Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical Security

Five Steps to a Secure Property

By Mike Beckerich
April 26, 2011

Security managers have many responsibilities and concerns. While keeping their buildings safe and secure is certainly one of them, it need not be a complicated matter. Working with a qualified, experienced security services firm can help a security manager in doing his or her job effectively, and even save money.

Education is the foundation upon which a solid relationship between a security manager and a security services provider is built. The security firm should be a trusted advisor, guiding and consulting management and showing them the many alternatives that exist in security today. So how can you tell that you are working with someone who will assist you in that goal? There are a few telltale signs that let you know you are working with a capable security firm. 

1. The first is that they are willing to fully assess your needs before providing you with a price quote. A reputable vendor should insist on visiting the facility you manage to see how it operates, the configuration of the physical space, and where there are needs for greater, or opportunities to condense security measures.

2. Another sign of a quality security firm is that they ask questions – and lots of them! Speaking with the security manager in depth to ascertain the needs and requirements for that particular building is an absolute “must.” The security vendor can then identify the objectives of the security program and understand any budgetary constraints that may exist so that they can best work around them. In fact, the ability to respect and work within monetary parameters is an important part of any relationship between a security firm and a security manager.

3. Once the scope of work is understood, and the security vendor has a feel for the types and volume of public interactions that exist in a given building, the next step is to make sure that the provider has the appropriate background. Just as you wouldn’t hire an electrician to fix your plumbing, you wouldn’t want to entrust your building to a firm that does not possess the right expertise. The company a security manager hires to safeguard a building should have a good deal of experience in providing services at locations where security and customer service skills are critical factors. The vendor you work with should know the ins and outs of your type of work. They should be able to talk the talk, literally. If they don’t understand your “terms of art,” then they are likely not conversant with your sector.

The ideal scenario is when the vendor can approach security from a comprehensive or “holistic” perspective. Some security firms offer personnel only, such as armed and/or unarmed guards, Fire Safety Directors and Concierge services, while others may specialize in security video, access control systems, intrusion and fire detection and other technology-based solutions. While both types of services are absolutely essential to a security manager and the security of a building overall, there are many benefits to working with a firm that can offer both under one umbrella. A company offering both capabilities is well-versed in combining manpower and technology to maximize the effectiveness of the two components. Otherwise, the decisions as to how best to apply  personnel and equipment are often left up to the security manager, who may not possess the expertise to piece the two programs together in a way that achieves the optimal security program. Technology can assist the building security personnel in doing their jobs more effectively, as well as limit the need for a larger security force on the site and instead place the right number of guards at strategic locations. The correct combination of the two may offer cost savings to the security manager. Also, since the investment in security personnel usually comes from the operating budget whereas technology typically comes out of the capital budget, bundling services into one hourly rate for the security officers can mean more budgetary flexibility. Finally, when a firm is a true “all in one” provider, there is less reason for them to push one type of service over the other.

4. Once a security manager has the right security firm on the task, they will immediately start to realize even more benefits. Redundancies in service can be eliminated by analyzing the overall security program on a day-to-day basis. An outside vendor can offer the new perspective to best review the security procedures and duties of on-site personnel. Such overlap of duties may not be as clear to the security manager who is so close to it. Furthermore, Internet Protocol (IP) cameras can be used to monitor isolated posts where there is no on the ground supervision so that, should an officer be less alert at 2:00 or 3:00 a.m., the command center can contact them and ask them to walk about, for example, thereby ensuring the effectiveness of the security program.

5. Further changes can be made to a security program once it is in place. When a security firm is at a property every day, they will get a better feel for the changing needs at that building and can then recommend adjustments accordingly, possibly identifying further opportunities for savings. Tweaking staffing levels just right can achieve the perfect balance between high service levels and savings. By reviewing the program on an ongoing basis, the security firm can ensure they are giving you the best possible job at the best possible price.

KEYWORDS: comprehensive security plan relationship security firm security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Mike Beckerich is a vice president with FJC Security Services, Inc. For more information on the company, visit www.fjcsecurity.com. 

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The Long and Winding Road to Cyber Recovery

    Five steps to secure your business – From the C-suite to the assembly line

    See More
  • Five Steps to Developing a Healthcare Information Technology Security Plan

    See More
  • implementing zero trust network

    Five practical steps to implement a zero-trust network

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing