Think Target Audience
Getting support for physical security upgrades typically means communicating the problem, its impact, and the solution. The information you present depends on who you are trying to convince. Company owners and high-level executives are typically interested in the impact of new technology on the bottom line. Frame your request for upgrades in a format that clearly describes benefits aligned the total cost of ownership and ROI.
When communicating to upper management, here is what you need for a successful outcome:
Use this template to identified your target audience, the role on purchase decision and their concerns related to your project proposal:
Target Audience
Concerns
Role on Purchase Decision
IT Department
Finance Department
Your Boss
Management Team
Download our FULL TOOLKIT TEMPLATE for physical security technology investment and build your access control technology business case now.
Answer: who, what, when, why, and how?
Anticipating questions and feedback from your audience is a good way to help gain their support. Your audience may misunderstand or misinterpret the concepts, challenges, problems, requirements, timelines, and solutions you present. Prepare answers to “who, what, where, why and how” questions, in order to establish more confidence in the plan and your ability to execute it.
Common questions you should have answers for include:
Use this template to organize your answers and include your imput:
Questions
Access Control Technology Investment (Example)
Your Input
What is the new technology, and how does it impact my audience?
Cloud-based access control
What problem(s) does it solve, and how do those problems impact my audience?
Why does my audience or the organization need this right now?
On-site server systems are outdated
Does it solve your problems? Your whole team’s? A few different team members’? Customers’?
What exactly is being lost without the new solution? Why should they care?
What does success look like?
Cloud-based access control
Download our FULL TOOLKIT TEMPLATE for physical security technology investment and build your access control technology business case now.
Find an Ally - Defy Your Skeptics
Determine who in your organization will benefit from a new access control system, and get them on board. IT, human resources, facility or property management, security management, and sales are all potential beneficiaries.
Security impacts the whole company, whether employees are aware of it or not. Getting cross-functional support for your security technology initiatives increases your chance of convincing upper management. By having multiple departments weigh-in you can clearly demonstrate the widespread impact of your proposal.
Even if you have a very convincing argument, you are going to have naysayers and skeptics. Your finance department may question the total cost of ownership or the value of spending capital now. Sales may not see how security impacts their efforts and would rather spend money on a new CRM. But if you have done your homework and created cross-functional support before presenting to executives, you’re naysayers will stand alone.
An easy way to keep track of your supporters and, more importantly, your skeptics is to create a list of each department within your organization and list the main benefits for each person.
Department
Benefits of New Access Control System
Contact
Human resources
Sample benefits: Request card and access to employees in one place
John Smith - Director Human Resources
IT
No server, Cybersecure, No backups, No Updates.
Alicia Jones - IT manager
Then create a list of your skeptics and itemize the reasons they may be skeptical of your initiative and mutually beneficial opportunities.
Department
Reasons for Skepticism
Arguments to Persuade
Human resources
Human Resources currently doesn’t provision employees; new system would add provision credentials to their credentials.
It will be a new responsibility, but it will be extremely streamlined so that it should not require significant time or resources.
IT
Just spent year-end budget dump on new IVR system; wants to wait until next quarter.
Set up the meetings and planning now to launch in aligned timeline.
Download our FULL TOOLKIT TEMPLATE for physical security technology investment and build your access control technology business case now.
Translate your “why” into an impact on the bottom line
Successful technology investments have a direct impact on the bottom line. Technology investments that are delivered on time and on budget lead to increased revenue, efficiencies, and more satisfied repeat customers. Improvements in process and efficiency reduce time spent on routine tasks, which equates to more time spent on valuable work.
Your challenge is to find your own real-world scenarios that demonstrate the value a new access control system would bring to your organization.
Some areas to explore include:
Use this template to pinpoint your bottom-line impact:
Business Objective
Access Control Investment Metric
Target Group
Benchmark Measurement
Improve operational efficiency
Time saved
CEO CFO CTO
Example: Current status meetings take 240 hours a year
Access control to save 180 hours a year. US$5,940 dollars saved
Increase profitability
Reduced business loss
CEO CFO
Example: Time card fraud estimated: US$28,665
Access control to reduce 75%. US$21,498 saved
Increase profitability
Increased revenue
CEO VP of Sales
Example: membership charge US$100 monthly
Access control to increase membership to US$120 with 24-hour access, expect 30% adoption
Improve customer satisfaction
Improved tenant access flexibility
VP Customer Service
Example: One tenant call a week about access issues
Access control to decrease 10% of customer service calls
Value of Intangible Benefits: Some benefits are harder to quantify. The intangible benefits have just as much of a business impact as the more quantifiable assets of your calculations.
Intangible benefits include:
Saying “We have the opportunity to make our security operation more efficient, reduce repetitive tasks, and lower building costs,” starts a very different conversation than, “I’d like to have this new cloud-based access control system.”
Whether you use one or all of these tactics to show the impact an access control system can have on the bottom line, the most important thing is to present enough justification to secure an approval without overwhelming your audience.
Also, be mindful to not get carried away with uncertain savings estimates and tying monetary savings to intangible ROI to prevent executives from dismissing your calculations.
Understand your ROI
Most technology investment decisions are budget driven, so it’s critical to demonstrate a reliable return on investment to get executive buy-in for your access control upgrade. The initial cost of a physical security solution is just that, your initial cost. Maintenance, operating costs, and upgrades all add to the final cost. Any analysis of a proposed investment should include the cost to purchase and support and maintain the equipment and programs.This gives you Total Cost of Ownership (TCO). Check out our guide on How Software As A Service (Saas) Lowers The Total Cost Of Ownership (TCO) For Physical Security Systems to learn more about this important calculation. TCO = Cost to Buy + Cost to Install + Cost to Operate + Cost to Maintain
In step 4, you used our TEMPLATE TOOLKIT for physical security technology investment to calculate the bottom line impact and dollarize it. That dollarized outcome leads to your ROI.
ROI = (Monetized Economic Value - Product Cost)/Product Cost Here is an illustration of this principle, based on a retail company with over 150 locations.
Business Objective
Access Control investment Metric
Current Annual Cost
Estimated Reduction in Cost
Estimated Annual Monetized Economic Value
Increase profitability
Lost Inventory
Time-card fraud
Rekeying
$2,000,000
$525,000
$432,000
60%
75%
90%
$1,200,000
$393,000
$388,000
Total
$2,957,000
$1,982,550
Factor
Could-base Access Control
1st Year Cost of Ownership
$1,720,000
Estimated Annual Savings
$1,982,550
1st Year ROI
13.2%
Annual Operating Cost
$30,000
In our recent survey: Best Tips for Getting Security Budget Buy-in, respondents suggested that proving ROI was key to getting executive buy-in. Calculate yours using our ROI calculator.
Download our FULL TOOLKIT TEMPLATE for physical security technology investment and build your access control technology business case now.
Our Brivo security experts are available to help you showcase the extra value of cloud-based access control for your business.
Build a Coalition: Involve IT Early On
You’ve already identified your allies and defined your skeptics. Now it’s time to build a coalition that will generate organizational buy-in on a larger scale. In step 3, we gave you a template to help recognize your allies and skeptics and state benefits to each. Now it’s time to identify where your IT department stands. Is IT an ally, skeptic, or on the fence?
Here are some key arguments for cloud-based access control relevant to IT:
Check out this infographic for additional information on IT benefits with cloud-based access control.
Use this template to organize the key arguments based on your specific situation: (Example assumes a fitness center with multiple locations and an undecided IT department)
Is Your IT Department an Ally, Skeptic or Undecided?
Skeptic - Persuade
Ally - Mobilize
On the fence - Advise
In our recent survey: Best Tips for Getting Security Budget Buy-in, many respondents offered, “involving colleagues in pitching the access control technology investment,” as their the “tip” to success.
“I suggest starting an open-ended discussion with those that are in the executive positions. Show them the security gaps of your current security system and how a security technology investment will close those gaps.” Property Owner, Multi-Unit Facility
Download our FULL TOOLKIT TEMPLATE for physical security technology investment and build your access control technology business case now.
Bring more than two comparable options to the table
It’s important to bring at least two options to the table when presenting physical access control solutions to your executive team. There is no shortage of vendors or solutions available to you on the market, but not all vendors will meet your requirements. You will have to decide how to score each vendor and their product(s) as you go through the selection process. Don’t forget to look for publicly available vendor reviews to help with this process.
During initial outreach, ask each vendor specific questions so you can evaluate how well their access control solution meets your needs. While this isn’t a formal information-gathering process, developing a set of high-level questions will allow you to classify vendors early in the process and save time during the official vendor selection process. Use our 7 questions to ask your security partner to help weed out vendors that might not be a good match.
The template below helps you organize vendor information and score your requirements.
Requirement - Score and Rate
Brivo
Comparable 2
Real-time reporting
Integrates with 3rd party software
Manage remotely
Real-time reporting
Automatic software updates
Cyber secure
User-defined alerts
Unlimited scalability
Trusted partner network
Open API to support integrations
Established manufacturer with over 15 years of experience
Proven technology manufacturer
Download our FULL TOOLKIT TEMPLATE for physical security technology investment and build your access control technology business case now.
Present the Results to Stakeholders
Our recent survey highlighted the importance of including concrete results and comparisons in your presentation to stakeholders.
Be positive, confident and concise. Lead with the conclusion – give them the bottom line first. Next, briefly outline the business problem the new technology will solve, and how. Don’t give a comprehensive list of features. Instead, talk about tangible, relevant benefits to the business. Share a timeline, including how long it will take to roll out and how much training will be needed. Finish with the projected financial benefits (ROI). You can calculate the ROI of moving your physical security to the cloud here.
Step
Details
Opening Statement
Give them the bottom line. Example: Moving to a cloud-based solution will save us $XXX yearly in inventory loss, wasted time, and operational inefficiencies.
Business problem 1
Business problem 2
Business problem 3
Timeline
Show what needs to be done for the transition, and who needs to participate.
ROI
Calculate your ROI here for a general breakdown of how a cloud-based solution can impact your bottom line.
Your presentation should include your business’s objectives and how a new access control will impact them. Our template will help you to visualize and quantify those benefits for your organization. Be sure to outline difficulties that your business has faced in achieving those objectives, and why finding a new physical security solution would benefit the company.
Other things to consider adding to your presentation include:
Set up a Follow-up Meeting
Follow-up meetings are important to make sure all stakeholders are on the same page and to ensure their questions and concerns are all addressed.
Before the project has buy-in, your follow-up meetings should:
Once the project has buy-in your meetings should:
Almost 80% of respondents to our recent survey agree that executive buy-in is very important to successfully upgrading your physical security. You already know the benefits of an upgrade. The key is to get your stakeholders to understand how crucial these benefits are to the efficiency of business operations and the security of the organization.
Download our FREE TEMPLATE FOR BUILDING A BUSINESS CASE for physical security technology investment now.
If you’re interested in seeing how the Brivo solution can add value to your organization, contact a Brivo expert now. You and your stakeholders will be glad you did.
© Copyright Brivo | Privacy & Security | Terms of Use