Skip to contentSkip to footer
returnToHomeBoon Edam logo
Contact

Security Solutions for Risk Mitigation

Modern demands in security are higher than ever, and not without good cause. In today's world, the list of potential risks to your business are huge and include events that can happen faster and be far more dangerous than ever before. Potential security risks include:

  • Active shooter events
  • Cyberattacks
  • Terrorism
  • Activism
  • Protests
  • Workplace violence

Trends in Security

We have seen a global trend in changing legislation concerning security. In the USA for example, Homeland Security has already passed legislation to protect critical infrastructure from increased risks. This legislation includes manufacturing, energy, transportation and technology industries.

We see identifying and mitigating threats at the entry point of a building hugely important in preventing unauthorised access. Moreover, if a company neglected to take reasonable precautions, it could be held liable for the resulting damages of earlier stated incidents.

Choosing the Right Security Solutions

To protect your business against these risks, you should include physical access as a part of your overall security solution. Security solutions range from hiring security guards to implementing camera’s and access control devices. All of these security solutions are commonly utilised, yet are also widely ineffective in mitigating unauthorized access. - Guards get distracted and camera’s will only alert you after the incident has happened.

Physical security entrance solutions don’t get distracted and successfully mitigate tailgating every time. So, what physical entrance solution should you choose?

Boon Edam security solutions represented by Low, Medium and High security icons

The Physical Security Entrance Solution

Keep an intruder where they belong - *outside*. If an intruder can infiltrate a building’s entry points, then all other security measures are simply reactive. Security entrances are the only proactive solution that addresses the risk of unauthorized entry (including tailgating and piggybacking) Often, these security breaches are regarded as the same, but there's a significant difference.

Tailgating

Tailgating is one of the most common security breaches at entry points, and is defined as "an unauthorised person following an authorised person into a building”. Tailgating can occur innocently between people who know each other, for example when the first person helps a known colleague who's forgotten their access card. However, tailgating can also occur when an unknown second person tries to sneak in behind an authorised person.

Piggybacking

Whether the intention is innocent or dishonest, piggybacking is an act of collusion by two people attempting to enter through a security entrance at the same time, using only one authorised credential.

While tailgating and piggybacking are often used synonymously, they are different when referring to security entrances. High-security doors work to combat collusive piggybacking through the use of sophisticated overhead sensor systems that can detect when more than one person is inside a compartment designed for one.

Can User ID Prevent Piggybacking and Tailgating?

Creating a secure entry involves granting and managing access to areas within a building, ensuring that only authorised individuals can enter. To do this, companies use identification methods, such as fingerprints, four-digit codes, hand or facial geometry, and so on. Once a digital identity is created, they can manage each user’s access to areas or zones within a building.

The most sophisticated security solution is ineffective if the entry is not properly secured. If a user is permitted to present their credentials at a swing door, the risk of an unauthorised entry has not been properly addressed. User ID alone cannot prevent piggybacking or tailgating.

But when identity is coupled with a physical security barrier, instances of tailgating and piggybacking are addressed upfront, and risk can therefore be accurately managed.

Piggybacking vs tailgating infographic

Scalable Security

Not all security entrance solutions are equal. Depending on your requirements, you may need a low, medium or high security solution.

What are security levels?

First of all, when we talk about the level of security offered, we are talking about the ability to control the physical passage of users in and out of a secured area. We break this ability down into three levels based on ability to prevent, detect or deter unwanted access as follows:

1. High Security – Tailgating / piggybacking prevention 

Very high levels of detection discrimination and a very high level of physical prevention. The very design or operation of the product makes tailgating or piggybacking impossible or extremely difficult. Examples of such products are security revolving doors or security portals where they can physically only allow one person through. No supervision is required here, however, cameras are almost always utilised for monitoring in case of suspicious loitering activity nearby.

2. Medium – Tailgating / piggybacking detection

Accurate detection and a physical deterrent providing a moderate level of physical prevention. A speed gate has sensors installed that will sound an alarm when tailgating occurs. This level of security allows for supervision from a further distance and potentially fewer supervisors, however, it should be planned as to how a supervisor should respond when tailgating occurs. Is anyone else notified to confront the tailgater? Do cameras zoom in to identify the users in the area? These are the sort of questions that need to be asked to determine adequate security levels with this range of products.

3. Low – Monitoring or controlling traffic (Keeping honest people honest) 

Upon authorisation, users are forced to be deliberate and in some cases, slowed down through a physical barrier, such as a waist-high turnstile or a gate. This situation requires supervision at all times because the physical barriers can be defeated by either jumping, climbing, tailgating, or piggybacking. The benefit of a low level of security is primarily very high throughput and controlling crowds – such as at a museum, a stadium, mass transit, etc. Supervision is required to prevent or quickly respond to attempts to defeat the barriers.

Thus, we have three levels of security: 

  • Prevention (high security level)
  • Detection (medium security level)
  • Deterrence (low security level)

As the level of security increases, the amount of supervision required decreases, which has a financial benefit if not an operational benefit. As a result, you can achieve an ROI by the reduction of supervision staff or allocate them to other areas of need in the building. In addition, you can mitigate physical violence, loss prevention risk, and provide superior evidence collection capabilities. To determine which security solution best fits your needs, you must ask yourself: what is your goal is?

Interested to Know More About Security Solutions?

Don’t hesitate to contact us with any questions you may have.

Boon Edam office worker, smiling at her computer desk

Need Advice?

Contact our Entry Experts, who are ready to support you.