Practical Solutions To Piggybacking and Tailgating

Author: Brian Rhodes, Published on Feb 12, 2015

Piggybacking and tailgating are two of access control's biggest threats. In this note, we share survey results from more than 100 integrators about the specific steps they have implemented to solve them.

Results

We asked "How do you deal with the problems of users sharing credentials (ie: Piggybacking) or holding doors open for others (ie: Tailgating)?"

More than 100 integrators and end users responded. A breakdown of their answers into common groups is given below:

************ *** ********** *** *** ** ****** *******'* ******* *******. In **** ****, ** ***** ****** ******* **** **** **** 100 *********** ***** *** ******** ***** **** **** *********** ** solve ****.

*******

** ***** "*** ** *** **** **** *** ******** ** ***** ******* credentials (**: ************) ** ******* ***** **** *** ****** (**: Tailgating)?"

**** **** *** *********** *** *** ***** *********. * ********* of ***** ******* **** ****** ****** ** ***** *****:

[***************]

*** **** * **** ********* ** *** ******* ** ***** below:

The ***** *******

*** ***** *** ********, *** *** ******** ** ****** ** this ******** *** ************ ********* ** ******* *** ******* **** traditional ****** ******* *******. ***** ****** *** ******** ******* **:

  • **********: ** ********* *** **** ** ***** ******* **** ***** to ***** **** **** *** **** ** **** ** *** ****** ******* ******: ********** ****. ****** ******* ******* **** * ********* **** ********** *** problem, ** **** **** ******* ***** ** ******** *****; *** how **** **** *** ******.
  • ********: * ******* ******* ** ********** ******* (************ ****** '********') due ** ***** ******* ***** *********** ** *** ****** ****** *** ******* a ***** ** *** ****, *** ** *** *********, *** so **. ****** ******* ***** ******* ******* ** ********* *********, alarms, ** **** ****** ****** ****** '****-********', *** *** *** of ********* ******* **** *** ******* *** *******. ** ******** the ******* ** *** ******** ******* ****.

Answers *******

********* ********* **** **** *** ********* ******* ** ******* ** mitigate *** ****. **** **** **% ** *** ********* ********* more **** *** ****** ** ******* *** **** **** **% mentioned *** ** ****.

**** **** ****, *** ******* ***** **** *** **** ******** cited:

  • *******:*** **** ****** ******** ******** ***** ************ ******* ** ****** and ****** ** ****** *** ********* ** ****** ******.
  • **********:*** **** ****** '******' ****** **** ***** **********, ********* *****, or ******** ** ********** ******* **** **** ** ****** ****** ***** at *** ****.
  • *******:*** **** ****** '****' ******* ** ***** **** ********** ** passively ******* *** **** *** *** *** ** ***** ** remind ****** **** ******** *** ****** ******* ****** ** ********** security ********.
  • *******:***** **% ** ********* **** **** ****** ** ******* ***** the *****.  ****** ********** ** ** *** ******, ** ** is *** ****** ** * **** ** ******* ***************.

Key ******

** *** ******** *****, ** **** *** ********** ********** *********** gave ** *********** ** ********** *** ********** *** **** **** problem:

***** ***********: ******* *********** ******* **** ****** ** * ******* ********, with **** ********* ********** ** ** *** ***** ****** **** when ****** **** *****:

  • "********* ** *** ******** ****** ********** *****\***** ** ***** **** with ********** ******** *******"
  • "** ******* **** ******* ******** *** ***** *** **** * ******** camera ***** **** ****** ******* ****** **** ***** * **** every **** * **** ** ****** ** ******."
  • "*** ******** ****** ** *** ****** *** ***** ****** ***** or *** * ******** **** ******* ** *** ********* ****/**** if *** ****** ****** **** *** ***** *** ********."
  • "*********** ***** ** * ************** *** *** ******** *********."
  • "** ******* ******* **** ** *** **** ** * **** stamp ** ******** ***** **** ***** ** **** ****. **'* then ** ** *** ***** ** ******* ***** ******."

*******, ****** ***** ** ******** ********* ** **********/******** ****** *********, it ** *** * ***** ******** *** *** ********.  **** placing ******* ***** **** *** ******* ******* ** ********* ****** view ******** *** ****** *********** *** ** ******* **** **** if *** ****** *** *** ******** ********* ** ****** **** other *******.  

Strict ********

***** ********** **** *** ******* ******** ** ********** ** ******* the ***** ********.  *********** ******** **** **********, ** '**** ************' are **** ** ******** ********** ******* ******.

**********

** **** *****, ***** ******* ******** **** ******* ******* *** many ****** ***** ** *** ****.  *** ********** **** ** almost ****** **********, ***** * **** ****** ** ******* ** held **** *** ******.  ******, ** ***** ** ******* *** turnstile, **** **** **** ******* * **********.

  • "** ** ** * **** ******** ***********, ** ********* *** installation ** * ********* **** ********."
  • "*** ******* *** ** ** ******* **** ********** **********. ***** only *** *** ****** ******* ** * ****. **'* *** the ******** ******."
  • "*** ****, ** ******."
  • "********* **** (**** **** ********), **** ****** ***** ***** ******* with ******* ******* ***** ** ***** ****."
  • "******* ********** ** ******* ** ***** ******** *****."
  • "**********- * **** ***** ******** ******** *** ******* ******** ****** for **** ****** *****."

**** *** (************)

** * ****** ******, ***** ********* **** ************ ******** ** actively **** *********** **** ***** **** *** ** ********.  **** typically ***** * **** ****** ** **** ** *** **** reader ***** (********** ** ***** **********) ******* ***** **** ***** at ***** *******.  ** **** *****, *** ******* **** ** users ** ** ****** ********** ******** *** **** ****** ** simply ******* ** '********' ** ****** ********** **** ******* * turnstile, *****, ** ******.

  • "** * ****-****** ****** **** ** **** ** ******* *** card *** ***** ** *** *** **** ** *** ***** area ******* ***** ******* *** ******** ****, *** **** ** disabled *** * ****** **** ** *** ********** ** ***/*****."
  • "** ****** *** ******* **** ***** ***** *** ** **** out-of-turn. ** *****."
  • "*** ******* **** ********* ****** **** ******** ** *****.  ********** is *** ******** ******* ** *** **********."
  • "** *** ************ **** ***** *** * **** ** **** with ***** ******** ** ** *** ** * ******** ****."

******

***** ***** ******** ********** ******** ** ****** ***** ** ****** the ****, *** **** ****** ******** ********* ******** **** ********* when **** ******:

  • "****** *** ****** ** ***** ****** ******* *** ********** *********** are ******* ******."
  • "****** ********* ****** *** **********."
  • "*** ***** *** ****** ** **** **** **** ***** **** not ******."
  • "* ***** ******** ***** ********* ****** **** ** ***** *** quarter ** *** **** ********."
  • "** *** *** ********* ** ********** ** ********, *** ****** come ***** *** ** ***********."

Soft ********

***** ***** *** **** *********, *** *********** ***** ******* **** to ***** ****, *** *** **** *********, **** *********, *** overall ********* *** **** ******* **** ** ******* **** *** issue.

*******

**** ********* ******* ******* ***** ** ****** ******** ** *********. While ***** ******* ** ******** ******** *** ****, ******* ** a ********** ******** ** ***** ** *** ****** ** ********* the ****** ******.

  • "***** ***** ********* ******** ** ***** ************ ****** **** ******** cameras ****** ******** ** * **** *********."
  • "** **** ***** ** ****** ****** *** ** ********."
  • "********* ******* ******** **** ** **** ******** *** ****."
  • "** ******** *** ***** ****** *** ****** *** *** ******* that ********** **** *** ******."
  • "** **** ******* ************, ****** ***** ******** **** ******** ******* are *********."

**********

******* ******, ** *** ********, ****** ** *********** *** **** is ** ***** *********** *** ******** ** ********* ********. ******* a *** ** *************, **********, *** ******** *** ******** ******* of ********** *** **** **** *** *******.

  • "***** ******* ** ** *** *****, ********* ********* ** ***** the ****** ******* ***."
  • "** ****** ******* **. **** ** ***** ******** ***** *****, we **** ******** ************ ** *** ** ****."
  • "****** *********** **** ****** ************ *******, ********* ********** ** *****, unpaid ********** **** ****, ***."
  • "(*** *****) **** **** ** **** ***** ********* **** **** ** the *** ** **** ** ****, ****, **** ********* **** reads ** ***** **** ******, *** ********* ********* ** **. If *** **** ** ********** *** *** *******, ***** *****, reports **** ** ** ****."
  • "******* *********** ** ******* *** ***** ** *** **** ********.  This ***** **** ** *** ****."

Do *******

* ****** ** *********, ***** **%, ********* **** **** ** not ******* *** ***** ** ***, ** *** ******** ** weak.  *** ******** ******* ** ****** *** ********* ** ** great ****** ** ******* ********** ******** ** ********** ***** ** *******.

  • "*** **** *** ** ********* "****" **** **** ** **** the "**** ** *** *****" *** ****** *** ** ****."
  • "** ** ********* ** ******* *******."
  • "** ** ******, ** ***'* ******. *** ********'* ****'* ****** too ********* ***** **."
  • "*** ********* ** *** *** *** ****, ******* ** ****** to ******** ****."
  • "**** ** ******* *********, ** *** ******* **** ********** **.  Just *** * *** ***** ******."

Tough *******

*** ****** ** *****: ******* ******** *** ******* ** ********* and ***** * ****** ** ********* **** ** ***********.  ******* answers ********* *** ********** ** ******** *** *******, *** *** multiple ******* ******:

  • "*** *** ******** **** *** ***** ******** **** ** ******* education. **** **** ***** **** *** ***** *******. **** **** offending *****. *** ** **** *****. **** ***** ****-******** *** mustering *** * *** **** *** ***** *** *** ********* the ******* ***. ***** **** *** *** *****. ** *** the **** ********* **** ** *** ********* ********. ***** *** no ********* *** **. ***** ******** ********* ** ******* ** create *** ***** / **-*** *******, ** *** *** ****** off. ******* ****** ********** ********* **** **** *****, ** ***'* happen."
  • "**** ** * ***** *****. ******* ** *** ***** **** implemented ******* *** *** *** ****** ******* ** * "****-**" system, ** ** * **** *****'* **** ****, *** ****** shows ** ** ****** **** *** ****** **** ****. **** of *** ***** **** **** ******** **** **** ****-******** ********. Many ** *** ***** **** **** ******* ** *** ***** and *** ***** ****** *** ****** ******* *** **** ****** against *** ****** ******* *********** *** **** *** ****** ******** the ************ ** **********."

Comments (4)

Interesting information. I would think video analytics would be tailor made for this, along with agressive followup.

Video can document and assess whether a piggy back occured, but doesn't have any means to stop it, right? Unless there's an analytic used as an occupancy sensor in a sallyport/man trap scenario in which only (1) person at a time can occupy the space.

that is why I mentioned agressive followup. Video can not stop it, but it can be used as a teaching tool.

Going one step further, if the analytics were good enough, you could sound an alarm at that door to alert the end user that he just piggy-backed. Bring their attention to it. Piggy backing is a serious issue and will not stop without agressive followup and training.

Keeping unathorized individuals out of your facility is security 101 stuff. An awful lot of serious infractions and penetrations are caused by ignoring seemingly harmless events.

Boon Edam did a tailgating survey. Obviously, it's skewed given their interests / sales but the claims are wild: "More than 50% of those surveyed believe the cost of a breach caused by tailgating would be from $150,000 up to “too high to measure.”

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Access Control - Time & Attendance, Mustering and Mantraps Guide on Jun 13, 2018
Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure,...
ReconaSense - The AI / Access Control / Analytics / IoT / Video Company Profile on Jun 12, 2018
One company's ISC West booth stood out for displaying a light-up tower of buzzwords. The company, ReconaSense, pledged to be 'making sense of it...
The Benefits of An Access Control Test Door on Jun 08, 2018
Security system dealers can benefit from having their own access control test door both for demonstrations and training. Inside, we explain the...
Princeton Identity Access 200 Iris Scanners Examined on Jun 05, 2018
Iris recently registered a big jump as a preferred biometric in our Favorite Biometrics survey, but access-ready options can be difficult to...
Keypads For Access Control Tutorial on May 31, 2018
Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if...
Ambitious Mobile Access Startup: Openpath on May 24, 2018
This team sold their last startup for hundreds of millions of dollars, now they have started Openpath to become a rare access control small...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Worst Manufacturer Technical Support 2018 on May 16, 2018
5 manufacturers stood out as providing the worst technical support to 190+ integrators in new IPVM results. These integrators answered: In the...

Most Recent Industry Reports

IFSEC Show Report Day 2 Report on Jun 20, 2018
IPVM is live from London reporting on the IFSEC show. The Chinese have taken over the UK, centered on Hikvision, flanked by Dahua, Huawei and a...
Mobotix Releases 'Move' Into 21st Century on Jun 20, 2018
For years, Mobotix stood resolutely against, well, every other manufacturer, selling it as a virtue: MOBOTIX equipment is designed with no...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
July 2018 IP Networking Course on Jun 19, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
Axis Guardian - Cloud VMS And Alarm Monitoring - Released on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...
IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Amazon Ring Launches $10 Monthly Professional Alarm Monitoring on Jun 15, 2018
Amazon's Ring has announced an alarm system with 24/7 professional alarm monitoring for $10 per month, a fraction of the $30+ per month traditional...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact