Preview

Contract Security vs. Proprietary Security

Good Essays
Open Document
Open Document
811 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Contract Security vs. Proprietary Security
Contract Security vs. Proprietary Security
Christopher R Raetano
University of Phoenix

Security is an essential part of any organization. Our manufacturing plant is no different. In this manufacturing plant we are tasked with making high-tech components for an international automobile manufacture. It is our responsibility as a company to ensure that those components reach the manufacture in a timely manner and intact. Because of the cost associated with the manufacturing these high-tech components it is my responsibility as the security manager to recommend a security service that suits our business and can be integrated seamlessly into daily operations. There are two types of security systems that could be used, a contract security agency or a proprietary security system.
Contract security is much like what it sounds. The company hires an outside company to provide security services. “Contract security companies recruit, screen, hire, train and supervise security personnel. From the time we wake until the time we go to bed and sometimes in the middle of the night, everything we do is all geared to enhancing the tasks we perform. If security is not your company 's core competency, this job will be better performed and supported by people who focus on it relentlessly.” (Zalud, 2007) The advantage to hiring contact security is all applications of security are controlled by an outside agency. If we are unsatisfied with the style or type of service we receive we can terminate the contract. This is also a disadvantage, because we lack the control of the guards, discipline is handled through the security company. There is also the cost of having contract security. It is in the company’s best interest to negotiate a contract that provides reliable security but not at the cost of handcuffing the company in other aspects of security.
Proprietary security is the exact opposite of contract security. With proprietary security all security personnel



References: Zalud, B. (2007). Enterprise-Wide Alignment Drives Contract or Proprietary Decisions. Security Magazine

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    The following document outlines Richman Investments security measures for IT infrastructure. There are many components that make up the Richman Investments network, and so there should be a multi-layered security solution to protect it. The server room has been located in the central part of the building, and will be physically protected by electronic door locks with keypad combination access. There are a limited number of personnel who will have access to this room in order to decrease the potential for tampering. Each of these personnel will have their own access code, and a digital log will be kept of all access.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    ITNE455-1204A-01 U3GP3

    • 5030 Words
    • 21 Pages

    Security is embraced by the executive management staff at MJD Electronics. An important task for the Chief Security and Compliance Officer for MJD Electronics is to outline a plan that makes considerations for many of the important aspects of valid security architecture. This discussion presents more detailed information on many topics that should be included in a solid security architecture including border routers, demilitarized zones, proxy firewalls, access control lists and filters, fail-safe equipment, and more.…

    • 5030 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    The level of security can determine the rise and fall of any organization, no matter how big or small the company may seem, so mitigating risk should always be the number one priority. Risk mitigation can be define as the process of implementing any form strategic actions that will reduce the level of threats that may cause financial hardship towards the organization. In addition, risk mitigation tracks, identify and evaluation all form of risk, including new and old. The focus of risk mitigation is to assist the organization’s department of security administration with identifying a list of potential problems that…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    unit 2 p3

    • 632 Words
    • 2 Pages

    Security – security is something every buisness needs in order to make the customers and employees safe enough to be or enter the business. Security includes video cameras within the store just which could be used as proves if a robbery happen or somethin went missing within the business, security guard etc… the security guard need to have skills in order to work in the business, for example, Marks and Spencer need security guards who pocess communication skills as its important for them to communicate well with customers as they represent the business.…

    • 632 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Cmgt400 Week3

    • 1493 Words
    • 6 Pages

    Security authentication is, as defined by our text, “the process of establishing a user 's identity to enable the granting of permissions.” This is a rather simple definition of a process that has many different areas and permutations that it encapsulates and includes within its scope. In order to better illustrate the concepts and requirements of a viable information security plan, they will be applied to Kudler Fine Foods. The final analysis of the weaknesses and strengths in the current setup of Kudler Fine Foods information security setup will provide a good direction for the new policy to be implemented.…

    • 1493 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    As a new security manager for a retail operation, you have been asked to create a new loss prevention and risk management program that will be presented to upper management.…

    • 438 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    week 3

    • 580 Words
    • 3 Pages

    In the ongoing process of analyzing the HR department of Riordan Manufacturing and integrate the existing tools into a single application, the project now transitions from the analysis phase to the design phase. This phase will include a description of the application architecture and process design as well as a high-level description of recommended security tools. A description of the system’s architecture in terms of data, processes, interfaces, and network are also included in this phase and will be addressed in this portion of the paper. Finally, a physical data flow diagram will be included to show how the system will take in data and deliver and expected output.…

    • 580 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Security is a compelling concern for business and employees. Employers need to establish that they carry out complete risk assessment and address security issues by implementing required security systems. Physical security system is a fundamental component of an establishment, which protects a several aspects such as building security, theft, vandalism and falsification of records. Therefore, organizations and companies need to highly aware of to protect their physical assets. The foundation of a competent security management can prevents such risk like discovering solutions, authorization, and controlling employee’s activities. As a result, organizations can ensure the safety and protection of employees and property.…

    • 1377 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Santander is an example of a company who made sure that security is top of the game, the reason for this is this company deals with thousands of customers account details may it be for credit cards or store cards, each member of staff are put through training which explains all about data protection and what to do and not to do. The ways in which staffs are told to deal with the accounts are as…

    • 620 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Miss

    • 2737 Words
    • 11 Pages

    Security and theft- You can improve the physical security of your organisation or service by installing electronic security systems such as cctv, intruder alarms and security lights. Improving perimeter security installing barriers, screens, using security personnel and contractors will also minimise risks of security breaches and theft.…

    • 2737 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    sec 410

    • 1157 Words
    • 5 Pages

    It is important for all organizations to have physical security. Physical security protects the organization in every way. Every individual needs to be aware of the importance of physical security. Not only is important for the individual to be aware of the importance physical security has in an organization but to be able to understand how physical security works within the organization. In this paper the writer will be describing the core concepts of physical security. Additionally the writer would be writing about the security assessments. Last the writing would be writing about the basic physical controls.…

    • 1157 Words
    • 5 Pages
    Better Essays

Related Topics