Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesAccess ManagementIdentity ManagementPhysical Security

Implementing Sallyports for Various Applications

By Bryan Sanderford
building entrance
August 26, 2019

Every industry has its own technical terms and common phrases that are understood by those who work in the industry but can be confusing for outsiders.

The term “sallyport” could be considered one of those terms that is not always familiar to everyone, but once its use is explained, is quickly understood. The term “sallyport” is a generic term that is used to describe a method for security to limit entry or exit into a space by allowing the release of only one door at a time.  

Security sallyports came into use in the 17th century to control entry into a prison or a detention facility. They usually incorporated two sets of doors or gates to delay entry or allow only one-person entry at one time. 

Sallyports are still used today in prisons or detention facilities and may include doors, gates or other physical barriers to control the access of people (or even vehicles) to a secure area. They also are frequently used in high-value transfer sites such as armored car depots, casino truck docks, and more. They can also be found in many commercial and industrial facilities such as banking, data centers, airports, and high-end retail shops. Also, many military facilities use sallyports to control vehicle access onto the base.

In exterior locations, automated swinging or sliding gates along with barrier arm devices are used to restrict vehicle access. Sometimes these also include wheel control devices that shred tires and disable the vehicle if there is an attempt to push through the gate. High-speed overhead doors can also be used to secure car and truck access points.

Another way to use a sallyport to control vehicle access is with automated barrier arm gates for faster throughput. For example, a garage that houses FBI agents’ automobiles is protected by a high-speed armored overhead door. While some vehicle portals are controlled remotely from a guard station, others may be automatically controlled by an access control system.

There are many key drivers for using security sallyports. They include the ability to detect and prevent tailgating and piggybacking incidents, to meet regulatory compliance standards (such as HIPAA, GDPR, PCI DSS, HIPPA) by restricting access to critical information systems, and to protect against other security concerns such as insider threats, espionage, terrorism, theft, vandalism, protests, and more.

A security sallyport can come in various sizes, shapes and aesthetics, with multiple options for finishes and colors for the doors, gates or other physical barriers that they use. They may be manual or automatic, manned or unmanned, and can be pre-engineered or built from the ground up.  

In addition to controlling doors and gates, traffic lights may be incorporated into a sallyport design to provide feedback to the system users as to when they should wait or proceed into the sallyport. Other options and features for sallyports include metal/weapons detection, vehicle bollards, left object detection, tailgating/piggybacking detection, network interface capabilities, video surveillance cameras, intercoms, biometrics, manual releases, and inputs/outputs for alarm monitoring.  

When security sallyports are being considered to mitigate unauthorized entry, it is important to establish clear goals and objectives for the equipment, use and the environment. Then, review and evaluate the proposed solution based on form, fit and function. Goals and objectives can be determined with a security risk assessment for your facility or site.

Your risk assessment should take into consideration the physical layout and intended purpose of your facility. Both vehicle sallyports and personnel mantraps may be used to provide the necessary level of security. Some facilities may require a fenced perimeter, plus restricted vehicle access and controlled pedestrian doors into the facility. Pharmaceutical plants, and Microchip fabrication facilities have special environmental and security concerns that must be addressed using a combination of controlled vehicles and pedestrian portals. For these applications, airlocks are recommended, and usually include swinging or sliding doors with maglocks or other electric locks or overheard roll-up doors.

Your security risk assessment should include a strategy that mitigates risk to people, property and information systems, and, for security sallyports, the primary goal is to prevent unauthorized entry. The security risk assessment process should begin with asset identification, followed by evaluation and analysis of threats, vulnerabilities and the potential loss of a security breach.  

For today’s high-profile environments where a data breach could be catastrophic, standard measures of access control and security clearance are sometimes not enough. A sallyport can provide safe, secure, and environmentally-controlled access for the most security-sensitive environment.

KEYWORDS: detection system entryway security Terrorism

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bryansanderford

Bryan Sanderford is National Sales Manager at Dortronics Systems, Inc.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • doctor in hospital

    Strategies for implementing proactive & reactive mass notification

    See More
  • Security Cameras on Building

    Best practices for implementing a new security camera system

    See More
  • Pelco_VXPro_Series

    Pelco Launches VideoXpert™ Professional VMS for SMB Applications

    See More

Related Products

See More Products
  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • July 2, 2012

    Creating & Implementing Templates

    This webinar will showcase the advanced ability of AXIS Camera Management, an efficient management tool for Axis network video products to configure a template from a device to be used as a back-up or to create a template allowing for specific parameters to be copied to multiple devices.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing