- Mechanisms for preventing unauthorized access to rooms where sensitive data is stored.
- Bars on windows that represent possible building entry points.
- Surveillance devices for securing the perimeter of the organizations’s premisses.
- A security gate for restricting access to a suite of offices.