Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Hardening the Links Among the Controls

December 1, 2006
Traditional turnstiles, around for years, hinder access but need a security officer or security video to add higher level control


The purpose of most access control systems is to allow authorized individuals entry into secured facilities while denying or limiting access to unauthorized individuals. Most access control systems, whether large or small, sophisticated or simple, do this by restricting or enabling the unlocking of entrance doors

Some optical turnstiles detect tailgating but the addition of swinging arms and sliding glass panels helps, too.

However, even when a secured entry door is unlocked, the weak link of the entire security system is suddenly exposed. Once a door is unlocked and opened, the access control system can do very little to prevent additional individuals from entering behind the authorized person who was granted the initial access. This passage of multiple people on one authorized entry is commonly known as tailgating or piggybacking, and can potentially lead to a serious security breach.

Facility managers and security directors often establish workplace policies that require employees to verify the authorized status of tailgaters, but most people simply don’t want to turn around and confront who almost always turns out to be their fellow employees.  

Some optical turnstiles detect tailgating but the addition of swinging arms and sliding glass panels helps, too

LOW SECURITY TURNSTILES

Rather than trying to get employees to play the role of security officer, facilities can use many different forms of security entrances that will effectively minimize or prevent tailgating and piggybacking. These different security entrances offer varying levels of security coupled with a diverse range of aesthetic appearances, providing multiple choices for the facility owner.

The most commonly used security entrance is a turnstile. Traditional 3-arm waist high tripod-type turnstiles have been available for decades, and provide a reasonable means of hindering access to unauthorized individuals. They are compatible with all types of access control systems. Waist high turnstiles allow a security officer to monitor multiple lanes simultaneously for people attempting to step over or under without proper authorization. Many different cabinet styles and finishes are available to fit into almost any building décor.

Barrier lanes gain from higher panels on the units so that people cannot leap over them.

In the 1980s, optical turnstiles were introduced as a means to detect tailgating without using the 3-arm barrier incorporated in traditional turnstiles. Optical turnstiles employed infrared beams to track passage of people, and, in conjunction with the access control system, provided a visual and audible alarm if a person was detected passing through without authorization. The cabinets tended to be smaller and sleeker than tripod turnstiles, and were thus perceived by many to have a more aesthetic and less obtrusive appearance.

However, because optical turnstiles only detected tailgating, the need eventually arose to add some type of physical barrier to the units. This led manufacturers to incorporate various types of swinging arms and sliding glass panels to the optical turnstiles, creating what are often referred to as optical barrier lanes or optical portals.

For maximum security, revolving portals and doors can detect unauthorized entry but also fight tailgating and piggybacking

MEDIUM SECURITY TURNSTILES

While tripod turnstiles, optical turnstiles and optical barrier lanes can all detect or prevent tailgating and unauthorized entry to varying degrees, they are still only security “speed bumps” because of their low height.

For greater security, optical barrier lane equipment can provide tall glass panels on their units, including on the tops of the cabinets, to make it even more difficult to step or leap over. This provides a further obstacle to someone trying to gain unauthorized entry into a facility.

For maximum security, revolving portals and doors can detect unauthorized entry but also fight tailgating and piggybacking.

Full height turnstiles, available in either single or dual (tandem) configurations, incorporate three or four rotors (wings) to enable one-at-a-time access while positively preventing tailgating. Because of their 7-foot tall height, they pose a much greater barrier to those without approved access.

To ensure maximum security, high security revolving doors and portals can detect and prevent unauthorized entry, tailgating and piggybacking. Security revolving doors can accommodate high traffic loads in both the entry and exit directions simultaneously. They also can be incorporated directly into the exterior façade of the building, providing the same climate control and energy saving benefits of traditional revolving doors with a discrete and aesthetic architectural appearance.

For maximum security, revolving portals and doors can detect unauthorized entry but also fight tailgating and piggybacking.

High Security Doors and Portals

Security revolving doors and portals employ sophisticated technologies such as overhead infrared sensors and digital camera systems to monitor all passages, allowing those authorized by the access control system and preventing those who are not. These are ideal for exterior employee entrances, as well as high security interior entries into data centers, computer rooms or areas with extremely sensitive activities or information.

With the large investments required for access control today, employing such systems as effectively as possible is a must. Regardless of a facility’s security level, the use of a security entrance – whether a turnstile, optical barrier lane, security revolving door or security portal – will improve the access control system’s ability to allow only authorized individuals in while keeping unauthorized intruders out.

Sophisticated systems that also include sensors and security video can monitor a diversity of passages and entries.

About the Sources

Security Magazine thanks Mark Borto of Boon Edam Tomsed for materials included in this article. Borto has been in the revolving door business for 18 years, serving in both sales and managerial capacities. More information on revolving security gates and doors at securitymagazine.com.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • The 1980s: Plug-ins, Links & Interfaces

    See More
  • Hardening the Entrance

    See More
  • LINKS

    ‘LINKS’ identifies ways to strengthen disaster resilience through the uses of social media and crowdsourcing technologies

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • Risk-Analysis.gif

    Risk Analysis and the Security Survey, 4th Edition

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!