Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceSecurity Education & TrainingAccess ManagementFire & Life SafetyIdentity ManagementPhysical Security

Security entrances: Essential tools to improve facility security posture

By Derek Nilsen
BoonEdam-image.jpg

Image courtesy of Boon Edam

June 17, 2022

Security professionals are all too familiar with the concept of physical access control. But for many, the term “access control” implies an access control system consisting of controllers, credentials, and accompanying software. This assumption leaves much to be desired, as it overlooks some critical elements of access control for risk mitigation. 


Not only are traditional access control systems unable to prevent tailgating and piggybacking, but they are also unable to confirm if a user ever entered the building after badging in. Under these circumstances, it is impossible to determine with confidence who is inside a building without deploying a number of redundant security systems. 


Access control is more than just a system. It is rather a multi-layered strategy involving a combination of smart security entrances, data analytics, predictive metrics, and, yes, even systems. Together these elements deliver information and value beyond what traditional access control systems provide. 


Where Traditional Access Control Solutions Fall Short 

Deploying an access control system (an access controller and its accessories) as a facility’s sole source of physical access control is limiting in both function and value, largely because access system controllers are primarily designed for traditional swinging doors. Swinging doors and access controllers each come with their own inherent weaknesses that even technological advancements cannot overcome. These weaknesses diminish security and create a deficit of operational data and meaningful analytics.


With only two “modes,” open or closed, the functions of swinging doors are limited. When open, any number of people can pass through in an uncontrolled fashion regardless of the presence of an access controller. Tailgaters are free to follow unsuspecting users, and employees are inclined to hold the door for others. Swinging doors also offer no restrictions regarding the removal of materials or goods of any size that pass through the doorway. 


As a result, there is no way for security management to accurately identify who or what has entered or exited a building. When integrated with an access control system, results are not much better. Access control software can alert to tailgating violations but cannot prevent them before damage can be done. And while access control systems confirm a person has valid credentials for access, there is no confirmation that the person granted access is the person passing through the doorway.  


Because swinging doors are unable to provide useful security or operational data back to the controllers, access controllers generally haven’t been designed to capture such data. This creates an information gap, wherein data could otherwise be used to understand and improve the facility’s security posture, as well as to gain insight and make improvements to operations. Swinging doors create risk without generating actionable outputs, often making them the weakest link in physical security systems, even when equipped with an access controller.


The Improved Security and Information of Security Entrances

Security entrances are completely different from traditional swinging doors and range widely in form and function to meet various needs. The most common types of security entrances include tripod turnstiles, full height turnstiles, optical turnstiles, security revolving doors, and security mantrap portals. At the lowest security level, they regulate the movements of a large crowd for safety and swift throughput. At the highest levels, they eliminate unauthorized intrusions, tailgating, and piggybacking without requiring any supervision by guard staff. Most important, all security entrances are designed to ensure only authorized people enter or exit a controlled area. 


Take the operation of a traditional swinging door with an integrated legacy access control system and compare it with that of a security revolving door with a built-in entrance controller. In the case of the swinging door, the access controller would only know if and when credentials were presented, accepted, and door access was triggered. In sharp contrast, the security revolving door and its entrance controller know as much and more. Here, the system confirms how many times entry was authorized and if the person successfully entered or did not enter. Furthermore, the system reports if the person entered and a second person tried to enter with them in the same compartment (piggybacking), if a second person tried to enter in the following compartment (tailgating), or if a second person tried to exit in the opposite compartment (unauthorized exit/entry).


This more complete information is of high interest to security and facility management teams because it affects both security and operational issues. Using this data, management teams can capture analytics about user behaviors and tie that information directly to threat and risk assessments. Such information would be otherwise impossible to gather using a traditional swinging door and integrated access control system. 


Predictive Metrics for Enhanced Insight

When it comes to certain security entrance models or designs, it may be possible to go even further. New innovations in presence detection have made it possible to both detect and reject piggybacking and tailgating attempts using intelligent interior sensors to confirm that only one person is attempting passage. With this technology, security managers can adjust several parameters that will affect the sensitivity of the assessment to meet the needs of a facility. This exercise results in access to predictive analysis of the risk of a potential breach. 


For example, an advanced presence detection solution detects and rejects every piggybacking attempt, but at the expense of an increased likelihood of a “false positive” — that is, a single authorized individual wrongly rejected for wearing a backpack. By lowering the system sensitivity, security management can reduce the number of these false rejections, but by doing so they increase the risk of a potential piggybacking breach. Managers can select the desired balance between security risk and user convenience by using the predictive probability metric. Such settings can then be scaled across all security entrances, giving management a clear understanding of the risk at these entrances and certainty that any infraction is not an accident.


Security entrances can be superior to their swinging door predecessors, helping bridge the gap between access control systems and holistic access control. Through the integration of new security entrance technologies, security management teams can accurately measure who is inside a facility while also providing significant return on investment that goes beyond improvements in security.


This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security Magazine. Subscribe here.

KEYWORDS: access control risk management security entrance security operations

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek nilsen

Derek Nilsen is the Director of Marketing for Boon Edam Inc. Nilsen has over 15 years of experience in the security industry and has been with Boon Edam for over ten years

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • man walking through revolving door

    Protecting data centers by layering physical security entrances

    See More
  • Webcor implements managed security services to mitigate risk

    Commercial construction company Webcor implements managed services to improve its security posture

    See More
  • document security

    How to improve legal document security in six steps

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing