Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementPhysical Security

Enterprise Services

Strategies for effectively outsourcing security

Security leaders can ensure the success of outsourced security services by investing in their teams.

By Sandi Davies, Dr. Glen Kitteringham
Sandi J. Davies

Hispanolistic / E+ via Getty Images

June 6, 2023

One of the elements of a successful security program is the stability of the guard force. An unstable security department results in an ineffective security program.

Wasted security countermeasures, high turnover, customer and employee dissatisfaction, frustrated senior management, disgruntled guards and high unscheduled and non-billable overtime are just a few factors that contribute to the ineffectiveness. Additionally, wasted time when security management is investigating employee misconduct adds instability to the department.

Setting outsourced security up for success

There are at least two options that security leaders can utilize to determine the outcome of outsourcing security officer services. The first is where the security leader considers the services purely from a technical perspective. This approach often incorporates cost as a primary driver, where the security leader details their specific requirements in a prescriptive approach. The prescriptive approach focuses on applicable licensing requirements, specific duties of security officers and supervisors, coverage hours, penalties and insurance requirements. These can be considered inputs. It is the “take two pills and call me in the morning” mentality, which can be considered a passive response to a dynamic risk situation.

This approach often fails, as it focuses on cost to the detriment of all other factors. Often, security leaders looking to outsource security incorporate unrealistic expectations into the request for proposal (RFP) that the winning bidder promises to provide but knows they cannot keep, thereby creating an adversarial relationship.

Alternatively, the second approach is to view the contract provider from an actual service perspective in a mutually beneficial relationship where the focus is on the resulting output — an effective security department. This second views the service provider as a partner to the security team and organization, where there is a recognition of the mutual needs of both parties. This creates a win-win opportunity. The second approach incorporates partnership principles into the RFP to ensure the resulting relationship is a win-win for both parties.

The following elements should be considered when developing the RFP:

You get what you pay for

First, the concept of a living wage has steadily gained ground in the last several years and has significant bearing upon an RFP. Security officers need to be fairly compensated for their services provided. Does the security contract manager factor in the living wage in the geographic area to ensure their vendor is able to recruit and retain quality employees?

Assess site complexities

Does the client consider site complexity which will impact security officer tasks and resulting competencies? Site complexity encompasses the size of the site, number of and types of incidents, risk profile, control room complexity, security systems in place, complexity of department size, training requirements which include pre-assignment, site familiarization, ongoing training and education for the team and individuals.

Upskill outsourced employees

Training is required in hard technical areas including access control, video surveillance, radios and their usage, report writing, use of force, intercoms, elevator monitoring and lighting control. Training is also necessary for soft skills development. This includes written and verbal communication skills development, negotiating skills, conflict de-escalation, interpersonal skills and empathy, teaching and training skills, and adaptability and continuous learning. Some may question why the security team requires these skills, but considering the duties and task complexities required for security personnel to be successful, soft skills are a key component of a successfully outsourced security program. Perhaps the most challenging task a security officer will engage in is rule enforcement. Whether this encompasses requiring employees, contractors, customers or criminals to follow the rules, security personnel require an understanding of criminal and civil codes, company rules, conflict de-escalation techniques, self defense, situational awareness, emotional intelligence and strong verbal communication skills.

Performance management is also an issue for a number of security leaders who outsource security patrols. A growing body of research in the last decade focusing on security officer retention has identified pay, training, the clarity of policies and procedures, employee engagement, supervisor and management support, role recognition/task significance, career planning and organizational fairness all as factors in employee retention. While some of these factors can be difficult to incorporate into an RFP, it must be recognized that in order to develop quality security staff, time, effort and money must be spent. This means that either the contract guard company management put effort into this or the client security management must do so.

Take a hands-on approach to outsourcing security

After the extensive initial work has been completed and the RFP has been delivered and awarded, it is equally important to sustain the key components of the RFP. The likelihood of components of the RFP getting put on the back burner by the service provider is sadly alarmingly high. For a multitude of reasons, it will be critical for the security leader to continue to invest in their team.

Providing relevant and meaningful educational opportunities and investing in the professional development of outsourced security officers will only pay dividends. Recognizing their efforts and accomplishments and providing opportunities beyond their expectations are a form of collateral. With professional development opportunities and ongoing training and recognition, the outsourced security team will understand that their roles will lead to career advancement, as well as increase their loyalty to the organization.

When outsourcing security officer talent, security leaders are quite right in pointing out that it is the responsibility of the contract provider to look after their employees. However, when the primary focus is on cost, this area will suffer. Focusing on price to the detriment of everything will almost certainly lead to high turnover and poor service. To expect anything else is foolish. This is why there needs to be greater attention paid to employees, their development and overall satisfaction.

 Outsourcing security is a fundamental function of providing the best possible service with a methodology of protecting people, property and assets in all capacities. The outcome of outsourcing will be a product of the planning, the execution of the plan and the follow-up of such an arrangement. It requires the aforementioned time, effort and money to be successful. The intentional development, awarding and management of the RFP can be a highly effective element of the security program.

KEYWORDS: outsourcing outsourcing security security service providers security services

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sandi Davies began her career in contract security in 1980 with a primary focus on personnel administration. She became deeply involved in training and was instrumental in developing security officer training programs for a major national guard company. In 1991 she was elected executive director of the International Foundation for Protection Officers (IFPO). She is editor of Protection Officer News published by the IFPO. Go to www.ifpo.org for more information or there is a link through Zalud's Blog at http://blog.securitymag.com

Dr. glen kitteringham

Dr. Glen Kitteringham, M.Sc., CPP, is President at Kitteringham Security Group, Inc. Bio image courtesy of Kitteringham

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0820-Operations-Feat-slide1_900px

    How CISOs Can Effectively Measure and Report Security Operations Maturity

    See More
  • hands in circle together

    Strategies for supporting security teams

    See More
  • Locked data

    Best practices for effectively securing sensitive data

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!