SlideShare a Scribd company logo
An overview of Business Security
Proprietary or Contracted
Presentation Outline
Security Concept in Business
• General Security Concept
The prevention of and protection against assault, damage, fire, fraud, invasion of
privacy, theft, unlawful entry, and other such occurrences caused by deliberate action.
• Corporate Security Concept
It refers to the practice of protecting a business‘ employees, physical property and
information systems.
• Supply Chain Security Concept
It refers to efforts to enhance the security of the supply chain, the transport and
logistics system for the world's cargo. It combines traditional practices of supply
chain management with the security requirements driven by threats such as terrorism,
piracy, and theft.
Contemporary Security Concept in Business
• Contemporary Security does not limits to protection and
prevention only.
• In today's global business environment, security must be the top
priority. The functions of security cover largely in managing
Business Continuity. Failure to such can have financial and
management changing impacts upon an organization.
• What Is Business Continuity?
Business continuity encompasses planning and preparation to
ensure that an organization can continue to operate in case of any
level of incidents or disasters and is able to recover to an operational
state within a reasonably short period.
• Employee SafetyEmployee Crime
• Crime by OutsidersNon-Employee Crime
• Target for CybercriminalsCyber Crime
• Proprietary InformationInformation Security
• Movement of Raw Materials from
Receiving to Shipment
Supply Chain Security
• Safeguard FacilityPhysical Security
• Employee ProtectionPersonal Security
• Protect Employees Against Potential
Dangers to Their Health
Health Hazards
Business Continuity
Affects Directly
Assaults and Vandalism
Theft of Goods
Threat to Business Continuity
Electronic Theft
Corporate Espionage
Loss of Access
Legal Liability
Business
Continuity
Types of Security Providing Source
• Police or Govt Law Enforcing Agencies
Security police are those persons, employed by or for a governmental agency,
who provide police and security services to those agencies' properties and in large
scale employed for enforcing the laws of land in area of responsibility.
• Proprietary Security
Proprietary security is a type of security used by the owner of the business.
Proprietary Security will include complete responsibility for the hiring, firing,
and management
• Private Security Company
A private security company is a business corporation, which provides armed and
unarmed security services and expertise to private and public clients.
Comparison between
Proprietary Security and Contracted Security
S/N Consideration Points Proprietary security Contracted Security
1 Control of Quality Greater control by the management Less control of Quality
2 Consistency Better consistency Less consistency
3 Policy and Procedure Company directors can determine the
policies and procedures for the security
staff
Contracted company has its own policy
and procedures
4 Immediate Control Can take immediate action in case of any
lacking of security duty
Not possible, as contracted company
reserves the right of action against his
security staffs
5 Command and control Better command and control for in-house
staffs
Less command and control as its been
controlled by third party
6 Training and Supervision Guards can be trained well as per
business standard
Inadequate training and supervision
7 Dedication More dedicated Dedication is less
8 Loyalty or Ownership Better loyalty or ownership Less loyalty and work commercially
9 Confidentiality Protect confidentiality Threat to loss business confidentiality
10 Familiarity in Specific
business needs
Guards can be trained and be familiar as
per business requirement
Training cannot be possible as per
different business needs
11 Supply Chain Security Provide better supply chain security Lack of training is weakness in supply
chain security
Comparison between
Proprietary Security and Contracted Security
S/
N
Consideration Points Proprietary security Contracted Security
12 Communication Enables better communication Better Communication
13 Response to Fire Incident Act as quick response team Response is not sufficient
14 Balance in behavior Can be trained well to balance in
behaving different types of
employee
Training is difficult to balance
employee behavior
15 Customer service and
response times
Greater Monitoring Less Monitoring
16 Cost Cost increases in worker benefits
and compensation
Cost increase as per contractual
deal
17 Flexibility of Personals Less flexible More flexible in replacement
18 Management Needs special management Management is done by
contractor
19 Training and Recruiting Needs manpower Training and recruitment is
done by contractor
20 General Administration Needs manpower Administration is maintained by
contractor
21 Payroll Staff are considered additional
employees on the company's
payroll
Staffs are maintained in
contracted company's payroll
www.dbl-group.com
• HR Consultancy FarmHR & Payroll
• Financial Consultancy FarmFinance
• Security CompanySecurity
• Rent-A-Car CompanyTransport
• Hospital and ClinicMedical
Overall Cost
Control
Consistency
Effectiveness
Liability
Loyalty
Management
Quality of Training
The role of security is to
improve a business and
the protections, quality,
and future performance
The most important and valuable business assets should be guarded
encompassing maximum Quality ,Loyalty and Control
Tha nk You

More Related Content

What's hot

2016_William_Gibson
2016_William_Gibson2016_William_Gibson
2016_William_Gibson
Bill Gibson
 
VIP security
VIP security VIP security
VIP security
worldprotection
 
Key pillars for effective risk management
Key pillars for effective risk managementKey pillars for effective risk management
Key pillars for effective risk management
Ramana K V
 
SRS Capability Statement v3.0
SRS Capability Statement v3.0SRS Capability Statement v3.0
SRS Capability Statement v3.0
Specialist Resilience Solutions Ltd
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
Gerhard Peens
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
Continuity and Resilience
 

What's hot (6)

2016_William_Gibson
2016_William_Gibson2016_William_Gibson
2016_William_Gibson
 
VIP security
VIP security VIP security
VIP security
 
Key pillars for effective risk management
Key pillars for effective risk managementKey pillars for effective risk management
Key pillars for effective risk management
 
SRS Capability Statement v3.0
SRS Capability Statement v3.0SRS Capability Statement v3.0
SRS Capability Statement v3.0
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Risk and Business Continuity Management
Risk and Business Continuity ManagementRisk and Business Continuity Management
Risk and Business Continuity Management
 

Viewers also liked

Forex Trading Education & Forex Course
Forex Trading Education & Forex CourseForex Trading Education & Forex Course
Forex Trading Education & Forex Course
David James
 
MSGD-assignment-NeerajMaurya-v5
MSGD-assignment-NeerajMaurya-v5MSGD-assignment-NeerajMaurya-v5
MSGD-assignment-NeerajMaurya-v5
Neeraj Maurya
 
Resume
ResumeResume
Resume
Ashok .R
 
Bab 3
Bab 3Bab 3
Apps
AppsApps
Educ 400 portfolio requirement sp17
Educ 400 portfolio requirement sp17Educ 400 portfolio requirement sp17
Educ 400 portfolio requirement sp17
Santa Fe Community College
 
Learning to Optimize
Learning to OptimizeLearning to Optimize
Learning to Optimize
Pramit Choudhary
 
Creativity and Copywriting - Research
Creativity and Copywriting - ResearchCreativity and Copywriting - Research
Creativity and Copywriting - Research
Margery Lynn
 
Экологический календарь 2017
Экологический календарь 2017Экологический календарь 2017
Экологический календарь 2017
shamardina
 
Cuentas de Almacenamiento en Microsoft Azure con C#
Cuentas de Almacenamiento en Microsoft Azure con C#Cuentas de Almacenamiento en Microsoft Azure con C#
Cuentas de Almacenamiento en Microsoft Azure con C#
Víctor Moreno
 
How to clean a gas bbq
How to clean a gas bbqHow to clean a gas bbq
How to clean a gas bbq
Texas Grill Master
 
Glass In Construction
Glass In ConstructionGlass In Construction
Glass In Construction
Achal Dadhania
 
Mr. Gilbert Gonzales
Mr. Gilbert GonzalesMr. Gilbert Gonzales
Mr. Gilbert Gonzales
Gilbert Gonzales
 

Viewers also liked (13)

Forex Trading Education & Forex Course
Forex Trading Education & Forex CourseForex Trading Education & Forex Course
Forex Trading Education & Forex Course
 
MSGD-assignment-NeerajMaurya-v5
MSGD-assignment-NeerajMaurya-v5MSGD-assignment-NeerajMaurya-v5
MSGD-assignment-NeerajMaurya-v5
 
Resume
ResumeResume
Resume
 
Bab 3
Bab 3Bab 3
Bab 3
 
Apps
AppsApps
Apps
 
Educ 400 portfolio requirement sp17
Educ 400 portfolio requirement sp17Educ 400 portfolio requirement sp17
Educ 400 portfolio requirement sp17
 
Learning to Optimize
Learning to OptimizeLearning to Optimize
Learning to Optimize
 
Creativity and Copywriting - Research
Creativity and Copywriting - ResearchCreativity and Copywriting - Research
Creativity and Copywriting - Research
 
Экологический календарь 2017
Экологический календарь 2017Экологический календарь 2017
Экологический календарь 2017
 
Cuentas de Almacenamiento en Microsoft Azure con C#
Cuentas de Almacenamiento en Microsoft Azure con C#Cuentas de Almacenamiento en Microsoft Azure con C#
Cuentas de Almacenamiento en Microsoft Azure con C#
 
How to clean a gas bbq
How to clean a gas bbqHow to clean a gas bbq
How to clean a gas bbq
 
Glass In Construction
Glass In ConstructionGlass In Construction
Glass In Construction
 
Mr. Gilbert Gonzales
Mr. Gilbert GonzalesMr. Gilbert Gonzales
Mr. Gilbert Gonzales
 

Similar to Business complex security in-house or contracted

Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
Donald Tabone
 
Company Profile Master 2015
Company Profile Master  2015Company Profile Master  2015
Company Profile Master 2015
Nigel (Tmp Security) Fitton
 
The Necessity of Security Guard Services in Edmonton Public Events.pdf
The Necessity of Security Guard Services in Edmonton Public Events.pdfThe Necessity of Security Guard Services in Edmonton Public Events.pdf
The Necessity of Security Guard Services in Edmonton Public Events.pdf
Security Company Edmonton
 
Focus on Hybrid Security while Selling or Buying a Business | Enterprise Wired
Focus on Hybrid Security while Selling or Buying a Business  | Enterprise WiredFocus on Hybrid Security while Selling or Buying a Business  | Enterprise Wired
Focus on Hybrid Security while Selling or Buying a Business | Enterprise Wired
Enterprise Wired
 
Why Is Security Training Important.pptx
Why Is Security Training Important.pptxWhy Is Security Training Important.pptx
Why Is Security Training Important.pptx
Phoenix Protection Services
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
Major K. Subramaniam Kmaravehlu
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
Security Guards
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
elizabethrdusek
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
elizabethrdusek
 
My_notes_part1.pdf
My_notes_part1.pdfMy_notes_part1.pdf
My_notes_part1.pdf
PhilLopez4
 
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docxAlarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
voltronoperations
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
NA Putra
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
Anne Starr
 
Corporate Safety Governance and Role of Leadeship
Corporate Safety Governance and Role of LeadeshipCorporate Safety Governance and Role of Leadeship
Corporate Safety Governance and Role of Leadeship
Consultivo
 
Security Culture
Security CultureSecurity Culture
On point presentation
On point presentationOn point presentation
On point presentation
Paul Latorre
 
Securitas Heimdallr (Private) Limited- Company Profile
Securitas Heimdallr (Private) Limited- Company ProfileSecuritas Heimdallr (Private) Limited- Company Profile
Securitas Heimdallr (Private) Limited- Company Profile
Nuwan Gamage
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial Risks
David Chase
 
Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’
Dragon Dream Bar
 
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Polsinelli PC
 

Similar to Business complex security in-house or contracted (20)

Selling security to the C-level
Selling security to the C-levelSelling security to the C-level
Selling security to the C-level
 
Company Profile Master 2015
Company Profile Master  2015Company Profile Master  2015
Company Profile Master 2015
 
The Necessity of Security Guard Services in Edmonton Public Events.pdf
The Necessity of Security Guard Services in Edmonton Public Events.pdfThe Necessity of Security Guard Services in Edmonton Public Events.pdf
The Necessity of Security Guard Services in Edmonton Public Events.pdf
 
Focus on Hybrid Security while Selling or Buying a Business | Enterprise Wired
Focus on Hybrid Security while Selling or Buying a Business  | Enterprise WiredFocus on Hybrid Security while Selling or Buying a Business  | Enterprise Wired
Focus on Hybrid Security while Selling or Buying a Business | Enterprise Wired
 
Why Is Security Training Important.pptx
Why Is Security Training Important.pptxWhy Is Security Training Important.pptx
Why Is Security Training Important.pptx
 
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSMBLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
BLE 1213 PSM (SESSION 6).ppt- Session 6 - Tools and Techniques for PSM
 
Importance of workplace Security.pptx
Importance of workplace Security.pptxImportance of workplace Security.pptx
Importance of workplace Security.pptx
 
Small Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdfSmall Business Playbook for Security and Compliance Success.pdf
Small Business Playbook for Security and Compliance Success.pdf
 
Small Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptxSmall Business Playbook for Security and Compliance Success.pptx
Small Business Playbook for Security and Compliance Success.pptx
 
My_notes_part1.pdf
My_notes_part1.pdfMy_notes_part1.pdf
My_notes_part1.pdf
 
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docxAlarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
Alarm & Patrol Services_ Safeguarding Your Property and Peace of Mind.docx
 
NQA - Information security best practice guide
NQA - Information security best practice guideNQA - Information security best practice guide
NQA - Information security best practice guide
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Corporate Safety Governance and Role of Leadeship
Corporate Safety Governance and Role of LeadeshipCorporate Safety Governance and Role of Leadeship
Corporate Safety Governance and Role of Leadeship
 
Security Culture
Security CultureSecurity Culture
Security Culture
 
On point presentation
On point presentationOn point presentation
On point presentation
 
Securitas Heimdallr (Private) Limited- Company Profile
Securitas Heimdallr (Private) Limited- Company ProfileSecuritas Heimdallr (Private) Limited- Company Profile
Securitas Heimdallr (Private) Limited- Company Profile
 
Intermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial RisksIntermountain CFO Summit - Managing Financial Risks
Intermountain CFO Summit - Managing Financial Risks
 
Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’Securing Your Peace of Mind: Private Security Guard Services’
Securing Your Peace of Mind: Private Security Guard Services’
 
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
Breach Response Matters: Effectively Handling Health Care Cyber Security Inci...
 

Recently uploaded

Jpeg to Dst File Converter - Guidebook by Image2Emb.docx
Jpeg to Dst File Converter - Guidebook by Image2Emb.docxJpeg to Dst File Converter - Guidebook by Image2Emb.docx
Jpeg to Dst File Converter - Guidebook by Image2Emb.docx
Image 2 EMB
 
Electrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptxElectrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptx
sandeepmetsuae
 
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptxTop 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
e-Definers Technology
 
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in PakistanCheck SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
ownerdetailssim
 
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
betterworlds2012
 
Generate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model StrategyGenerate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model Strategy
RNayak3
 
antivirus and security software | basics
antivirus and security software | basicsantivirus and security software | basics
antivirus and security software | basics
basicsprotection
 
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
usaisofficial
 
Find Sim Owner Details | +447490809237 | Paid Sim Details
Find Sim Owner Details | +447490809237 | Paid Sim DetailsFind Sim Owner Details | +447490809237 | Paid Sim Details
Find Sim Owner Details | +447490809237 | Paid Sim Details
ownerdetailssim
 
DOJO Training room | Training DOJO PPT
DOJO Training room | Training DOJO   PPTDOJO Training room | Training DOJO   PPT
DOJO Training room | Training DOJO PPT
Himanshu
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
Godwin Emmanuel Oyedokun MBA MSc PhD FCA FCTI FCNA CFE FFAR
 
sim owner details | +447490809237 | sim owner details pakistan
sim owner details | +447490809237 | sim owner details pakistansim owner details | +447490809237 | sim owner details pakistan
sim owner details | +447490809237 | sim owner details pakistan
ownerdetailssim
 
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdfThe best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
tonytkelly6
 
Electrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdfElectrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdf
sandeepmetsuae
 
#1 Call Girls in Islamabad || 03274100048 || Quick Booking at Affordable Price
#1 Call Girls in Islamabad || 03274100048 || Quick Booking at Affordable Price#1 Call Girls in Islamabad || 03274100048 || Quick Booking at Affordable Price
#1 Call Girls in Islamabad || 03274100048 || Quick Booking at Affordable Price
ownerdetailssim
 
Check CNIC Information | +447490809237 | CNIC Details Checker
Check CNIC Information | +447490809237 | CNIC Details CheckerCheck CNIC Information | +447490809237 | CNIC Details Checker
Check CNIC Information | +447490809237 | CNIC Details Checker
ownerdetailssim
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
gaurisiddhivinayakte
 
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital MarketingBilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar
 
Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024
growthgrids
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
Outdoor Home Decor Company
 

Recently uploaded (20)

Jpeg to Dst File Converter - Guidebook by Image2Emb.docx
Jpeg to Dst File Converter - Guidebook by Image2Emb.docxJpeg to Dst File Converter - Guidebook by Image2Emb.docx
Jpeg to Dst File Converter - Guidebook by Image2Emb.docx
 
Electrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptxElectrical Testing Lab Services in Dubai.pptx
Electrical Testing Lab Services in Dubai.pptx
 
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptxTop 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
Top 10 Challenges That Every Web Designer Face on A Daily Basis.pptx
 
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in PakistanCheck SIM Owner Details | +447490809237 | Sim Details in Pakistan
Check SIM Owner Details | +447490809237 | Sim Details in Pakistan
 
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
Visions of Reality Inspiring Innovations from MIT Reality Hack 2024.
 
Generate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model StrategyGenerate Revenue with Contact Center Business Model Strategy
Generate Revenue with Contact Center Business Model Strategy
 
antivirus and security software | basics
antivirus and security software | basicsantivirus and security software | basics
antivirus and security software | basics
 
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
How Can I Apply in India (2024) for a US B1/B2 Visa Renewal?
 
Find Sim Owner Details | +447490809237 | Paid Sim Details
Find Sim Owner Details | +447490809237 | Paid Sim DetailsFind Sim Owner Details | +447490809237 | Paid Sim Details
Find Sim Owner Details | +447490809237 | Paid Sim Details
 
DOJO Training room | Training DOJO PPT
DOJO Training room | Training DOJO   PPTDOJO Training room | Training DOJO   PPT
DOJO Training room | Training DOJO PPT
 
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report –  What the Certified Fraud Examiner Should KnowThe Fraud Examiner’s Report –  What the Certified Fraud Examiner Should Know
The Fraud Examiner’s Report – What the Certified Fraud Examiner Should Know
 
sim owner details | +447490809237 | sim owner details pakistan
sim owner details | +447490809237 | sim owner details pakistansim owner details | +447490809237 | sim owner details pakistan
sim owner details | +447490809237 | sim owner details pakistan
 
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdfThe best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
The best Social Media Spy Apps for Catching Your Unfaithful Wife.pdf
 
Electrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdfElectrical Testing Lab Services in Dubai.pdf
Electrical Testing Lab Services in Dubai.pdf
 
#1 Call Girls in Islamabad || 03274100048 || Quick Booking at Affordable Price
#1 Call Girls in Islamabad || 03274100048 || Quick Booking at Affordable Price#1 Call Girls in Islamabad || 03274100048 || Quick Booking at Affordable Price
#1 Call Girls in Islamabad || 03274100048 || Quick Booking at Affordable Price
 
Check CNIC Information | +447490809237 | CNIC Details Checker
Check CNIC Information | +447490809237 | CNIC Details CheckerCheck CNIC Information | +447490809237 | CNIC Details Checker
Check CNIC Information | +447490809237 | CNIC Details Checker
 
Siddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TXSiddhivinayak temple timings Houston, TX
Siddhivinayak temple timings Houston, TX
 
Bilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital MarketingBilal Ibrar - Resume 2024 - Digital Marketing
Bilal Ibrar - Resume 2024 - Digital Marketing
 
Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024Best Web Development Frameworks in 2024
Best Web Development Frameworks in 2024
 
Exceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in MelbourneExceptional Landscape Architecture Services in Melbourne
Exceptional Landscape Architecture Services in Melbourne
 

Business complex security in-house or contracted

  • 1. An overview of Business Security Proprietary or Contracted
  • 3. Security Concept in Business • General Security Concept The prevention of and protection against assault, damage, fire, fraud, invasion of privacy, theft, unlawful entry, and other such occurrences caused by deliberate action. • Corporate Security Concept It refers to the practice of protecting a business‘ employees, physical property and information systems. • Supply Chain Security Concept It refers to efforts to enhance the security of the supply chain, the transport and logistics system for the world's cargo. It combines traditional practices of supply chain management with the security requirements driven by threats such as terrorism, piracy, and theft.
  • 4. Contemporary Security Concept in Business • Contemporary Security does not limits to protection and prevention only. • In today's global business environment, security must be the top priority. The functions of security cover largely in managing Business Continuity. Failure to such can have financial and management changing impacts upon an organization. • What Is Business Continuity? Business continuity encompasses planning and preparation to ensure that an organization can continue to operate in case of any level of incidents or disasters and is able to recover to an operational state within a reasonably short period.
  • 5. • Employee SafetyEmployee Crime • Crime by OutsidersNon-Employee Crime • Target for CybercriminalsCyber Crime
  • 6. • Proprietary InformationInformation Security • Movement of Raw Materials from Receiving to Shipment Supply Chain Security • Safeguard FacilityPhysical Security • Employee ProtectionPersonal Security • Protect Employees Against Potential Dangers to Their Health Health Hazards Business Continuity Affects Directly
  • 7. Assaults and Vandalism Theft of Goods Threat to Business Continuity Electronic Theft Corporate Espionage Loss of Access Legal Liability Business Continuity
  • 8. Types of Security Providing Source • Police or Govt Law Enforcing Agencies Security police are those persons, employed by or for a governmental agency, who provide police and security services to those agencies' properties and in large scale employed for enforcing the laws of land in area of responsibility. • Proprietary Security Proprietary security is a type of security used by the owner of the business. Proprietary Security will include complete responsibility for the hiring, firing, and management • Private Security Company A private security company is a business corporation, which provides armed and unarmed security services and expertise to private and public clients.
  • 9. Comparison between Proprietary Security and Contracted Security S/N Consideration Points Proprietary security Contracted Security 1 Control of Quality Greater control by the management Less control of Quality 2 Consistency Better consistency Less consistency 3 Policy and Procedure Company directors can determine the policies and procedures for the security staff Contracted company has its own policy and procedures 4 Immediate Control Can take immediate action in case of any lacking of security duty Not possible, as contracted company reserves the right of action against his security staffs 5 Command and control Better command and control for in-house staffs Less command and control as its been controlled by third party 6 Training and Supervision Guards can be trained well as per business standard Inadequate training and supervision 7 Dedication More dedicated Dedication is less 8 Loyalty or Ownership Better loyalty or ownership Less loyalty and work commercially 9 Confidentiality Protect confidentiality Threat to loss business confidentiality 10 Familiarity in Specific business needs Guards can be trained and be familiar as per business requirement Training cannot be possible as per different business needs 11 Supply Chain Security Provide better supply chain security Lack of training is weakness in supply chain security
  • 10. Comparison between Proprietary Security and Contracted Security S/ N Consideration Points Proprietary security Contracted Security 12 Communication Enables better communication Better Communication 13 Response to Fire Incident Act as quick response team Response is not sufficient 14 Balance in behavior Can be trained well to balance in behaving different types of employee Training is difficult to balance employee behavior 15 Customer service and response times Greater Monitoring Less Monitoring 16 Cost Cost increases in worker benefits and compensation Cost increase as per contractual deal 17 Flexibility of Personals Less flexible More flexible in replacement 18 Management Needs special management Management is done by contractor 19 Training and Recruiting Needs manpower Training and recruitment is done by contractor 20 General Administration Needs manpower Administration is maintained by contractor 21 Payroll Staff are considered additional employees on the company's payroll Staffs are maintained in contracted company's payroll www.dbl-group.com
  • 11. • HR Consultancy FarmHR & Payroll • Financial Consultancy FarmFinance • Security CompanySecurity • Rent-A-Car CompanyTransport • Hospital and ClinicMedical
  • 12. Overall Cost Control Consistency Effectiveness Liability Loyalty Management Quality of Training The role of security is to improve a business and the protections, quality, and future performance The most important and valuable business assets should be guarded encompassing maximum Quality ,Loyalty and Control