When it comes to utilising any form of electronic security, it is essential that you carefully and regularly assess all your options in the context of your unique security needs and requirements, in order to get a proper picture of were you should be deploying electronic security, why you should be doing it and how you should do it.