Image by Collin Armstrong

Physical Security Concepts

"Physical security describes security measures designed to prevent unauthorized access to facilities, equipment and resources to protect people and property from harm (such as espionage , theft or terrorist attacks) ."

Field Manual 3-19.30: Physical Security . headquarters

U.S. Department of Army

"If you fail to plan,

You are planing to fail."

- Benjamin Franklin

Security - more than walls, weapons and cameras

Every security officer knows the following problems:


  • A fire door is blocked because it hinders the constant movement of goods.

  • It uses poorly qualified personnel where technology would be a more effective AND cheaper solution.

  • Only technology is used that is practically useless without the human factor.


A holistic security concept includes structural, mechanical and electronic components as well as the human factor.

The implementation and subsequent use of the plan must be coordinated with the responsible persons as early as possible in the planning phase.

A security concept is not written in an afternoon. And you never write it alone.

Otherwise physical security concepts can quickly become expensive and useless due to the smallest planning errors.

Our three rules of physical security

Technology alone is useless!

Technical facilities must be operated by someone.

Just building a fence and putting cameras on your property is NOT a professional security concept.

Mechanical and electronic measures must be compatible with each other AND with your budget.

Personnel alone is inefficient!

Since the human factor is crucial, employees must be well trained, loyal and familiar with local conditions.

The manpower-only doctrine has long been working  no longer.
Staff must be supported with technology.

Targeted personnel planning is more effective than many poorly trained employees on a minimum wage basis

An individual is blind!

Expertise and experience are valuable qualities for security managers.

But years of work on the same object can also lead to operational blindness.

A professional security concept therefore always needs the "second eye" of an independent person.

Security is more!

Security is a CRAFT.

You don't learn how to fix a car or cut a fashionable hairstyle in a week. Neither security.

Security is a craft that many practice but few have mastered.

It takes years of experience and months to years of dedicated learning to be able to plan security professionally.

Security is a SCIENCE.

Aspects of criminology, psychology and sociology must be taken into account as well as computer science,  engineering sciences and business process structures.

Special problems require special experts.

Security is an ART

One-size-fits-all solutions are just as useless in terms of clothing as they are in safety. They don't really suit anyone in the end.

Security planning needs free spirits who think outside the box and develop individual creative solutions.

Do you already have a security artist on your team?

Everything starts with a plan

With ISMT you can recognize blind spots in your concept and avoid your security concept becoming a money destruction machine.

We become your third eye, perceiving aspects that you may be overlooking. In this way, your property and your budget can be protected with experience, know-how and creativity.

Our service is not a cost factor but a worthwhile investment.

"Whoever wants to defend everything

in the end does not defend anything "

- Friedrich II. the great

The Vulnerability Assesment

A company or home is threatened by all sorts of dangers and no security concept can guarantee 100% security.

It is therefore necessary to find the weak points in your system and also in your security concept.


If you can't find your weak points, thieves and burglars will!


People, objects, machines or events such as storms, pandemics or power outages can cause serious damage and ruin your business.


Everyone should be aware of the dangers and know their "crown jewels".


The actual weak points are often not the obvious points of attack. With a professional vulnerability analysis, you can see where you should invest in your security and where you are wasting your money.


If you want a ship to be 100% safe - leave it in port, turn off the engine and fire all sailors.

But why do you need a ship if you can't let it into the sea?  If the crew is well trained and the ship is well done, you will get good business with your ship at sea.

ISMT shows you where your weak points are, where you should really invest in security and where not.

How does it all work?

It all starts with the identification of risks and dangers. Using modern and internationally proven methods, we find out what your “crown jewels” are and which possessions or assets are threatened.


A professional vulnerability analyst does not simply enter all possible risks and dangers in an Excel sheet and calculate the possible damage.

It also takes into account the interactions with one another and, above all, the human factor.

After identifying your weak points, we will find out which risk management is right for your property.


Some risks can be completely avoided, reduced, or transferred to others. In the end, there is always a calculated residual risk that has to be accepted (and can often be insured).


The human factor is extremely important in a risk and weak point analysis.

In many cases, implementing Security Awarenss training courses in your company can reduce risks without the need for external security services.


Security awareness training can dramatically increase security in a cost-effective way.


Nobody knows your company or your property as well as you do. That said, there is a high chance that you already know a lot of vulnerabilities. But with daily routine people can lose sight of some dangers. You will become “operationally blind” for individual topics.

That is why an external consultant is indispensable for your security management.

If you don't have a "Third Eye" yet, contact us today.