Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementPhysical Security

Security Entrances: Tales from the Road and Lessons Learned

By Dave Whitis
boonedam-entrance1
Lesson: Deploy the solution that is right for your application the first time, and provide proper training and orientation for your personnel so that they will be prepared for the change. Photo Courtesy of Boon Edam
boonedam-entrance2

Photo courtesy of Boon Edam

boonedam-entrance3
Lesson: Work with your integrator or trusted manufacturer to discover and deploy the best technology for the needs of your installation. Photo Courtesy of Boon Edam
boonedam-entrance4
Lesson: Take the time to completely understand the operational details and plan user training and support before your deployment. Photo Courtesy of Boon Edam
boonedam-entrance1
boonedam-entrance2
boonedam-entrance3
boonedam-entrance4
July 30, 2019

Nothing beats experience in the field for understanding the various ways a security entrance installation can go wrong. Here are some of our own tales from the road – read on, and discover what not to do when deploying security entrances.

Don’t install a “practice” solution

It may seem like a good idea to give your personnel a lower security option to get used to the idea of new physical security measures at your facility. With this in mind, security enterprises install barrier-free optical turnstiles in an attempt to ease their employees’ eventual transition to optical turnstiles with swinging or sliding barriers. However, this backfires because the employees do not learn to use their credentials correctly; they simply walk through the barrier-free lanes without badging in and wave to the guards when they forgot their credentials. After two years, enterprises usually install the optical turnstiles they wanted in the first place, costing them much more money – and they still have to go through the transitional period of helping their personnel learn to adjust to the new turnstiles.

Lesson: Deploy the solution that is right for your application the first time, and provide proper training and orientation for your personnel so that they will be prepared for the change.

Don’t deploy a partial solution

It may be surprising, but we’ve seen a number of enterprises install a set of turnstiles and then leave a wide gap at one or both ends of the row. Typically, this happens because the organization intends to build a wall or put up filler rail in that area. However, in reality it is not unusual to find several months later that they have simply placed a potted plant in the gap. Even though this is an obvious security shortfall, due to inertia it may stay that way forever. Leaving an open gap around security entrances defeats the purpose of installing them in the first place. There is no reason to allocate budget towards security if you aren’t going to fully follow through on your program.

Lesson: Make sure you have your entire plan in place before installing security entrances.

Don’t mistake one type of problem for another

We have come across several organizations who did not recognize that tailgating and piggybacking are two different things and may require different solutions. With tailgating, one or more individuals follow a credentialed person through an access point, either without their knowledge or without their consent. With piggybacking, the authorized and non-authorized individuals cross as a team, with intent. Depending on the need and application, the recommended product may not be the same for one as for the other. For example, a full height turnstile rotates just enough to let one user through and then the arms lock so that the tailgater can’t enter. But, two slender people could squeeze together into the same compartment (piggybacking) to get in. Each entrance handles things a little differently.

Lesson: Understand the goal of your installation so that you can make the right product decisions.

Don’t make purchase decisions before understanding the technology

It’s not unusual for an organization to make the assumption that turnstiles will be a better choice than a security revolving door. They may consider the doors to be more limiting, slower or more expensive. In some instances, that would certainly be true. However, there are numerous situations in which that would be an incorrect assumption. There is significant long-term ROI associated with security revolving doors. Because these doors prevent unauthorized entry, they do not require manned supervision, allowing guard positions to be eliminated or reallocated throughout the building. Security revolving doors also enable an automatic lockdown of the perimeter in the event of an emergency – something you cannot do with turnstiles.

Lesson: Work with your integrator or trusted manufacturer to discover and deploy the best technology for the needs of your installation.

Don’t expect others to successfully adopt new technology that you don’t know how to use

We’ve seen this a number of times – some security managers go through the entire process of analyzing their needs, evaluating providers, getting approval for expenditures, purchasing and installing security entrances – without fully understanding how to use the new technology. You may have made the very best choice for your application, but you cannot expect your new solution to be successful if your personnel do not understand how they are meant to use it. Your provider should supply user orientation materials to help coach and prepare your stakeholders and employees before installation, and follow through with training once the installation is complete to help ensure the organization gains the maximum ROI from the new security entrances.

Lesson: Take the time to completely understand the operational details and plan user training and support before your deployment.

Security entrances are a significant investment that can greatly improve the overall security for a facility or campus. In order to get the most from them, it’s important to understand some of the things that can go wrong and how to avoid them. Work with your trusted manufacturer and your expert installer to make the right choices and lay the groundwork for a fully successful installation.

KEYWORDS: enterprise security security breach Security entrances turnstile

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave whitis
Dave Whitis is Senior Business Development Manager at Boon Edam.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • lessons-ideas-freepik1170x658.jpg

    3 security lessons we haven’t learned from the Kaseya breach

    See More
  • iphone free

    Lessons learned from the iPhone call recording app vulnerability

    See More
  • SEC0820-Data-Feat-slide1_900px.jpg

    Lessons learned from the Equifax data breach

    See More
×
Lesson: Deploy the solution that is right for your application the first time, and provide proper training and orientation for your personnel so that they will be prepared for the change. Photo Courtesy of Boon Edam
Photo courtesy of Boon Edam
Lesson: Work with your integrator or trusted manufacturer to discover and deploy the best technology for the needs of your installation. Photo Courtesy of Boon Edam
Lesson: Take the time to completely understand the operational details and plan user training and support before your deployment. Photo Courtesy of Boon Edam

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!