Walk into a Fortune 500 fleet and ask "who runs security?" You get a clean answer: a name, a title, an org chart, a budget line. Ask the same question at a $200M regional carrier and you get a shrug. Facilities owns part. Ops owns part. The guard vendor handles the day-to-day. The COO steps in when it breaks.
That gap is exactly why mid-market fleets pay enterprise prices for sub-enterprise outcomes. Below is the four-layer model the big fleets actually use, where you're missing pieces, and the compressed version that works at your scale.
The four layers
Layer 1: Program ownership
At Fortune 500 scale, this is a Chief Security Officer or VP of Corporate Security with a clear reporting line (usually COO, GC, or CRO), a budget, and a quarterly board cadence. They own the written security policy, risk appetite, program scope, KPIs, vendor standards, and external reporting. Without it, every other piece of the program drifts.
Layer 2: Vendors
The guards, monitoring, alarm, integration, and investigations vendors you already pay for. At Fortune 500 scale they're heavily managed — scorecards, quarterly business reviews, contract terms tied to outcomes. At mid-market scale they exist but nobody runs them — they operate to their own SOPs, not yours.
Layer 3: Technology stack
Cameras, access control, alarms, intrusion detection, perimeter, telematics integration, analytics, GSOC tooling. At Fortune 500 scale it's integrated through one central system. At mid-market scale it's fragmented — multiple vendors, multiple portals, no single view, no analytics on top.
Layer 4: Monthly reviews + quarterly insurance reports
The rhythm that keeps the program alive. Daily incident intake, weekly portfolio dashboards, monthly reviews with vendors and ops leadership, quarterly insurance-ready reporting, annual program refresh. At Fortune 500 scale this runs on a calendar. At mid-market scale, it's whatever the COO has time for — which means it doesn't happen until something breaks.
Where mid-market fleets are missing pieces
The pattern is consistent across the 10–50 facility fleets we serve best. Layers 2 and 3 are there (vendors, technology). Layers 1 and 4 are missing.
| Layer | Fortune 500 | Typical mid-market |
|---|---|---|
| Program ownership | CSO + team, defined policy, board reporting | Spread across COO, facilities, ops — no real owner |
| Vendors | Managed contracts, scorecards, QBRs | Multiple vendors running their own playbooks |
| Technology stack | Integrated, central view | Fragmented, multiple portals, no analytics |
| Reviews + reporting | Daily, weekly, monthly, quarterly disciplines | Reactive — only after something breaks |
The cost of the missing pieces compounds. Without an owner, vendors aren't held to anything. Without a review rhythm, your tech stack's data sits unused. You pay for the parts you have and never get the program-level value those parts could deliver together.
The compressed model — rebuilt for fleets your size
The compressed model collapses layers 1 and 4 — program ownership and the review rhythm — into one function: an outsourced security director backed by AI-driven reporting. Layers 2 and 3 (your vendors and technology) stay where they are, but now run under a single program instead of in silos.
Outsourced ownership
A credentialed senior security operator runs your program — on retainer, not on payroll. They write the policy, set the standards, own the vendor relationships, run the monthly reviews, and report to your COO or GC. Most mid-market fleets need 8 to 25 hours of senior security leadership a month. That's what you get.
AI-driven reporting
The work that used to take a 5- to 10-person internal team — incident intake, portfolio dashboards, monthly reviews, quarterly insurance reports — is now mostly automated. AI ingests incident data, vendor reports, telematics, and external threat feeds and spits out the rollups, summaries, and exception reports a human team would've produced. Your security director reviews, signs off, and presents.
Your vendors, finally managed
You keep your guards, monitoring, and alarm providers — but they now run under documented standards, scorecards, and quarterly reviews. Consolidation usually happens in the first 90 days as redundancy and underperformers surface. Vendor spend typically drops 10–20% in year one.
Technology stack cleanup
Camera coverage analysis. Access control review. Telematics integration audit. Where there are gaps, you document them. Where there's redundancy, you consolidate. The missing analytics layer — usually a portfolio dashboard your COO and CFO can both pull up — gets built or licensed.
The economics
A full Fortune 500 internal security org runs $2M–$20M+ a year. The compressed mid-market version — an outsourced security director plus AI-driven reporting layered over your existing vendors — runs $54,000 to $180,000 a year ($4,500 to $15,000/month).
That's 5 to 10% of what a Fortune 500 security org costs, delivering the same program quality at your scale.
Year one, you typically get:
- 15–25% drop in total security spend (vendor consolidation, right-sizing 24/7 coverage where remote monitoring works, alarm contract renegotiation)
- 30–60% drop in incident frequency (program discipline, vendor accountability, tech stack cleanup)
- 8–18% drop in commercial fleet premium at renewal (because you can finally hand the underwriter a binder)
- Material drop in negligent security litigation exposure (documented adherence to a structured program)
90-day rollout
- Weeks 1–2: Free Fleet Vulnerability Assessment ($25K of work, $0 to you, 100% remote). Top 5 risks ranked by dollar exposure, vendor stack mapped, insurance posture documented, two quick wins identified.
- Weeks 3–6: Program design. Written policy, ownership structure, vendor scorecards, KPIs, monthly review calendar, tech stack cleanup plan.
- Weeks 7–10: Vendor restructuring. Contract reviews, RFPs where needed, SOP rollout, scorecards live, monthly reviews begin.
- Weeks 11–12: Technology cleanup. Camera coverage refresh, access control audit, telematics integration, dashboard live.
- Month 4 onward: Steady state. Monthly reviews, quarterly insurance reports, incident response coordination, annual program refresh.
Who this is for
The compressed model fits fleets with:
- 10 to 50 facilities (sweet spot); up to 150 with a deeper team
- 100 to 1,500 vehicles (sweet spot); up to 5,000
- $50M to $300M in annual revenue (sweet spot)
- Multi-state ops with regulatory exposure (CTPAT, TSA, FMCSA, DOT, FDA/FSMA where it applies)
- No full-time CSO or VP of Corporate Security
- Insurance pressure, a recent incident, or growth that's outrunning your program
Smaller than that, you're usually fine with good cameras and a checklist. Bigger than that, you have or should have an internal security org — though even the largest fleets often layer outsourced advisory above their internal team.
Next step
Fit the profile? Want to see what the compressed model looks like for your specific operation? We do a free Fleet Vulnerability Assessment for qualified fleets — $25K of consulting work, $0 to you. Five business days from intake call to written report. If we can't surface $50K of avoided losses in your first year, we'll refer you to a firm built for your size operation. We accept 8 fleets a month — five spots left.
Related: Fleet security cost guide for 2026, How underwriters grade your security program, and What a cargo theft incident actually costs.

