Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Enterprise-Wide Alignment Drives Contract or Proprietary Decision

By Bill Zalud
February 1, 2007
The mission of security officers has expanded and embedded more deeply in the enterprise. Photo courtesy of Wackenhut Corporation


While the debate continues between contracted and proprietary officer operations at the nation’s largest enterprises, those of both sides of the argument stress the need for quality personnel, continuing training and a constantly expanding business-centric role for security officers beyond typical patrols.

Contract security has its place. But is that place with you organization?, questioned Brad Hellums, CPP, CPO, security manager, Trammell Crow Company, and one of Security Magazine’s 25 Most Influential executives in 2006.

“In the beginning, shopping mall security was low on the totem pole,” said David Levenberg, CPP. “Over the years, there has been a tremendous increase in the amount of attention paid to mall security because the public has made it so. The keys today include training and professionalism of the people being hired. If I have to choose one reason for success, it centers on the relationship with the vendors we work with,” Levenberg contended.

He is vice president of security and loss prevention for General Growth Properties, the second largest U.S.-based publicly traded Real Estate Investment Trust (REIT). General Growth currently has an ownership interest in or management responsibility for a portfolio of more than 200 shopping malls in 44 states, as well as ownership in planned community developments and commercial office buildings. The portfolio totals approximately 200 million square feet of retail space and includes more than 24,000 retail stores nationwide.

Nicholas Luciano of Hannon Security Services advises that “Not all contract security firms are created equal.”

BALANCING THE PLAN

With such an intense and sprawling mission, Levenberg depends on contracted firms for parking lot, parking garage and public area security. In malls, typically tenant stores provide their own level of security in their areas.

David Levenberg’s experience with contract officer firms is mirrored in the details of a national stuffy conducted just a few months ago.

According to the results, nearly six in ten security executives (56 percent) who are Security Magazine readers contract their guarding needs while another 24 percent have a mix of proprietary and contracted officers. While most of those surveyed by Clear Seas Research for Security Magazine (61 percent) have 25 or less contracted security officers, eight percent of survey respondents who contact officers have 250 or more officers assigned.

There is evidence that contract guarding services will grow in the future. While nearly six in ten (59 percent) who contract out the service say the number of officers will stay the same in the future, a healthy 26 percent report they intend to increase officer ranks.

Electronic security has added a new dimension to the tasks and training of security officers.

Over the years, chief security officers have continued to diversify the services provided by contracted officers.

Going beyond the typical patrols, contract security officers cover building lobbies (61 percent), monitor a central station (37 percent), investigate incidents (31 percent) and provide courier services (18 percent). Based on results of the Clear Seas Research for Security Magazine, there also is growth in the use of contracted officers as executive bodyguards.

Quality of the service and pricing are the top reasons that would trigger a change in the contracted guard firm. Two-thirds of respondents who have contracted officers say that a negative event would be the trigger, while 38 percent say that a price increase who make them consider another guard firm.

EMPLOYEE ADVANTAGES

On the other hand, many security executives see value in hiring their own officers.

“Security providers are abundant, and there is a price to fit every need. But what seems to suffer most with a drop in price is the commensurate drop in quality. To be sure, contract security has its place. But is that place with your organization?” questioned Brad Hellums, CPP, CPO, security manager, Trammell Crow Company, and one of Security Magazine’s 25 Most Influential executives in 2006.

Hellums suggested that CSOs consider six elements:
  1. How well trained are the people you are looking to put in your organization?
  2. How vested are they in the success of your organization?
  3. What guarantee is in place that good people will be retained?
  4. What incentives can a low paid employee find to continue at your organization if the financial rewards or benefits are non-existent with the contractor?
  5. What image does your organization wish to project to its customers or clients?
  6. Is it important to see the same people regularly, or is constant rotation of people at your location acceptable to you and your customers or clients?


Contended Hellums, “Proprietary employees work for you. They share in the responsibility of making the company a success. They have an interest that goes beyond a ‘contract’ in the successful completion of a task. As a result, they are well trained and competent. They are better compensated with a competitive benefits package. Because of this, their retention rates are high.”

John Rankin, CPP, of G4S Security Services (Canada) Ltd., realizes that deciding between using an outside contractor to provide security and going “in- house” has challenged many managers over the years.

“The reality though, is that most security contractors have developed efficiencies in order to compete in a low margin; volume based business in order to support the necessary overheads, and modest profit and to deliver a quality security officer to their client. If a detailed comparison was taken of in- house security versus contract with pay levels being equal, it is my belief that there would be little to no cost advantage and contract security would attract a higher quality officer as well as better trained and motivated,” said Rankin.

CONTRACT ADVANTAGES

Rankin has his own points that point to contract security.

Training: who will be the trainer? Will they be competent to train in many security functions; where will the courses come from? Will they meet government standards?

Human Resources: Who will hire, background check, license, maintain records, scheduling, deal with unionization, discipline or terminations?

Liability: who will take responsibility in a legal action? Has everything been done in order to not be found negligent and have all aspects been addressed in relation to personal safety? Have we met minimum standards on training; do post orders cover all aspects related to the specific job specifications?

Backup: who will cover for vacation, illness, last minute book off, no shows, resignations, and emergencies?

Supervision: How will you ensure all shifts are supervised; who can attend the site after hours in case of an emergency?

“Many contract security agencies are well prepared to provide quality service at a price comparable to in-house. I would urge all security professionals to consider detailed analysis when making this important decision.” said Rankin.

Nicholas Luciano of Hannon Security Services also sees value in contract security officers but with a twist. “Not all contract security firms are created equal. It is the responsibility of the buyer to properly research and hire a quality security firm with a solid background. The phrase ‘you get what you pay for’ is especially true when it comes to hiring people who manage other people. Hire a partner, not just a vendor.”

“Contract security companies recruit, screen, hire, train and supervise security personnel. From the time we wake until the time we go to bed, and sometimes in the middle of the night, everything we do is all geared to enhancing the tasks we perform. If security is not your company’s core competency, this job will be better performed and supported by people who focus on it relentlessly,” he pointed out.

Another element – Outsource to stay competitive. “Leading companies worldwide realize that in order to stay ahead, they need to operate efficiently. One way to do this is to shed every responsibility that keeps them from that focus. A good contract security provider will help keep a company’s focus on the product or service they sell. Let your contract security provider worry about recruiting, staffing issues, vacations, record keeping, employee benefits, writing post orders and terminations.”

Complementing Security Magazine’s guard survey, Luciano also sees that a contract company will be able to provide additional resources that will enhance an enterprise security department or program, (i.e. investigations, security audits, executive protection, patrol services or alarm response services). He added, “A good contract security provider can share best practice policies and procedures and connect you with other similar companies to promote networking.”

About the Survey

All research findings/results included in the above article are from the Clear Seas Research 2007 Contract Guard Study. For more information about these and additional findings found in the comprehensive study, including report pricing, please refer to www.clearseasresearch.com, write: info@clearseasresearch.com or contact Renee Love at (248) 786-1581.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Photo courtesy of G4S Secure Integration; access control, ID badges, security integration, university security, security technology

    Access Control is Only the Beginning for Multi-Function Cards

    See More
  • Guy Grace

    Retrofit Fits the Bill for Outdated Security Technology

    See More
  • cards feat

    Adding Value by Adding Functions to Cards and Badges

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!