrusive protection, while also reducing power consumption and minimising impact on people, ecosystems, and the environment.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
CAA-compliant ground drone outsourcing
Surveillance IoT & Automation
South African mines, estates, utility companies, independent power producers, ports, municipalities and others can now own and operate a CAA-compliant drone dock ground station in just six to eight weeks.

Read more...
AI-powered classification across large areas
Axis Communications SA Surveillance Products & Solutions AI & Data Analytics
Axis Communications announced the upcoming launch of two innovative radars. Each device delivers a 180° or 270° horizontal field of detection, with accurate AI-powered classification across large areas, 24/7, in all weather and lighting conditions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.