Skip to main content icon/video/no-internet

The term security management refers to efforts to prevent loss caused by fire, theft, or accidents. Security management is considered to be a business function and is supplemental to the services provided by governmental agencies such as police or fire departments. Nevertheless, it is a vast enterprise that employs more than two and one-half times the number of public police and claims expenditures of more than $50 billion annually.

History

The history of modern security management began about 150 years ago and runs roughly parallel to that of public policing. Essentially, security management developed in order to provide businesses with protective and investigative services in areas or circumstances not under the jurisdiction of public law enforcement. One security pioneer was a Scottish cooper named Allan Pinkerton, who settled in the Chicago area and later became a police detective. Eventually, he formed his own organization to provide security services to the railroads that traveled through the American western frontier but had no police protection against criminals. The Pinkerton Agency, which also conducted investigations, was later called upon by the Union Army during the Civil War to provide intelligence about the Confederates.

During the nineteenth century, other security services emerged. Washington P. Brink founded a courier and delivery service that eventually used the first armored cars to facilitate the safe transport of currency and valuables. William J. Burns, a former Secret Service agent, founded an agency that provided investigative and guard services to the banking industry. Finally, Edwin Holmes, originally a merchant, marketed the first burglar alarm systems using batteries, switches, and bells. These systems were first used by the wealthy to protect their mansions against intruders, but soon they were installed in businesses as well. The use of burglar alarms actually preceded telephone service in the United States.

The role of private security continued to develop during the late nineteenth and early twentieth centuries. Private security personnel were used as strikebreakers and guards at factories. During World War II, private security guards were used to protect industrial plants producing materials for the armed forces. In the latter part of the 1900s, with the escalation of the crime rate and the availability of efficient and inexpensive electronic devices, security became common to most people's experience. Today, many homes and businesses have fire or smoke alarms, as well as intrusion detection systems. In addition, guards and security patrols are now typically seen in parking lots, apartments or residential communities, stores, office buildings, schools, and factories.

When someone refers to the “security industry,” this term includes a number of types of services. Most common are contract guard services, private investigators, alarm companies, and locksmiths. There are also security consultants and engineers. Proprietary security services are provided by any corporation's own security personnel, whereas contract security services are provided by corporations specializing in security management.

A major step in the professionalization of the security industry was the formation of the American Society of Industrial Security (ASIS). Members of ASIS are security managers and consultants; the organization claims a membership of 32,000, with chapters in the United States and 108 foreign countries. The organization sponsors conferences, publications such as books and the journal Security Management, and a Certified Protection Professional (CPP) accreditation program. Applicants for CPP status must demonstrate both educational and experiential qualifications and pass a rigorous examination.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading