Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementPhysical SecurityInfrastructure:Electric,Gas & Water

How to Formulate a Holistic Approach for Effective Entrance Planning

By Tracie Thomas
entrance-enews
July 17, 2018

Traditionally, security personnel begin with their building’s main entrances when planning to secure their facility. While that is an effective start, it is important to consider the entire facility or campus to ensure that all areas are protected.

Sectors that are already embracing this trend include corporate campuses, higher education, critical infrastructure, multi-tenant buildings, data centers and distribution centers – and it’s spreading to all industries and organizations. In this article, we’ll share how security entrances are deployed in layers across large properties to mitigate the risk of infiltration according to their capabilities.

 

The Three Legs of the Holistic Approach

As a quick reminder, security entrances are intended to fit into physical security planning that addresses People, Process and Technology. The People aspect involves curating a highly experienced and capable security team; Process is about creating well-defined, robust, flexible and adaptive processes and procedures; and Technology (which includes security entrances, access control systems, cameras, biometrics, etc.) encompasses an advanced, innovative and highly secure tool set. These three elements work together to formulate a holistic physical security plan that is used by the sectors in this article.

Now, here’s how these sectors are addressing the risk of infiltration by deploying security entrances in layers.

 

Corporate Campuses

Corporate headquarters require a range of differing solutions at entrances and exits to ensure that only authorized people are able to enter each section of the campus. These organizations can create multiple layers of access authority, for example, by using optical turnstiles with waist-high glass barriers to detect tailgating at the main building entrance and full-height security revolving doors or mantrap portals at the entrances to more restricted areas. This creates an open and more inviting impression for the main lobby area while maintaining higher security where it is necessary to secure sensitive information housed on certain floors, protect employees, or provide employee-only access to certain floors.

 

Higher Education

College and university campuses are difficult to secure because they are open to the public and often distributed across large tracts of land or blocks in urban locations. Campus security is responsible for the safety of staff, students and visitors. You can find optical turnstiles at the supervised entrances of libraries, residence halls, recreational facilities, dining halls and classroom buildings to deter and detect tailgating and facilitate visitors/guests. Parking areas, sports stadiums and other outdoor facilities deploy full-height and waist-high turnstiles to control the flow of traffic through entrances and exits, and can supervise them on an “as needed” basis.

 

Critical Infrastructure

With risks to critical infrastructure including terrorism and cyber breaches, these are some of our must vulnerable facilities. Dams, ports, railways, power plants and oil/gas facilities must comply with federal or state regulations or pay hefty fines for infractions. Full-height turnstiles on the fence line deter public access into dangerous, outdoor areas. Then the entrances to buildings and areas that are more sensitive rely on either supervised turnstiles or security mantrap portals to prevent unauthorized entry. Often biometric technology, such as iris or facial recognition, confirms the identity of employees entering sensitive areas and the access control system records the entry.

 

Multi-Tenant Commercial Buildings

Security challenges in a multi-tenant space are diverse, as each tenant provides different services with individualized needs. With the wide range of security entrances available, each tenant can tailor the level of security (do they want to deter, detect or prevent infiltration?) to match their requirements.

 

Data Centers

It is vitally important to protect data centers from physical breaches, as they enable hackers to easily access networks to steal, corrupt or ransom intellectual property, personal data and other information. At the fence line, you’ll find full-height turnstiles with security cameras to deter casual pedestrian intrusion. At the main entry into the facility supervised optical turnstiles facilitate the entry of employees and escorted guests. The final “nucleus” layer includes the servers in the cold room; to enter, you’ll encounter mantrap security portals that prevent piggybacking attempts and are ideal for two-factor authentication protocol. If a user satisfies both factors (credential and identity) and most importantly, they are alone, they can enter. 

 

Distribution Centers and Manufacturing Facilities

Distribution centers and manufacturing facilities don’t generally admit the public, but security is required to protect employees, physical assets and also prevent theft. This sector relies on lower cost, robust entrance solutions. Economical full-height turnstiles perform double duty both inside and outside: at the perimeter fence line and again inside where workers enter the floor or warehouse (often in conjunction with metal detectors to ensure no weapons are brought in). Then, full-height turnstiles are used again as a one-way exit solution. As a theft deterrent, we’ve also seen tripod turnstiles used to process employees for random pat-downs before they leave for the day.

The layered approach is one driver behind the growing security entrance market. No matter what industry you are in, you have an opportunity to use security entrances to harden your facility areas beyond the front door.

KEYWORDS: corporate security intrusion detection Security entrances security risk management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tracie Thomas is the Marketing Manager for security entrance and door manufacturer Boon Edam.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • speed lane

    You Deserve to be Delighted: 10 Essential Elements to Look for in a Security Entrance Manufacturer

    See More
  • Workplace Violence Prevention Plan

    Workplace violence prevention: How to formulate a plan

    See More
  • A Holistic Approach to Physical and IT Security

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780128147948.jpg

    Effective Security Management, 7th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing