Return on security investment

October 2010 Integrated Solutions

Investments in security not only protect companies from break-ins and theft but also monitor and improve critical processes, such as the availability of communications networks or the power supply. Further, such security technology can ensure the trouble-free operation of a complete supply chain. Through the intelligent integration of systems management tools a latent wealth can be added to companies. That is why more and more companies make use of these.

If insufficient security measures are taken, the reputation of a company or a brand name can be endangered. That must be avoided because a brand name is one of their most valuable assets and protecting it has the highest priority. This means that companies must always deliver products and services to their customers punctually and with consistent quality. A negative change, either through manipulation or other influences, or failed deliveries can lose customers to alternative suppliers. In addition, the image of the brand name would be tarnished. Of course, companies must protect themselves in advance against damage from theft or vandalism. However, the most benefit does not lie therein, but in the combination of security aspects with other operational processes. The added value available can only be appreciated by security managers when they look more closely at the various business activities of their company. Then they discover possible synergies between security applications and other business processes.

If these are combined correctly, they can significantly affect a company‘s value, according to a study by Knights and Pretty. Companies were examined in which there had already been major security issues. Those that had taken adequate security measures could raise their company value by an average of 30% within one year of the event; by contrast the company value sank by an average of 20% in those firms that had not invested in the appropriate measures. Francis D’Addario, member of the Security Executive Council and principal at Crime Prevention Associates, a US consulting firm dealing with the minimisation of security risks, sees the objective of a 'Layered Security Support Mission' in making the processes and the supply chain of companies more secure, in addition to providing security for personnel and assets, thus enabling companies to execute all operational processes without interruption.

Remote status and control

Competitive pressure is particularly strong in the telecommunications industry and network operators ensure that their network is always available, otherwise there is a danger that customers will look for another provider. The network providers must also constantly reduce their operational costs. Therefore leading companies in the industry, such as Vodafone or Wind, combine modern theft or vandalism protection at their unmanned antenna sites with other processes such as surveillance, remote diagnosis and control as well as optimisation of the power supply or air conditioning. In this way they improve the availability of their networks by 1% or 2%, which not only makes happy customers but also brings more revenue and reduces network operation costs. Overall the network operators achieve a very good return on investment.

For this they use a solution developed by Siemens called Intelligent Shelter, an integrated security and operations solution for remote operation of unmanned cellular network antenna sites. It monitors and controls not only the security elements such as access control, video and alarm systems and fire protection but also operational elements such as the power supply, emergency generators, batteries, aviation warning lights and climate control. So most of the necessary tasks, in the event of an alarm, technical failure or preventative maintenance, can be carried out from the control room. When work is being carried out on site, the system informs precisely which technician found which sub-systems in what condition upon arrival and how he left them, so every service visit is well audited. Depending upon the topographical situation, the local road infrastructure and also the salary scales, combining security technology with network operations enables running costs to be reduced by up to 40% and a return on investment obtained within two years.

Securing the supply chain

Years ago it was not possible to track the shipping routes of goods from dispatch to their final destination. Today, technologies such as RFID and video surveillance enable perfect monitoring of shipping paths and corrective action should this become necessary due to unforeseen circumstances. Delayed shipments or damaged goods can be detected early so that adequate countermeasures can be taken, making certain that the customer will receive the goods on time and in perfect condition.

Starbucks is one of the leading buyers, roasters, suppliers and marketers of coffee. It successfully piloted integrated operational guidelines with advanced security technologies to ensure risk mitigation in priority trade lanes. One of Starbucks’ main concerns is that coffee beans reach their destination in perfect condition, an important quality assurance criterion since the taste of coffee should never change. So all persons and processes along the path of the coffee beans from the plantation – often in high-risk countries – through the supply chain stakeholders as well as companies supplying the technical equipment and all traders and shippers right up to the coffee cup are monitored and protected. Risks that threaten the production process or could adversely affect the coffee taste are minimised.

Containers, security installations and customs documents are monitored, enabling the company to satisfy compliance guidelines, such as C-TPAT (Customer Trade Partnership against Terrorism), ISO standards, Customs Video Compliance, and Process & Goods Authentication.

Enormous added value

This consistent security-related optimisation of the supply chain has resulted in every process being redesigned for cost optimisation. In particular, the amount of manual intervention could be reduced. Conversely it is the application of security technology such as RFID (radio frequency identification), access control or video surveillance for operations optimisation that brings the deciding customer benefits. D’Addario demonstrated that benefits resulting from a US$7 million investment amounted to US$14,36 million, returning US$2,04 for every dollar invested. As a result, profits rose by 20% from US$35 to US$42 million in a business sector characterised by low margins.

Security managers are able to achieve enormous added value for their companies by understanding a 'Layered Security Support Mission' that sensibly brings security applications and other business processes together.

For more information contact Siemens Southern Africa, +27 (0)11 652 2412, [email protected], www.siemens.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

ArxTech: Over 30 years of evolving security solutions for South Africa’s toughest challenges
Security Services & Risk Management Integrated Solutions
[Sponsored] For over 30 years, a Centurion-based company has helped shape how security technology is designed, deployed, and supported in South Africa. Originally known as CellSecure, it now operates as ArxTech.

Read more...
Innovations shaping the safety and security landscape
Integrated Solutions Products & Solutions
TMT Services and Supplies is excited to connect with all attendees, share insights, and explore the latest trends and innovations shaping the safety and security landscape.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Cape Town estates gain access to advanced security technology at Securex
Securex South Africa News & Events Integrated Solutions
For the first time, estate and complex security decision-makers in the Western Cape will have direct access to the breadth of solutions and expertise these shows are synonymous with.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Making drone security more accessible
Editor's Choice Integrated Solutions Residential Estate (Industry) AI & Data Analytics IoT & Automation
Michael Lever discusses advances in drone technology, focusing on cost reductions and the implementation of automated services, including beyond line of sight capabilities, for residential estates with SMART Security Solutions.

Read more...
View from the trenches
Technews Publishing SMART Security Solutions Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
There are many great options available to estates for effectively managing their security and operations, but those in the trenches are often limited by body corporate/HOA budget restrictions and misunderstandings.

Read more...
SMART Estate Security Conference KZN 2025
Arteco Global Africa OneSpace Technologies SMART Security Solutions Technews Publishing Editor's Choice Integrated Solutions Security Services & Risk Management Residential Estate (Industry)
May 2025 saw the SMART Security Solutions team heading off to Durban for our annual Estate Security Conference, once again hosted at the Mount Edgecombe Country Club.

Read more...
Community-centric security architecture
Regal Security Distributors SA Integrated Solutions Residential Estate (Industry)
Securing any large area, whether it is a commercial park or a residential estate, is as much about protecting and monitoring the internal environment as it is about protecting the perimeter.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.