Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

It’s Time for a Proposal!

By Joel Jensen
February 1, 2010

Not a wedding proposal, unless you already had that in mind. Last year I discussed the additional services many security integrators are adding in response to changes in the economy. Those service offerings continue to increase in variety and creativity, especially at the enterprise level.

OK, so you’re perfectly satisfied with your current integrator and/or in-house software administrators and field technicians. Perhaps you are facing some budget reduction efforts that are affecting your ability to retain an in-house staff. Well, whatever your situation, I would recommend that you invite different security integrators and vendors, door hardware manufacturers representatives, identification and visitor management specialists and perhaps even extended warranty providers – typically insurance companies, to stop by and let you know what they have to offer. There are varying reasons for doing so and approaches to accomplishing part or all of the above.

First, let your existing integrator and in-house personnel know that you are going to embark on the search I am suggesting. If you’re satisfied with you are working with – let them know that. In that case, explain that you are just gathering information and aren’t planning changes without considerable discussion with them. If you aren’t quite sure about your existing relationships, let them know that as well. It’s an obvious way to encourage improvement. We’re busy people as leaders in the enterprise. I’m rereading what I am suggesting and I know that I wouldn’t have the time to accomplish all of that work.

First, select which of your partners you want to compare, integrators or door hardware representatives for example, maybe more than one or two. There are many of the organizational, logistics and research tasks that can be delegated. Next step: perform or delegate the research. A great launching pad for research is to hand a designee a stack of current and past issues of this magazine, for example. 

Request an executive summary of the research, select a few integrators to invite based on that research and your personal choices, and have an administrative assistant schedule the meetings and organize the logistics. This is one approach.

Another approach is to generate an RFP, a Request for Proposal. For this type of project, one form of RFP to generate would be one of a broad and open format. Include a list of your challenges and be clear that you are seeking solutions from the responders. On the other hand, if you have a very specific challenge, for example, costs, a more comprehensive and detailed RFP would be in order. I encourage you to include language in your RFP that, in addition to a written proposal, on-site interviews may be conducted.

The third approach I’ll offer is to hire a security consultant. You may already have a relationship with or know a trusted colleague who would perform this work. I’ve been involved with using an RFP process to select consultants. One very effective RFP for this type of review that I was involved included seeking an architectural firm to select a security consulting partner who would provide suggestions and solutions. 

Ultimately, these results could be incorporated into building and remodeling standards. Of course, that will be the most costly approach; however, it may be what you need. It’s never a bad idea, in my opinion, to seek someone outside of your organization who has the proper credentials and background to review any or all of your practices. What may be unusual in what I’m proposing is using an outside source to essentially review the success of your existing purchasing practices and integrator relationships. 

Whatever method you choose, if you decide to move forward, be certain to include your existing standards and best practices in the information that you provide. That information can be considered and reviewed as well, and no one will know better than you and your staff as to which of those practices cannot be disregarded.

The bottom line before embarking on anything I’m suggesting is to respect people’s time – your time, your staff’s time, and that of the integrators and your vendors. If you are not going to be able to make changes, the work I’m suggesting would be pointless. That being said, I know I am not alone in recognizing that recommendations that are made from an “expert” outside of one’s own organization, especially those in writing, tend to increase the funding priority of the proposed solutions.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Jensen is the associate director of security at Minnesota State University, Mankato, and in addition, serves as the system administrator and project manager for the University’s access control system, radio communications systems and two networked video systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Water faucet and cup

High Water Mark: CISA Shares Foundations for Effective Cybersecurity and Risk Management

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Video Verification: Use it Wisely!

    See More
  • It’s 2010: Be Careful with your Convergence

    See More
  • When It’s Time for a Holistic Hospital Security Assessment

    See More

Related Products

See More Products
  • Physical Security and Safety: A Field Guide for the Practitioner

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing