Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalTechnologies & SolutionsSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical SecurityVideo Surveillance

Best practices on integrating access control, biometrics with swing doors and security entrances

There needs to be a solid strategy to ensure security when using an electronic access control system (ACS) and secured entrance devices.

By Kurt Measom
boon edam
February 9, 2021

While the array of ancillary devices surrounding an ACS may vary and range in levels of complexity, the fact is that most access control systems are designed to work with swinging doors, and this hasn’t changed in several decades. The difficulties of trying to properly integrate your ACS with other types of entrances, such as security doors or turnstiles remains a challenge for many systems integrators and their end-user partners. This is because most ACS are designed to track the events that happen at swinging doors, telling you only one thing: the door opened. Typical events are: “Door Unlocked”, “Door Forced Open” and “Door Held Open.”

From a physical security strategy standpoint, the other issue with swinging doors is that if they are used exclusively throughout a facility, that facility is vulnerable to intrusion from tailgating. Ideally, a facility should have a layered approach where, for example, security turnstiles and/or security revolving doors are stationed at perimeter access locations and then swinging doors can be used for interior office spaces and mantrap portals for sensitive data or records rooms (this is a general approach – your facility may require a different strategy). Given this ideal scenario, the solution for a secured entrance that mitigates tailgating is to integrate it with a compatible ACS so events can be logged and personnel entering the facility are properly tracked and identified. So, how can EAC and other devices like biometrics technologies be configured to help mitigate unauthorized entry through swing doors and turnstiles? We’ll take a look at swing doors and turnstiles first, then the high security revolving doors and mantrap portals.

Enhancing Detection: Making Swing Doors and Turnstiles Work

For veteran security consultant Sean Ahrens, CPP, the assertion is that the user weighs the multiple options and chooses the solution that best fits the specific facility and security culture. He says that anti-tailgating technologies can be added to swing doors, or they can deploy optical turnstiles, either of which use photo-optic beams to detect tailgating, adding that there is also the possibility of using cameras and analytics to detect movement and tracking. But Ahrens cautions that anti-tailgating door technologies have been around for some time but can create false alarms and that camera analytics are being used increasingly, but still need to be improved. He also notes that contactless biometrics are certainly going to be the norm given the challenges of COVID.

Ahrens points out that from a process perspective, the most inconvenient approach for occupants is to use hard anti-pass back, which requires a person to use a credential to enter and also exit. Failure to present a credential on exit will disable the credential from being used to re-enter the facility.

“This can be very inconvenient and goes against the current “frictionless” access control mantra that many are spreading. An alternative approach is not to disable a credential but automate a response to the person’s supervisor via a rule/flow process and require the completion of security classes for the supervisor and the offender within a specific timeframe. In this way it becomes a compliance issue, and people will be compelled to use their credential properly rather than be reprimanded by their superior or re-take training that is mundane,” says Ahrens. “Facial recognition can be used to automate access, however, COVID and mask requirements may limit the effectiveness of these systems and could permit false acceptance.”

Swinging Doors and Turnstiles Integrate with ACS for Solid Solutions

As mentioned earlier, swinging doors with a credential reader are usually locked until a valid credential is presented and can have tailgating detection technology installed. Optical turnstiles offer built-in tailgating detection and work exceptionally well in open lobbies to accommodate both occupants and visitors. Timothy Sutton, who has more than 30 years of security experience and is a Senior Security Consultant at Guidepost Solutions, says short of a security guard manning your front entrance – which can also be a security weakness -- swing doors and turnstiles that can be secured against unauthorized entry and are supported by an electronic access control system, and monitored or supervised, are a strong defense for a facility.

“The ACS basically performs the same functions as a physical security guard in that a person seeking access would present a credential for inspection by the ACS. The ACS compares the credential information to a user database to ensure the person is confirmed as a user, and that the user has been granted entry authority to that particular door or turnstile at the time the credential was presented. Credentials can be physical cards or fobs with electronic encoding, a code to be entered into a keypad often known as a personal identification number (PIN), or a biometric signature such as a finger or palm print, vascular mapping of a hand, or a retina to be scanned,” says Sutton. “These credentials can be used alone or in any combination of two or all three types to achieve the desired level of security. Video surveillance systems can be utilized for access control in this environment by providing an image of a person for comparison to a database of authorized persons. This comparison can be made by a physical security officer, or, using facial recognition and video analytics.”

Sutton emphasizes that integrating ACS and credential/identity technology with swinging doors will only address authorizations for entry and will not control tailgating. The best way to set up a secured entrance is multi-factor credential authorization, tailgating detection through video analytics or LIDAR, and using a mantrap portal solution or building a secured mantrap vestibule with two doors that uses a two-stage approach with credential verification (RFID card, PIN) to open the first door, then identity verification (biometrics) to open the second door. With a mantrap solution, you can be assured of a user’s identity and that they are alone.  

Security Revolving Doors and Mantrap Portals Create a Prevention Strategy

boon edam

According to security consultant and CTO of ESI Convergent, Pierre Bourgeix, both swinging door and optical turnstile scenarios that include LIDAR tailgating detection are more of a deterrent or a forensic, investigative tool rather than a prevention strategy. 

“The only true prevention strategy is the use of a security revolving door or mantrap portal solution.The critical point is that access and identity to entry must be cohesive, occurring simultaneously during the entry event. This is your prevention strategy because these types of high security doors have a working principle that prevents piggybacking and ensures a user is alone.”

Customizing your ACS to Track Rich Event Data

One final point about integration: earlier, I mentioned that an ACS system is designed to only tell you that a door was unlocked, forced open or held open longer than allowed. Security entrances, when integrated properly with an ACS, can tell you much more than a swinging door. If you deploy them, it is critical that you work with your integrator or manufacturer to install extra inputs or input boards to enable the ACS to track the many types of events that can happen at security entrances. For example, you can track normal authorizations, tailgating rejections and piggybacking rejections (two people colluding to enter on a single authorization), loitering alarms, biometric time-outs, and passage completed events, to name a few. This information can help you be much more aware of exactly who is doing what at various entrances at the perimeter and interior of your facility.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: access control biometrics facility security Security entrances

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kurtmeasom

Kurt Measom serves as vice president of technology and product support and is part of the enterprise account team. Measom has been employed at Boon Edam for more than 25 years serving in multiple roles including vice president of technical services, training and quality. Over the past eight years, Measom has worked closely with Boon Edam’s enterprise sales team as an advisor for security solutions to many Fortune 1000 companies and is currently a Lenel Certified Associate.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Man on laptop

Healthcare Executives Face a New Era of Personal Risk

Police lights

Security Team Member Dies in Standoff with Dallas Police

Stadium

Physical Security in Global Arenas: How AI Improves Security at Scale

Four people in suits

Mexico Security Crisis: Never Waste a Crisis

Product Spotlight

ISC West 2026 Product Preview

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

April 21, 2026

The Blind Spot in Enterprise Security: Managing Workforce Risk Post-Hire

Organizations continuously monitor their networks and systems for risk, yet the people with legitimate access are often the least monitored part of the model. Discover a Workforce Risk Intelligence Framework that adds a dedicated layer focused on workforce risk.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • An Opened Lock Standing Out From Locked Locks

    From the Outside In: A Smarter Approach to Vendor Access

    See More
  • Access Control: Best Practices for After-Hours Operation

    See More
  • entrance

    Decoding Security Entrances: Getting Familiar with Local Codes

    See More

Related Products

See More Products
  • 9780815378068.jpg.jpg

    Biometrics, Crime and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing