Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireTechnologies & SolutionsSecurity Leadership and ManagementSecurity & Business ResilienceAccess ManagementPhysical Security

Four steps to entrance security success

By Greg Schreiber
woman enters building

Image courtesy of Boon Edam

February 18, 2022

All entrance security solutions are as unique as the large organizations that install them. Access control products and their functions vary widely, from revolving doors to optical turnstiles and security portals. Similarly, every organization has differing corporate cultures and needs that guide their decision-making.

While organizations and the security solutions they choose to install may look different, there is one thing that binds them — their framework for success. Fortune 500 companies and the like employ four basic steps to ensure their physical security deployments run smoothly. By adopting these tactics, any large organization can feel confident in their entrance security decisions.

1. Vet the manufacturer

Any security director or integrator should have a deep understanding of the manufacturer they will be working with. That is not to say that working with a new vendor is frowned upon, but rather, all parties involved should get to know one another. To do this, both the end user and manufacturer should ask questions and respond honestly. Take time at the beginning of the relationship to work through the critical questions to avoid issues down the road.

Perhaps most importantly, consider the manufacturer’s capacity to scale. Question the ability of their products to be upgraded, modified or adjusted as necessary. Conversely, clearly communicate current organizational needs and potential future needs. Regardless of budget, installing new entrance security measures is a long-term investment. A manufacturer should build confidence in their client that their investment is reasonably future-proof.

2. Use these seven considerations

Before starting on a project, security decision-makers will want to consider the critical elements of an entrance security solution. Not only will the following considerations assist decision-makers in choosing the best entrance products for their facility, but they can also be used as criteria for vetting the manufacturer.

  1. Throughput: Consider the types and quantities of people moving through the various areas of a facility. 
  2. Security: Think about the risks that will be mitigated after the system deployment is complete. How does each product address issues like piggybacking and tailgating?
  3. Safety: Ensuring the safety of all assets — people, property and information — is a key function of entrance security. Contemplate what in the building is worth protecting and act accordingly. 
  4. Aesthetics: An entryway is an initial first impression; therefore, it should match the organization in tone and presence. 
  5. Technology: Integrating innovative technology is great for future-proofing, but consider how frequent technology updates may impact costs.  
  6. Comfort: Imagine walking through the proposed entrance solution. Is it easy to use and navigable?
  7. Service: Service includes the service of both the physical product and the user. Keep this in mind when vetting a manufacturer.

Beyond project managers and security directors, all project stakeholders should be made aware of the seven considerations. This aids in decision-making by providing various points of view and can reduce headaches down the road. At the end of the day, a company is liable for any safety or security misstep. Therefore, stakeholders and C-suite employees should, at the very least, be aware of any physical security solutions being installed.

3. Deploy in layers

Corporate campuses have layers. The outermost layers are likely for public access, but as we move toward the facility’s center, the layers get more complex and require higher levels of clearance to access. Each layer serves a separate purpose and requires its own unique entrance product to mitigate the applicable risks. Each campus and facility is different, but generally, adopting a layered approach to access control will allow organizations to better understand and address the requirements of each entry point.

The deterrence layer is the outermost layer and typically consists of a fence, gate or parking garage. Full height turnstiles are recommended in these locations to deter entry based on their tall stature and anti-tailgating design.

Next, we move to the detection layer, which processes both visitors and employees. An optical turnstile may be an apt entry solution for this layer, as it allows credentialed employees to pass through with ease while staff can direct visitors to additional check-in services.

The first prevention layer includes employee-only entrances. Here, revolving doors can aid security teams as they are unmanned and prevent tailgating without slowing employees.

As employees move into the building’s core, they hit the second prevention layer. This is where security portals offer authorized, single-person entry to highly sensitive areas such as executive suites or data centers.

4. Test the integrated solution

The best way to ensure an entrance security product is suitable for an organization is to test it first. Even if this means shipping a single unit to a facility before ordering for the complete install, the ability to confirm a working system will be more than worth the shipping costs. Invite stakeholders and employees to test the products so they can provide feedback from a different point of view. Also, consider assessing any third-party devices that will be integrated with the entrance security products to verify whether products integrate well and operate as expected.

Deploying entrance security solutions across a large campus or facility is no small undertaking. Armed with these tips for success, enterprise security leaders can confidently install entrance solutions and ensure their investment is built for the long term.

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: access control entrance security entryway device layered security security tools threat detection turnstile

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg schreiber
Greg Schreiber is the Senior Vice President of Sales at Boon Edam Inc. with a career that spans more than 20 years in the security entrance and door industry in a variety of sales management roles, including National Sales Manager for Boon Edam since 2007. Schreiber has successfully steered Boon Edam’s North American and Latin American sales teams to produce double-digit sales growth in each of the last five years.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Boon Edam Circlelock Security Portal with Internal Biometrics.jpg

    Making the Security Case to the C-Suite

    See More
  • turnstile

    The Top 5 Reasons the C-Suite Wants Security Entrances

    See More
  • ransomware

    Four steps to deliver a deadly counterpunch to ransomware attacks

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing