Personnel, Procedures, and Hardware are the three (3) key components  to a successful security program.

Those three items have to work together in order to provide the maximum benefit.

Personnel- People,  in many cases, are the reporters, responders, and reactors when something happens.  Without people, it is very hard to observe information, notify, and recover property.

Procedures- Having certain protocol to follow prior to, during, and after a security breach, is crucial.  Laying out expectations for your employees through procedures is a must.  Who can access the system?

Hardware- Having the right equipment in place is also very important.   Integrating the proper cameras, lenses,  locks,  video storage, and access control.

When designing a system, or program, always be aware of the above in order to successfully layout and deploy the program.