Discussing Security

Why leveraging an OPEX vs. CAPEX System acquisition model makes sense in today’s economy

There continues to be much discussion on the topic of how and where physical security should fit within an organization’s overall balance sheet. The fact that security operations centers (SOCs) are transitioning from being purely cost centers to potential profit centers as traditional video surveillance and security technologies are being used for myriad business intelligence applications across the enterprise.

The proliferation of smart edge devices that aggregate data and interoperate with other devices and systems on the network, is also fueling this migration by delivering additional sources of data that can help to streamline workflows, build efficiencies and save costs along with numerous other benefits.

While this has been an undeniable boon to security practitioners who need to ensure their systems and solutions remain up to date to protect their employers from risk and liability, there is still room for improvement when it comes to finding the best justifications for expenditures on physical and cyber security upgrades and new systems.

Some of the biggest News stories over the last few years have revolved around corporate vulnerabilities and the negative impacts that breaches have had on brand value, financial profiles and personal liabilities of the individuals within leadership positions. As risk mitigation becomes a greater concern, the security professionals in C-suite and other top positions are becoming more and more central to ensuring the longevity and value of companies.

It is these security professionals who are finding themselves in the position of determining the best ways to protect the business – a task that encompasses a wide range of responsibilities.

For example, the director of security is best-positioned to make a recommendation for new expenditures or identify areas where security has been underfunded. Similarly, in times of downturn, that same person is well-placed with the experience and knowledge to identify where cuts can reasonably be made without seriously harming the risk profile of the brand. When security is viewed as a contributor to business intelligence rather than simply a cost center, it is less likely to be impacted as there are global cuts to the budget that do not take these elements into consideration.

For these contemporary security leaders, there are significant benefits to placing physical security within the category of operational expenditures. Eliminating the need for a large initial investment reduces the TCO (total cost of ownership), which is often an objective for budget planning. Creating a monthly expense category for security opens opportunities to deploy solutions that are more costly and deliver better outcomes for the organization.

Many advanced technology solutions reaching the market today are sold within subscription-based software models, which fit into the OPEX structure and enable security operators to realize greater ROI from their security budgets. This financial structure also creates a better framework for scalability, making business growth a smoother and more organic process.

The same business model has become ubiquitous for most business systems. Companies routinely lease office equipment instead of purchasing it, and many of the most-used business software systems are only available as a subscription. This helps to pave the way for a better understanding of the benefits of the OPEX structure among upper management, who can clearly experience the advantages of always having the most up-to-date accounting, document processing, graphics and other software systems in place. A further advantage can be realized by companies who no longer need to spend their after-tax dollars and spend them on non-revenue generating assets that begin to depreciate the moment they are purchased.

As security solutions have migrated to the network, with new systems such as access control often use a thin client and hardware devices such as video surveillance cameras occupying a place on the Internet of Things, it has become clear that the future of security as an expense category is within OPEX. Cloud-based services are continuing to evolve, taking a larger percentage of the overall market, while edge devices continue to drop in price as their features move into the centrally based software realm.

Providers offering Security as a Service have made it easier for those expenses to be considered as ongoing for operations rather than a single one-time investment. At the same time, it places much of the burden for maintenance, upgrades and oversight into the hands of those providers rather than the end users – creating an additional advantage.

Many vendors of security solutions, whether they are manufacturers or integrators, are in a better position to stay up-to-date on the newest trends in technology and capabilities in areas like Artificial Intelligence, deep learning, behavioral analytics and other complex areas of development. It is to their financial benefit to offer the newest and best products, and to make sure their customers are kept up to date with the solutions they have deployed.

Vendors have fully embraced the OPEX model as well, since it delivers a dependable stream of recurring monthly revenue that is beneficial to their business operations and financial planning. They are also better able to leverage their expertise by providing a more consultative service to their customers, which is good for both parties.

Over time, security will continue to migrate to an operational expense as the managed service model becomes more entrenched and demonstrates higher value to organizations. It is the historical path of this type of trend that it reverses itself every few years as people search for new ways to create efficiencies within business operations. However, because of the nature of how physical security has evolved – with a strong shift from local hardware systems to network-based interoperable systems – this is a trend that may have found permanent traction.

This article originally appeared in the July / August 2022 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3