Who Should Be ‘In The Room’ When Deciding to Buy Security Systems?
Editor Introduction
We in the physical security market tend to watch closely how the buying decision is made. If anything, the buying process has become more complex in recent years. We have seen the impact of security systems extending beyond the core security department, and with greater impact come more stakeholders. “Buying by committee” is more the rule than the exception, and the committee is getting rather large in some situations. We asked this week’s Expert Panel Roundtable: Who should be “in the room” when decisions are being made about physical security systems?
When it comes to security planning, one person can't possibly do it all. This is especially true for education and healthcare institutions that need to remain open to the public while maintaining security. Creating a comprehensive strategy for these campuses will mean establishing open communications with stakeholders and forging symbiotic relationships throughout your community. By forming a small task force, you can make sure you are always operating from a position of knowledge, consent and support. Take every opportunity to speak to as many different organizations as you can. While key staff, including campus police and facilities and operations management, should be included in the decision-making process, don’t forget about checking in with your IT professionals, local law enforcement, students/patients, parents, and neighbouring businesses both on and off campus.
The landscape of today’s decision-makers is much different than that of the past. No longer is it just the security team “in the room;” there are many diverse stakeholders involved. What used to be a few people sitting around a table making decisions has now grown extensively to double digits. Different teams from IT, HR, Legal Business Continuity, and Security, including subset specialists from each group, all participate and have a voice in the security system decision-making process. Each department provides input and expertise from their department’s point of view to help their organisation make the best decision possible for the good of the whole company. This is critical in today’s changing security landscape.
The answer to this question depends on various elements of the project, such as the types of systems, size of the project, the industry segment and requirements for integration with other systems. Apart from security personnel, here are other attendees depending on the project:
- IT personnel – for system design, integration, equipment procurement, cyber security considerations, etc.;
- Consultant(s) and A&Es – if they’re involved in the spec/design;
- Integrators – if they’ve already been selected as part of the process;
- Vendors – if particular products have been selected;
- Architects/interior designers – for facilities that require attention to building/facility/store design;
- Human Resources/Operations – if there’s need to access employee databases and data, especially for access control;
- Compliance – to ensure systems comply with company or institutional policies;
- Finance – to discuss budgets, payment schedules, etc.;
- City planners and other city departments (such as power) – this is critical if the deployments are in city centers and other city departments are involved.
In today’s security deployments, there are more people who should be “in the decision-making room” than have been in the past. I have found that the most successful plans and implementations involve an access control security professional, a video security professional, an IT or networking staff member, and a facilities professional. In having these professionals in the room, the project has the appropriate individual constituents to protect people, property, and assets while taking into consideration the transport and storage systems and their respective workflows in construction and facility utilization.
In the modern business world, interest in physical security has gone way beyond the security department. This is due in part to all the other functions security can have a role in, such as time-and-attendance recording, lone worker protection and building environmental controls, to name a few. Along with the physical security team, undoubtedly the IT team will need to be heavily involved as both systems will be linked directly and have a symbiotic relationship in protecting the organization. Equally, the facility management team will want to ensure systems adequately protect and monitor staff and facilities safety. The human resource department will be interested in the time-and-attendance aspect, which is also vital to the accounting department, who will use this information for budgeting. Undoubtedly, as the overseeing “eyes and ears” of the business, physical security has a role to play across most divisions of a business.
When building a reliable, intelligent physical security system, it is critical to consider the skills and opinions of all stakeholders who will control or manage the solution as it becomes a part of the fabric of everyday operations. For example, in a university setting, representatives from different departments such as campus police, school administrators, board of trustees members, architects, facility managers and other heads of security should all weigh. Including them ensures that the design, effectiveness and sustainability of the proposed installation come together to form a cohesive solution that is easy to use and prioritises the safety of students, faculty and staff. In non-scholastic environments, it is just as important to collaborate with different departments to gauge how each one will leverage the system's benefits in their decision-making.
Depending on the size of the enterprise, there can be just a few, or many voices that need to be heard in this process. Naturally, the financial decision maker(s) will be involved. If the purchase involves IP-based technology, IT should be involved early and often to achieve their buy-in on how the technology fits the overall IT infrastructure. Physical security managers and risk managers obviously need to be engaged, but it is always good to get input from other line managers as well as the users of the proposed system. Ease of use and support of the system should be evaluated by employees who will use the system, not just their managers. Get buy-in from C-level management after the business case has been made and all other input vetted. The CEO and other C-suite executives want to know that the purchasing team has done a thorough evaluation.
Editor Summary
When it’s time to discuss a security buying decision, you might want to send out for more donuts. These discussions are likely to draw a big turnout of stakeholders from all parts of the customer’s company, not to mention consultants, accountants and others. For anyone looking to sell a system, it comes down to more questions to answer and more needs to fulfil. And all you have to do is get everyone nodding in unison.
Expert commentary
Security beat
Security bytes
- Getting To Know Dan Grimm, VP And General Manager Of Computer Vision At RealNetworks
- Big Wins And The Importance Of Showing Up: Insights From SecurityInformed.com Editor Larry Anderson
- Setting Goals, Business Travels And Radioactivity: Success Secrets From Tiandy's John Van Den Elzen
- Getting To Know Jeff Burgess, President/CEO At BCDVideo
Healthcare security articles
Milestone Systems, a global pioneer in video technology, is at the forefront of the video security industry, emphasizing responsible technology innovation across its operations. The company will host...
Just like fighting against the spread of disease in a clinical environment, healthcare providers must mobilize, coordinate with interconnected partners, and apply sufficient budgetary resources to com...
VIPRE Security Group, a global pioneer and award-winning cybersecurity, privacy, and data protection company, released its Q1 2024 Email Threat Trends report, based on an analysis of 1.8 billion email...
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, demonstrated complete building security solutions at ISC West 2024 in Las Vegas. The company showcased its comprehen...
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, a...
ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2024 with in-person and di...
Next DLP, a pioneer in data loss prevention and insider threat solutions announced that their Reveal Platform is the first Insider Risk Management solution to automatically map detection events to MIT...
The Security Executive Council, with Rice University and MD Anderson Cancer Center, will facilitate a day and a half of expert-led sessions on workplace violence risk management for corporate security...
At Hannover Messe 2024, Siemens presents the first generative artificial intelligence (AI) product for engineering in an industrial environment. Siemens Industrial Copilot The Siemens Industrial Cop...
HID, the pioneer in trusted identity solutions, announces it has been positioned by Gartner® as a Pioneer in its 2024 Magic Quadrant for Indoor Location Services. The evaluation was based on speci...
Vismo will launch the latest version of its Locate & Protect App at the International Association for Healthcare Security and Safety (IAHSS) Annual Conference and Exhibition 2024, at booth #713, f...
ASSA ABLOY Opening Solutions will be exhibiting an expanded range of innovative products at booth #8061 during ISC West. With access and intrusion risks rising in schools, healthcare spaces, and worsh...
Cohesity, a pioneer in AI-powered data security and management, announced it is collaborating with Intel to bring Intel’s confidential computing capabilities to the Cohesity Data Cloud. Leverage...
Identiv, Inc., a global digital security and identification pioneer in the Internet of Things (IoT), has entered into a definitive asset purchase agreement to sell its physical security, access card,...
Thailand’s pioneering fair for security and fire safety for commercial and industrial premises, announced at the press conference at Grand Hyatt Erawan Bangkok that the 2024 edition will return...
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadGunshot Detection
DownloadVerkada TD52 Cloud-Based Video Intercom
exacqVision IP08-64T-R1XW-E X-Series 1U Rdnt IP NVR 64TB RAID5 Windows OS with 8 IP Ent Lic
Climax Technology TouchPanel-3 7” Color Graphic Touchscreen Panel