Browse Definitions :
Definition

mantrap (interlocking door controller)

A mantrap is a small room with an entry door on one wall and an exit door on the opposite wall. One door of a mantrap cannot be unlocked and opened until the opposite door has been closed and locked.

Mantraps are most often used in physical security to separate non-secure areas from secure areas and prevent unauthorized access. They can also be found in high tech manufacturing to provide entry and exit chambers for clean rooms.

In the Middle Ages, mantraps were used to check visitor credentials in prisons.  A visitor would be allowed entry into an enclosed vestibule, at which time the entry door would be locked and the visitor’s credentials examined. If the credentials didn’t check out -- or if the visitor was determined to be a person of interest – the trapped visitor could easily be arrested.    

Today’s mantraps use interlocking doors that are interfaced so that when one door is unlocked, the other door automatically locks.  Pass-through authorization is validated by smart card, key fob or biometric verification. Some systems may employ three-dimensional optical imaging or thermal imaging technology to prevent more than one person from passing through a mantrap at the same time.

This video shows a mantrap denying access to an employee until both doors are closed and locked.

This was last updated in October 2011

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Mantrap access control from Borer with IEE People Counter Sensor, to ensure that proof of identity is established to ensure only the authorised personnel are given access.

http://mantrap.solutions
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • data breach

    A data breach is a confirmed incident in which sensitive, confidential or otherwise protected data has been accessed and/or ...

  • zero-day (computer)

    A zero-day vulnerability, also known as a computer zero day, is a flaw in software, hardware or firmware that is unknown to the ...

SearchHealthIT

SearchDisasterRecovery

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

  • business continuity software

    Business continuity software is an application or suite designed to make business continuity planning/business continuity ...

  • business continuity policy

    Business continuity policy is the set of standards and guidelines an organization enforces to ensure resilience and proper risk ...

SearchStorage

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks to ...

  • dedicated cloud

    A dedicated cloud is a single-tenant cloud infrastructure, which essentially acts as an isolated, single-tenant public cloud.

Close