Skip to contentSkip to footer
returnToHomeBoon Edam logo
Contact

Access control systems and security entrances are technology solutions that work together to track and manage who can enter and under what circumstances.

The type of security entrance that is coupled with an access control system plays a huge role in how effectively unauthorized entry is mitigated. Read on to explore how access control systems work with security turnstiles, revolving doors and mantrap portals, and some of the most popular ways to integrate the two for a seamless physical security solution that keeps intruders out.

What Are Access Control Systems and Devices?

Access control systems manage user information and confirm or deny access through an entrance to certain areas of a building. In the past, this system consisted of brass keys and locks on doors. However, with the need for increased security, access control systems now consist of computer-based systems and special access cards.

5 Basic Components of an Access Control System

When it comes to rolling out an access control system at a facility, there are typically five main components:

  1. Credentials: a unique electronic “key” used by a person to gain access through a door that is secured by the access control system. The most common is an electronic access card, but it could also be a PIN, fingerprint, iris, face, a barcode from an app on a phone, etc.
  2. Credential Reader: device(s) mounted to the exterior of an entrance and used to “read” the credential(s) electronically.
  3. Lock Hardware: door hardware (either electric door locks or a security entrance) that is used to electrically lock and unlock the door or entryway to the secured area.
  4. Intelligent Controllers: boards/panels installed in a building and used to process access control activity; credential readers, electric lock hardware and other access control devices are all connected to the panels.
  5. Access Control Server Computer: the “brain” of the access control system and serves as the central database and file manager that is responsible for recording system activity.

With these components in place, a security or facility manager can tailor access privileges for each user based on a number of factors, such as the floors a user works on within a building, work hours (full-time vs. part-time), etc.

The five basic components of an access control system

Access Devices: Going Beyond the Swinging Door and Card Reader

As mentioned above, credential readers collaborate with the access control system to confirm or deny entry to users. Traditional methods utilize card readers mounted on swinging doors, however, security personnel are finding weaknesses in this method for mitigating unauthorized entry.

Weakness 1: Swinging Doors

Swinging doors with a credential reader are locked until a valid credential is presented. However, once that door is unlocked it can be held open for a number of other unauthorized users to come through. Cameras can record these instances and drive employee education, but the risk of infiltration is still there. In addition, a breach could cost an organization significantly, especially if the government regulates it.

Weakness 2: Card Readers

In addition to moving away from swinging doors, organizations are also deploying access devices that allow for two-factor or multi-factor authentication. An access card can be stolen, but it is far harder to replicate a key code, barcode, or a unique biological trait, like a fingerprint or iris pattern. We will discuss the benefits of biometric devices later in this article.

Because of these two weaknesses, more and more organizations are using access control systems in conjunction with revolving door and turnstile entry systems. In fact, this integration is really the only way to effectively and proactively mitigate unauthorized entry.

Click here to read more on why access control systems will never be enough to protect your premises.

Tailgating Survey

Why Access Control is More Effective with Security Entrances

The type of entrance that is coupled with an access control system plays a huge role in how effectively unauthorized entry is mitigated. So, how are security entrances superior to swinging doors in their ability to mitigate unauthorized entry?

Security entrances provide five main benefits over swinging doors.

  • Visual deterrence to intrusion
  • Curtail tailgating and piggybacking
  • Ability to select a security level by entrance type
  • Establish a reliable standard operating procedure (SOP) for entry
  • Provide valuable metrics on entry use and trends

Curtail Tailgating and Piggybacking

When integrated with an access control device, a security entrance will open or rotate to allow access to a single user per credential. This operation takes pressure off staff members to constantly have “eyes up” to supervise the entry. This is something that a swinging door cannot do. In addition, building occupants are relieved of the burden of potentially being rude to strangers by not holding the door open for them: “Do I hold the swing door open for this vendor I don’t know? Will it seem rude if I don’t? What should I do?” The security entrance simply won’t allow more than one person to enter.

You can view this content after you accept cookies. More information about cookies.

Don't Tell Me, Show Me

This graphic shows how an optical turnstile interacts with the building's access control system to confirm or deny access based on a user's credentials.

Optical Turnstile Access Control Sequence of Events

Select Your Desired Level of Security

There are several types of security entrances available today. Depending on the model you select, you can customize the security level for each area of your building. In addition, each entrance type has a different impact on guard supervision, annual and recurring operating costs, payback and more.

Here’s a quick synopsis of each entrance:

  • Tripod Turnstiles: Manual or electrical arms rotate to allow one authorized passage at a time. Effective at crowd control only, requiring constant supervision to address any crawl over/under attempts.
  • Full Height Turnstiles: Full height barrier, typically deployed on exterior fence lines. A good deterrent against casual intrusion attempts. Prevents tailgating as it will rotate once per valid authorization, however two people can squeeze together in one compartment (piggybacking).
  • Optical Turnstiles: Swinging or sliding barriers open to allow one user per credential. Requires supervision as tailgating is possible – alarms will notify when tailgating occurs.
  • Security Revolving Doors and Security Portals: Full height entrances provide the highest level of assurance against tailgating and piggybacking by using an overhead sensor system that only allows one person to enter through per valid authorization. Security portals can also support an additional credential reader inside to ensure that not just one person, but the right person is entering.

You can view this content after you accept cookies. More information about cookies.

A Reliable SOP that Enables Accurate, Auditable Metrics

When integrated with your access control system, security entrances operate reliably according to their working principle – which in essence acts as a consistent standard operating procedure. This consistency serves as the basis for the gathering of data.

Security entrances can deliver a wealth of data into the database of an access control system, including completed passages, who did the passages, number of unauthorized entry attempts, emergency button usage, etc. to give you more insight into who is in your building at any given moment (mustering) and, in general, how the entrances are being used. This capability gives your organization reliable data that be used for future planning.

Free Whitepaper

Learn how entry solutions can provide significant ROI with new technologies for data collection and aggregation.

Advanced Analytics of Security Entrances

Popular Ways to Integrate Access Control Devices and Security Turnstiles and Doors

Now that you know the benefits of integrating access control with revolving door and turnstile systems, the next step is effective integration between the two. Integration should be an integral part of your building design from the very beginning.

Integration Techniques

The access control system really is the “heartbeat” of the security entrance. And as such, each entrance solution has a designated area for mounting the access device.

However, there are times when these mounting places may not fit your needs. For these situations, we have deployed some alternative options:

  1. Top-mounted
  2. Panel cut-outs
  3. Custom pedestals
  4. Interior-mounted

You can explore each of these methods further in our blog post: Door Access Control & Security Entrance Integration Techniques.

Providing Entry Assurance with Biometric Authentication

We’d be amiss if we didn’t mention the benefits of biometric authentication devices integrated with security entrances. This sophisticated access device is on the rise for its ability to provide higher assurance that only authorized users are entering a facility.

What are Biometric Devices?

Biometric devices require unique biological traits for authorization. These traits are not easily forgotten or compromised. Popular authentication methods include facial recognition, fingerprint technology and iris patterns. The device scans the biological feature and then compares its unique measurement to an enrollment list of all authorized users. Confirmation = access through the entrance.

Integration with Security Entrances

Watch as Vice President of Technology and Product Support, Kurt Measom, walks you through just a few of the ways we've seen biometric access control devices paired with security entrances for optimal security.

You can view this content after you accept cookies. More information about cookies.

Entry Assurance with Security Mantrap Portals

A biometric device provides the biggest benefit when it is integrated with a security mantrap portal. This unique security entrance has been trusted to protect data centers and other sensitive locations for the Fortune 500 at locations across the globe.

Here’s how a mantrap portal works with biometrics:

  • A user presents a credential outside the portal. This could be an access card or biological trait.
  • Once inside the portal an overhead sensor system verifies that the person inside is alone.
  • After the first door closes, an internal biometric device verifies that the person who presented their credential outside the portal is the same person inside the portal now.
  • Once confirmation is granted, the second set of doors open to allow the user into the secure area.

Why is this method of dual authentication so effective? Imagine this scenario. An employee’s husband decides to drive to your facility. He is determined to confront one of his wife’s colleagues. With his wife’s access badge in hand, he steps up to the portal, presents her credentials, and enters the door. The portal verifies that he is alone. An interior biometric device is the difference between this unauthorized person getting to his wife’s colleague, and not. How does it work?

The biometric device is capable of detecting two things in this scenario: (1) the husband isn’t enrolled in the biometric system and (2) even if he was enrolled, his biometrics do not match the on-file biometrics of the badge owner. In short, it is much harder for the husband to steal his wife’s eyes, fingerprint, face, etc. to gain access to the building.

How Security Portals Interact with an Access Control System

The graphic below shows how a security mantrap portal interacts with a building's access control system. The top of the graphic shows a "perfect" entry experience, while the bottom portion shows the rebuffing of an unauthorized entry, or piggybacking, attempt.

Security Portal Access Control Sequence of Events

Conclusion

Integration between access control systems and security entrances is a fine art - one that must be considered prior to the implementation of the project. When it comes to coupling the two together, here’s a recap of things to remember:

  • Decide which security entrances are important for the security level within your building; the level could vary at each entry point.
  • Consider placement of the access device within the entrance and determine if special arrangements must be made based on the device size.
  • Make sure the integration is intuitive for the user.
  • Consider biometric devices for effortless entry.
  • Discuss the metrics available with the security entrance chosen.

The best way to have success is to consult with one of our entry experts who have seen a variety of methods used in the field. Contact us at 1-800-334-5552 to discuss further.