Skip to main content

Security: Proprietary

  • Living reference work entry
  • First Online:
Encyclopedia of Security and Emergency Management

Definitions

Proprietary security refers to in-house security services, including physical, information, and employment-related protection of assets and personnel, provided by the company to itself through employees that it hires, manages, and trains (Nemeth 2018; Strom et al. 2010).

Introduction

Approximately 20 billion dollars are spent annually by firms across the world in a variety of sizes and segments who choose to develop and provide security as a proprietary or in-house function (Perry 2018). Often this decision is based upon the desire to have more control over the entire security operation and has much appeal to organizations that value loyalty, quality, and prestige of their security staff while eliminating the large rate of employee turnover often associated with a contractual security firm (McCrie 2016).

Where and how the proprietary security organization functions within the organization is a matter of great importance and shall determine its value and strength. There is...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Brennan, J., & Mattice, L. (2014). Managing risk across enterprise. Security, 51(7), 22.

    Google Scholar 

  • Finch, B. (2013). The security leader, the business leader. Security Magazine, 50 (6), 20–22, 24.

    Google Scholar 

  • McCrie, R. (2016). Security operations management (3rd ed.). Oxford: Butterworth Heinemann.

    Google Scholar 

  • Nemeth, C. P. (2018). Private security: An introduction to principles and practice. Boca Raton: CRC Press.

    Google Scholar 

  • Perry, R. H. (2018). U.S. contract security industry (10th ed.). Accessed at: https://www.roberthperry.com/uploads/2018_White_Paper1.pdf. 2 Dec 2019.

  • Reilly, S. (2013). How to train your security training program. Security, 50(9), 122–124.

    Google Scholar 

  • Sennewald, C. A. (2011). Career (proprietary) versus noncareer (and contract) personnel. In C. A. Sennewald (Ed.), Effective security management (pp. 127–135). Burlington: Butterworth-Heinemann.

    Chapter  Google Scholar 

  • Strom, K., Berzofsky, M., Shook-Sa, B., Barrick, K., Daye, C., Horstmann, N., & Kinsey, S. (2010). The private security industry: A review of the definitions, available data sources, and paths moving forward (NCJ No. 232781). Retrieved from National Criminal Justice Reference Service website: https://www.ncjrs.gov/app/publications/abstract.aspx?ID= 254874. 2 Dec 2019.

  • Zalud, B. (2007). Enterprise-wide alignment drives contract or proprietary decision. Security, 44(2), 46, 48–49, 52.

    Google Scholar 

Further Reading

  • Fay, J. (2011). Contemporary security management (3rd ed.). Burlington: Butterworth-Heinemann.

    Google Scholar 

  • Sorrells, E. (2016). Security litigation: Best practices for managing and preventing security-related lawsuits. Amsterdam: Elsevier.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anthony Gentile .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Gentile, A., Shapiro, L.R. (2019). Security: Proprietary. In: Shapiro, L., Maras, MH. (eds) Encyclopedia of Security and Emergency Management. Springer, Cham. https://doi.org/10.1007/978-3-319-69891-5_32-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69891-5_32-1

  • Received:

  • Accepted:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69891-5

  • Online ISBN: 978-3-319-69891-5

  • eBook Packages: Springer Reference Law and CriminologyReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences

Publish with us

Policies and ethics