Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Putting Up Barriers

By Sue Marquette Poremba
Barriers Slide 1
Two sets of turnstile entrances help University of Arkansas personnel control access to certain areas.
Barriers Slide 2
Data centers control network infrastructures and hold millions of pieces of sensitive information. Access to the center needs to be tightly controlled. The gate and fence at this data center near Dallas provides protection near the facility while still presenting an open, welcoming space for the neighborhood.
Barriers Slide 3
Buried about eight inches underground, Omnitrax forms a volumetric zone of detection around a building or site and detects intruders based on body mass. The system has a high probability of detection with low false and nuisance alarms rates.
Barriers Slide 1
Barriers Slide 2
Barriers Slide 3
April 1, 2011

The events of September 11, 2001 changed the way business thought about perimeter security and access control. Rather than just a barrier to keep intruders out, fences and gates are installed with protection against potential terrorist attacks in mind. Perimeter security is now being looked at to determine the best ways to stay safe.

Of course, the heightened sense of alert that followed 9-11 is only one of dozens of reasons why organizations or private residents choose to install some sort of access control. For example, Charlie Weston, president of Guardian Fence in Columbia, S.C., points out that construction sites and utilities companies have problems with people sneaking on to the property to steal copper. Prisons need good security around the property. Or it might simply be a way to monitor that the properly credentialed people are coming into a facility, like at a baseball stadium.

When deciding on the right type of perimeter and access security, the primary consideration is to understand what the fence or other barrier is meant to do. Is the fence keeping something out of an area or is it keeping something in?

Once that’s determined, says Chris Herold with Ameristar Fence Products of Tulsa, Okla., the next step is to determine what the threat is because that will determine the type of products needed. Someone whose biggest concern is neighborhood kids climbing the fence will look into a very different type of barrier system than someone who operates a chemical company and wants to keep trucks from crashing into the building.

Other questions that Herold recommends asking before installing any type of fencing include the following:

•  Can the fence be integrated with other physical security technologies and access control devices?

•  What image do you want the fencing to portray?  Do you want the facility to look like prison grounds or should the fencing blend into the neighborhood?

•  What is the reputation of the manufacturer?

•  What are the results of industry testing for the product you are considering?

These were among the issues that Mark Kennaugh, operations manager at CAPSTAR Commercial Real Estate Services, considered for the perimeter security of a data center in the Dallas, Tex. area. Data centers control network infrastructures and hold millions of pieces of sensitive information. Access to the center needs to be tightly controlled.

“Security was our first concern,” he says. “We wanted to create a barrier around the perimeter around the building, with the fence 75 feet off the road. That allows people to walk around the building on sidewalks but not get close to the building.”

The fence Kennaugh used has three areas of security: the exterior of the fence, which is public; the first interior, which is the zone for visitors to the facility; and the second security zone, which is for employees who then need special access into the building.

This more secure fence was installed to replace a chain-link fence that once surrounded the data center. The current fence, installed in 2005, is strong enough to keep people from getting through it. The security bolts that connect the fence can’t be unfastened to break through the fence.

“We wanted something strong, but was also appealing to the neighborhood and durable,” says Kennaugh.

Fences are made from a variety of different materials, ranging from wood to plastic, but for the highest security fences, steel is the material of choice. Chain link remains a popular option; a mini-mesh design with a smaller than usual diameter can deter those who want to climb the fence. The smaller weaving prevents a potential trespasser from getting a foothold.

One of the greatest challenges in fence installation today is retrofitting the fence structures for the current environment. For example, the anti-ram fencing has certain requirements for footings, but the fences are being installed at facilities that have been in operation for decades with fencing that no longer meets security standards. The old system posts and footings may not work with the new system, and soil conditions around the old system may have deteriorated, making new installation more difficult.

Gates are the weakest part of the fence because that’s the point of access. When deciding on the type of gate to be used, such as a sliding gate versus a rolling gate, the main consideration is how the gate will be used. Will it be opened several thousand times a day or just a few times a month? Environmental conditions of the area also need to be considered. Too much snow and ice can make a roll gate less effective, so a slide gate would be the better consideration.

The complexity of the gate system really depends on the level of security desired, Herold points out. A pedestrian gate used infrequently may be locked with padlocks and chains; whereas, a sliding gate that uses a motorized gate operator locks automatically. Those installing the fence and gate have a lot of control over how people can gain access. Electronic card readers are common to allow easy access for people in vehicles.

When budgets are tight, a good perimeter system can provide 24/7 security and cut down on the need for staff monitoring the property. However, there are situations when even the best barriers need some extra help, like alarm systems, cameras, or sensors.

Greg Briggs, project manager with O’Connell Electric in Victor, N.Y., installs a lot of jail security systems, including a recent fence project around a county jail. He usually uses a perimeter fence detection system, in this case by Senstar. “Usually they are ground-mounted sensors, with different technologies for different levels of securities,” Briggs explains. “The county jail we just did had a cable system installed in razor wire work that was mounted across the roof.”

When recommending a fencing system to his clients, Briggs says his main concern is reliability of the product. “When we turned on the system at the county jail, we were being hit with 30-mile-per-hour winds. The system was not false alarming like the old system.”

The sensor system from Senstar incorporates different styles of sensors that warn you when someone is trying to enter or leave the property without permission. Depending on the style, the sensors can be placed on the fence or underground as an invisible barrier. The sensors can be added to any existing fence, of any material.

What sensors bring to the perimeter protection arena is notification that something is amiss on the property, which is vital at a prison, for example. Are sensors or other security monitoring systems necessary on fences? Again, it all depends on what the fence is meant to do and the level of security required. There is no one-size-fits-all solution for outdoor perimeter security, and it may be good to consider a combination of systems.

While the barriers are meant to keep trespassers out (or criminals in), there are times when an added level of access control is required, most frequently with turnstiles. Anyone who has ever gone to an amusement park or to a sports stadium has experienced the most familiar type of turnstile – three armed, waist high – which is meant to ensure that persons with the right credentials (a ticket, say) are able to enter. This type of turnstile is also popular inside lobbies to control the access into certain areas of a building.

Other options of turnstiles are optical (a cabinet with infrared sensors; if the beams are broken without authorization, an alarm sounds) and full-height that allows only one person at a time to enter. Full-height turnstiles are usually used in exterior situations.

The most effective turnstiles prevent tailgating – two people going through the barrier at the same time on one authorization. The locked entrance, says Mark Borto, CEO and president of Boone Edam, is really the last stand in access control. Even in the most sophisticated barrier and access system, once an entrance is unlocked, the only thing preventing a second person from coming in – with or without authorization – is the first person.

Turnstiles fit into the concept of access control in two ways: they remain locked in the same way a regular door is locked and they eliminate the second person coming in without a struggle. Deciding on the type of turnstile to use follows the same line of thinking for fences – think about the application of the turnstile and what type of access is to be controlled.

All in all, the amount of security is determined by the amount of time one has to react to a breach. The perimeter barriers and access controls onto a property should, then, reflect the level of security desired.

KEYWORDS: barrier fences gates perimeter security security turnstiles

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sue Marquette Poremba is a contributing writer.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • firetruck

    Mobile vehicle barriers: Long-term security solution for temporary events

    See More
  • Generic Image for Physical Security

    Security Barriers Approved for Times Square

    See More
  • Security gate with barrier arm

    Keys and vehicle barriers: A unified approach to protection

    See More
×
Two sets of turnstile entrances help University of Arkansas personnel control access to certain areas.
Data centers control network infrastructures and hold millions of pieces of sensitive information. Access to the center needs to be tightly controlled. The gate and fence at this data center near Dallas provides protection near the facility while still presenting an open, welcoming space for the neighborhood.
Buried about eight inches underground, Omnitrax forms a volumetric zone of detection around a building or site and detects intruders based on body mass. The system has a high probability of detection with low false and nuisance alarms rates.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!