Technology has brought us powerful ways to maintain security in businesses. It has produced biometric (fingerprint) confirmation, optical recognition, and facial confirmation. Unless you use someone else’s eyeball, a la “Minority Report”, these three security protocols are strong identifiers and a way to allow the right people in and keep the wrong ones out.
However, these are just one level of security protocol. Before you prevent your finger, eye, or face for access, you need to pass through an even more important security checkpoint — the turnstile. Invented to keep livestock in their pens, the turnstile began its business use around 1974 when they were added to the first Piggly Wiggly store. Since then, various forms of turnstiles have been used in stadiums, amusement parks, and as security gates for businesses.
In many cases, turnstiles are connected with access via a card pass or biometric recognition. For instance, subway stations in Chicago, New York, and Washington D.C. keep their turnstiles locked into a card is scanned. Some financial institutions have door-sized turnstiles which can be entered unless a code is accepted.
How to secure access depends on the turnstile parts purchased as enhancements. Outlets like Turnstiles.us provide various models of turnstiles and ways to record incoming and outgoing traffic. One of the enhancements to consider are video cameras. While biometrics is an extra level of security, having a video record of those who enter and exit. A video record also helps check inconsistencies in conjunction with a turnstile count.
If you don’t want to invest in so many pieces of equipment for your security, consider purchasing a high-security single turnstile. This full-height series can be used individually or integrated into a series along with another level of security, including biometrics. This set up allows for Fail-Open and Fail-Secure locking when cards or biometrics don’t sync up.
Which turnstile you choose depends on the size of your business and, of course, your budget. As ususal, do your research before you decide on the company you want to use to ensure they’re available to help guide you when systems fail and security is at risk.