On the rise: Securing entrance ways with retrofits

All conduits and wiring for electrical, access control, and fire connections should be addressed before installation.

Architectural revolving doors

Architectural revolving doors do not mitigate tailgating; however, they offer several security features, including creating safety around a public entrance. These doors can be locked remotely by a person or access control system, and support public entry during the day, alongside authorized access at night. Should a threat develop outside, they can also be remotely locked instantly in any position.

Revolving doors have long been an energy efficient and sustainable entrance for buildings. Their “always open, always closed” working principle keeps conditioned inside air and unconditioned outside air separated, which prevents drafts, dust, and noise from entering the building. Since less energy is required to maintain the conditioned climate inside the building, revolving doors help reduce the carbon footprint of a building as well and save energy and cost. Many architects today are switching from swinging door entrances with vestibules to revolving doors because some consider them aesthetically more attractive and they save space.

Security entrances selection guidelines

There are several types of security entrances available, each designed with a specific purpose and level of protection including security mantrap portals, security revolving doors, speed gates, and full height and tripod turnstiles. To assist in selecting the right entrance solution, security entrances can be classified into three classifications:

  1. Their ability to prevent tailgating and piggybacking
  2. Their ability to detect tailgating and piggybacking
  3. Their ability to caution or deter by monitoring or controlling traffic

Security entrances which prevent tailgating and piggybacking allow for the elimination or reallocation of guard supervision, providing security and facility managers with a tangible ROI. These solutions include revolving doors and mantrap portals, which are virtually impenetrable and prevent unauthorized intrusion. Also, by collecting metrics gathered by sensor systems in these solutions, security personnel can predict and quantify their actual risk of infiltration.

Entrances detecting tailgating and piggybacking provide a strong visual obstacle against intrusion, and when coupled with biometric and access control devices, can also detect unauthorized entry attempts in real-time and issue alarms for security personnel to take immediate action. This category of solutions includes speed gates, which are designed for this purpose and to facilitate both security and visitor management operations. Ideal for reception areas, speed gates can also support regulatory and risk reduction compliance mandates.

Security entrances which only detect unauthorized access serve as a deterrent against casual attempts to gain unauthorized access. These monitor and control traffic under the supervision of a security personnel. Appropriate for building perimeters, supervised locations, “exit only” applications, or any location where large crowds need to be controlled, the entrance solutions include full height and tripod turnstiles, wide lane gates, and monitored access solutions.

The data collected using overhead sensor systems in security entrances, designed to prevent and detect threats, can also be used as a great new source of business intelligence. The intelligence provided from these devices can help forecast and quantify an organization’s risk of infiltration and threat. Typically deployed at employee entrances and other sensitive areas within a facility, sensors further elevate the effectiveness and efficiency of security entrances as an enterprise level solution.

Each security level requires a distinctly different mix of technology and personnel. It is the security consultant’s job to help lay the foundation of how to best achieve the desired levels of security. It is also important for the consultant to aid the user when telling the C-suite about the long-range total cost of ownership (TCO) of technology deployment, as well as its potential ROI.

Leave a Comment

Comments

Your email address will not be published. Required fields are marked *