Practical Solutions To Piggybacking and Tailgating

Author: Brian Rhodes, Published on Feb 12, 2015

Piggybacking and tailgating are two of access control's biggest threats. In this note, we share survey results from more than 100 integrators about the specific steps they have implemented to solve them.

Results

We asked "How do you deal with the problems of users sharing credentials (ie: Piggybacking) or holding doors open for others (ie: Tailgating)?"

More than 100 integrators and end users responded. A breakdown of their answers into common groups is given below:

************ *** ********** *** *** ** ****** *******'* ******* *******. In **** ****, ** ***** ****** ******* **** **** **** 100 *********** ***** *** ******** ***** **** **** *********** ** solve ****.

*******

** ***** "*** ** *** **** **** *** ******** ** ***** ******* credentials (**: ************) ** ******* ***** **** *** ****** (**: Tailgating)?"

**** **** *** *********** *** *** ***** *********. * ********* of ***** ******* **** ****** ****** ** ***** *****:

[***************]

*** **** * **** ********* ** *** ******* ** ***** below:

The ***** *******

*** ***** *** ********, *** *** ******** ** ****** ** this ******** *** ************ ********* ** ******* *** ******* **** traditional ****** ******* *******. ***** ****** *** ******** ******* **:

  • **********: ** ********* *** **** ** ***** ******* **** ***** to ***** **** **** *** **** ** **** ** *** ****** ******* ******: ********** ****. ****** ******* ******* **** * ********* **** ********** *** problem, ** **** **** ******* ***** ** ******** *****; *** how **** **** *** ******.
  • ********: * ******* ******* ** ********** ******* (************ ****** '********') due ** ***** ******* ***** *********** ** *** ****** ****** *** ******* a ***** ** *** ****, *** ** *** *********, *** so **. ****** ******* ***** ******* ******* ** ********* *********, alarms, ** **** ****** ****** ****** '****-********', *** *** *** of ********* ******* **** *** ******* *** *******. ** ******** the ******* ** *** ******** ******* ****.

Answers *******

********* ********* **** **** *** ********* ******* ** ******* ** mitigate *** ****. **** **** **% ** *** ********* ********* more **** *** ****** ** ******* *** **** **** **% mentioned *** ** ****.

**** **** ****, *** ******* ***** **** *** **** ******** cited:

  • *******:*** **** ****** ******** ******** ***** ************ ******* ** ****** and ****** ** ****** *** ********* ** ****** ******.
  • **********:*** **** ****** '******' ****** **** ***** **********, ********* *****, or ******** ** ********** ******* **** **** ** ****** ****** ***** at *** ****.
  • *******:*** **** ****** '****' ******* ** ***** **** ********** ** passively ******* *** **** *** *** *** ** ***** ** remind ****** **** ******** *** ****** ******* ****** ** ********** security ********.
  • *******:***** **% ** ********* **** **** ****** ** ******* ***** the *****.  ****** ********** ** ** *** ******, ** ** is *** ****** ** * **** ** ******* ***************.

Key ******

** *** ******** *****, ** **** *** ********** ********** *********** gave ** *********** ** ********** *** ********** *** **** **** problem:

***** ***********: ******* *********** ******* **** ****** ** * ******* ********, with **** ********* ********** ** ** *** ***** ****** **** when ****** **** *****:

  • "********* ** *** ******** ****** ********** *****\***** ** ***** **** with ********** ******** *******"
  • "** ******* **** ******* ******** *** ***** *** **** * ******** camera ***** **** ****** ******* ****** **** ***** * **** every **** * **** ** ****** ** ******."
  • "*** ******** ****** ** *** ****** *** ***** ****** ***** or *** * ******** **** ******* ** *** ********* ****/**** if *** ****** ****** **** *** ***** *** ********."
  • "*********** ***** ** * ************** *** *** ******** *********."
  • "** ******* ******* **** ** *** **** ** * **** stamp ** ******** ***** **** ***** ** **** ****. **'* then ** ** *** ***** ** ******* ***** ******."

*******, ****** ***** ** ******** ********* ** **********/******** ****** *********, it ** *** * ***** ******** *** *** ********.  **** placing ******* ***** **** *** ******* ******* ** ********* ****** view ******** *** ****** *********** *** ** ******* **** **** if *** ****** *** *** ******** ********* ** ****** **** other *******.  

Strict ********

***** ********** **** *** ******* ******** ** ********** ** ******* the ***** ********.  *********** ******** **** **********, ** '**** ************' are **** ** ******** ********** ******* ******.

**********

** **** *****, ***** ******* ******** **** ******* ******* *** many ****** ***** ** *** ****.  *** ********** **** ** almost ****** **********, ***** * **** ****** ** ******* ** held **** *** ******.  ******, ** ***** ** ******* *** turnstile, **** **** **** ******* * **********.

  • "** ** ** * **** ******** ***********, ** ********* *** installation ** * ********* **** ********."
  • "*** ******* *** ** ** ******* **** ********** **********. ***** only *** *** ****** ******* ** * ****. **'* *** the ******** ******."
  • "*** ****, ** ******."
  • "********* **** (**** **** ********), **** ****** ***** ***** ******* with ******* ******* ***** ** ***** ****."
  • "******* ********** ** ******* ** ***** ******** *****."
  • "**********- * **** ***** ******** ******** *** ******* ******** ****** for **** ****** *****."

**** *** (************)

** * ****** ******, ***** ********* **** ************ ******** ** actively **** *********** **** ***** **** *** ** ********.  **** typically ***** * **** ****** ** **** ** *** **** reader ***** (********** ** ***** **********) ******* ***** **** ***** at ***** *******.  ** **** *****, *** ******* **** ** users ** ** ****** ********** ******** *** **** ****** ** simply ******* ** '********' ** ****** ********** **** ******* * turnstile, *****, ** ******.

  • "** * ****-****** ****** **** ** **** ** ******* *** card *** ***** ** *** *** **** ** *** ***** area ******* ***** ******* *** ******** ****, *** **** ** disabled *** * ****** **** ** *** ********** ** ***/*****."
  • "** ****** *** ******* **** ***** ***** *** ** **** out-of-turn. ** *****."
  • "*** ******* **** ********* ****** **** ******** ** *****.  ********** is *** ******** ******* ** *** **********."
  • "** *** ************ **** ***** *** * **** ** **** with ***** ******** ** ** *** ** * ******** ****."

******

***** ***** ******** ********** ******** ** ****** ***** ** ****** the ****, *** **** ****** ******** ********* ******** **** ********* when **** ******:

  • "****** *** ****** ** ***** ****** ******* *** ********** *********** are ******* ******."
  • "****** ********* ****** *** **********."
  • "*** ***** *** ****** ** **** **** **** ***** **** not ******."
  • "* ***** ******** ***** ********* ****** **** ** ***** *** quarter ** *** **** ********."
  • "** *** *** ********* ** ********** ** ********, *** ****** come ***** *** ** ***********."

Soft ********

***** ***** *** **** *********, *** *********** ***** ******* **** to ***** ****, *** *** **** *********, **** *********, *** overall ********* *** **** ******* **** ** ******* **** *** issue.

*******

**** ********* ******* ******* ***** ** ****** ******** ** *********. While ***** ******* ** ******** ******** *** ****, ******* ** a ********** ******** ** ***** ** *** ****** ** ********* the ****** ******.

  • "***** ***** ********* ******** ** ***** ************ ****** **** ******** cameras ****** ******** ** * **** *********."
  • "** **** ***** ** ****** ****** *** ** ********."
  • "********* ******* ******** **** ** **** ******** *** ****."
  • "** ******** *** ***** ****** *** ****** *** *** ******* that ********** **** *** ******."
  • "** **** ******* ************, ****** ***** ******** **** ******** ******* are *********."

**********

******* ******, ** *** ********, ****** ** *********** *** **** is ** ***** *********** *** ******** ** ********* ********. ******* a *** ** *************, **********, *** ******** *** ******** ******* of ********** *** **** **** *** *******.

  • "***** ******* ** ** *** *****, ********* ********* ** ***** the ****** ******* ***."
  • "** ****** ******* **. **** ** ***** ******** ***** *****, we **** ******** ************ ** *** ** ****."
  • "****** *********** **** ****** ************ *******, ********* ********** ** *****, unpaid ********** **** ****, ***."
  • "(*** *****) **** **** ** **** ***** ********* **** **** ** the *** ** **** ** ****, ****, **** ********* **** reads ** ***** **** ******, *** ********* ********* ** **. If *** **** ** ********** *** *** *******, ***** *****, reports **** ** ** ****."
  • "******* *********** ** ******* *** ***** ** *** **** ********.  This ***** **** ** *** ****."

Do *******

* ****** ** *********, ***** **%, ********* **** **** ** not ******* *** ***** ** ***, ** *** ******** ** weak.  *** ******** ******* ** ****** *** ********* ** ** great ****** ** ******* ********** ******** ** ********** ***** ** *******.

  • "*** **** *** ** ********* "****" **** **** ** **** the "**** ** *** *****" *** ****** *** ** ****."
  • "** ** ********* ** ******* *******."
  • "** ** ******, ** ***'* ******. *** ********'* ****'* ****** too ********* ***** **."
  • "*** ********* ** *** *** *** ****, ******* ** ****** to ******** ****."
  • "**** ** ******* *********, ** *** ******* **** ********** **.  Just *** * *** ***** ******."

Tough *******

*** ****** ** *****: ******* ******** *** ******* ** ********* and ***** * ****** ** ********* **** ** ***********.  ******* answers ********* *** ********** ** ******** *** *******, *** *** multiple ******* ******:

  • "*** *** ******** **** *** ***** ******** **** ** ******* education. **** **** ***** **** *** ***** *******. **** **** offending *****. *** ** **** *****. **** ***** ****-******** *** mustering *** * *** **** *** ***** *** *** ********* the ******* ***. ***** **** *** *** *****. ** *** the **** ********* **** ** *** ********* ********. ***** *** no ********* *** **. ***** ******** ********* ** ******* ** create *** ***** / **-*** *******, ** *** *** ****** off. ******* ****** ********** ********* **** **** *****, ** ***'* happen."
  • "**** ** * ***** *****. ******* ** *** ***** **** implemented ******* *** *** *** ****** ******* ** * "****-**" system, ** ** * **** *****'* **** ****, *** ****** shows ** ** ****** **** *** ****** **** ****. **** of *** ***** **** **** ******** **** **** ****-******** ********. Many ** *** ***** **** **** ******* ** *** ***** and *** ***** ****** *** ****** ******* *** **** ****** against *** ****** ******* *********** *** **** *** ****** ******** the ************ ** **********."

Comments (4)

Interesting information. I would think video analytics would be tailor made for this, along with agressive followup.

Video can document and assess whether a piggy back occured, but doesn't have any means to stop it, right? Unless there's an analytic used as an occupancy sensor in a sallyport/man trap scenario in which only (1) person at a time can occupy the space.

that is why I mentioned agressive followup. Video can not stop it, but it can be used as a teaching tool.

Going one step further, if the analytics were good enough, you could sound an alarm at that door to alert the end user that he just piggy-backed. Bring their attention to it. Piggy backing is a serious issue and will not stop without agressive followup and training.

Keeping unathorized individuals out of your facility is security 101 stuff. An awful lot of serious infractions and penetrations are caused by ignoring seemingly harmless events.

Boon Edam did a tailgating survey. Obviously, it's skewed given their interests / sales but the claims are wild: "More than 50% of those surveyed believe the cost of a breach caused by tailgating would be from $150,000 up to “too high to measure.”

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Wavelynx Access Control Manufacturer Profile on Jan 10, 2019
Denver-based WaveLynx is not well known as an access reader manufacturer, but OEMs for big industry brands including Amag, Isonas (Allegion),...
Combating Vaping Epidemic - Halo Smart Sensor Profile on Dec 21, 2018
Youth vaping has become an epidemic, according to the US Surgeon General, while the market leader, Juul, just received a $12.8 billion investment...
ACRE-Acquired Open Options Access Company Profile on Dec 17, 2018
Who is the company ACRE is acquiring? In this note, we examine Open Options line for best customer fit, key features, pricing, and main...
Open Options Acquired By ACRE on Dec 17, 2018
ACRE is doing deals again. A year after they sold Mercury, they are buying another access control company - Open Options. In this note, we...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...
Top 2019 Trend - AI Video Analytics on Dec 10, 2018
160+ Integrators answered: What do you think the top industry trend will be in 2019? Why? AI / video analytics was the run-away winner with...

Most Recent Industry Reports

Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...
2019 IP Networking Book Released on Jan 14, 2019
The new IP Networking Book 2019 is a 285 page in-depth guide that teaches you how IT and telecom technologies impact modern security...
Arecont Costar Layoffs on Jan 14, 2019
Arecont Vision, a Costar Company, has laid off more than 10% of their workforce in a move the company described to IPVM as a result of "important...
The False SCMP Story on Hikvision NYC AI on Jan 14, 2019
In the past week, one of Asia's largest publications, the South China Morning Post (SCMP), posted an article about "Chinese [facial recognition]...
WDR Tutorial on Jan 11, 2019
Understanding wide dynamic range (WDR) is critical to capturing high quality images in demanding conditions. However, with no real standards, any...
Pelco Favorability Results 2019 on Jan 11, 2019
Pelco had a significant favorability problem amongst integrators in our previous study (see 2016 Pelco results). Now, in the first edition of our...
Bad: Dahua Villa Video Doorbell Tested on Jan 11, 2019
Doorbells are one of the hottest segments in the residential market but Dahua's Villa Video Doorbell is the worst we have tested.   We bought and...
Last Chance - Winter 2019 IP Networking Course on Jan 10, 2019
Today is the last day to register for the Winter 2019 IP Networking course. This is the only networking course designed specifically for video...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact