The new dynamics of security and safety mandates for security entrances

INDUSTRY PROFESSIONAL

Navigating the Retrofit

The new dynamics of security and safety mandates for security entrances

Most security managers know that security technology has come a long way in the last few years, and equipment and systems purchased five or 10 years ago will need to be updated or replaced. When the update plan includes security entrances, like turnstiles and revolving doors, the project may bring unique challenges and pitfalls. With careful planning and foreknowledge, pitfalls can be avoided. New security entrances can be integrated without compromising security or safety.

The Role of Turnstiles in Physical Security
The past year has highlighted the importance of security in general, and brought to the forefront the role that security entrances can mitigate the costly liabilities associated with unauthorized entry, but also assisting in the safety and wellbeing of staff during a pandemic. Understanding their responsibility for “duty of care” to those occupying their spaces, building owners and security professionals must account for the changing social landscape and the growing options of available entrance technologies for controlling access.

Retrofit First Step Includes Determining Security Goals
When building owners are looking to upgrade the physical security of their facilities through the use of security entrances, the first step should be to clearly define the organization’s security goals, gaining a solid understanding of the threat and culture of the facility. With this information in hand, it will be possible to choose the right revolving door or turnstile solution that will not only meet an organization’s needs, but also be a good fit with the corporate culture.

The obvious challenge of a security retrofit project is that the new technology is often replacing a solution that already exists. It’s also possible that existing technologies, in many instances, are still a part of the retrofit plan. To aid in the process, security professionals should develop a strategic retrofit roadmap ahead of time. This map will outline how to keep existing systems and devices functioning while the retrofit is in progress. When this map is communicated to others in the organization, there is a sense of transparency towards staff, employees and other stakeholders.

The Biggest Challenge is on the Floor
As security dynamics shift with changing technology, most systems integrators will tell you the goal is to design entrances that are on the cutting edge of security but balanced with the need to welcome people and move them through quickly. Many security entrance projects are retrofits to existing buildings and the biggest challenge usually revolves around the flooring in the facility.

The floor must be dead level for a security entrance to work properly. In the case of a security revolving door, a door rotating on an uneven floor will put undue stress on the door wings and the door operator. The wear and tear will be excessive and the door will have to be replaced sooner than expected. Shimming is a popular method for trying to square a door on an unleveled floor. However, the shims will eventually force the door out of balance and plum, resulting in a door that is hard to push, is excessively loud when operating and will eventually fail prematurely.

For lobby turnstiles, all conduits and wiring for electrical, access control and fire connections should be run through the floor. Existing flooring configurations, especially when the floor is made of concrete with existing conduit inside, often require breaking and removing the floor to install the new wiring and conduit in the appropriate locations. This adds considerable expense to the project and may also be technically prohibitive depending on the building. One potential solution of existing wiring in concrete flooring is to add special, above-grade platforms that are mounted to the floor surface under the turnstiles.

Power, access control, fire alarm connections and proper flooring/conduit requirements must be properly addressed to ensure a smooth and cost-effective installation. These items should be in place and functional before the installation begins.

Additional Retrofit Considerations
Safety is rarely discussed during the bidding process in a retrofit project. However, it is the one factor that could quickly and possibly tragically undermine the success of the project. Most security entrances use a barrier of some kind. The more sophisticated barriers use presence sensors to detect objects or users. Building owners looking to upgrade security entrances should carefully consider how proposed solutions will prevent entrapment or contact, and how they should respond to either event.

These decisions should then be based on the facility’s security versus safety needs, the ability and ease of product training for staff, the product’s response to an incident during peak periods (does it stop and require re-badging?) and whether large objects are typically carried or pulled behind.

Another consideration relates to the upgrade of older security entrance technologies to larger-sized products, especially when space is limited in an older building. Larger products can lead to having fewer products – be sure to check your traffic and throughput needs before you reduce the number of entrances.

Include service considerations when making a buying decision. During and after installation of a security entrance, the level of service directly impacts continued operations and ROI. Consider the negative impact of a delayed installation or service visit, or delayed parts availability on your building entrance procedures – all because service was left out of the decision-making process.

A final and key consideration on your next retrofit project is considering the culture of the organization the new or upgraded technology will serve. Culture permeates all other decision factors and is critical to success. Successful security policy is a direct result of top-to-bottom commitment to both technology and business operations. All management stakeholders involved in the buying decision, from CEO to employees, should be an intimate part of the retrofit process and be willing to assist in implementing a culture shift through communication and training.

This article originally appeared in the May June 2021 issue of Security Today.

Featured

  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.