Download Our Free E-book
Get Access to the Best Content on High Court Enforcement
Get Access to the Best Content on High Court Enforcement
Experience gained from security delivered in some of the most ferocious war zones of the 21st century, including Iraq and Afghanistan. John Johnson, our VP of Operations, is a decorated war vet who headed up the operations of 650 canine teams for the US military. He sat down with Taliban warlords and negotiated his way through delicate cultural exchanges. Which means, when we’re helping you put your security plan together it’s going to have the best minds on the job. No one client should ever have a carbon copy security plan for another client’s business. Security plans are built from political risk management (we hear threat assessment used in the US but for civilian sites, we prefer “risk assessment”).
We understand that buyers of security have to walk the line in controlling costs but also managing the risks that their business, small business taxes may encounter. Therefore, we start every new potential assignment, even before we have signed a contract, with a visit to the site and a checklist for a security risk assessment. We invite comment from all the stakeholders, including the management team, and then workers or residents and visitors to the site to gauge their view of the security risk. We send our team to site, or we can view it online and by satellite. This is not the ideal, but it can give us enough insight to start the risk assessment process.
What we want to achieve for our clients is a risk assessment, and then security plan which anticipates all the risks which may impact a site, and then have a plan to eliminate, or at least reduce, those risks. We do this by mixing human, K9 and technological resources to create a security plan which is appropriate to the situation, well planned, cost-effective and easy to understand!
So, if you are in the driving seat of finding and hiring a security company. here are top tips for getting the best outcome:
If you are starting a scratch or if you already have a plan, we encourage you and your team to write down in bullet point form, your expectations of a security team and its operation. Keep it simple. If you know your business, then you will know the risks. However, complex buying a small business you are working with the daily risks now so just put them in a list. Share them in your team and see if your old security plan has a list or the same list. Build on the material you already have. Once you have all the bullet points in place, you can work them into a proper specification for the managing agreement likes security contract, suppliers agreement, vendor contract. But we encourage the use of the acronym “KISS” – Keep It Simple Stupid. Don’t overly complicate your requirements or try to put them into management-speak. Your new security partner has to be able to follow your thought process, so everyone gets to be on the same page.
There are plenty of private security companies in the market, so a pre-qualification process is going to sort the “wheat from the chaff”. You may have the material in place to send out as a pre-qual questionnaire, vendor management form or a more formal bid process may be in place. We see all types and standards of documentation. If you are responsible for appointing a security company, ensure that you review and update the process regularly. It might be necessary to change the way you select security vendor relations, especially if you need to terminate the current contract.
To be successful a contract has to meet the needs of both sides and this applies to a contract for security services as much as any other type of commercial arrangements. Both sides need to understand the other’s position and anticipate how the contract will respond if the risks we discussed above actually occur.
For our part, we offer a standard form of security contract which is part of our Proposal/Quotation process. It is based on the ISO18788 which is the gold standard of security management. Clients typically accept this contract, but occasionally the legal department or compliance team within a client organization reviews it, and sometimes they attach it to their own form of contract. We refrain from providing a contract form until we thoroughly assess the security site and offer our expert opinion on the necessary risk mitigation measures. Throughout this process we find our clients to be open to ideas, and improvements so that the end results if a contract that we all feel comfortable with.
There is useful management saying – “What gets measured gets managed” and none is truer than how a security contract is delivered. Daily reports, patrol hours, the punctual start of patrols, incident reports and categorization, anything and everything needed to demonstrate full and complete coverage of the security plan is possible. Technology plays a large part in shaping meaningful management information through devices carried by officers on patrol. We ask our clients to think about what they need to manage us, and we then augment our resources to fit the needs of the client. Reports are digital and demonstrate adherence to post orders.
Security plans can deliver the almost 360-degree vision of a site if using a combination of human, K9 and technology. All 3 elements create a plan which means the needs of a client, and which can be managed 24 x 7 if this is required. We use VWK9’s with their ability to follow certain smells in the human plume to detect nasties such as explosives or drugs. And we encourage clients to use CCTV monitoring and recording of the camera footage to monitor sites to definable standards. Again, we don’t put forward items that are not necessary. One item we do find our client’s buying is “armed” security when in fact it’s just an additional cost. “Armed” security is a specialist area and all our senior managers will only advise it if there is a genuine risk that demands this level of security response. Often, we find clients have paid a premium for something that is not required.
Security can be a “win-win” vendor partnership if buyer and vendor come together to create a security plan which is sensible, within budget, and measures expectations. When it comes to negotiating your next security contract, use one or more of these ideas to improve the outcome, and keep everyone in the plan safe and secure. We are willing to have no-obligation conversations with any client who wants to review their plans, introduce security, or just needs a backup team as a GO TO TEAM. Whatever your need, book a Discovery Call and have a chat. We look forward to talking to you.
Are you a security vendor looking for a reliable partner? Look no further than Shergroup. Join forces with us and together we can deliver exceptional security services to clients across various industries. Visit our website at www.shergroup.com to learn more about our collaboration opportunities and take your security business to new heights. Let’s work together to provide top-notch security solutions that exceed expectations. Contact us today and become a valued partner in the Shergroup network.
DISCLAIMER NOTICE |
The following disclaimer applies to Shergroup Limited and its platform, shergroup.com. Please read this notice carefully before accessing or using any information provided on our platform.
By accessing or using shergroup.com, you acknowledge that you have read, understood, and agreed to this disclaimer notice. If you do not agree with any part of this notice, you should refrain from accessing or using shergroup.com.
Last updated | 19 July 2023
Should you have any questions or concerns regarding this disclaimer notice, please contact us at [email protected]