Ask the Expert

Ensuring only the right people enter and exit a facility is the core principle of access control. It is extremely important that only approved people have entry authorization. Access control can be managed in different ways, but one of the most popular and effective methods is with identification cards. A multitude of different ID cards is available. How can you use them for your next security installation?

ISSUE:What are some ID card choices?

SOLUTION: The most common form of access card is probably in your wallet right now: the magnetic stripe card. Found on the back of credit cards and most driver’s licenses, these black magnetic stripes contain information. Once swiped through a reader, the information taken from the card allows the user to complete a transaction or enter a building.

Newer forms of magnetic stripe cards, dubbed “smart cards,” have small chips that can store more information. Smart cards are more functional and secure than other alternatives and can include biometric data to offer an even higher level of security.

ISSUE: What are the latest advances in smart-card technology?

SOLUTION: Newer versions of smart cards enable contactless technology, which means that the card does not need to be passed through a reader. RFID technology only requires the user be close to a reader for the card to be used.

Implementing an access card system within your security apparatus is made even easier by products that allow cards to be made on-site. Schools and businesses can take a picture of an employee or student and feed the image into the printing software. The card printing machines will then produce a working version of the organization’s identification card to use.

Some universities have extended their use of ID cards with smart-card technology and may require students to swipe their cards before gaining access to buildings such as the library or dining facility. Further functions enable tracking of student meals through the ID card; parents can even create an account to deposit money into, which the students can access through their campus ID smart cards. They also can access other bank accounts, such as personal checking or savings, effectively making the campus ID card an ATM or debit card.

ISSUE: What factors should businesses consider when implementing an ID program?

SOLUTION: Businesses can use any variation of the ID card to ensure only approved personnel enter a building. Functions also can allow either full or restricted access to a facility—you can define admission only to certain areas or grant admission only at certain times. The control can even be extended to immediately invalidate a terminated employee’s card or to approve access for temporary employees or vendors requiring longterm access to the facility. Of increasing importance today is the ability to centrally and completely disable an employee or student ID when their permission to use the campus has been removed. Organizations that use these cards also may have the ability to track information on a user’s location, habits and interests.

ID cards are an essential tool for access control and secure organizations. It is now easier than ever to implement ID cards in a security system. Talk to a security integrator about the benefits and start making money by implementing the technology as soon as possible.

READER QUESTION: I operate a small manufacturing facility.We have a need to strengthen security in one sensitive area and are considering adding a biometric device. But a fingerprint reader will not work, as our employees often have their hands full with heavy parts. That might also make it difficult to use a retinal scanner. Do voice or other biometrics work reliably, and are they affordable?

SOLUTION: Mr. “Hands-full” probably would be best served by using a smart card or at least a proximity card that does not require anything additional. If high security is really necessary, a retinal scan device or even a voice recognition system may be useful. But these systems are in the higher price bracket and require more intimate contact, which many people object to. In a shop environment, it is possible these devices could be affected by dirt and high noise level.

Another solution could be to use a combination of prox card and video recognition system, especially if video is going to be deployed anyway. The card reading can call up an anticipated profile in the video system and do a facial recognition test, comparing the template to the live image of the presenter. The integrated access control/video system then decides whether to grant access based on how close the presenter is to the template on file. Facial recognition technology is still evolving but currently has good accuracy, is fast, is reasonably priced when added to a video system and is definitely user friendly. Once installed, accuracy can be raised by tightening the acceptable parameters of the facial recognition software. A secondary advantage is the ability to record on video all valid and invalid entry attempts.

Featured

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.