SECURITY MANAGEMENT SUPPORT A Cost Effective Option

smsi-report-exec

The contemporary concept of Security Management Support provides a reasonable alternative between hiring a Board Certified Protection Professional (CPP) Security Manager with 20 years of diverse security management expertise, and/or a recently retired law enforcement professional with limited security management expertise, but with great potential. (In fact a plurality of security managers come out of law enforcement, but it takes time before they are fully up to speed.) Therefore Security Management Support programs are designed to facilitate that transition, and to play a supportive role going forward. Alternatively, SMS programs provide a number security management options, including moving, someone from within the organization to the position of Security Manager, supported SMS at a net savings to the security budget.

Therefore SMS is designed to play a supportive role to the less experienced security manager at a cost substantially below the salary demands of well a seasoned security manager holding professional certifications.

One of the requirements of effective security management is a full understanding of the business model being served. This requires the ability to speak the language, as well as understand the needs of the organization from the perspective of the C-Suite. This includes an understanding of the budgetary process and the ability to demonstrate ROI for budgetary items such as security personnel, access management systems, surveillance systems and CPTED design, are all subject to cost justification.

Corporate security programs, whether in mall settings, supply chain operations, healthcare facilities, schools & universities, and/or high-rise buildings, and others, requires an understanding of the relevant business models of each, as well as an understanding dynamics of the ambient threat environment for the enterprise.

Security is a situational discipline, meaning, one size does not fit all. Security is also a dynamic discipline that must continually flex and adapt to new threats and emerging trends, as well as emerging technical solutions. What is appropriate today, may not be effective tomorrow. The situational dynamic of corporate security programs is also reflected in the evolving trends embodied in advanced security strategies, including the need to be nimble, and the ability to flex and adapt. The ability to flex is applicable to the application contemporary and emerging security countermeasures, and ensuring synergy between emergent security technology and security personnel. This also requires the early identification of new developing trends in the threat environment and the required mitigating responses.

On the cost continuum, security personnel is always the most costly security countermeasure because it is a reoccurring expense (payroll, taxes, insurance, etc.). This means that goal should be keep payroll costs to a practical minimal level, while at the same time, increasing the impact of security personnel through the application of appropriate security technology. This also means attaining a goal where the whole is always greater than the sum of the parts.

Over the past few years, two things have happened: Security technology has significantly improved, and that technology has come down in cost. Remember how much one low-light, movable, video surveillance parking lot camera cost twenty years ago, as compared to the networkable camera of today. Despite these advancements, many security programs remain burdened with less than contemporary security programs with burdensome overhead, and in many cases avoidable liability exposure.

Security Management Support (SMS) is a service intended to support those security programs that are looking for cost effective alternative solutions. Because of the situational nature of security, the initiation of this program must be customized to the need-set of each client. For this reason, the best first step, is a comprehensive security review. Once the review process has been completed, SMS may include the development of RFPs and/or vendor selection support. This SMS program would also support the initiation of internal crime prevention strategies that would invite all employees to become part of the solution (A low-cost, but often overlooked strategy). SMS can also be transitional support systems for organizations that are establishing a new security program or reorganizing an existing security program.

Usable data is the key element that ensures the relevancy of any security program. Through the use of Report Exec security management software, the SMS team is enabled to support any local security operations by monitoring Daily Activity Logs and Incident Reports in the cloud, and subsequently suggesting course correction mitigation strategies. Information regarding Report Exec is available at www.reportexec.com

Additionally, the option of sending video images to a 3rd party monitoring center, savings are achieved by reducing the overhead-cost of maintaining an on-site control-center, requiring a minimum of 4.2 FTEs. The use of smart video (video analytics) also becomes a powerful, and cost effective security tool. The offsite monitoring strategy also provides the SMS teams with the ability to review security breaches, analyze them, and subsequently suggest mitigating course corrections, within the framework on budget limitations. These technological services reduces the time and expense that a SMS team member needs to be on-site, including travel expense. Both the Report Exec data and the smart video can be reviewed by the SMS team for initiating specific corrective actions.

As was said at the beginning of this offering, the SMS concept affords the client the services of board Certified Protection Professionals without the attendant overhead. These services will also assure the application of appropriate and cost-effective remedies, as well as the continual evaluation of the present security organizational structure.

The most logical SMS starting point is a security/risk assessment and review, in order to identify specific security needs. This process will determine what is working and what is not working, and what can be done better. During this initial security assessment process a number of security concerns will be reviewed, including, but not limited to:

  • Workplace violence programs
  • Active shooter protocols
  • Police relations & liaison
  • CPTED Design
  • Employee participation
  • Security system design & goals
  • Access Management
  • Security personnel deployment, qualifications and training
  • Security vendor support
    • Surveillance systems
    • Lighting
    • Locks and access control
    • Barriers
    • High value protection

In conclusion Security Management Support is an idea whose time has come, aided and abetted by modern security technology and the ability to operate in the cloud. Security litigation continues to flourish in most states with Texas, California, New York and Florida leading the way. Senseless violence wrought by active shooters and home grown terrorist are part of the mitigation calculus. Workplace violence perpetrated by disgruntled employees, domestic strife migrating into the workplace, and the random acts of common criminals are threats that deserve mitigation strategies. We have a saying in the security profession: The cost of reaction is several times the cost of mitigation.

 This service is offered independent of contract guard agencies or security product vendor. SMS is a customized, need driven service predicated on need.

As usual, your comment are always welcome.

by W. H. Nesbitt, CPP, President SMSI Inc.

Phone: 805-4999-3800 / Email bill@smsiinc.com / Website: www.smsiinc.com