Personnel, Procedures, and Hardware are the three (3) key components to a successful security program.
Those three items have to work together in order to provide the maximum benefit.
Personnel- People, in many cases, are the reporters, responders, and reactors when something happens. Without people, it is very hard to observe information, notify, and recover property.
Procedures- Having certain protocol to follow prior to, during, and after a security breach, is crucial. Laying out expectations for your employees through procedures is a must. Who can access the system?
Hardware- Having the right equipment in place is also very important. Integrating the proper cameras, lenses, locks, video storage, and access control.
When designing a system, or program, always be aware of the above in order to successfully layout and deploy the program.