Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Mantraps: A Unique Solution

September 1, 2005
As organizations upgrade their security, unique access applications can often include mantraps, a design more typical of bank backrooms and military operations in the past.

Mantraps limit access to secure areas within a facility while providing an effective means to physically detain unauthorized persons until security provides clearance. In its most basic form, a mantrap is comprised of a set of doors that requires the person to enter the first while the others are closed. Mantraps are typically manual swing doors forming a vestibule but can also use sliding doors or gates. Some mantraps use turnstiles or revolving doors.

Once inside the first door, the person cannot pass through the second door until the first door is closed.

This system provides security in at least three ways. It makes it difficult to forcibly gain entry by knocking down a single door; it allows time to evaluate the person in the mantrap before releasing him or her through the second door; and it allows entry of only one person at a time.

In large scale systems such as those found in casinos, healthcare facilities, government installations and large financial institutions, as many as 99 doors can be configured into a single massive mantrap system. The programmable nature of such large systems provides system designers and integrators with the flexibility to implement complex systems involving dozens of rooms and safe areas.

Two-door mantraps can limit access into an area or can control a factory’s sterile environment.

Typical mantrap configurations

There are a few basic mantrap configurations for different levels of applications.

Mantrap systems employing air lock control are generally designed for minimum security applications where all of the doors in the system are normally unlocked until any door is opened. Once any door is opened, all other doors in the system automatically lock. This configuration provides easy entry or egress with no access wait time, but is the least secure as two or more doors may be opened simultaneously. Typically, this design incorporates door position switches to control the mantrap system.

Secure entry/free egress mantraps are more secure, allowing a faster method of egress through a combination of locked and unlocked doors. Exterior doors are normally secured and interior doors normally unlocked. A card access system controls entry from the exterior and an R-E-X device is used on the interior of the outside door. A valid access card will unlock the exterior door only if the interior door is closed. Unlocking the exterior door will lock the interior door. Once the exterior door is re-secured, the interior door is unlocked to allow access into the facility. Opening the interior door prevents the exterior door from being unlocked.

Restricted entry and exit mantrap systems provide the highest level of security. With all doors in the system locked, a door can only be unlocked by making a request for access if any other door in the system is unlocked. As a result, opening any door keeps all other doors secure. The more secure mantrap systems will buffer simultaneous requests for access to prevent two or more doors from being unlocked. The best designs use lock monitoring sensors in lieu of door switches.

A field-programmable mantrap controller such as Dortonics’ 7700 can work with a card access system.

Complex examples

A hospital recently used a Dortronics Systems (Sag Harbor, N.Y.) 4400 series mantrap control to limit access into the mental health areas. A vestibule with 1100 series magnetic locks and magnetic bond sensors on the interior and exterior doors secure the floor entry. Access is authorized through the key switches on each side of the secured doors. The mantrap controller prevents the second door from being unlocked while the first door is unsecured. A door prop alarm is used at every secured door to insure that each is properly re-secured after an authorized access. Each door is also monitored in the security office by a Dortronics 7600 annunciator/controller that will sound an alarm if the doors have not been re-secured in the allotted time period.

A pharmaceutical manufacturing facility employs a mantrap control to insure a sterile environment. Magnetic locks with door position switches are installed on 2-door mantraps. While the doors are normally unlocked, the mantrap controller will lock the opposite door when any door of the mantrap is opened. The second door can only be opened after the first door has been closed.

Some facilities use a manned security station to monitor and control the mantrap entry. Opening an exterior door would lock all doors. A security video/intercom can monitor request for access. After viewing the individual requesting entry, security personnel can release the outside or inside door to allow entry into or out of the facility. Once the security vestibule is cleared, security then resets the system, unlocking both interior and exterior doors, ready for the next user. This configuration is also being used in conjunction with a card access system.

Several newly constructed casinos use a field-programmable mantrap controller with a card access system to provide secured entry into the money counting areas. These complex systems utilize magnetic locks with magnetic bond sensors and strikes for redundant fail-secure locking. Visual indicators are also supplied for traffic control. The systems are field programmable to allow for any number of secured rooms with multiple doors and may be adjoining with shared doorways between rooms. The systems are easily programmed without the need of ladder logic or other computer language knowledge using a simple dumb terminal emulator. Once enabled, the mantrap controllers monitor the status of doors and requests for access, allowing only one door to be unsecured at a time in any room.

Sidebar: More Alternatives? From Turnstiles to Exit Buttons

The University of Pennsylvania has almost 24,000 students located primarily within the 270 acres. Access control is a priority. For example, the University’s Harnwell House and other buildings have to be prepared for the thousands of students that use the facilities daily. Integrator SST of Norristown, Pa., realized the importance of campus safety and security. The university chose proximity card readers in six lanes of Port Washington, N.Y.-based Automatic Control Systems’ PNG390 ADA accessible Optical Portals. The prox cards act as student ID and dormitory access. To unlock the high glass barriers, that cannot be climbed over or crawled underneath, a student swipes his or her card at the front of the portal and it opens allowing just one person to enter.

Another solid access alternative is a control station that can handle myriad of devices and designs. DKS interior control stations from DoorKing of Inglewood, Calif., for example, can be installed into a single-gang electrical box. Lighted exit buttons provide free exit while key switch and keypad devices control entry through doors with electric or magnetic locks. Gate control devices provide manual operation and control of automated vehicular gates.

For More Information

Information for this article came in large part from Bryan Sanderford of Dortronics Systems, Inc., Sag Harbor, N.Y. More details at www.dortronics.com. Information on DKS stations from DoorKing, Inglewood, Calif., at www.doorking.com. Info on Automatic Controls Systems, Port Washington, N.Y., at www.automaticsystems.com. Also visit the Security magazine Web site at www.securitymagazine.com and use the LINX service, powered by Google, to get even more background on alternative electronic access controls such as mantraps, turnstiles and control stations.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Our ASIS Inside Report: Mantraps, Video, and Tour of Chicago Security from Dallas, Too

    See More
  • Gordmans deploys state-of-the-art surveillance solution, while keeping a close eye on budget

    See More
  • New Newswire Feature Image 3/8/2012

    From RSA: Big Data is a Transformative Solution to Security Challenges

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • security book.jpg

    Security Investigations: A Professional’s Guide

  • Whitepaper-Social-Media-3.gif

    Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!