Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical Security

Security entrances: Essential tools to improve facility security posture

By Derek Nilsen
BoonEdam-image.jpg

Image courtesy of Boon Edam

June 17, 2022

Security professionals are all too familiar with the concept of physical access control. But for many, the term “access control” implies an access control system consisting of controllers, credentials, and accompanying software. This assumption leaves much to be desired, as it overlooks some critical elements of access control for risk mitigation. 


Not only are traditional access control systems unable to prevent tailgating and piggybacking, but they are also unable to confirm if a user ever entered the building after badging in. Under these circumstances, it is impossible to determine with confidence who is inside a building without deploying a number of redundant security systems. 


Access control is more than just a system. It is rather a multi-layered strategy involving a combination of smart security entrances, data analytics, predictive metrics, and, yes, even systems. Together these elements deliver information and value beyond what traditional access control systems provide. 


Where Traditional Access Control Solutions Fall Short 

Deploying an access control system (an access controller and its accessories) as a facility’s sole source of physical access control is limiting in both function and value, largely because access system controllers are primarily designed for traditional swinging doors. Swinging doors and access controllers each come with their own inherent weaknesses that even technological advancements cannot overcome. These weaknesses diminish security and create a deficit of operational data and meaningful analytics.


With only two “modes,” open or closed, the functions of swinging doors are limited. When open, any number of people can pass through in an uncontrolled fashion regardless of the presence of an access controller. Tailgaters are free to follow unsuspecting users, and employees are inclined to hold the door for others. Swinging doors also offer no restrictions regarding the removal of materials or goods of any size that pass through the doorway. 


As a result, there is no way for security management to accurately identify who or what has entered or exited a building. When integrated with an access control system, results are not much better. Access control software can alert to tailgating violations but cannot prevent them before damage can be done. And while access control systems confirm a person has valid credentials for access, there is no confirmation that the person granted access is the person passing through the doorway.  


Because swinging doors are unable to provide useful security or operational data back to the controllers, access controllers generally haven’t been designed to capture such data. This creates an information gap, wherein data could otherwise be used to understand and improve the facility’s security posture, as well as to gain insight and make improvements to operations. Swinging doors create risk without generating actionable outputs, often making them the weakest link in physical security systems, even when equipped with an access controller.


The Improved Security and Information of Security Entrances

Security entrances are completely different from traditional swinging doors and range widely in form and function to meet various needs. The most common types of security entrances include tripod turnstiles, full height turnstiles, optical turnstiles, security revolving doors, and security mantrap portals. At the lowest security level, they regulate the movements of a large crowd for safety and swift throughput. At the highest levels, they eliminate unauthorized intrusions, tailgating, and piggybacking without requiring any supervision by guard staff. Most important, all security entrances are designed to ensure only authorized people enter or exit a controlled area. 


Take the operation of a traditional swinging door with an integrated legacy access control system and compare it with that of a security revolving door with a built-in entrance controller. In the case of the swinging door, the access controller would only know if and when credentials were presented, accepted, and door access was triggered. In sharp contrast, the security revolving door and its entrance controller know as much and more. Here, the system confirms how many times entry was authorized and if the person successfully entered or did not enter. Furthermore, the system reports if the person entered and a second person tried to enter with them in the same compartment (piggybacking), if a second person tried to enter in the following compartment (tailgating), or if a second person tried to exit in the opposite compartment (unauthorized exit/entry).


This more complete information is of high interest to security and facility management teams because it affects both security and operational issues. Using this data, management teams can capture analytics about user behaviors and tie that information directly to threat and risk assessments. Such information would be otherwise impossible to gather using a traditional swinging door and integrated access control system. 


Predictive Metrics for Enhanced Insight

When it comes to certain security entrance models or designs, it may be possible to go even further. New innovations in presence detection have made it possible to both detect and reject piggybacking and tailgating attempts using intelligent interior sensors to confirm that only one person is attempting passage. With this technology, security managers can adjust several parameters that will affect the sensitivity of the assessment to meet the needs of a facility. This exercise results in access to predictive analysis of the risk of a potential breach. 


For example, an advanced presence detection solution detects and rejects every piggybacking attempt, but at the expense of an increased likelihood of a “false positive” — that is, a single authorized individual wrongly rejected for wearing a backpack. By lowering the system sensitivity, security management can reduce the number of these false rejections, but by doing so they increase the risk of a potential piggybacking breach. Managers can select the desired balance between security risk and user convenience by using the predictive probability metric. Such settings can then be scaled across all security entrances, giving management a clear understanding of the risk at these entrances and certainty that any infraction is not an accident.


Security entrances can be superior to their swinging door predecessors, helping bridge the gap between access control systems and holistic access control. Through the integration of new security entrance technologies, security management teams can accurately measure who is inside a facility while also providing significant return on investment that goes beyond improvements in security.


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: access control risk management security entrance security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek nilsen

Derek Nilsen is the Director of Marketing for Boon Edam Inc. Nilsen has over 15 years of experience in the security industry and has been with Boon Edam for over ten years

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • man walking through revolving door

    Protecting data centers by layering physical security entrances

    See More
  • SMBs can improve their cybersecurity posture

    Practical tips and resources to improve the cybersecurity posture of your business

    See More
  • Webcor implements managed security services to mitigate risk

    Commercial construction company Webcor implements managed services to improve its security posture

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!