Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity & Business ResilienceAccess Management

Protecting data centers by layering physical security entrances

By Derek Nilsen
man walking through revolving door

Image via Boon Edam

January 27, 2023

Physical security is vitally important to help prevent unauthorized persons from entering data facilities to steal valuable intellectual property or cause harm to people or property. 

The truth of the matter is that the easiest way to steal data is to gain physical access to a network or the servers themselves. While strong firewalls and other cybersecurity measures help prevent unauthorized logical access, hackers are more frequently breaking into data centers where they can easily plug into any IP connection — or steal a laptop or server and walk out with it. They can talk their way by security guards, slip in behind an employee who politely holds the door open for them, tailgate through an access-controlled entrance, or use stolen credentials to get into a facility. Deploying physical security measures is the best way to mitigate against this danger. Security entrances are a core component of this strategy. 

Data centers can help prevent cyber threats by installing security entrances at entry and exit points at the perimeter of a facility and at critical internal access points. Security entrances are available in a variety of configurations to protect from unauthorized entry that can seriously increase a facility’s risk for cyberattacks, and should be considered a critical component of a data center’s cybersecurity best practices.

Layering security entrances at data centers

When it comes to cybersecurity, the firewall is not the only means by which sensitive data is protected. If a hacker were to breach the firewall, other obstacles are in place to shield the data: virus and malware scanning software, monitoring services for unusual network traffic, and similar techniques. Likewise, the implementation of security entrances must be executed using a layered approach. If an intruder were to breach the building’s fence line perimeter or lobby, additional physical barriers have to be in place to protect the ultimate gem — the data on the servers. 

Data centers can achieve high levels of security with layers of security entrances:

  • Deterring infiltration at the perimeter: Physical security starts with keeping unauthorized users off the premises altogether. A data center is typically surrounded by a security fence outfitted with a full height turnstile for access. Employees exit their vehicles, proceed through the turnstile and enter the building. Full height turnstiles are a visual deterrent against infiltration and prevent tailgating, or an unauthorized person following in the next compartment. 
  • Preventing intrusion at the server room: For the protection of the most sensitive area in a data center, the server room, it is critical that a physical security entrance prevent intrusion. Security mantrap portals can enforce single entry by means of an overhead sensor system.

Selecting security entrances for each layer  

There are several styles of security entrances available, each designed with a specific purpose and level of protection including: security mantrap portals, security revolving doors, speed gates, full height and tripod turnstiles. Security entrances can be classified into three simple classifications:  

  1. Prevent tailgating and piggybacking 
  2. Detect tailgating and piggybacking 
  3. Deter by monitoring or controlling traffic  

Security entrances that prevent tailgating and piggybacking allow for the elimination or reallocation of guard supervision, providing security and facility managers with tangible ROI. These solutions include revolving doors and mantrap portals. Also, by collecting metrics gathered by sensor systems in these solutions, security personnel can predict and quantify their actual risk of infiltration. 

Security entrances that detect tailgating and piggybacking can provide a visual obstacle against intrusion, and when coupled with biometric and access control devices, can detect unauthorized entry attempts and issue alarms for security personnel to take immediate action. This category of solutions includes speed gates, which are designed to detect tailgating and facilitate both security and visitor management operations. 

Security entrances that deter unauthorized access serve as a deterrent against casual attempts to gain unauthorized access, and more often are in place to help keep people honest. They accomplish this by monitoring or controlling traffic under the supervision of security personnel. Appropriate for building perimeters, supervised locations, exit-only applications, or any location that needs to control large crowds, these tools include full height and tripod turnstiles, wide lane gates and monitored access solutions. Security entrances designed to deter unauthorized access cannot stop a piggybacking incident from happening on their own, and ideally require manned supervision for proper monitoring. The cost of supervision should be factored into the annual budget as a necessary expense. If an organization deploys an entrance that requires supervision and elects not to employ personnel to monitor the access point, management could be held liable if an event occurs as a result of their inaction.  

The data collected using overhead sensor systems in security entrances designed to prevent and detect threats can also be used as a source of business intelligence. The intelligence provided from these devices can help forecast and quantify an organization’s risk of infiltration and threat. Typically deployed at employee entrances and other sensitive areas within a facility, sensors further elevate the effectiveness and efficiency of security entrances as an enterprise-level solution. Security entrances designed to prevent and detect can be unattended security solutions.

To protect data centers and the critical data they contain, it is essential to think of cybersecurity and physical security as working hand in hand to protect critical data. Installing security entrances can help ensure that only people entering the building are credentialed employees or authorized visitors, providing the highest levels of security for facilities housing sensitive data.

When mitigating risk in enterprise physical and cybersecurity planning, remember that security entrances can reduce liability by demonstrating a plausible degree of effort to prevent infiltration. They protect the personal safety and security of staff, visitors and anyone else in a facility, as well as the organization’s IT and computer systems and data. In addition, security entrances can also help reduce costs related to security personnel and false alarm management, while helping to maintain compliance to various government and industry imposed regulations and internal security policies. 

This article originally ran in Security, a twice-monthly security-focused eNewsletter for security end users, brought to you by Security magazine. Subscribe here.

KEYWORDS: data center intrusion detection piggybacking risk management server room security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Derek nilsen

Derek Nilsen is the Director of Marketing for Boon Edam Inc. Nilsen has over 15 years of experience in the security industry and has been with Boon Edam for over ten years

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

Person working on laptop

Governance in the Age of Citizen Developers and AI

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • BoonEdam-image.jpg

    Security entrances: Essential tools to improve facility security posture

    See More
  • Data Stream

    The Five Rings: Understanding the importance of physical security of colocation data centers as a fundamental service during COVID-19

    See More
  • Operations Center

    US enterprises hit hard by short-staffed security operations centers

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!