Maintaining Customer Trust

Cover Story

Maintaining Customer Trust

There are a few things you should know about the consulting business in the security industry. First, it is a must to be a trusted security advisor. Chad Parris and Lynda L. Buel know this well, and believe it so much so that it is part of the company profile. They are Security Risk Management Consultants (SRMC), trusted security advisors.

Based in Columbus, Ohio, their work extends well beyond the confluence of the Scioto and Olentangy rivers. Columbus is the 14th largest city and the third most populous state capital city in the U.S. There is also, of course, the Ohio State football Buckeyes.

STRETCHING ITS ROOTS

Columbus is a pretty amazing city. All that aside, this is the place that SRMC has set its roots, which stretch worldwide. The security business is alive and well, thanks to the company’s holistic security process.

“We start with a comprehensive review of any given security situation; from a current plan to technology needs, policies, procedures and processes,” said Parris, an owner and president of SRMC. “We augment what we learn with real-world expertise to create a custom security solution, designed to keep our clients in front of an everevolving threat landscape.”

The fact is a custom solution helps protect people, property and assets that seamlessly integrate into the end user’s mission and culture.

“It is important that we become and maintain the status as a trusted advisor to the end user as well as architects and engineers,” said Buel, also an owner and the CEO of this certified woman-owned, independent security consulting organization. “We travel all over the country, attend a lot of conferences and seminars so that our clients trust that we know what we’re talking about; and when the time comes, we can present technology benefits, interoperability and functionality of security systems. We must continue to offer value to our clients.”

I might be getting a little ahead of the overall story, because SRMC is really one of the best kept secrets in the security consulting industry. While that isn’t always a good thing, it doesn’t stop end users, architects and engineers from calling when they need help, integrity and knowhow is a must.

BUILDING A BUSINESS TOGETHER

Parris and Buel have a similar track into the physical security industry, and the one link that brings them face to face, is working with and learning from Elliott A. Boxerbaum, who sadly passed away in 2014.

Boxerbaum never knew a stranger, and to his credit, hand-picked the executive team (Parris and Buel) he wanted to work with in bringing together SRMC. Boxerbaum honed his talent maximizing and designing security services while serving as the director of protective services at Ohio Health, director of safety and security at Ohio State University Hospitals and a police supervisor with Ohio State University Police Department.

Technological advancements and futuristic gadgets were both a love and hobbies of Boxerbaum’s. You could bet that his latest gadget was light-years ahead of the curve. He was passionate about the security industry and advocated for its progress. He was driven and hardworking, always striving to improve and ensure the industry was at its highest standard.

It was this drive that ensured those who Boxerbaum chose to work with, and eventually run SRMC, met this high standard. Buel’s expertise in senior security management in retail and banking environments on both a local and national scope and Parris’ professional security experience, including physical and technological assessment, system design and planning, made them the right team to lead the firm. Even today, Boxerbaum’s security consultant legacy endures by continuing to provide high-end security assessments, planning, design, support and training services.

There’s a lot to be said about being a trusted advisor.

“Our process includes the needs of the customer, or end user, then adding in our own processes,” Parris said. “We also take into account environmental factors, such as asset and risk assessment, emergency response and recovery dynamics.”

SRMC considers the architecture and facilities that are in question for either an upgrade or a completely new security system. Of course, the existing IP infrastructure, as well as technology needs assessment.

ENSURING COMPLIANCE

Parris said that customer needs will likely include regulatory compliance, such as those in the healthcare industry, and other regulated industries. He also said vision and values of the installation are critical, as well as collaboration with the IT team.

“It is our goal to identify our client’s organizational risks, vulnerabilities, and engage the stakeholder and community for best results,” Parris said. “We have to understand any and all integrations issues as we perform a site assessment, and we always implement industry best practices.”

One of the time honored traditions founded by Boxerbaum and still carried out today by the SRMC team is to educate an architect and engineer on security technology, interoperability and functionality in an effort to build security in and not bolt it on. Parris said this brings value to company clients, and SRMC becomes a value-add to the end user.

While most companies have their favorite, well-known projects; the kind that bring fame and sometimes fortune, Buel said that working with a family-owned business is often one of the most rewarding because they are privately held companies, and SRMC is working directly with the owner of the business. Aside from all of this, SRMC has participated in plenty of pro bono work, where she or a staff member has been able to solve a question in 90 minutes or less, which can be more gratifying than taking a consulting fee. SRMC will take on any project that is within the scope of the services offered.

These services come in the form of the SRMC staff. It is a stellar lineup of consultants: Paul Denton, Marilyn Hollier, Rose Miller, Paul Redmond, Rick Amweg, James Clark, Charles Smith, John Kleberg and Patrick Maughan. Laura Schween is the staff business development specialist, and holding it all together inside the Columbus office is Gen Lanphere. Many of the staff members have specialty expertise. However, Buel said the SRMC staff has been exposed to so many other verticals over the years; they have become experts in many diverse markets.

“It has been and is a great career for all of us,” Buel said. “In our line of work we get to meet new people, and help them. We become their trusted security advisor.”

This article originally appeared in the November 2017 issue of Security Today.

Featured

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

New Products

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.