The Essentials for a
Solid Security Structure

The Five Pillars of a Comprehensive Security Program

  • 1

    Physical Security

    These are the physical barriers intended to deter, detect, and defeat.

    Fundamental protection is based on layers, or rings of Security surrounding what needs protected. Adversaries should be detected at the outermost perimeter. Those that pass through this detection must be defeated by interior layers of Security. Early detection is vital to a successful Security program.

  • 2

    Technical Security

    Electronic and mechanical devices intended to deter, detect, and defeat.

    Books and movies are filled with “impenetrable” security devices that are foiled by the villains and heroes. The only technical devices that are truly effective are those that work in concert with the other vital elements of security. The tools available continue to evolve and are very effective when applied in the right situations and circumstances vital to a good security program.

“ A security solution that relies solely on physical fortification or technical protection will fail. There is an absolute necessity to insert the human element. ”

;
  • 3

    Protective Security

    The individuals that deter, detect, respond, and defeat

    A security solution that relies solely on physical fortification or technical protection will fail. There is an absolute necessity to insert the human element. Individuals with the right skills and training are able to successfully respond to all situations and make sound security decisions. Security forces that work in concert with the customer, public, and other elements are essential personnel.

  • 4

    Information Security

    Computers, phones, other electronic devices, and documents

    The protection of electronic and hardcopy documents goes well beyond virus software, passwords and locked desk drawers. Information is vulnerable wherever it is stored and must be protected. In addition, social media, news bulletins and emails have the potential to inadvertently leak your valuable information or result in an difficult situation.

  • 5

    Personnel Security

    A trusted workforce

    You cannot succeed in business or government without a trusted work force. Proprietary or classified information is vulnerable as soon as it is shared with one single person. If that person is not trustworthy, you lose. You lose information, other employees, reputation and income when someone leaks your information.

lock