Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Open Dialogue to Keep Cost Down

By Joel Jensen
April 1, 2009

One concern that I’ve heard repeatedly from security integrator representatives is a fear of appearing to add extras to drive up their commissions and company profit margins by suggesting changes and additions to a customer specification or RFP. These are often options that, based on their experience, will enhance the overall solution sought by you, the security director. They’re even more leery to suggest additional hardware or labor now when bottom line prices are more attractive than ever and our thinking is becoming increasingly myopic toward short-term goals based on lean budgets.
     
Be up front with your integrator competing for your business. Encourage open dialogue early on, as you are engaging in important discussions at this point. Let them know that alternates to their base bid with justifications to provide a user friendly, reliable, secure and robust access control and identity management solution will be welcomed. You don’t want to discover later that the fifty dollars per door you saved today results in a very costly change order during installation, or worse, a pricey “remodel” of the installation later on. Yet, you still have the ability to easily tailor the solution by accepting or rejecting alternates versus starting the procurement process over because no response falls into your budget. Accept a rough-in for proposed alternates so you can add them later, when your budget allows, without having additional cables pulled.


Best Practices Could Mean Best Service

Ask your integrator for a copy of their best practices for access control and integrated security system software, programming, photography, badging and hardware installations. Some integrators may be parties to a manufacturer’s agreement to hold these as proprietary – that doesn’t necessarily trigger a red flag, and it is likely based on the specific nature of a particular brand or line of access control solutions. Yet, remain assertive – you have the right to understand what you may be purchasing.
     
Often, the integrator with the longest list of best practices will submit the highest quotation. Those costly or value-added practices may benefit your operation considerably and their ROI recouped promptly. Alternatively, there may be practices and standards in that list that do not benefit you at all. Discuss these with your integrator. It will be worth your time as well as theirs.
     
Review best practices of various integrators, solicit your colleague’s best practices and highlight those that are applicable to your operation or particular installation. Meet with your maintenance and repair staffs and solicit their input. If you rely on your integrator for maintenance and repair, ask that they bring along their project manager, service manager, installers and repair technicians when presenting their proposals to you – or at least enough representation from such a group as is practical. Conference calls or Web meetings can accomplish the same end result. Gather the data and then develop your own best practices based on those highlighted and presented line items, or incorporate them into your own existing standards and practices boilerplate.


Keep Your Best Practices Live

Your best practices and standards should be living documents. I keep a folder on my desk labeled, “Best Practices/Standards” for each system that I manage. I fill folders with clippings from trade magazines, pages from industry standard publications. I include standards and practices that I’ve obtained from integrators and I write my own. I’ll gather them electronically so I can cut and paste them into specifications. I’ll toss in some repair tickets that resulted in a critical failure and write in a solution to add in the future.      

For example, an early entry into my folder was caused by more than one instance of access control cables being burned through by a plumber’s torch in mechanical equipment spaces. New best practice: Cables/fiber traversing designated mechanical spaces shall be protected in four inch diameter EMT (conduit).
     
Due to frequent remodeling on my campus, I specify that all door controllers be housed in a heavy duty enclosure, placed in a data closet on each floor of a building and all access control cables on that level shall be homeruns to that enclosure. In smaller buildings, the main controller and door controllers are housed in one location and all cables are homeruns to that room. That way, a door controller board isn’t mounted in what is a ceiling today and may become tomorrow’s wall.
     
Do cable homeruns cost more? Absolutely! Do they save hours of fruitless labor searching for a failed controller that is now encased in some concrete tomb? Absolutely! Downtime is reduced. Total cost of ownership is reduced. This practice simplifies troubleshooting failures for your in-house techs or your integrator’s technicians, thus saving downtime and labor costs and increasing your satisfaction. Your system documentation and CAD drawings will be simple and more understandable as well.
     
Now more than ever, you are partners with your integrator. Their reputation is in your keeping and your reputation is in theirs.  

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Jensen is the associate director of security at Minnesota State University, Mankato, and in addition, serves as the system administrator and project manager for the University’s access control system, radio communications systems and two networked video systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hello to the Future of POE

    See More
  • Ready to Tailgate?

    See More
  • Minor Details Can Lead to Major Expenses

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing