Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementAccess ManagementPhysical Security

The Top 5 Reasons the C-Suite Wants Security Entrances

By Greg Schreiber
turnstile
January 16, 2018

Even though they’ve been around for decades, sales of security doors and turnstiles have increased markedly in the last several years. Some of the biggest companies on the planet are implementing them globally and tying them into their access control systems. Why now? What has changed?

Every organization faces a wide range of risks on a daily basis. Of all these various risks, there are five specific categories affected by access control, where the risks increase significantly when an unauthorized person has gained access into a controlled area. To manage any of these risks, you have a choice: you can choose to respond after the infiltration occurs or prevent infiltration from happening up front.

The C-suite is approving the deployment of security entrances today because standard swinging doors, even when normally kept locked, are not effective at managing these risks; once they are open, more than one person can enter ( known as “tailgating”). Doors also can only grant access; they cannot determine credential or identity. It has become important to ensure that when someone enters a facility they are a known entity and they can be identified. This is critical for each of the five reasons presented below. Also, it is critical to define how access can be verified to build a defensible position in the face of risk and the liability that a company either accepts, transfers or mitigates. Here are the five top reasons or risks the C-suite is working to mitigate with security entrances.

Business Continuity or Loss of Productivity: The entrance of unauthorized people can have a huge negative impact on operations, such as bad PR and work stoppage. Stories abound in the news almost daily. At a major bank in an urban location, protestors pushed into the lobby area and attempted to block employees from going to work. At a manufacturing plant, a woman went missing, and the authorities shut down the plant and made it a crime scene because they didn’t know if she was in or out of the plant when she was lost. In situations like these, productivity suffered tremendously, there was negative publicity, and money was lost. Other potential costs for these sorts of incidents are unbudgeted sick days and the need for employee counseling due to fear or anxiety.

Safety: The importance of controlling dangerous areas (construction zones, chemicals, explosives, dangerous equipment and machinery, etc.) and segmenting environments to prevent unauthorized personnel from wandering or purposefully entering secure or regulated areas is huge. Universally, the concern over employee safety is an issue to the C-suite due to the burden of liability they hold and the potential reprehensible damage to the company if they avoid dealing with it.  

Physical Security: This category is about protecting people who are already inside a building (staff, approved visitors, etc.) safe from attack by outsiders intent on assault, robbery, domestic violence, shootings, etc. Today one of the greatest concerns for the C-suite is the safety of its employees while still giving them a sense of openness and anonymity. However, in these times, the hope to put convenience before security or safety is quickly fading away.

Loss Prevention: All organizations have assets worth protecting. They may be tangible, such as materials, equipment or finished goods, or they may be intangible such as business plans and intelligence, customer billing information, personal information of the staff and other data. It may seem obvious to control access to physical materials, but unauthorized physical access to internal networks, data servers and physical records can potentially be even more damaging to the organization.

Liability/Regulations: I’ve saved the best for last. If anything goes wrong with Safety (injury), Physical Security (violence) and the other risks, then Liability steps up to the plate. If lawsuits come into play, an organization will have to prove they took adequate measures to prevent infiltration; this usually involves a “three-legged stool” of people, process and technology. Security entrances integrated with access control systems are the “technology” leg of the stool: they address tailgating and therefore enable people and processes to work more efficiently and with greater accountability.

Some organizations are subject to regulations that address liability proactively. These regulations usually require controlling physical access as a prerequisite for operation, for example, NERC (energy facilities), HIPAA (healthcare records processing), FDA (drug and food companies), PCI (personal credit info) and many more. Failure to comply results in hefty fines in the hundreds of thousands or millions. Security entrances such as turnstiles and security revolving doors, along with access control and biometric identification systems, provide the solid proof of compliance needed for regulatory oversight and audit purposes.

Conclusion

As you can see, these reasons for deploying security entrances are not trivial. The news is cycling constantly, reminding all of us of how unauthorized physical entry can wreak havoc on operations, people, continuity and the bottom line. The C-suite today is recognizing that the traditional combination for access management – locks on swinging doors, access control systems and guards – each have weaknesses that combined, reduce their effectiveness and cease to be management tools. Instead, they give the impression of security without the reality. This is no longer acceptable to an “awakened” C-suite that demands accountability, predictability and ROI.

KEYWORDS: C-suite security perimeter security security compliance Security entrances workplace security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg schreiber
Greg Schreiber is the Senior Vice President of Sales at Boon Edam Inc. with a career that spans more than 20 years in the security entrance and door industry in a variety of sales management roles, including National Sales Manager for Boon Edam since 2007. Schreiber has successfully steered Boon Edam’s North American and Latin American sales teams to produce double-digit sales growth in each of the last five years.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Enterprise Services
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Boon Edam Circlelock Security Portal with Internal Biometrics.jpg

    Making the Security Case to the C-Suite

    See More
  • woman enters building

    Four steps to entrance security success

    See More
  • budget-enews

    Getting the Greenlight: How to Sell Video Surveillance Systems to the C-Suite

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!