A decision methodology for physical security solutions
All seven decision factors contribute to an effective physical security solution

Installation of an effective physical security solution can enable end users to avoid serious mistakes. This article presents a comprehensive and consultative decision methodology to help end users make the best decisions about security entrance products for the long term. The decision-making process is based on Boon Edam’s more than 100 years of experience in installing thousands of entry solutions and talking to end users worldwide.

Seven Key Decision Factors

The entrance solution decision-making process can be divided into two parts. During the before installation phase, initial purchase decisions are often weighted toward the factors Security, Aesthetics and ROI. After installation, however, and once there is no going back, Throughput, Training, Service and Safety play a more prominent role.

By understanding the importance of each of the decision factors and considering all of them in the context of the final product decision, end users stand a much better chance of having the best overall decision-making experience that meets all their needs.

While initially Aesthetics or Security often naturally jump out as paramount in the decision process, all seven decision factors contribute to an effective physical security solution. Let’s take each factor and walk through a more comprehensive decision-making process. A process that is more internally focused, as opposed to one driven by a contractor talking solely about price or an architect more interested in entries that meet superior aesthetic qualities.

1. Security Features

Security is typically the top driver in the buying decision, but do compare security features closely to ensure you obtain the right solution for your needs.

Does the proposed entry solution offer these security features?

  • Tailgating/piggybacking prevention
  • Anti-climb-over detection (waist high entrance) or prevention (full height barrier)
  • Support for anti-passback feature in the access control system
  • Integration with any access control system
  • Minimal false rejection rates (3% or less)

    The decision-making methodology process is based on Boon Edam’s more than 100 years of experience in installing thousands of entry solutions

Are you familiar with false rejection and the impact on the overall acceptance of daily users of the entry solution? If authorized users are rejected by a security entrance too frequently this can lead to complaints across the organization. So, it is important you get data on false rejection rates.

2. Throughput Requirements

Throughput affects users directly on a daily basis. Before you commit to a particular kind of entrance solution, carefully calculate the peak throughput requirements for your building and entrances:

  • Are there shifts that create heavy flows of traffic at certain times of day or evening?
  • Do you need one-way or two-way traffic at certain locations?
  • Where will you provide access for the disabled or for large items?
  • Does the security entrance allow for card stacking to maximize throughput?
  • Does the security entrance use automatic or manual operation?

In measuring and evaluating throughput, it’s critical to manually count the number of people entering and leaving an entrance in a short period of time, such as five minutes, during a peak busy period. Do not rely on access control numbers especially if swing doors are present, as tailgating is likely to be occurring and your count could end up too low.

3. Aesthetic Entrance Solution

Aesthetics are important initially, but they should not trump Security, Safety or Throughput. The winning solution should meet aesthetic requirements without sacrificing the other key decision factors. One’s entrance may be drop-dead gorgeous, but if you have a line of employees and guests stacking up at the entry doors, they won’t be marveling at the aesthetic appeal for long.

Important aesthetic features should include:

  • Architectural finishes
  • Glazing options to complement any design/facade
  • Workmanship and finishing
  • Numerous top cover options for optical turnstiles
  • Wide variety of product dimensions

Important: Do not let aesthetics be the driving decision factor. A factor? Certainly, but only one of seven that must all be considered.

4. Return On Investment (ROI)

ROI involves far more than the initial cost of the product.

ROI factors to consider:

  • Does the entry solution replace or reduce manned security ($114,000/year at $13/hour, for one guard, 24/7/365 coverage*
  • Robust construction = Long product life
  • Certified MTBF (mean time between failures) cycle data
  • Energy savings

* US Bureau of Labor Statistics, 2011

The average life of a security entrance product is 10-15 years. By weighing all the above factors, you are able to more accurately consider the true cost of making the buying decision.

5. Installation And Maintenance Training

Training usually isn’t considered a major factor when choosing an entry product. However, since most manufacturers do not directly install their products, technical training becomes critical in creating successful service providers for end users. It adds considerable value during installation and in maintenance over the life of the product.

Ask potential entry solution providers:

  • Are installation, service, planned maintenance, and post-installation technical training available for installers of the product?
  • Do you provide a certification program for installers to keep them trained and up-to-date on new technologies?
  • What training methods are used: Hands-on factory and field training, pre-scheduled monthly webinars or private custom webinars?
  • What are the training costs and are they included in the overall solution or do they cost extra each time?

A comprehensive technical training and maintenance program from the manufacturer is critical to the long-term success of the installation and customer satisfaction.

6. Service Offering

Service considerations typically come last, or not at all, when making a buying decision. Yet, during and after installation the level of service directly impacts continued operations and ROI.

Security, Aesthetics, ROI, Throughput, Training, Service and Safety play a prominent role in selecting a security entrance solution

Look for these features in a comprehensive service offering:

  • Nationwide and global certified distribution partners
  • Phone support: What is the percentage of same-day resolution?
  • Parts: What is the percentage of same-day parts fulfillment? Are parts shipped from overseas?
  • Is installation project management available?
  • Preventative planned maintenance agreements

Consider the impact of a delayed installation, unsatisfactory technical support and delayed parts availability. Problems in any of these areas could drag on for days or weeks, meanwhile your building is vulnerable while entrances are shut down and nobody is happy. All because service was left out of the decision-making process.

7. Safety Compliance

Safety, too, is rarely discussed during the bidding process. However, it is the one factor that could quickly and tragically undermine the effectiveness and success of the project.

Does the provider offer these safety features?

  • Code compliance
  • Meets all NFPA fire egress codes
  • Audible and visual communication for users
  • Added sensors to protect users from moving components
  • Speed/torque controls that can be adjusted to meet site operating conditions
  • Instructional media to train new users

Ensure all above criteria are met as they apply for the physical security products and applications you are considering.

Company Culture

In addition to the seven crucial decision factors discussed so far, there is one more factor to consider. Entry solution providers must understand your company Culture, and help you communicate the best way for your culture to adapt to a new security entrance. Some culture factors include:

  • How much exposure have your employees had to security entrances (other buildings, around town, previous employers, etc.)?
  • How do you think employees will feel about your new security entrance?
  • How will you plan to achieve buy-in from employees?
  • When and how will you communicate the upcoming changes in security entrances?
  • Are there any special needs — service animals, pets, elderly or disabled users, frequent deliveries in large carts — to be considered?
  • Are all stakeholders involved in the decision process including the facility manager who will own the entrances once installed? Has the CEO been in on the decision-making process, is it possible he or she might decide the newly secure entryway is far from the image they wish to project?

Security Entrance Project – Outcome


The success (or failure) of a security entrance project must start and end with a comprehensive, consultative process that takes into consideration the full range of factors for discussion and ultimate decision. The decision-making methodology outlined here is such a process. One that will help ensure that the buyer will be just as satisfied, and probably more so, years after installation and not just when you’ve cut the ribbon on day one.
Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

Author profile

Greg Schreiber Vice President of Sales, Boon Edam

Greg Schreiber has been the Vice President of Sales of Boon Edam Inc. since 2013 and has been with the company a total of 15 years.

In case you missed it

Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)
Why Visualization Platforms Are Vital For An Effective Security Operation Center (SOC)

Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.

What New Technologies And Trends Will Shape Video Analytics?
What New Technologies And Trends Will Shape Video Analytics?

The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?

Tackling The Challenge Of The Growing Cybersecurity Gap
Tackling The Challenge Of The Growing Cybersecurity Gap

The SolarWinds cyberattack of 2020 was cited by security experts as “one of the potentially largest penetrations of Western governments” since the Cold War. This attack put cybersecurity front and center on people’s minds again. Hacking communication protocol The attack targeted the US government and reportedly compromised the treasury and commerce departments and Homeland Security. What’s interesting about the SolarWinds attack is that it was caused by the exploitation of a hacker who injected a backdoor communications protocol.  This means that months ahead of the attack, hackers broke into SolarWinds systems and added malicious code into the company’s software development system. Later on, updates being pushed out included the malicious code, creating a backdoor communication for the hackers to use. Once a body is hacked, access can be gained to many. An explosion of network devices What has made the threat of cyberattacks much more prominent these days has been IT's growth in the last 20 years, notably cheaper and cheaper IoT devices. This has led to an explosion of network devices. IT spending has never really matched the pace of hardware and software growth Compounding this issue is that IT spending has never really matched the pace of hardware and software growth. Inevitably, leading to vulnerabilities, limited IT resources, and an increase in IoT devices get more attention from would-be hackers. Bridging the cybersecurity gap In the author’s view, this is the main reason why the cybersecurity gap is growing. This is because it inevitably boils down to counter-strike versus counter-strike. IT teams plug holes, and hackers find new ones, that is never going to stop. The companies must continue fighting cyber threats by developing new ways of protecting through in-house testing, security best practice sources, and both market and customer leads. End-user awareness One of the key battlegrounds here is the education of end-users. This is an area where the battle is being won at present, in the author’s opinion. End-users awareness of cybersecurity is increasing. It is crucial to educate end-users on what IoT devices are available, how they are configured, how to enable it effectively, and critically, how to use it correctly and safely. Physical security network A valuable product that tackles cybersecurity is, of course, Razberi Monitor™, which is new to ComNet’s portfolio. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem. Monitor™ is a software platform that provides a top-down view of the physical security network and ecosystem It monitors and manages all the system components for cybersecurity and system health, providing secure visibility into the availability, performance, and cyber posture of servers, storage, cameras, and networked security devices. Proactive maintenance By intelligently utilizing system properties and sensor data, Razberi’s award-winning cybersecurity software prevents problems while providing a centralized location for asset and alert management. Monitor™ enables proactive maintenance by offering problem resolutions before they become more significant problems. Identifying issues before they fail and become an outage is key to system availability and, moreover, is a considerable cost saving.