Whether your site utilizes physical security technologies as a singular or tertiary layer to detect, mitigate, or prevent criminal activity, an integrated approach with specific recommendations is provided. It is critical to ensure your approach to the deployment of technology in support of your security program is a component to your program and not the entirety of one.