How Easy Are You?

It’s a question that we all must ask ourselves at some point: “How easy am I to deal with?”

We all have to answer this question in all aspects of our lives. From the personal aspect, how easy are we to deal with as spouses, parents, siblings and children of our parents? In this sense, “easy” will be defined as how well you listen and absorb, handle stress and react to success. From the security consultant’s standpoint, it means how simple it is to see and realize your value from your client’s perspective and whether or not your price is worth that. I want to spend a little time defining what this means from an integrator’s standpoint and from a consultant’s point of view.

Over the last few years, I have heard from integrators that the biggest challenge isn’t necessarily landing projects, but instead keeping margin. By margin, I mean enough of a margin to fund the non-billable items that it takes to be a well-respected, educated and low-turnover integrator. If you have an installation, service and sales function, then you have a bucket full of associated costs that go along with that:

Employees. Finding good technicians, keeping them certified and then keeping them on staff can lead up to a big cost, one that isn’t appreciated by the end user even though they gauge the effectiveness of your company on this component. I am sure there are few out there who have not heard the saying, “Happy employees make and bring happy clients.”

Installation costs. Along with having good employees comes having project managers or lead technicians, depending on your size, that can actually take a project and bring it in on scope, schedule and budget. I would venture to say that inside the core structure of any good project manager is the ultimate ability to manage these three aspects for any project. From an end user’s standpoint, the perfect formula is beyond scope, under budget and on schedule. From the typical integrator’s standpoint, it is normally on scope, on budget and under schedule.

Project management. A good project manager will take scope, schedule and budget, and focus on them individually to ensure that they work together seamlessly.

For scope, he/she focuses on what was sold and whether it will be achievable within the budget and schedule confines. Furthermore, he/she will look at the scope and brainstorm about other issues that typically come up during projects with similar scope and address them early with the client to lay the ground for either consciously excluding these items or providing them at an additional cost.

For budget, a good project manager will first look at the project as sold and gauge, whether or not the budget is achievable, and highlight the threats to the budget. It’s these threats that pose the greatest risk to the margin because profits typically are the first to be pilfered when costs overrun. These threats are typically defined as one of three categories: materials cost too much, labor costs too much or scope creep.

Cost of materials and labor. These only cost more inside a project when there is a lack of focus on what is being provided and the tracking of those materials to that project. Labor costs are the big expense and can be directly related to scope creep. Adding an additional contact on a nearby door, for example, goes a long way for pleasing the client and doesn’t cost that much in material. However, the lost labor cost of running the wire, landing it on the input and programming costs more in labor than it will in material. One of these is probably acceptable without much damage to the margin.

I was recently on a project where I was looking over what was installed versus what was sold. It turned out that there were 12 more door contacts than were in the design and without any additional price request. That hurts margin.

Finding the fine line between what is acceptable and what is not will define how you handle scope creep, which mostly affects labor costs.

The Ease of Customer Service

Most integrators that I interact with from the consultant’s standpoint place their best customer service representatives on the front end of the project to approach potential clients and close the deal. Once the deal is closed, it gets handed off to operations, which is either a project manager or lead installer. After the completion of the install, the next best customer service representative takes over, also known as the service department.

So, what happens during the operations portion of a project when conflict arises? The typical operations lead/decision maker is more about counting beans and watching scope and schedule than looking at what the next project might be out of that client or the impact of a small scale item with the potential of becoming a big scale problem. Here’s where good employees, good project managers and customer service have to do with being easy.

The formula that end users and consultants use is:

Ease of interaction + Technician knowledge of product/install + Reason for change order requests = “Easy”

It’s not a difficult formula. The ease of interaction is a result of responses from the front line sales, the mid-term operation and the conclusion from service.

During these responses, we heard more between “That’s going to be a change…” and “This issue was a result of something changing in the project and the cost for that will be...” These and the technician on site handling equipment issues without them ever knowing it was an issue set the tone for the reaction from the end user every time.

It’s tough enough to maintain margin in a project when it was put into the dirt going into the project. End users, consultants and architects aren’t typically opposed to valid change requests, but have no patience for change requests without advance notice of an issue with subsequent justification for costs. There will still be those items that will cost more to pursue than to just throw in. Make those the small ones, and make them visible afterward, but not in a way that expresses, “I did you a favor.”

This article originally appeared in the July 2014 issue of Security Today.

Featured

  • The Future of Access Control: Cloud-Based Solutions for Safer Workplaces

    Access controls have revolutionized the way we protect our people, assets and operations. Gone are the days of cumbersome keychains and the security liabilities they introduced, but it’s a mistake to think that their evolution has reached its peak. Read Now

  • A Look at AI

    Large language models (LLMs) have taken the world by storm. Within months of OpenAI launching its AI chatbot, ChatGPT, it amassed more than 100 million users, making it the fastest-growing consumer application in history. Read Now

  • First, Do No Harm: Responsibly Applying Artificial Intelligence

    It was 2022 when early LLMs (Large Language Models) brought the term “AI” into mainstream public consciousness and since then, we’ve seen security corporations and integrators attempt to develop their solutions and sales pitches around the biggest tech boom of the 21st century. However, not all “artificial intelligence” is equally suitable for security applications, and it’s essential for end users to remain vigilant in understanding how their solutions are utilizing AI. Read Now

  • Improve Incident Response With Intelligent Cloud Video Surveillance

    Video surveillance is a vital part of business security, helping institutions protect against everyday threats for increased employee, customer, and student safety. However, many outdated surveillance solutions lack the ability to offer immediate insights into critical incidents. This slows down investigations and limits how effectively teams can respond to situations, creating greater risks for the organization. Read Now

  • Security Today Announces 2025 CyberSecured Award Winners

    Security Today is pleased to announce the 2025 CyberSecured Awards winners. Sixteen companies are being recognized this year for their network products and other cybersecurity initiatives that secure our world today. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.