Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity Leadership and ManagementSecurity Education & TrainingAccess Management

Education & Training

The 3 pillars of access control

Access control is not one-size-fits-all, and security leaders should consider their unique needs.

By Joe Seagriff
Revolving door

Tom Merton / OJO Images via Getty Images

September 13, 2023

In today’s rapidly evolving security landscape, the concept of access control has taken on new dimensions. As organizations navigate the return to work, a shrinking labor pool and a changing economic climate, access management has emerged as a mainstream solution to address these pressing concerns. By providing consistent enforcement of access permissions, preventing unauthorized entry attempts and reducing reliance on human capital for access management, security entrances offer an effective approach to risk mitigation that can go beyond what is possible using physical access control systems (PACS) alone.

Filling the security gap

The use of the term “access control” likely evokes the image of an office worker pressing their credential to a card reader in order to receive access into a facility. While these types of technologies have their place, traditional PACS applications can have limitations when it comes to providing comprehensive security and risk prevention.

One major shortfall is the assumption that access control systems can proactively prevent unauthorized entry. The notion that only authorized personnel can gain access to a secured area by way of PACS ignores basic social constructs. For example, it is not uncommon for good-natured individuals to hold the door for others coming in behind them. This practice is harmless at best and catastrophic at worst. Any person attempting access via piggybacking or tailgating could potentially be a threat actor exploiting human nature to gain unrestricted access to the building.

What’s more, most access control devices are ill-equipped to address instances of tailgating or piggybacking as they happen. While many PACS have built-in tailgating detection, these alerts only raise awareness of the issue after the fact. By the time an alarm is raised, the unauthorized individual has already entered the premises. Within seconds, an attacker can carry out their malicious intentions once inside.

It can be challenging for traditional access control systems to proactively address attempts of tailgating and piggybacking alone. Rather, their application on swing doors limits their operation to detect and deter functions while doing little to actively prevent such attempts. Secured entry solutions can help deter, detect and prevent unauthorized entry at the source, thus closing the physical security gap left by a reactive approach.

Deter, detect, prevent

Security entrances can be classified into one of three levels based on their ability to deter, detect or prevent unauthorized entry. Each level of security entrance serves a specific purpose and can be applied based on the security goal at a particular entry point. For example, an unmanned employee entrance may be required to reduce traffic flow in a corporate lobby or larger, visually impactful security entrances may be required to visually deter access at high-security facilities. For this reason, organizations should look to implement a layered application of security entrances to effectively address the security requirements at all access points of their facility.

"The notion that only authorized personnel can gain access to a secured area by way of PACS ignores basic social constructs.”

Security entrances that deter unauthorized access serve as a visual obstacle against intrusion and casual attempts to gain unauthorized entry. These solutions, such as full-height and waist-high turnstiles, act as a “first layer” in a layered physical security approach, particularly at building perimeters or supervised locations. They work by preventing individuals from climbing or crawling over the entrance, discouraging unauthorized entry. While these entrances do not always have sensors or alarms to alert security staff of infiltration, their presence alone serves as a deterrent.

Security entrances that detect tailgating and piggybacking are equipped with access control devices to detect unauthorized entry attempts in real time. Optical turnstiles, for example, not only visually enhance the environment but can also feature detection sensors that can identify when someone tailgates behind an authorized user. If an intrusion occurs, an alarm is triggered to alert nearby security staff to confront the intruder. Optical turnstiles are commonly found in lobbies and reception areas, where visitors and vendors enter the premises.

Security entrances that prevent tailgating and piggybacking offer the highest level of security. These solutions, such as security revolving doors and interlocking mantrap portals, are designed to prohibit unauthorized intrusion. Mantrap portals enforce single entry by utilizing various sensor systems to confirm that the authorized individual is alone in the compartment. When integrated with an access control system, security revolving doors can stop instances of tailgating and piggybacking while confirming the identity of the individual wishing to receive singular access. These systems are particularly suited for securing sensitive areas like executive suites, data or record centers and cash holding areas.

Embraced by the mainstream

 The deter, detect and prevent functions provided by security entrances offer direct solutions to many of the emerging challenges faced by modern organizations.

One industry championing the use of a layered secured entry strategy is data centers. As the need for robust data storage and cybersecurity expands, unauthorized access in this fast-growing market can have severe consequences ranging from data breaches to operational disruptions. Secured entry solutions effectively control unauthorized access while ensuring compliance with industry regulations and addressing rising energy costs. Additionally, security entrances equipped with advanced technologies, like biometric authentication, provide an extra layer of security at data centers, mitigating the risk of credential theft or misuse.

Warehouse and logistics facilities are also discovering the benefits afforded by security solutions for workplace violence and loss prevention. A secured entry strategy in this market involves deploying the appropriate security entrances at various stages of the workflow, such as perimeter/parking lots, facility entry and screening, tracking breaks and lunches, end-of-shift theft deterrence, and facility exits. In this way, secured entry solutions not only create a safer and more secure environment, but also minimize shrinkage in an industry grappling with rising costs.

There are a number of markets where secured entry solutions are now considered core security imperatives for myriad applications, ranging from critical infrastructure to retail establishments and corporate offices. As these organizations face an evolving threat landscape, embracing secured entry strategies becomes paramount to achieving true access control.

KEYWORDS: access control data breach response PACS piggybacking tailgating warehouse security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Joe seagriff headshot

Joe Seagriff is the Vice President of Sales — East at Boon Edam USA.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • cloud-and-tablet.jpg

    The 5 pillars of cloud security for data storage

    See More
  • Visitors walk through the Museum of the Bible entrance.

    Access control adapts to COVID-19 restrictions at the Museum of the Bible

    See More
  • Library shelf

    The role of access control systems in school safety

    See More

Events

View AllSubmit An Event
  • April 16, 2025

    Modernizing GSOC Operations: Ensuring Full Control and Complete Situational Awareness

    ON DEMAND: For many organizations, physical security management can be a daunting task. Threats are on the rise and risks are becoming increasingly diverse. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!