Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Management

Calculating ROI for Better Security

Here, we dive into more conventional ROI justifications for security purchases.

By Darrell Clifton CPP
SEC0220-ROI-slide2_900px.jpg

About the Author

Darrell Clifton, CPP is the author of Hospitality Security. He was named by Security magazine as one of Security’s Most Influential in 2011. After 30 years in operations, he is now an adjunct professor and consultant for the Kolins Security Group. He provides expert testimony and training on Hospitality, including Hotel, Nightclub, Restaurant and Bar security. Contact him at darrell.clifton@kolinssecuritygroup.com

SEC0220-ROI-Feat-slide1_900px.jpg
SEC0220-ROI-slide2_900px.jpg
SEC0220-ROI-Feat-slide1_900px.jpg
February 10, 2020

In the first article, we discussed how Life Safety can be an effective argument for not only getting your purchase approved, but making it a priority. Here, we dive into more conventional ROI justification.

When purchasing or implementing new equipment, there are three schools of thought that determine when an enterprise will jump into a new technology. These decisions are based on budget for sure, but also on risk mitigation.

Some organizations seem to have an unlimited budget for new technology, always positioning themselves to be the “Beta site” for an innovation. This costs them more money, but from a risk standpoint, it generally keeps them out of the legal woods. Litigation is generally targeted at “inadequate” or “negligent” security. It is difficult to prove either of those accusations against a company that maintains state of the art technology to protect its personnel or visitors. So, their savings (ROI) is on the “back-end” or in risk management.

The second group of technology buyers is the most common. These are the ones that wait until a “best practice” is established with the new technology. This buying strategy is circumstantial, often less expensive and safer from a risk standpoint. It is circumstantial because most companies do not have cash lying around to try the latest gadget before it has proven itself. So often it is purchased later, as that is when the capital is available. Purchases made later are less expensive, because the price on technology generally comes down as it ages, even if just a year or so. Waiting for the herd to come up with an industry standard is safer because it is easier to defend in court if best practices were used, as opposed to some new gimmick.

The final group of buyers are the ones who wait until everyone else has the technology, and they climb on board more out of necessity. This may be due to a lack of capital or it may be because whomever is in charge wants to be certain that is the way the industry is headed. These companies save money initially in not making the purchase, but may take a gamble on being the only one, or one of a few, in the market to lag behind the curve.

After the 2017 shooting in Las Vegas, where Stephen Paddock opened fire on a crowd of concertgoers at the Route 91 Harvest music festival and killed 58 people and wounded 413, we all waited to see how the hospitality industry was going to react as far as implementing new security measures. A few resorts immediately established armed response teams, search dogs and hired off-duty police. The majority, though, waited for one or more best practices to develop before making drastic changes to their security posture. A little over two years after the incident, at least one hotel is going to install and staff metal detectors at their elevator banks. It will be interesting to see if this becomes the best practice that everyone will be “forced” to follow, or if another technology will replace it as being more effective. And as it goes, the security leaders with no capital budget for such things may be left vulnerable. Hotels across the country will, under pressure from the herd, take up this decision whether they want to or not.

What does all this have to do with ROI? The answer is, for major purchases that are going to change your security posture (like metal detectors), your capital request may depend on management’s stance and where they want to be: front of the pack, part of the herd, or bringing up the rear. Once you know that, make your request accordingly. The thought: “Everyone else has one, so we should too” is not very intellectual, but it is a reality for many security directors.

 

ROI – Secrets to Getting What You Need

Next, we will discuss timing, which is everything. This goes for capital requests, as well. We have discussed Life Safety, labor savings and best practices as solid strategies for showing ROI. There are, however, some things you can do to help assure approval of your request.

Timing. Did you know that capital money is given out quarterly? Most departments will ask for money that will be spent as soon as the calendar flips to the New Year. In an effort to save money, the corporation that holds and distributes the checks does so on a quarterly basis. This means that while all the money allocated for the first quarter may be ear-marked, the third or fourth quarter may have some unclaimed funds that are available for you.

It’s who you know. There is likely one individual in the enterprise or business unit who controls the purse strings. It’s not the GM or CEO, but it is someone like a controller who actually receives and distributes the money to departments. This individual should be your best friend. Take him/her to lunch, and find out how funding for capital improvements works. “How do I write a request that will get approved?” “What types of purchases get approved?” etc. This individual will also help you with timing.

Speaking of timing. Did you know there is often extra capital left over after each quarter? If the sales department put in a request for a $500,000 customer lounge and it only cost $450,000; that is $50,000 that will be sent back to corporate. Unless you grab it. You are correct in your assumption that additional money can be set aside for a lounge to buy a security vehicle, so you need to be creative (but honest). How about asking for new security cameras for that lounge that will cost $5,000, with plenty of money left for you to upgrade the rest of your video surveillance system?

Strength in numbers. One of the best ways to show a ROI and get the security technology that you need is to team up with another department – especially a revenue-generating department. Much of the security technology on your wish list has relevance to others in your organization, as many of the technology being purchased elsewhere in your enterprise can be useful to you, as well. For example, license plate readers have an obvious crime-fighting feature, but perhaps another department could benefit from knowing when their best customer is on property. Same with facial recognition. Video analytics are used by large retailers for loss prevention, but they also share this technology with the Operations team to monitor the efficiency of cashiers, customer buying patterns and product placement. An access control system in a parking lot can reduce burglaries, but it can also make a nice profit. The sky is the limit on partnerships.

Security often gets left behind with each new budget. Hopefully, these strategies will help you cross off some items from your wish list and keep your people and assets safe and secure.

KEYWORDS: camera metal detectors return on investment security budgets security metrics

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Darrell Clifton, CPP is the author of Hospitality Security. He was named by Security magazine as one of Security’s Most Influential in 2011. After 30 years in operations, he is now an adjunct professor and consults for the Kolins Security Group. He provides expert testimony and training on all things Hospitality, including Hotel, Nightclub, Restaurant and Bar security. Contact him at darrell.clifton@kolinssecuritygroup.com

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×
About the Author Darrell Clifton, CPP is the author of Hospitality Security. He was named by Security magazine as one of Security’s Most Influential in 2011. After 30 years in operations, he is now an adjunct professor and consultant for the Kolins Security Group. He provides expert testimony and training on Hospitality, including Hotel, Nightclub, Restaurant and Bar security. Contact him at darrell.clifton@kolinssecuritygroup.com

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!