How Easy Are You?

It’s a question that we all must ask ourselves at some point: “How easy am I to deal with?”

We all have to answer this question in all aspects of our lives. From the personal aspect, how easy are we to deal with as spouses, parents, siblings and children of our parents? In this sense, “easy” will be defined as how well you listen and absorb, handle stress and react to success. From the security consultant’s standpoint, it means how simple it is to see and realize your value from your client’s perspective and whether or not your price is worth that. I want to spend a little time defining what this means from an integrator’s standpoint and from a consultant’s point of view.

Over the last few years, I have heard from integrators that the biggest challenge isn’t necessarily landing projects, but instead keeping margin. By margin, I mean enough of a margin to fund the non-billable items that it takes to be a well-respected, educated and low-turnover integrator. If you have an installation, service and sales function, then you have a bucket full of associated costs that go along with that:

Employees. Finding good technicians, keeping them certified and then keeping them on staff can lead up to a big cost, one that isn’t appreciated by the end user even though they gauge the effectiveness of your company on this component. I am sure there are few out there who have not heard the saying, “Happy employees make and bring happy clients.”

Installation costs. Along with having good employees comes having project managers or lead technicians, depending on your size, that can actually take a project and bring it in on scope, schedule and budget. I would venture to say that inside the core structure of any good project manager is the ultimate ability to manage these three aspects for any project. From an end user’s standpoint, the perfect formula is beyond scope, under budget and on schedule. From the typical integrator’s standpoint, it is normally on scope, on budget and under schedule.

Project management. A good project manager will take scope, schedule and budget, and focus on them individually to ensure that they work together seamlessly.

For scope, he/she focuses on what was sold and whether it will be achievable within the budget and schedule confines. Furthermore, he/she will look at the scope and brainstorm about other issues that typically come up during projects with similar scope and address them early with the client to lay the ground for either consciously excluding these items or providing them at an additional cost.

For budget, a good project manager will first look at the project as sold and gauge, whether or not the budget is achievable, and highlight the threats to the budget. It’s these threats that pose the greatest risk to the margin because profits typically are the first to be pilfered when costs overrun. These threats are typically defined as one of three categories: materials cost too much, labor costs too much or scope creep.

Cost of materials and labor. These only cost more inside a project when there is a lack of focus on what is being provided and the tracking of those materials to that project. Labor costs are the big expense and can be directly related to scope creep. Adding an additional contact on a nearby door, for example, goes a long way for pleasing the client and doesn’t cost that much in material. However, the lost labor cost of running the wire, landing it on the input and programming costs more in labor than it will in material. One of these is probably acceptable without much damage to the margin.

I was recently on a project where I was looking over what was installed versus what was sold. It turned out that there were 12 more door contacts than were in the design and without any additional price request. That hurts margin.

Finding the fine line between what is acceptable and what is not will define how you handle scope creep, which mostly affects labor costs.

The Ease of Customer Service

Most integrators that I interact with from the consultant’s standpoint place their best customer service representatives on the front end of the project to approach potential clients and close the deal. Once the deal is closed, it gets handed off to operations, which is either a project manager or lead installer. After the completion of the install, the next best customer service representative takes over, also known as the service department.

So, what happens during the operations portion of a project when conflict arises? The typical operations lead/decision maker is more about counting beans and watching scope and schedule than looking at what the next project might be out of that client or the impact of a small scale item with the potential of becoming a big scale problem. Here’s where good employees, good project managers and customer service have to do with being easy.

The formula that end users and consultants use is:

Ease of interaction + Technician knowledge of product/install + Reason for change order requests = “Easy”

It’s not a difficult formula. The ease of interaction is a result of responses from the front line sales, the mid-term operation and the conclusion from service.

During these responses, we heard more between “That’s going to be a change…” and “This issue was a result of something changing in the project and the cost for that will be...” These and the technician on site handling equipment issues without them ever knowing it was an issue set the tone for the reaction from the end user every time.

It’s tough enough to maintain margin in a project when it was put into the dirt going into the project. End users, consultants and architects aren’t typically opposed to valid change requests, but have no patience for change requests without advance notice of an issue with subsequent justification for costs. There will still be those items that will cost more to pursue than to just throw in. Make those the small ones, and make them visible afterward, but not in a way that expresses, “I did you a favor.”

This article originally appeared in the July 2014 issue of Security Today.

Featured

  • Collaboration Made Easy Using a Work Management Platform

    Effective collaboration between security operators, teams and other departments is critical to the smooth functioning of organizations. Yet, as organizations grow in complexity, it becomes more difficult for teams to coordinate with each other. This is compounded by staffing shortages, turnover and ineffective collaboration tools. Read Now

  • Creating a Safer World

    Managing and supporting locks and door hardware within a facility is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Read Now

  • Creating More Versatility

    Today, AI has become top of mind for most security professionals. It is the topic of conversation in the technology world and continues to transform the way data is used to make important business decisions. Read Now

  • Report: 78 Percent of CISOs Seeing Significant Impact from AI-Powered Cyber Threats

    Darktrace recently unveiled its 2025 State of AI Cybersecurity report. The findings reveal that 78% of Chief Information Security Officers (CISOs) surveyed say that AI-powered threats are having a significant impact on their organizations, a 5% increase1 from 2024. While an increasing number of CISOs report feeling a significant impact from AI threats, more than 60% now say that they are adequately prepared to defend against these threats, an increase of nearly 15% year-over-year. However, insufficient AI knowledge and skills and a shortage of personnel and talent continue to be listed as the two top inhibitors to a successful defense. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.