Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise Services

Improving Guarding with Data

By Banruo Zhou, Mike Ginty
Bannerman- figure 1

Figure 1: Distribution of Timeliness Score. Courtesy of Bannerman Security

Bannerman- figure 2

Figure 2: Distribution of Reliability Sub-Score. Courtesy of Bannerman Security

Bannerman- figure 3

Figure 3: Example of anomalous behavior tracking displayed on a manager’s dashboard. Courtesy of Bannerman Security

Bannerman- formula1

Formula 1: Timeliness Score. When a guard arrives on site and checks in through the mobile device, it records the Guard Arrival Time and GPS location, which enables users to determine if the user is late, and how late. Courtesy of Bannerman Security

Bannerman- formula2

Formula 2: Reliability Sub-Score, measuring how much a certain guard calls out within a calendar week, and the time of notification before the cancellation. Courtesy of Bannerman Security

Bannerman- formula3

Formula 3: Incident Reporting Score, measuring how well a guard follows client instructions. Courtesy of Bannerman Security

Bannerman- formula4

Formula 4: Client Rating Score, so clients can rate guards based on appearance, professionalism, ability to follow instructions and customer service.  This method comes from the ordinary least squares solution to the following model: Client Rating Observed, for guard i by client j = Client Rating True, for guard i + Client Bias of client j + ϵi j, where we observe Client Rating Observed, for guard i by client j and estimate Client Bias of client j to back out the middle term—true client rating for the guard. Courtesy of Bannerman Security

 

 

 

Bannerman- figure 1
Bannerman- figure 2
Bannerman- figure 3
Bannerman- formula1
Bannerman- formula2
Bannerman- formula3
Bannerman- formula4
August 29, 2017

Proving value in the security guarding industry is complicated. When things are quiet, people tend to assume that there are no problems; when incidents happen, on the other hand, management sees it as the fault of the security personnel. External events and factors beyond our control should not be the way we measure the ongoing performance of the guard force. Traditional performance indicators – spend versus budget, reduction in incidents by frequency and severity, as well as shortened response time – often used by security managers, decision makers, and those who control budget, completely miss the true performance of the individual security professional.

So how do you measure that? Training and standards exist throughout the guarding industry: every guarding company, client, and state has its own version of it. Measuring adherence and performance is often subjective and sometimes misguided as it is very difficult to observe and manage a decentralized and distributed workforce 24/7. Field supervisors and frontline managers can do surprise inspections, spot checks, and even review video footage to see how their team is performing. However, these methods only capture a snapshot in time. Management is not truly able to measure the performance of the guard carrying out their duties in real-time, nor aggregate performance metrics over time (i.e. over many shifts). We theorized we could better measure real time guard performance through our App by recording things like check-in and location, then applying data analytics and standardized measurement criteria, we could objectively track the performance of a pool of guards.

Starting in January of this year, we implemented this system for over 500 security officers across 75 client sites in different geographies. Using mobile phones and predetermined scoring algorithms, we tracked the following metrics: timeliness, reliability, trustworthiness, reporting and client feedback. Formulas for calculating these rates are available in the images above.

Timeliness answers the question of how punctual a certain guard is. When a guard arrives on site and checks in through the mobile device, it records the Guard Arrival Time and the GPS location. If the GPS location is within the acceptable geo-fence, we compare Guard Arrival Time and Shift Start Time to see if the guard is late, and if so, how late. This lateness is then mapped to a Timeliness score between 0 and 1 through a bounded quadratic function, as illustrated in Figure 1 above.

Reliability measures how much a certain guard calls out within a calendar week. When a guard cancels a shift within the next 4 weeks (i.e. 28 days), we record two variables: 1) the cancellation being the N-th one in that week, and 2) the Call-out Notice Time, which is number of days between the call-out and the actual shift date. Our system then uses these two variables as inputs to calculate a Reliability Sub-Score, as illustrated in Figure 2 above.

Trustworthiness aims to measure how much we can trust a guard in staying and completing a shift, particularly when there is no supervisor on-site. Through near constant tracking of geolocation data, detects various suspicious behaviors such as checking-in offsite, checking-in in a moving vehicle, abandoning site, checking-out in a moving vehicle, and checking-out off-site. These data, displayed in the manager’s dashboard as per Figure 3 above, then become the source of a Trustworthiness Score for each guard.

Reporting measures how well a guard follows client instructions. Through push notifications, the App prompts the guards to submit a status or incident report, effectively having the guard keep a detailed electronic Daily Activity Report (DAR). Guards were evaluated based on the percentage of prompted reports completed.  

Additionally, we used a Client Rating. Clients rated their security officers 1-5 stars evaluating four specific categories: appearance, professionalism, ability to follow instructions and customer service., and we required all ratings equal to or less than 3 provide feedback as to which category prompted the negative rating. For client ratings, we recognized that each client may have their own bias – some are more tolerant, and others less so. We used an algorithm (see formula 4 above) to derive the unbiased client evaluation of the guard.

Each metric, represented in both raw data and calculated scores, was stored in the cloud, aggregated and audited routinely to ensure accuracy. Throughout this study, auto-generated emails kept the guards apprised when the system recorded they checked in late, provided insufficient reporting, or exhibited anomalous behavior. The intent was to encourage real-time, continuous improvements in their performance.

Based on the calculated scores, we easily and objectively viewed guard performance and stratified the guard pool. Management could assess a guard's performance over time (whether they were getting better or worse), and distinguish between one-off mistakes versus consistent poor performance. Guards who did not meet standards were counseled and in some cases removed from their position. Guards performing above standard were given more responsibilities, higher pay and preferential shifts. 

These quantified metrics not only improved guard performance, but enabled management to be more effective as well. Management knew which officers needed more direction and focused post checks accordingly.  This system also enabled better matching between guards and clients (i.e. top-tier clients matched with top guards). In the future, training could be tailored for specific individuals or across the entire guard pool if specific deficiencies are indicated.

While we are continuing our research in this area, our initial findings support the hypothesis that this approach would lead to improved guard and client satisfaction, a reduction in incidents, and improved security and safety. Going forward, we hope to add more metrics into the scoring methodology to include engagement, proficiency, and possibly experience.    

They say the devil is in the details, but we have found the delight is in the data. Gathering more information, parsing, and aggregating allowed us to make better-informed decisions and ultimately brought up the average quality level across the board.

KEYWORDS: guarding security metrics security officer

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Banruo Zhou is Director of Operations for Bannerman Security, a San Francisco-based security technology company empowering safety and security professionals with the tools to increase automation, connectivity, reliability and accountability.

Mike Ginty is the Vice President of Security for Bannerman Security, a San Francisco-based security technology company.  Follow more research from Ginty at the Bannerman blog.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Healthcare professional

    Protecting healthcare data, improving trust through security measures

    See More
  • wifi

    With WPA3, Wi-Fi Security Is Improving but It’s Not Airtight

    See More
  • critical-infrastructure-freepik1170x658 (1).jpg

    Industrial security posturers are improving – but still struggle to keep up with growing threats

    See More
×
Figure 1: Distribution of Timeliness Score. Courtesy of Bannerman Security
Figure 2: Distribution of Reliability Sub-Score. Courtesy of Bannerman Security
Figure 3: Example of anomalous behavior tracking displayed on a manager’s dashboard. Courtesy of Bannerman Security
Formula 1: Timeliness Score. When a guard arrives on site and checks in through the mobile device, it records the Guard Arrival Time and GPS location, which enables users to determine if the user is late, and how late. Courtesy of Bannerman Security
Formula 2: Reliability Sub-Score, measuring how much a certain guard calls out within a calendar week, and the time of notification before the cancellation. Courtesy of Bannerman Security
Formula 3: Incident Reporting Score, measuring how well a guard follows client instructions. Courtesy of Bannerman Security
Formula 4: Client Rating Score, so clients can rate guards based on appearance, professionalism, ability to follow instructions and customer service.  This method comes from the ordinary least squares solution to the following model: Client Rating Observed, for guard i by client j = Client Rating True, for guard i + Client Bias of client j + ϵi j, where we observe Client Rating Observed, for guard i by client j and estimate Client Bias of client j to back out the middle term—true client rating for the guard. Courtesy of Bannerman Security      

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!