Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

As the Perimeter Turns

By Bill Zalud
September 12, 2006
Turnstiles can provide higher level security but also blend into the look and feel of a corporation or building lobby. Photo of optical portals courtesy of Automatic Control Systems


Think of an onion. That’s what chief executive officers and chief security officers visualize about protecting their people, facilities and assets.

That onion is a group of layers. So is security.

Among the enterprise layers are the physical perimeter. In these areas, there are access controls ranging from guardhouses and fences to turnstiles and even systems integrated with revenue controls.

The lobby is the heart of a building and often the parking lot or garage is the real entrance.

Sturdy, welded wire fence systems open the doors for projects requiring higher security while reducing the vandalism associated with legacy chain link fence designs.
These are the primary entry and exit points where security is key. In an increasingly security-conscious business world, companies are finding ways to support lobby and parking security through access control. In many situations, turnstiles are an effective solution. Especially inside of buildings, turnstiles are becoming more secure and less obtrusive by blending in with building aesthetics, providing critical tailgate detection and fully integrating with existing access control systems. Today’s models range from high-end optical turnstiles to basic mechanical turnstiles, providing options for varying budgets and customization needs. But before building owners or security managers chose turnstiles, they should ask themselves some questions to ensure that the solutions they select are the best for the job.

Next generation turnstiles combine intelligence, speed, accuracy and tailgater detection with glass barriers that recess into the pedestals for authorized personnel. Photo courtesy of Smart Security Systems
Can turnstiles fit specific building aesthetics or architectural requirements? Optical turnstiles in particular can be custom designed to blend into any building’s aesthetics. Mid-sized, canister style, barrier arm and non-barrier arm optical turnstiles provide a variety of options to fit linear or even circular open lobby applications. Custom colors and finishes including granite, wood, glass and stainless steel can be used to help turnstiles become a part of a building’s aesthetics--instead of competing with them. This correlates to less noticeable and less intimating access control.

There also are access systems that combine security with financial and revenue needs. Taking an enterprise-wise approach, the Metro Toronto (Canada) Convention Centre (MTCC) automated and integrated vehicle access and revenue control systems with additional payment options including high-speed credit card transactions. One recent option: six “pay-on-foot” stations, according to MTCC Vice President of Operations Vince Quattrociocchi. PARC Automation provided the design and installation for the system integration, and provides ongoing service for the system.

The system can also create bulk pre-paid vouchers, event passes and multiple day passes using a burster and ticket vault. These stored value passes can be created at any station. Each pass is encoded with a magnetic stripe on either thermally printed ticket stock or plasticized longer-term stock.

Shelters prevent trespassers from climbing turnstiles to gain access to secured areas.
Photo courtesy of Porta-King

MORE INTELLIGENCE

No doubt, when you get inside facilities, building owners and operators now seek more computer and communications intelligence in their turnstiles.

For example, next generation equipment combines intelligence, speed, accuracy and tailgate detection with glass barriers. Such optical turnstile systems are, in essence, extremely intelligent computers. Unlike relying on PLC logic, every lane has a microprocessor programmed with advanced neural network algorithms.

Especially inside facilities and especially in high-rise lobbies, the look of turnstiles is very important. It is important to eliminate a “mass transit” look in lobbies and areas where owners prefer discreet, extremely effective security measures to protect tenants and other assets.

At other times, and often outdoors around a facility perimeter or parking lot or garage, CEOs and CSOs often prefer a harder security look while not wanting unsightly or bulky enclosures. Michel Mongeau of Omega II Fence Systems added that chief security officers and facility managers now consider sturdy, welded wire fence systems designed for projects requiring higher security while reducing the vandalism associated with legacy chain link fence designs.

Of course, perimeter security, access control, electronic detection, surveillance and building security may be set up via different vendors.

This approach can make integration of security components and technology quite difficult. Choosing the best supplier to secure an integrated solution that maintains the integrity and compatibility of an enterprise security system is critical. A large chemical manufacturing company had an unconnected multi-tiered security system at its worldwide locations; using unique technology, it integrated electronic detection, surpassing levels suggested through homeland security and industry initiatives. An example, the LightForce system, analyzes any light variations through six different parameters of the light spectrum. Along with intensity and Fourier and Laplace analysis, the system considers attributes such as color, frequency, bandwidth and temperature in its evaluation. Using algorithms and filters, such an approach recognizes the installed environment to limit disturbances that could otherwise be registered as break-in attempts.

Then there are shelters to protect turnstiles and employees from the elements.

The shelters protect people, sensitive keycard readers and access control equipment from the weather, but also add an extra level of security by preventing trespassers from climbing turnstiles to gain access to secured areas.

SIDEBAR: Turn to Full Height Turnstiles

Turnstiles aren’t just for busy building lobbies, according to Curtis Lamson of Designed Security, Inc. Full height turnstiles are ideal for indoor and outdoor applications where added security and high pedestrian traffic are priorities, including unattended locations in a facility where only authorized employee access is allowed. While providing a true access control barrier, many of these units will still control high throughput traffic flow of up to 20 people per minute per turnstile. Most are also compatible with any major access control system.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • How the Security Evolution Turns to Prediction

    See More
  • TSA Now Turns Attention to Mass Transit Systems – More Passengers, Less Security than Airports

    See More
  • cyber network

    The three main ingredients for the successful implementation of Zero Trust in the time of COVID-19: Machine learning, carta and software defined perimeter

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • Physical Security and Safety: A Field Guide for the Practitioner

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing