Efficient utilisation of a guard force

November 2013 Security Services & Risk Management

The degree of success of a guarding company is largely determined by the degree of efficiency with which the company’s guard force is applied to the requirements of the company’s clients.

100 percent efficiency with regard to guard force utilisation would mean that the correct numbers of guards, of the correct grades are rostered and posted for the correct number of hours to the correct sites. Furthermore, there should be no overtime, no non-productive time, and each site should deliver the required percentage of profit.

Obviously it is almost impossible to achieve 100 percent efficiency because of ever changing client requirements and guard complements, as well as varying degrees of unpredictability with regard to personnel behaviour. However, the closer a company can get to achieving the 100 percent efficiency target, the happier its clients will be and the lower the wage bill will be.

In order to achieve maximum efficiency with regard to guard force utilisation, it is necessary to consider the following points:

* Legislation with regard to wage determination.

* Number of guards needed to meet client requirements.

* Complement of excess or spare guards.

* The rostering cycle.

* Operational control.

1. Legislation with regard to wage determination

Wages are by far the biggest cost driver in the guarding industry and should therefore be given the most attention when it comes to controls.

The current legislation should be used to determine the most efficient shift pattern that should be used to roster and post guards. The most efficient shift pattern is the one according to which no overtime as well as no non-productive time is accumulated. Taking the current wage determination in South Africa into account, the most efficient shift pattern that can be used is one where a guard works four shifts on and is then off for two shifts. Some companies do however have a collective agreement whereby guards work six shifts on followed by three off shifts.

If the 4-on-2-off shift pattern is being used it is usually better to do the calculation of overtime on a weekly basis (after 48 hours) rather than on a monthly basis (after 208 hours). The reason for this is that a week is always seven days in duration, while some months are longer than others. If you are currently calculating overtime on a monthly basis, you will find that the overtime bill is a lot higher for a 31 day month than for a 30 day month. This problem goes away if you calculate overtime on a weekly basis. If, however, the 6-on-3-off shift pattern is being used, then it is obviously preferable to calculate overtime on a monthly basis.

There are situations where the most efficient shift pattern cannot be used because of client requirements or other operational reasons. An example of this is when a client requires a guard to work from Monday to Friday, in other words, 5-on-2-off. This will mean that the guard will qualify for overtime during each week or month. This is obviously unavoidable, but should be taken into account when preparing a quotation for the client.

2. Number of guards needed to meet client requirements

It is very important to determine the correct number of guards (by grade) needed to meet the requirements of all client sites. The reasons for this are twofold.

Firstly, if there are too few guards then it would mean that some of the existing guards would have to work overtime in order to meet client requirements. This obviously has a negative effect on wage costs. Secondly, if there are too many guards then the company carries unnecessary costs with regard to basic wages, uniforms, provident funds, etc.

Naturally, the shift pattern used to roster guards determines the number of guards that are needed to cover all sites.

3. Complement of excess or spare guards

It is desirable to have a complement of excess or spare guards (usually by area, depending on the level of operational control). These excess guards should also be rostered according to the most efficient shift pattern. The reasons for the excess complement are threefold.

Firstly, to be used as relievers when guards go on leave; secondly, to take the places of guards that are AWOL or sick during a specific shift; and thirdly, to be used to cover ad hoc or temporary requirements that occur from time to time.

It is important that the company decide on an acceptable percentage of guards that should fulfil this role.

4. The rostering cycle

Historically, rostering has been carried out as a manual process without taking all the components of efficiency into account. It is suggested that rostering should really be carried out in a cycle with each iteration of the cycle being used to increase the efficiency of the roster.

In this way a company can ensure maximum efficiency with regard to the utilisation of the guard force by rostering the correct number of guards of the correct grades for the correct number of hours at the correct sites. Furthermore, the roster should ensure that overtime and non-productive time is limited as much as possible and that rostered wage-to-revenue percentages will provide the desired profits.

5. Operational control

All the above-mentioned steps which should be followed to plan for maximum efficiency in the utilisation of a guard force would be worthless if a company did not have effective operational control. Rostering or planning is only one step in the operational process. Once an efficient roster has been compiled, it is imperative that operational managers at all levels ensure that the roster is followed by guards as much as is possible. Otherwise, the effect of all the efficiency planning would be negligible.

Wherever guards do not work according to the roster, excess guards should be used as relief in order to minimise the cost of exceptions.

Making use of biometric devices, either mobile in supervisory vehicles, or static at sites, makes the registration of attendance far more accurate than relying on manual reporting procedures. Other than that, this technology enables real-time reporting which obviously enables operational management to rectify any attendance issues immediately.

Summary

As can be determined from the discussion above, there are quite a number of issues that should be taken into account when optimising the utilisation of personnel and maximising profitability in a guarding company.

Some guarding companies seem to be of the opinion that a simple time-and-attendance system would solve their wage problem. This is definitely not the case. The main contributors to a minimised wage bill are efficient planning and operational control (which obviously includes time and attendance).

It is almost impossible to make the correct management decisions with regard to the above-mentioned issues without the use of a management tool which provides the necessary information to help in the decision-making process. EasyRoster is used by a large number of guarding companies to ensure that guarding operations are planned and controlled efficiently. EasyRoster Deployment Manager (ERDM) may be used as the interface between biometric devices and EasyRoster. ProSync may be used for static or mobile biometric and RFID deployment and has full EasyRoster synchronisation, eliminating duplicate data capture.

Contact EasyRoster Software for more information on EasyRoster and ERDM on +27 (0)12 809 4270 or info@easyroster.net

Contact neaMetrics for more information on ProSync and Suprema biometric devices and biometric deployment on +27 (0)11 781 9964 or enquiry@suprema.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

“This Is Theft!” SASA slams Mafoko Security
News & Events Security Services & Risk Management Associations
The Security Association of South Africa (SASA) has issued a stark warning that the long-running Mafoko Security Patrols scandal is no longer an isolated case of employer misconduct, but evidence of a systemic failure in South Africa’s regulatory and governance structures.

Read more...
Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Privacy by design or by accident
Security Services & Risk Management Infrastructure
Africa’s data future depends on getting it right at the start. If privacy controls do not withstand real-world conditions, such as unstable power, fragile last-mile connectivity, shared devices, and decentralised branch environments, then privacy exists only on paper.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.