Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Business Story: Outsourcing Makes ROI Sense

By Pamela S. Singleton
August 1, 2006
Outsourcing security allows enterprises to push off operational costs as well as expertise in protection technologies.


In today’s climate of heightened concern for security, chief security officers, building owners and managers ask hard questions about the costs of effective building security systems and the resulting return on their security investment.

Once installed, “run-it-yourself” security systems become the responsibility of building owners and managers, who often have to create a technological infrastructure and hire or assign staff to run the system--24 hours a day, seven days a week, 365 days a year. To address the requisite elements of installing, operating, and managing a reliable, functional security system, owners and managers are faced with multiple layers of costs, from purchasing equipment, to monitoring alarms and revoking access cards, to ensuring prompt repairs, to providing for system operation in an emergency.

A better alternative to installing run-it-yourself security systems is outsourcing security system operation and management to experts. Outsourcing allows building owners and managers to significantly reduce their costs, provide better security for their employees and tenants, and eliminate the 24/7 headaches of system responsibility.

Analyzing the ROI

A security system’s return on investment varies significantly depending on whom the building owner elects to run the system over its lifetime. The cumulative savings generated by outsourcing to experts the operation and management of a building’s security system are significant compared to running the system in-house. Outsourcing lowers costs more than 35 percent over a six year period – the estimated life of a typical run-it-yourself system.

Anticipated costs, hidden costs

Building owners ask, “How much will my building’s security system cost?” as they anticipate the obvious expenses such as system design, installation, maintenance and security officers. But in fact, the true cost of a security system involves a host of other, less obvious expenses: the costs of running the system on an ongoing basis. With outsourcing, all of the obvious and not-so-obvious costs are included in one outsourced operations fee each month.

Monitoring of all building systems can easily be outsourced.

Obvious costs

Design and Installation: The cost of system design and installation for a run-it-yourself system will be higher than an outsourced system for two reasons. First, a security consultant will charge approximately 20 percent of the system’s purchase price each time he is hired to design a run-it-yourself system, whereas system design is included in the purchase price of an outsourced system. Second, security systems that are installed and run by an outsourced provider will never become obsolete, whereas run-it-yourself systems are typically replaced every six years.

Maintenance: Maintenance costs are comparable for run-it-yourself and outsourced systems, but clients may have to wait hours or days for service from a third-party vendor, while an outsourced provider employs service and maintenance technicians 24/7/365 to respond quickly to calls, including after hours, weekends and holidays.

Security Officers: With an outsourced security system monitored by experts 24/7, fewer on-site guards are required to monitor and initiate the appropriate response to alarms and critical events.

Not-so-obvious costs

Ongoing Monitoring: Run-it-yourself systems often hire an external provider to monitor only the fire panel. Outsourcing security system operation and management encompasses ongoing monitoring of all alarms, including fire, life safety and other critical mechanical systems, as well as propped door, intrusion and tamper alarms.

Ongoing Administration: A run-it-yourself system generally requires an inhouse security staffer's time for several days each month to issue and revoke access cards and run visitor and employee tracking reports. Outsourcing allows employees to focus on their primary responsibilities instead of security system administration.

Ongoing Programming: Owners must hire a programmer for several hours each month to respond to constantly changing building and tenant needs, such as programming perimeter doors to lock at a different time on a particular day. An outsourced security system includes this ongoing programming as part of the overall fee.

Ongoing Operations: Emergency generators, redundant computers and a 24/7 security or IT staff are required for the physical infrastructure of a security system to operate properly. With a run-it-yourself system, the security, network administrator or building engineer is responsible for troubleshooting, which interferes with their other responsibilities.

Ongoing System Changes/Upgrades: Systems software and hardware must be continuously updated to avoid system obsolescence, without disrupting system operation. All changes and upgrades must be done within the context of the system’s existing configuration to ensure it remains functional.

The Bottom Line: Outsourcing reduces costs and improves ROI significantly.

Lower cost is only one benefit of outsourcing. Office building owners and their security executives report that by outsourcing, they are able to focus on more business- and security-centric tasks. Higher rates of tenant retention result from tenants having confidence in their building’s expertly-run security system. With a thorough understanding of the hidden, as well as the obvious costs of a security system over its lifetime, building owners and managers can make an educated decision regarding how their system is run. The facts are clear: Hiring an outsourced expert to operate and manage a security system will have a significant, positive return on investment.

Property management companies use security video technology to protect stores and malls.

SIDEBAR: Branch Properties Uses IP Video at Roswell Town Center

“The city government is thrilled that Branch owns the center because they know that we have made both a financial and personnel commitment to the community. We have cleaned up the center and invested in the security services that make it a safe place for the patrons. It improves the overall quality of the community.” - Dena W. Hughes, senior property manager, Branch Properties LLC

Challenges – Roswell Town Center has an entertainment complex open in the evenings that attracts crowds of young people. The community youth enjoy these public facilities, but sometimes get carried away. Ensuing problems include drunkenness, disorderly and inappropriate behavior, fights, graffiti, vandalism, car break-ins and minor accidents.

Solution – Incom Interactive Surveillance has installed 8 Axis network cameras and 2 stationery ones running through an Axis 240Q video server. All are centrally monitored 24/7 by Incom operators using Milestone XProtect software. The operators also take emergency calls from call boxes Incom has set up around the center. A policeman is on duty weekend nights, and keeps in touch with the Incom surveillance operator, as well. Branch property managers also have remote access to the surveillance system, and receive daily event reports from Incom.

Advantages – Branch Properties has better control over the security situations and are able to provide faster response and evidence for resolving issues. The safety of people and the protection of property are ensured round-the-clock.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pamela S. Singleton is vice president at Kastle Systems. Headquartered in Washington, D.C., Kastle Systems has offices in Chicago, Dallas, Houston, Los Angeles, New York, Philadelphia, and Sydney, Australia. More information at www.kastle.com.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Tracking Assets Makes Business Sense

    See More
  • Motion Detection that Makes Security Sense

    See More
  • Video analytics feature image

    Under Analysis, Making Business Sense of It All

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing