Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Beyond electronic security

Many people see electronics, but few see security. We do not sell alarms or cameras or monitoring or surveillance, but security.

By Eng. Modesto Miguez CPP*

But: What is security?

"Bilateral security"
To understand what refers to the reasons for the success for the provision of "security" services, it can be divided for consideration and analysis to security as the sum of two perfectly differentiated aspects.

- Publicidad -

According to the characteristics of the needs and the recipients of the service, one will apply more than the other:

They are its extremes: quantitative and emotional.

Quantitative security
It's the one you have.
It can be measured.
It is controlled by the left side of the brain.
The rational, calculating and organizational.

It is defined in the different classical methods used to measure risk. The classic example of quantitative risk analysis is the Mosler method. Its most relevant aspect is that in it you can define magnitudes and units.

There are tangible values such as the amount of the loss, the probability of occurrence of an event and the magnitude of the impact.

This security applies when what is at stake can be expressed in kilograms, meters, seconds, watts, percentages, gold, money and any asset (all measurable).

It applies mainly in the theories expressed in the POA (ASIS Asset Protection Manual).

- Publicidad -

The most valued component to determine the success of projects is ROI (return on investment).

Here resources earmarked for security are seen as an investment, not an expense.

It measures how much is invested to achieve "security" and how much is saved in losses by lowering the risk as a probability of occurrence of the different factors causing the loss events.

The relationship between savings in losses and investment to reduce risk is what defines ROI and this will be proportional to the success of the project.

We define as success: to make the investment, to obtain the expected results in the development of a security plan sustained over time in which pre-established procedures such as periodic maintenance were applied with the adjustments and updates that the new security needs demand. (there's a lot of fabric here)

As an example we can cite the installation of a fire protection system.

- Publicidad -

Examples where quantitative security predominates occur when for a company, who decides whether or not the system is made is the finance manager.

He is only interested in numbers, he will seek to verify that by accepting the proposal, the numbers will close better than not doing so.

The keys are, the documentation, the specifications, the contributions of demonstrable information, the regulations, the procedures and the traceability that demonstrates the veracity of the data.

Emotional security:
It's the one you feel.
It cannot be measured.
It is handled by the right side of the brain.
Passion and creativity predominate.

Here the methods and techniques applied for quantitative security only serve to reinforce image.

The key word that defines the level of sense of security is trust.

Therefore everything that reinforces trust adds up and what does not, subtracts.

Because the feeling of security cannot be measured, the zero-sum effects do not apply, the negative factors subtract much more than the positive ones add up.

As an example, it can be said that a lie is not compensated by telling a truth.

Documents according to rules and procedures only reinforce the feeling, but tacit contracts such as "the word" are more valuable.

A responsible professional attitude added to the effort and dedication to make efficient systems is what contributes most to a long-term relationship to be worthy of the trust deposited.

This reinforces the idea that the most valuable "asset" is sustained trust over time.

It applies especially when what is protected are people.

"The tranquility of loved ones" value impossible to measure with quantitative methodologies for risk analysis.

I repeat, the keys to success are all the factors that reinforce trust.

We do not refer to the self-confidence of friendship or kinship but to what is defined as the firm hope that a person has in something working in a certain way, or in that another person acts as it expects.

The immediacy of the response (even if it is only a call or signal acknowledging receipt of a message).
Respect (listening to the customer, striving to understand what they need).
Keep promises (punctuality and responsibility).
The image (from presence to rating on social networks).
The recommendation (preferably disinterested).
Good reputation (positioning, recognition and prestige).
Belonging to a brand.

*If you wish to write to the author of this article, please do so via email [email protected]

Duván Chaverra Agudelo
Author: Duván Chaverra Agudelo
Jefe Editorial en Latin Press, Inc,.
Comunicador Social y Periodista con experiencia de más de 16 años en medios de comunicación. Apasionado por la tecnología y por esta industria. [email protected]

No thoughts on “Beyond electronic security”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter