Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Ready to Tailgate?

By Joel Jensen
January 1, 2011

 

I love tailgating. I tailgate at my own institution and try to tailgate at others, even at corporate sites. Yet, I strongly disapprove of tailgaters and the practice in general. Of course, I’m referring to the practice of tailgating into a secured space or building, whether it’s a facility protected by standard locks and keys, guard stations, or electronic card access. Tailgating is the act of following an authorized individual into a protected/secured space by one who is not authorized to enter that space or perhaps, just that particular entrance or space.

Tailgating has been challenging physical security practices throughout history. There is myriad technology and design solutions to thwart tailgating into your facility. Facilities that require a high level of security employ tools ranging from tailgate sensors to mantraps, biometrics and the like. What are some solutions, then, for spaces that don’t require that level of security?   

Consider a corporate structure with a single point of entry that is monitored by security personnel. Exits from the building are equipped with alarms. Customers, delivery staff, visitors and others desiring to enter the building present some form of credential and are required to sign in, literally, on a notebook denoting the date and time entered and likely, their destination. They are to sign out when leaving, so at the end of the day, it’s a simple matter of ensuring that sign outs = sign ins and the building, in theory, is now unoccupied except for the security staff. This is a very common and traditional entrance to an office building. 

This hypothetical building also has employee entrances that are protected by electronic card access. Employees carry an ID badge that also serves as a card access key. OK, now I’m going to tailgate. I can either choose a time when a large number of employees are entering and just get in the middle of the line and walk right in. I can time my entrance to be just prior to the arrival of a lone employee, for example, and be fumbling through my wallet as if looking for an ID badge. This helpful individual who arrives shortly after I did will card-in and allow me to enter. 

The last scenario is one easily activated feature that has been around for decades in card access control – the anti-passback feature. The majority of enterprise level (if not virtually all) card access systems have had anti-passback enabled for some time. That is, the system won’t allow the same credential to be presented twice at the same location within “X”number of minutes or hours and allow access. Another solution that’s been around for some time is the addition of optical tailgate sensors: One credential is presented to the system, the tailgate sensor reads two people entering, an alarm sounds and a security response is initiated. Access control course level 101, right?

When electronic access technology was new, these are details that received a lot of our attention from the system users. Consider security cameras. They have been around for a long time, but due to cultural changes and due to the affordability of video security, they seem to be just about everywhere. So much so that employees are caught on video, by very overt cameras, committing a crime, as they’ve become so accustomed to seeing video cameras that they simply blend in with the building architecture.

If you read this column regularly, you know that I preach best practices, adopting standards and reviewing the basics. It’s human nature that developed the insensitivity to the presence of visible surveillance cameras just as it becomes human nature for system users to allow tailgating. It can become so common place that it escapes the attention of our security staff and our leadership. Perhaps adding tailgate sensors in your application would be an effective solution, if you have the resources to manage the additional alarm responses. Whether you have the system capabilities, funding and resources to do so or not – it’s just time to implement that no-cost solution: education.  

Remind your system users that, while it is in their nature to be friendly and helpful, letting people through the door who shouldn’t be there can cause losses and possibly harm. Remind the security front line and their leadership to be watchful for tailgating and provide them with some simple, positive responses to help them educate system users. That’s a guaranteed return on investment. 

Yes, I do resort to spot checking for tailgating. In my work environment, I can do this as a sometimes “fun” challenge, yet not anger folks or insult my colleagues. Your environment may be quite different, so my approach should be used with care. Also, I’ve tailgated my way into other facilities where I had appointments with colleagues in our profession. Not to embarrass them, just to let them know. I appreciate it when people do the same for me – I’d rather have some hole in the fence discovered by a colleague who will share it in private with me versus the other possibilities.

By the way, I’ve never tried tailgating at any government, airport or any high security areas – it can be fun but I’d like to retain my professional credibility and also maintain personal safety!   

KEYWORDS: badging system ID card tailgate

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joel Jensen is the associate director of security at Minnesota State University, Mankato, and in addition, serves as the system administrator and project manager for the University’s access control system, radio communications systems and two networked video systems.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Open Dialogue to Keep Cost Down

    See More
  • Minor Details Can Lead to Major Expenses

    See More
  • Hello to the Future of POE

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing