Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Improving Guarding with Data

By Banruo Zhou, Mike Ginty
Bannerman- figure 1

Figure 1: Distribution of Timeliness Score. Courtesy of Bannerman Security

Bannerman- figure 2

Figure 2: Distribution of Reliability Sub-Score. Courtesy of Bannerman Security

Bannerman- figure 3

Figure 3: Example of anomalous behavior tracking displayed on a manager’s dashboard. Courtesy of Bannerman Security

Bannerman- formula1

Formula 1: Timeliness Score. When a guard arrives on site and checks in through the mobile device, it records the Guard Arrival Time and GPS location, which enables users to determine if the user is late, and how late. Courtesy of Bannerman Security

Bannerman- formula2

Formula 2: Reliability Sub-Score, measuring how much a certain guard calls out within a calendar week, and the time of notification before the cancellation. Courtesy of Bannerman Security

Bannerman- formula3

Formula 3: Incident Reporting Score, measuring how well a guard follows client instructions. Courtesy of Bannerman Security

Bannerman- formula4

Formula 4: Client Rating Score, so clients can rate guards based on appearance, professionalism, ability to follow instructions and customer service.  This method comes from the ordinary least squares solution to the following model: Client Rating Observed, for guard i by client j = Client Rating True, for guard i + Client Bias of client j + ϵi j, where we observe Client Rating Observed, for guard i by client j and estimate Client Bias of client j to back out the middle term—true client rating for the guard. Courtesy of Bannerman Security

 

 

 

Bannerman- figure 1
Bannerman- figure 2
Bannerman- figure 3
Bannerman- formula1
Bannerman- formula2
Bannerman- formula3
Bannerman- formula4
August 29, 2017

Proving value in the security guarding industry is complicated. When things are quiet, people tend to assume that there are no problems; when incidents happen, on the other hand, management sees it as the fault of the security personnel. External events and factors beyond our control should not be the way we measure the ongoing performance of the guard force. Traditional performance indicators – spend versus budget, reduction in incidents by frequency and severity, as well as shortened response time – often used by security managers, decision makers, and those who control budget, completely miss the true performance of the individual security professional.

So how do you measure that? Training and standards exist throughout the guarding industry: every guarding company, client, and state has its own version of it. Measuring adherence and performance is often subjective and sometimes misguided as it is very difficult to observe and manage a decentralized and distributed workforce 24/7. Field supervisors and frontline managers can do surprise inspections, spot checks, and even review video footage to see how their team is performing. However, these methods only capture a snapshot in time. Management is not truly able to measure the performance of the guard carrying out their duties in real-time, nor aggregate performance metrics over time (i.e. over many shifts). We theorized we could better measure real time guard performance through our App by recording things like check-in and location, then applying data analytics and standardized measurement criteria, we could objectively track the performance of a pool of guards.

Starting in January of this year, we implemented this system for over 500 security officers across 75 client sites in different geographies. Using mobile phones and predetermined scoring algorithms, we tracked the following metrics: timeliness, reliability, trustworthiness, reporting and client feedback. Formulas for calculating these rates are available in the images above.

Timeliness answers the question of how punctual a certain guard is. When a guard arrives on site and checks in through the mobile device, it records the Guard Arrival Time and the GPS location. If the GPS location is within the acceptable geo-fence, we compare Guard Arrival Time and Shift Start Time to see if the guard is late, and if so, how late. This lateness is then mapped to a Timeliness score between 0 and 1 through a bounded quadratic function, as illustrated in Figure 1 above.

Reliability measures how much a certain guard calls out within a calendar week. When a guard cancels a shift within the next 4 weeks (i.e. 28 days), we record two variables: 1) the cancellation being the N-th one in that week, and 2) the Call-out Notice Time, which is number of days between the call-out and the actual shift date. Our system then uses these two variables as inputs to calculate a Reliability Sub-Score, as illustrated in Figure 2 above.

Trustworthiness aims to measure how much we can trust a guard in staying and completing a shift, particularly when there is no supervisor on-site. Through near constant tracking of geolocation data, detects various suspicious behaviors such as checking-in offsite, checking-in in a moving vehicle, abandoning site, checking-out in a moving vehicle, and checking-out off-site. These data, displayed in the manager’s dashboard as per Figure 3 above, then become the source of a Trustworthiness Score for each guard.

Reporting measures how well a guard follows client instructions. Through push notifications, the App prompts the guards to submit a status or incident report, effectively having the guard keep a detailed electronic Daily Activity Report (DAR). Guards were evaluated based on the percentage of prompted reports completed.  

Additionally, we used a Client Rating. Clients rated their security officers 1-5 stars evaluating four specific categories: appearance, professionalism, ability to follow instructions and customer service., and we required all ratings equal to or less than 3 provide feedback as to which category prompted the negative rating. For client ratings, we recognized that each client may have their own bias – some are more tolerant, and others less so. We used an algorithm (see formula 4 above) to derive the unbiased client evaluation of the guard.

Each metric, represented in both raw data and calculated scores, was stored in the cloud, aggregated and audited routinely to ensure accuracy. Throughout this study, auto-generated emails kept the guards apprised when the system recorded they checked in late, provided insufficient reporting, or exhibited anomalous behavior. The intent was to encourage real-time, continuous improvements in their performance.

Based on the calculated scores, we easily and objectively viewed guard performance and stratified the guard pool. Management could assess a guard's performance over time (whether they were getting better or worse), and distinguish between one-off mistakes versus consistent poor performance. Guards who did not meet standards were counseled and in some cases removed from their position. Guards performing above standard were given more responsibilities, higher pay and preferential shifts. 

These quantified metrics not only improved guard performance, but enabled management to be more effective as well. Management knew which officers needed more direction and focused post checks accordingly.  This system also enabled better matching between guards and clients (i.e. top-tier clients matched with top guards). In the future, training could be tailored for specific individuals or across the entire guard pool if specific deficiencies are indicated.

While we are continuing our research in this area, our initial findings support the hypothesis that this approach would lead to improved guard and client satisfaction, a reduction in incidents, and improved security and safety. Going forward, we hope to add more metrics into the scoring methodology to include engagement, proficiency, and possibly experience.    

They say the devil is in the details, but we have found the delight is in the data. Gathering more information, parsing, and aggregating allowed us to make better-informed decisions and ultimately brought up the average quality level across the board.

KEYWORDS: guarding security metrics security officer

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Banruo Zhou is Director of Operations for Bannerman Security, a San Francisco-based security technology company empowering safety and security professionals with the tools to increase automation, connectivity, reliability and accountability.

Mike Ginty is the Vice President of Security for Bannerman Security, a San Francisco-based security technology company.  Follow more research from Ginty at the Bannerman blog.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Improving Network Security and Efficiency with the Cloud

    See More
  • Healthcare professional

    Protecting healthcare data, improving trust through security measures

    See More
  • wifi

    With WPA3, Wi-Fi Security Is Improving but It’s Not Airtight

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing