Discussing Security

Why leveraging an OPEX vs. CAPEX System acquisition model makes sense in today’s economy

There continues to be much discussion on the topic of how and where physical security should fit within an organization’s overall balance sheet. The fact that security operations centers (SOCs) are transitioning from being purely cost centers to potential profit centers as traditional video surveillance and security technologies are being used for myriad business intelligence applications across the enterprise.

The proliferation of smart edge devices that aggregate data and interoperate with other devices and systems on the network, is also fueling this migration by delivering additional sources of data that can help to streamline workflows, build efficiencies and save costs along with numerous other benefits.

While this has been an undeniable boon to security practitioners who need to ensure their systems and solutions remain up to date to protect their employers from risk and liability, there is still room for improvement when it comes to finding the best justifications for expenditures on physical and cyber security upgrades and new systems.

Some of the biggest News stories over the last few years have revolved around corporate vulnerabilities and the negative impacts that breaches have had on brand value, financial profiles and personal liabilities of the individuals within leadership positions. As risk mitigation becomes a greater concern, the security professionals in C-suite and other top positions are becoming more and more central to ensuring the longevity and value of companies.

It is these security professionals who are finding themselves in the position of determining the best ways to protect the business – a task that encompasses a wide range of responsibilities.

For example, the director of security is best-positioned to make a recommendation for new expenditures or identify areas where security has been underfunded. Similarly, in times of downturn, that same person is well-placed with the experience and knowledge to identify where cuts can reasonably be made without seriously harming the risk profile of the brand. When security is viewed as a contributor to business intelligence rather than simply a cost center, it is less likely to be impacted as there are global cuts to the budget that do not take these elements into consideration.

For these contemporary security leaders, there are significant benefits to placing physical security within the category of operational expenditures. Eliminating the need for a large initial investment reduces the TCO (total cost of ownership), which is often an objective for budget planning. Creating a monthly expense category for security opens opportunities to deploy solutions that are more costly and deliver better outcomes for the organization.

Many advanced technology solutions reaching the market today are sold within subscription-based software models, which fit into the OPEX structure and enable security operators to realize greater ROI from their security budgets. This financial structure also creates a better framework for scalability, making business growth a smoother and more organic process.

The same business model has become ubiquitous for most business systems. Companies routinely lease office equipment instead of purchasing it, and many of the most-used business software systems are only available as a subscription. This helps to pave the way for a better understanding of the benefits of the OPEX structure among upper management, who can clearly experience the advantages of always having the most up-to-date accounting, document processing, graphics and other software systems in place. A further advantage can be realized by companies who no longer need to spend their after-tax dollars and spend them on non-revenue generating assets that begin to depreciate the moment they are purchased.

As security solutions have migrated to the network, with new systems such as access control often use a thin client and hardware devices such as video surveillance cameras occupying a place on the Internet of Things, it has become clear that the future of security as an expense category is within OPEX. Cloud-based services are continuing to evolve, taking a larger percentage of the overall market, while edge devices continue to drop in price as their features move into the centrally based software realm.

Providers offering Security as a Service have made it easier for those expenses to be considered as ongoing for operations rather than a single one-time investment. At the same time, it places much of the burden for maintenance, upgrades and oversight into the hands of those providers rather than the end users – creating an additional advantage.

Many vendors of security solutions, whether they are manufacturers or integrators, are in a better position to stay up-to-date on the newest trends in technology and capabilities in areas like Artificial Intelligence, deep learning, behavioral analytics and other complex areas of development. It is to their financial benefit to offer the newest and best products, and to make sure their customers are kept up to date with the solutions they have deployed.

Vendors have fully embraced the OPEX model as well, since it delivers a dependable stream of recurring monthly revenue that is beneficial to their business operations and financial planning. They are also better able to leverage their expertise by providing a more consultative service to their customers, which is good for both parties.

Over time, security will continue to migrate to an operational expense as the managed service model becomes more entrenched and demonstrates higher value to organizations. It is the historical path of this type of trend that it reverses itself every few years as people search for new ways to create efficiencies within business operations. However, because of the nature of how physical security has evolved – with a strong shift from local hardware systems to network-based interoperable systems – this is a trend that may have found permanent traction.

This article originally appeared in the July / August 2022 issue of Security Today.

Featured

  • Bringing New Goods to Market

    The 2024 version of GSX brought with it a race to outrun incoming hurricane Helene. With it’s eye on Orlando, it seems to have shifted and those security professionals still in Orlando now have a fighting chance to get out town. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 3 Recap

    And GSX 2024 in Orlando, is officially in the books! I’d like to extend a hearty congratulations and a sincere thank-you to our partners in this year’s Live From program—NAPCO, Eagle Eye Networks, Hirsch, and LVT. Even though the show’s over, keep an eye on our GSX 2024 Live landing page for continued news and developments related to this year’s vast array of exhibitors and products. And if you’d like to learn more about our Live From program, please drop us a line—we’d love to work with you in Las Vegas at ISC West 2025. Read Now

    • Industry Events
    • GSX
  • Live from GSX 2024: Day 2 Recap

    Day 2 was another winner at GSX 2024 in Orlando. Aisles and booths were packed with attendees looking at some of the new and latest security technology. Remember to follow the GSX Live page from Security Today, as well as SecurToday on X and Security Today on LinkedIn to find out more about what’s happening on the show floor during tomorrow’s final day. Here’s what was happening with all four of our partners during the event on Tuesday. Read Now

    • Industry Events
    • GSX
  • How Much Carbon is Your Footprint Leaving?

    A more sustainable future is not only shared responsibility, it is increasingly critical. Securitas, is inviting clients and industry partners to make a difference in an ever-evolving world that faces diverse sustainability challenges. Read Now

    • Industry Events
    • GSX

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3