New technologies and the 24/7 Security Operations Center (SOC) offer advanced protection for all types of facilities. With a focus on reducing costs and thinking about reducing physical security and increasing electronic security, the integral security model was born, consisting of physical barriers, technological support, human resources and protocols. Its business model implements a security ecosystem, using innovative technological solutions for perimeter security, access control, remote monitoring and trained human resources. Its project engineers, together with security consultants, carry out an on-site survey to detect vulnerable points of the facility and propose solutions to protect 100% of the perimeter. These solutions are constantly monitored from the SOC where threats are detected and security protocols are activated. Camera systems with analytical technology can generate alerts in the event of intrusion into protected areas, identify faces, patents, clothing and other relevant information that could be useful in the event of a burglary attempt. Thermal cameras identify the body temperature of possible intruders, which is detected by the systems and managed as an emergency, reacting prior to the intrusion. The personalized attention, the technical service and the “tailor-made suit” make First Security the best security alternative for today’s times, which demand constant vigilance, innovation and technology for the peace of mind of people and companies. The means of protection used in the security model are: – Physical Barriers: These are the physical means that protect the perimeter of the place, such as an electric fence, walls or fences, lighting, among others. – Technical Support: Technology and security equipment available, such as Artificial Intelligence Cameras, access control, vehicle barriers, operations center, etc. – Human Resources: Trained personnel dedicated to the execution of protocols established for each situation, such as security guards, supervisors, remote monitors, etc. – Action protocols: Actions executed in real time, depending on the security event in progress. In this way, this integral ecosystem controls in real time the security of a facility, applying clear protocols and actions for each situation.