Return on security investment

October 2010 Integrated Solutions

Investments in security not only protect companies from break-ins and theft but also monitor and improve critical processes, such as the availability of communications networks or the power supply. Further, such security technology can ensure the trouble-free operation of a complete supply chain. Through the intelligent integration of systems management tools a latent wealth can be added to companies. That is why more and more companies make use of these.

If insufficient security measures are taken, the reputation of a company or a brand name can be endangered. That must be avoided because a brand name is one of their most valuable assets and protecting it has the highest priority. This means that companies must always deliver products and services to their customers punctually and with consistent quality. A negative change, either through manipulation or other influences, or failed deliveries can lose customers to alternative suppliers. In addition, the image of the brand name would be tarnished. Of course, companies must protect themselves in advance against damage from theft or vandalism. However, the most benefit does not lie therein, but in the combination of security aspects with other operational processes. The added value available can only be appreciated by security managers when they look more closely at the various business activities of their company. Then they discover possible synergies between security applications and other business processes.

If these are combined correctly, they can significantly affect a company‘s value, according to a study by Knights and Pretty. Companies were examined in which there had already been major security issues. Those that had taken adequate security measures could raise their company value by an average of 30% within one year of the event; by contrast the company value sank by an average of 20% in those firms that had not invested in the appropriate measures. Francis D’Addario, member of the Security Executive Council and principal at Crime Prevention Associates, a US consulting firm dealing with the minimisation of security risks, sees the objective of a 'Layered Security Support Mission' in making the processes and the supply chain of companies more secure, in addition to providing security for personnel and assets, thus enabling companies to execute all operational processes without interruption.

Remote status and control

Competitive pressure is particularly strong in the telecommunications industry and network operators ensure that their network is always available, otherwise there is a danger that customers will look for another provider. The network providers must also constantly reduce their operational costs. Therefore leading companies in the industry, such as Vodafone or Wind, combine modern theft or vandalism protection at their unmanned antenna sites with other processes such as surveillance, remote diagnosis and control as well as optimisation of the power supply or air conditioning. In this way they improve the availability of their networks by 1% or 2%, which not only makes happy customers but also brings more revenue and reduces network operation costs. Overall the network operators achieve a very good return on investment.

For this they use a solution developed by Siemens called Intelligent Shelter, an integrated security and operations solution for remote operation of unmanned cellular network antenna sites. It monitors and controls not only the security elements such as access control, video and alarm systems and fire protection but also operational elements such as the power supply, emergency generators, batteries, aviation warning lights and climate control. So most of the necessary tasks, in the event of an alarm, technical failure or preventative maintenance, can be carried out from the control room. When work is being carried out on site, the system informs precisely which technician found which sub-systems in what condition upon arrival and how he left them, so every service visit is well audited. Depending upon the topographical situation, the local road infrastructure and also the salary scales, combining security technology with network operations enables running costs to be reduced by up to 40% and a return on investment obtained within two years.

Securing the supply chain

Years ago it was not possible to track the shipping routes of goods from dispatch to their final destination. Today, technologies such as RFID and video surveillance enable perfect monitoring of shipping paths and corrective action should this become necessary due to unforeseen circumstances. Delayed shipments or damaged goods can be detected early so that adequate countermeasures can be taken, making certain that the customer will receive the goods on time and in perfect condition.

Starbucks is one of the leading buyers, roasters, suppliers and marketers of coffee. It successfully piloted integrated operational guidelines with advanced security technologies to ensure risk mitigation in priority trade lanes. One of Starbucks’ main concerns is that coffee beans reach their destination in perfect condition, an important quality assurance criterion since the taste of coffee should never change. So all persons and processes along the path of the coffee beans from the plantation – often in high-risk countries – through the supply chain stakeholders as well as companies supplying the technical equipment and all traders and shippers right up to the coffee cup are monitored and protected. Risks that threaten the production process or could adversely affect the coffee taste are minimised.

Containers, security installations and customs documents are monitored, enabling the company to satisfy compliance guidelines, such as C-TPAT (Customer Trade Partnership against Terrorism), ISO standards, Customs Video Compliance, and Process & Goods Authentication.

Enormous added value

This consistent security-related optimisation of the supply chain has resulted in every process being redesigned for cost optimisation. In particular, the amount of manual intervention could be reduced. Conversely it is the application of security technology such as RFID (radio frequency identification), access control or video surveillance for operations optimisation that brings the deciding customer benefits. D’Addario demonstrated that benefits resulting from a US$7 million investment amounted to US$14,36 million, returning US$2,04 for every dollar invested. As a result, profits rose by 20% from US$35 to US$42 million in a business sector characterised by low margins.

Security managers are able to achieve enormous added value for their companies by understanding a 'Layered Security Support Mission' that sensibly brings security applications and other business processes together.

For more information contact Siemens Southern Africa, +27 (0)11 652 2412, [email protected], www.siemens.co.za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Future trends for electronic safety and security in mining
Fang Fences & Guards Mining (Industry) Integrated Solutions AI & Data Analytics
The mining industry is ever evolving, driven by technological advancements and the growing need for enhanced safety and security measures, with significant innovation seen in turnkey electronic security for mining operations.

Read more...
Unlocking enhanced security for mining
Mining (Industry) Integrated Solutions
In the dynamic landscape of African mining, security remains of paramount concern as threats evolve and challenges persist, and mining companies seek innovative solutions to safeguard their operations, assets, and personnel.

Read more...
A constant armed struggle
Technews Publishing XtraVision Editor's Choice Integrated Solutions Mining (Industry) IoT & Automation
SMART Security Solutions asked a few people involved in servicing mines to join us for a virtual round table and give us their insights into mine security today. A podcast of the discussion will be released shortly-stay tuned.

Read more...
Access and identity in 2024
Technews Publishing Gallagher HID Global IDEMIA Ideco Biometrics Enkulu Technologies neaMetrics Editor's Choice Access Control & Identity Management Integrated Solutions
SMART Security Solutions hosted a round table discussion with various players in the access and identity market, to find out what they experienced in the last year, as well as their expectations for 2024.

Read more...
Advanced security solution for high-risk areas
Secutel Technologies Surveillance Integrated Solutions
The need for a sophisticated intrusion detection system is paramount when faced with persistent security challenges, particularly in isolated battery rooms or high-risk areas prone to vandalism, cable theft, and battery theft.

Read more...
Vumacam and NAVIC enhance SafeCity initiative
Integrated Solutions Security Services & Risk Management
Vumacam and NAVIC, two of South Africa's most respected surveillance technology and vehicle intelligence providers, are proud to announce an alliance that will greatly expand the coverage and impact of the SafeCity initiative across the country.

Read more...
Gallagher Security’s achieves SOC2 Type 2 recertification
Gallagher News & Events Integrated Solutions Infrastructure
Gallagher has achieved System and Organization Controls (SOC2 Type 2) recertification after a fresh audit of the cloud-hosted services of its integrated security solution, Command Centre. The recertification was achieved on 21 December 2023.

Read more...
Integrated transportation security
Guardian Eye AI & Data Analytics Integrated Solutions Logistics (Industry)
HG Travel installs an AI-powered camera system integrated across 115 vehicles throughout a fleet comprising 160 vehicles of different sizes, along with predictive and self-monitoring tools to track tyre condition, fuel consumption and theft, and overall vehicle maintenance.

Read more...
Embracing next-generation surveillance for safer cities
Surveillance Integrated Solutions AI & Data Analytics
With the South African government highlighting the importance of building smart cities by integrating advanced technologies to make them more resilient and liveable, the role of next-generation network video and surveillance technologies cannot be ignored.

Read more...
Gallagher Security releases Command Centre v9
Gallagher News & Events Access Control & Identity Management Integrated Solutions
Richer features, greater integrations, with the release of Gallagher Security’s Command Centre v9 security site management software designed to integrate seamlessly with various systems and hardware.

Read more...