Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Contract Security Selection – Identifying the Right Partner

By Randal R. Dorn
June 1, 2012

Selecting the best security officer service provider for your company is a decision that can significantly affect the safety, security and reputation of your organization. A physical security program integrated with technology solutions offers comprehensive support of a company’s employees and financial, intellectual and physical properties. The provider you select needs to be committed to the success of your security program and be seamlessly integrated into your unique organizational culture.

When looking to establish a partnership with a security company, it is important to determine the core elements of a quality-based contracting process that will form a mutually beneficial relationship between you and your security contractor. In a competitive market, it is important to even the playing field and thoroughly understand what you are getting for your dollar. A careful contractor screening process will ensure that specific performance standards appropriate for your organization are established and that you select the best security officer service provider suited to meet those needs. Key steps for contracting success include:

Define the Contracting Process– By defining the internal process and selecting your team, you are ready to address a key question such as ‘which departments will participate and what role will each play?’ Generally the decision-making team includes some or all of the following disciplines: Security, Human Resources, Procurement, Legal and Finance. Determine which individuals from these departments will be involved, who will make the final decision and how much time you will allow for the selection process.

Evaluate Current Environment and Establish Priorities– The potential success of the security officer service provider you hire depends on the evaluation of your company’s current environment and specific needs. To establish your priorities, it is important to first assess your satisfaction level with the current situation. Some questions to consider include assessing the positive and negative aspects of your current security program. Where is there room for improvement? Are you confident that your security officers are properly trained? What are the goals and objectives of your security program and how does your current program impact the achievement of these goals and objectives?

Define Desired Improvements and Define Program Expectations– After a careful evaluation of your current program, the team should itemize desired improvements.  Compare your key objectives with those of other companies in the industry with similar needs. Keep in mind that you can specify many elements of a security program to allow a true “apples-to-apples” comparison of providers. Request a full explanation of medical benefits, training, holidays, vacations and uniforms to ensure that your needs are met and that all bidders are factoring in the same requirements into costs. 

Wages are the most important cost factor in the overall bill rate, so creating a level playing field on the labor cost allows you to best assess the balance of price, quality and value represented by a contractor’s bid. 

Determine the Security Contractors to Include– Utilize a pre-bid questionnaire to narrow your list and invite potential contractors to visit sites where service will be provided. Make sure that your contractor is licensed to provide security services in the states that service is required and that security personnel are licensed and certified. Find out how many years the contractor has been in business and if the company is financially stable. Is the company’s management experienced and stable and does the company deliver services to other companies in your industry of similar size and scope?

Issue Request for Proposal– An RFP should include an introduction that describes your organization and goals and expectations for your security provider. Hours of coverage, duties, equipment, uniforms, insurance coverage, payment terms, etc. should be included. Ask for contractors to submit resumes for management and potential account manager.

Narrowing the Field – Review the proposals to ensure prospective partners have provided comprehensive responses. The best contractors employ tools and techniques to assess their officers’ integrity, reliability, suitability to perform and customer service orientation. Determine employee retention rates and morale as a good contractor will minimize turnover and foster loyalty.

Presentations and Meetings– Your team should evaluate the responses and select two or three contractors to meet with and discuss your potential relationship in depth. You want to be sure your selected contractor has a clear understanding of the unique issues faced in providing services to your organization. 

Finalize Partner Selection– After weighing the options, select your preferred contractor.  Ensure agreement on all terms of the contract. An effective transition plan should detail the tasks to be accomplished and the parties responsible for completing each task.   

By following these recommended steps, you are on your way to securing a quality security services partnership that will provide measurable results, add value and meet or exceed your expectations. 

KEYWORDS: security officer

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Randal R. Dorn is Division President for AlliedBarton Security Services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • vendor selection

    Many Vendors, Many Decisions: How Safeguarding your Vendor Selection Practices Can Help Reap Rewards for your Security Enterprise

    See More
  • entrance security

    7 ways to ensure proper security entrance selection

    See More
  • Study: Identifying High-Performance Security Professionals Using a Competency Model

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing