Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementPhysical Security

Security Entrances: Tales from the Road and Lessons Learned

By Dave Whitis
boonedam-entrance1
Lesson: Deploy the solution that is right for your application the first time, and provide proper training and orientation for your personnel so that they will be prepared for the change. Photo Courtesy of Boon Edam
boonedam-entrance2

Photo courtesy of Boon Edam

boonedam-entrance3
Lesson: Work with your integrator or trusted manufacturer to discover and deploy the best technology for the needs of your installation. Photo Courtesy of Boon Edam
boonedam-entrance4
Lesson: Take the time to completely understand the operational details and plan user training and support before your deployment. Photo Courtesy of Boon Edam
boonedam-entrance1
boonedam-entrance2
boonedam-entrance3
boonedam-entrance4
July 30, 2019

Nothing beats experience in the field for understanding the various ways a security entrance installation can go wrong. Here are some of our own tales from the road – read on, and discover what not to do when deploying security entrances.

Don’t install a “practice” solution

It may seem like a good idea to give your personnel a lower security option to get used to the idea of new physical security measures at your facility. With this in mind, security enterprises install barrier-free optical turnstiles in an attempt to ease their employees’ eventual transition to optical turnstiles with swinging or sliding barriers. However, this backfires because the employees do not learn to use their credentials correctly; they simply walk through the barrier-free lanes without badging in and wave to the guards when they forgot their credentials. After two years, enterprises usually install the optical turnstiles they wanted in the first place, costing them much more money – and they still have to go through the transitional period of helping their personnel learn to adjust to the new turnstiles.

Lesson: Deploy the solution that is right for your application the first time, and provide proper training and orientation for your personnel so that they will be prepared for the change.

Don’t deploy a partial solution

It may be surprising, but we’ve seen a number of enterprises install a set of turnstiles and then leave a wide gap at one or both ends of the row. Typically, this happens because the organization intends to build a wall or put up filler rail in that area. However, in reality it is not unusual to find several months later that they have simply placed a potted plant in the gap. Even though this is an obvious security shortfall, due to inertia it may stay that way forever. Leaving an open gap around security entrances defeats the purpose of installing them in the first place. There is no reason to allocate budget towards security if you aren’t going to fully follow through on your program.

Lesson: Make sure you have your entire plan in place before installing security entrances.

Don’t mistake one type of problem for another

We have come across several organizations who did not recognize that tailgating and piggybacking are two different things and may require different solutions. With tailgating, one or more individuals follow a credentialed person through an access point, either without their knowledge or without their consent. With piggybacking, the authorized and non-authorized individuals cross as a team, with intent. Depending on the need and application, the recommended product may not be the same for one as for the other. For example, a full height turnstile rotates just enough to let one user through and then the arms lock so that the tailgater can’t enter. But, two slender people could squeeze together into the same compartment (piggybacking) to get in. Each entrance handles things a little differently.

Lesson: Understand the goal of your installation so that you can make the right product decisions.

Don’t make purchase decisions before understanding the technology

It’s not unusual for an organization to make the assumption that turnstiles will be a better choice than a security revolving door. They may consider the doors to be more limiting, slower or more expensive. In some instances, that would certainly be true. However, there are numerous situations in which that would be an incorrect assumption. There is significant long-term ROI associated with security revolving doors. Because these doors prevent unauthorized entry, they do not require manned supervision, allowing guard positions to be eliminated or reallocated throughout the building. Security revolving doors also enable an automatic lockdown of the perimeter in the event of an emergency – something you cannot do with turnstiles.

Lesson: Work with your integrator or trusted manufacturer to discover and deploy the best technology for the needs of your installation.

Don’t expect others to successfully adopt new technology that you don’t know how to use

We’ve seen this a number of times – some security managers go through the entire process of analyzing their needs, evaluating providers, getting approval for expenditures, purchasing and installing security entrances – without fully understanding how to use the new technology. You may have made the very best choice for your application, but you cannot expect your new solution to be successful if your personnel do not understand how they are meant to use it. Your provider should supply user orientation materials to help coach and prepare your stakeholders and employees before installation, and follow through with training once the installation is complete to help ensure the organization gains the maximum ROI from the new security entrances.

Lesson: Take the time to completely understand the operational details and plan user training and support before your deployment.

Security entrances are a significant investment that can greatly improve the overall security for a facility or campus. In order to get the most from them, it’s important to understand some of the things that can go wrong and how to avoid them. Work with your trusted manufacturer and your expert installer to make the right choices and lay the groundwork for a fully successful installation.

KEYWORDS: enterprise security security breach Security entrances turnstile

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Dave whitis
Dave Whitis is Senior Business Development Manager at Boon Edam.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • lessons-ideas-freepik1170x658.jpg

    3 security lessons we haven’t learned from the Kaseya breach

    See More
  • Top Lessons Learned from the Security 500 Conference

    See More
  • Lessons Learned from Security at the 2014 World Cup

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • 150 things.jpg

    The Handbook for School Safety and Security

See More Products

Events

View AllSubmit An Event
  • January 30, 2025

    Iconic and Secure: Security Lessons Learned at Georgetown University

    ON DEMAND: Georgetown University, a major international research university with nine schools, an affiliated hospital, and many highly-ranked academic programs, has a mature, layered security program.
  • January 6, 2011

    From Here to There - Advancing in the Security Field

    Learn the three components that are critical for your advancement.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing