ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

12
ACCESS CONTROL INTEGRATION WITH TURNSTILES AND SECURITY DOORS. A WHITEPAPER POWERED BY BOON EDAM

Transcript of ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

Page 1: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

ACCESS CONTROL INTEGRATION WITH TURNSTILES AND SECURITY DOORS.

A WHITEPAPER POWERED BY BOON EDAM

Page 2: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

Access control is becoming ever more important fororganizations of all kinds to prevent the potentiallycatastrophic risks and liabilities that can occur fromunauthorized intrusion. In short, access control is how afacility controls who has access to the secure areas of itsbuildings and is an essential part of a complete physicalsecurity strategy, which includes the deployment oftechnology (such as access control systems andsecurity entrances), people (security staff andemployees) and processes (rules and procedures) toachieve a secure perimeter. In this whitepaper, we willfocus on the technology aspects of access control.

Access control systems and security entrances aretechnology solutions that work together to track andmanage who can enter and under what circumstances.

The type of security entrance that is coupled with anaccess control system plays a critical role in howeffectively unauthorized entry is mitigated. Read on toexplore how access control systems work with securityturnstiles, revolving doors and mantrap portals, andsome of the most popular ways to integrate the two for aseamless physical security solution that keeps intrudersout.

2INTRODUCTION.

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAM

Page 3: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

Credentials: a unique electronic “key” used by aperson to gain access through a door that is securedby the access control system. The most common isan electronic access card, but it could also be a PIN,fingerprint, iris, face, a barcode from an app on aphone, etc. Credential Reader: device(s) mounted to theexterior of an entrance and used to “read” thecredential(s) electronically. Lock Hardware: door hardware (either electricdoor locks or a security entrance) that is used toelectrically lock and unlock the door or entryway tothe secured area.Intelligent Controllers: boards/panels installed ina building and used to process access controlactivity; credential readers, electric lock hardwareand other access control devices are all connectedto the panels.Access Control Server Computer: the “brain” ofthe access control system and serves as the centraldatabase and file manager that is responsible forrecording system activity.

Access control systems manage user information andconfirm or deny access through an entrance to certainareas of a building. In the past, this system consisted ofbrass keys and locks on doors. However, with the needfor increased security, access control systems nowconsist of computer-based systems and special accesscards.

FIVE BASIC COMPONENTS OF ANACCESS CONTROL SYSTEMWhen installing a complete access control system at afacility, there are typically five main components:

1.

2.

3.

4.

5.

ACCESS DEVICES: GOING BEYONDTHE SWINGING DOOR AND CARDREADERAccess devices work with the access control system toconfirm or deny entry to users based on a credential.Traditional methods utilize card readers mounted onswinging doors, however, security personnel are findingweaknesses in this method.

WEAKNESS 1: SWINGING DOORS

Swinging doors with an access control reader are lockeduntil a valid credential is presented. But, once that dooris unlocked it can be held open for a number of othersto come through. Cameras can record these instancesand drive employee education, but the risk of infiltrationis still there. And, when it comes to regulatorycompliance, a breach could cost an organizationsignificantly. 

WEAKNESS 2: CARD READERS

Organizations are also deploying access devices thatallow for two-factor or multi-factor authentication. Anaccess card can be stolen, but it is far harder to replicatea key code, barcode, or a unique biological trait, like afingerprint or iris pattern.

Because of these two weaknesses, more and moreorganizations are using access control systems inconjunction with security revolving door and turnstileentry systems. In fact, this integration is really the onlyway to effectively and proactively mitigate unauthorizedentry.

3

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAMWHAT ARE ACCESS CONTROL

SYSTEMS AND DEVICES?

Page 4: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

ACCESS CONTROL IS

MORE EFFECTIVE WITH

SECURITY ENTRANCES.

Visual deterrence to intrusionCurtail tailgating and piggybackingAbility to select a security level by entrance typeEstablish a reliable standard operating procedure(S.O.P.) for entryProvide valuable metrics on entry use and trends

The type of entrance that is coupled with an accesscontrol system plays a critical role in how effectivelyunauthorized entry is mitigated. So, how are securityentrances superior to swinging doors in their ability tomitigate unauthorized entry?

Security entrances provide five main benefits overswinging doors:

CURTAILING TAILGATING AND

PIGGYBACKINGWhen integrated with an access control device, asecurity entrance will open or rotate to allow access to asingle user per credential. And this operation takespressure off of staff members that a swinging door can’t.Your employees don’t have to make a decision whenentering the secure area of a building.

“Do I hold the swing door open for this vendor I don’tknow? Will it seem rude if I don’t? What should I do?”

The security entrance simply won’t allow more than oneperson to enter.

The tailgating and piggybacking mitigation level doesdiffer depending on the type of security entrance that isinstalled, though, which we will discuss next.

4

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAM

Tailgating in a security revolving door Piggybacking in a security revolving door

Page 5: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

Tripod Turnstiles: Manual or electrical arms rotateto allow one authorized passage at a time. Effectiveat crowd control only, requiring constant supervisionto address any crawl over/under attempts.Full Height Turnstiles: Full height barrier, typicallydeployed on exterior fence lines. A good deterrentagainst casual intrusion attempts. Prevents tailgatingas it will rotate once per valid authorization, howevertwo people can squeeze together in onecompartment (piggybacking).Optical Turnstiles: Swinging or sliding barriersopen to allow one user per credential. Requiressupervision as tailgating is possible – alarms willnotify when tailgating occurs.Security Revolving Doors and Mantrap Portals:Full height entrances provide the highest level ofassurance against tailgating and piggybacking byusing an overhead sensor system that only allowsone person to enter through per valid authorization.Mantrap portals can also support an additionalcredential reader inside to ensure that not just oneperson, but the right person is entering.

There are several types of security entrances availabletoday. Depending on the model you select, you cancustomize the security level for each area of yourbuilding. In addition, each entrance type has a differentimpact on guard supervision, annual and recurringoperating costs, payback and more.

Here’s a quick synopsis of each entrance:

When integrated with your access control system,security entrances operate reliably according to theirworking principle – which in essence acts as a consistentstandard operating procedure. This consistency servesas the basis for the gathering of data.

Security entrances can deliver a wealth of data into thedatabase of an access control system, includingcompleted passages, who did the passages, number ofunauthorized entry attempts, emergency button usage,etc. to give you more insight into who is in your buildingat any given moment (mustering) and, in general, howthe entrances are being used. This capability gives yourorganization reliable data that be used for futureplanning. On the next page, an illustration shows how asecurity entrance and access control system worktogether, generating important metrics on "who is inyour building."

5

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAM

Low Security Medium Security High Security

Page 6: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

6

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAM

Page 7: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

POPULAR WAYS TO INTEGRATEACCESS CONTROL DEVICES WITH

SECURITY TURNSTILES.

7

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAM

Top-mountedPanel cut-outsCustom pedestalsInterior-mounted

Now that you know the benefits of integrating accesscontrol with security revolving doors and turnstiles, thenext step is effective integration between the two.Integration should be an integral part of your buildingdesign from the very beginning.

INTEGRATION TECHNIQUESThe access control system really is the “heartbeat” of thesecurity entrance. And as such, each entrance solutionhas a designated location for installing the access device.

However, there are times when these locations ormounting places may not fit your needs. For thesesituations, there are some alternative options (seephotos below in order from left to right):

1.2.3.4.

Device Placement: placing an access device on theleft of an entrance (when users enter to the right) ortoo far away from the entrance. This mistake affectsthroughput and, more importantly, security.Activation Timing: access devices can actuallyauthorize individuals too fast to be effective, or theycan keep a door unlocked too long. This means auser 15 feet away from the entrance could beauthorized and then a different, unauthorized usercould actually enter instead.Not Intuitive for Users: the access device must notbe too complex for employees to learn and useeffectively. The device must also be placed in an areathat is intuitive for users to find.

WHAT NOT TO DO: THREEINTEGRATION MISTAKESWe’ve also seen a number of “what not to do’s” when itcomes to integration between access devices andentrances. Here are three things to look out for:

Page 8: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

8

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAM

Integration between asecurity entrance and

access device should bean integral part of

your building designfrom the very

beginning.

Page 9: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

PROVIDING ENTRY

ASSURANCE WITH

BIOMETRIC

AUTHENTICATION.

We’d be amiss if we didn’t mention the benefits ofbiometric authentication devices integrated with securityentrances. These sophisticated access devices are onthe rise for their ability to provide higher assurance thatonly authorized users are entering a facility.

WHAT ARE BIOMETRIC DEVICES?Biometric devices require unique biological traits forauthorization. These traits are not easily forgotten orcompromised. Popular authentication methods includefacial recognition, fingerprint technology and irispatterns. The device scans the biological feature andthen compares its unique measurement to anenrollment list of all authorized users. Confirmation =access through the entrance.

9

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAM

A user presents a credential outside the portal. Thiscould be an access card or biological trait.Once inside the portal an overhead sensor systemverifies that the person inside is alone.After the first door closes, an internal biometricdevice verifies that the person who presented theircredential outside the portal is the same personinside the portal now.Once confirmation is granted, the second set ofdoors open to allow the user into the secure area.

ENTRY ASSURANCE WITH SECURITYMANTRAP PORTALSA biometric device provides the biggest benefit when it isintegrated with a specific type of security entrance: themantrap portal. Mantrap portals have been entrustedwith protecting data centers and sensitive locations ingovernment and Fortune 500 facilities around the globe.

Here’s how a mantrap portal works with biometrics (seemore details in the illustration on the next page):

Why is this method of dual authentication so effective?

Imagine this scenario: an employee’s husband decides todrive to your facility. He is determined to confront one ofhis wife’s colleagues. With his wife’s access badge inhand, he steps up to the portal, presents her credentials,and enters the door. The portal verifies that he is alone.An interior biometric device denies entry, and this is thedifference between this unauthorized person gettinginside or not.

Page 10: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

10

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAM

Page 11: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

11

YOU

R EN

TRY

EXPE

RTS

| B

OO

N E

DAMCONCLUSION.

Decide which security entrances are important forthe security level within your building; the levelcould vary at each entry point.Consider placement of the access device within theentrance and determine if special arrangementsmust be made based on the device size.

Integration between access control systems andsecurity entrances is a fine art - one that must beconsidered prior to the implementation of the project.When it comes to integrating the two together, here’s arecap of things to remember:·

Make sure the entry process is intuitive for the user.Consider biometric devices for higher security aswell as convenience. Discuss the metrics available with the securityentrance chosen.

The best way to have success is to consult with one ofour entry experts. Contact us at 1-800-334-5552 todiscuss further.

Page 12: ACCESS CONTROL INTEGRATION WITH TURNSTILES AND …

We have been in business for more than 140 yearsmanufacturing premium aesthetic and securityentrance solutions in the Netherlands, United Statesof America and China. We can confidently say that wecover every corner of the globe with subsidiarycompanies in major cities across the globe.Furthermore our global export division not onlypartner with our distributors, but also offer directsales and service to every territory. This wide netallows us to have a strong global footprint as well as apersonal grasp of local markets and their unique entryrequirements.

To find your closest Boon Edam expert, please go to:www.boonedam.us/contact

Boon Edam Inc.T  910 814 3800E [email protected] www.boonedam.us