Guide To Contracting Security Form > Security Tools | Resource Request Choosing the right security officer service provider is a decision that will significantly affect the safety and security of your organization. It is important to select a provider committed to the success of your security program and your unique organizational culture. Allied Universal has outlined the core elements of how to establish a quality-based contracting process that will form a mutually beneficial relationship between you and …
Guide To Contracting For Higher Education Form > Security Tools | Resource Request Choosing a security personnel contractor is a decision which will significantly affect the safety and image of your institution. It is important to select a company that is committed to the success of your organization and can understand and integrate into the culture of your campus. Allied Universal has outlined the core elements of how to establish a quality-based contracting process that will form a mutually beneficial …
Law Enforcement and Private Security Demonstrate Power of Public-Private Partnerships Our nation’s police departments are under intense pressure to keep crime rates low despite reduced manpower and budgets. As President of the Northeast Region for North America’s leading physical security services company, I believe in the power of public-private partnerships. Three decades ago, very few private security and law enforcement liaison programs existed. Today, New York and other cities across the country boast …
Webinar: Feedback Fosters Security Success > Security Tools | Resource Request Ongoing communication and evaluation can take your security program to the next level. And, feedback and communication should not end with the client-vendor relationship. Your vendor should also solicit and act on feedback from their employees. Use this evaluation to help gauge if your security provider is taking every opportunity to listen to your concerns and assess your program. Before proceeding to the Security Tool that …
Contract vs In House Security Form > Security Tools | Resource Request It appears there has been a paradigm shift in the thinking of many corporations, Fortune 500 companies and smaller firms alike. This shift is to “core competency” and involves outsourcing support functions not associated with a company’s core business. This move towards core competency is especially prevalent in the area of personnel-related support functions, which includes security. Before proceeding to the Security Tool that you …
Calculating Healthcare Security Costs Form > Security Tools | Resource Request It appears there has been a paradigm shift in the thinking of many health systems, hospitals and other healthcare facilities. This shift is to “core competency” and involves outsourcing support functions not associated with a hospital’s core business. This move towards core competency is especially prevalent in the area of personnel-related support functions, which includes security. Before proceeding to the Security Tool that …
You Went Low Bid Now What Form > White Papers | Resource Request Has your organization made the decision to procure its security services through an Invitation to Bid (ITB) or other low bid solicitation process? Have your efforts to explain the value of a quality security program to your selection committee gone unheard? Does your organization’s leadership continue to focus on the bottom line costs despite quality concerns? Before proceeding to the White Paper that you have requested, please provide us …
Smart Security Autonomous Data Machine Technology Form > White Papers | Resource Request The world is going to change more in the next five years than the last 50 years, combined. The emergence of technology into the security sector has driven a shift in the paradigm of risk management, offering more opportunities for security system enhancements and program integration than ever before. Concurrently, pressures to control cost in a competitive global market can limit the potential of security programs. In …
Security Tailgating Best Practices Access Control Form > White Papers | Resource Request Tailgating occurs when an authorized individual permits others to follow behind without showing or registering proper authorization and gain access to a secure area. Tailgating is a function of both the attitude of the individual and the corporate culture towards adherence to security measures. The impacts and costs of tailgating affect both the business and personnel including; theft of equipment and intellectual …
Practical Preparedness for Workplace Violence > This webinar was recorded prior to the formation of Allied Universal. Because of the highly relevant nature of the topic, we are still offering this content for viewing. Presented by: Bob Chartier, Vice President of Business Development, AlliedBarton Workplace violence can impact every industry and every type of work environment. We must all prepare for the possibility of violent acts in our own workplace. This webinar highlights: Detecting warning signs …