Ask the Expert

Ensuring only the right people enter and exit a facility is the core principle of access control. It is extremely important that only approved people have entry authorization. Access control can be managed in different ways, but one of the most popular and effective methods is with identification cards. A multitude of different ID cards is available. How can you use them for your next security installation?

ISSUE:What are some ID card choices?

SOLUTION: The most common form of access card is probably in your wallet right now: the magnetic stripe card. Found on the back of credit cards and most driver’s licenses, these black magnetic stripes contain information. Once swiped through a reader, the information taken from the card allows the user to complete a transaction or enter a building.

Newer forms of magnetic stripe cards, dubbed “smart cards,” have small chips that can store more information. Smart cards are more functional and secure than other alternatives and can include biometric data to offer an even higher level of security.

ISSUE: What are the latest advances in smart-card technology?

SOLUTION: Newer versions of smart cards enable contactless technology, which means that the card does not need to be passed through a reader. RFID technology only requires the user be close to a reader for the card to be used.

Implementing an access card system within your security apparatus is made even easier by products that allow cards to be made on-site. Schools and businesses can take a picture of an employee or student and feed the image into the printing software. The card printing machines will then produce a working version of the organization’s identification card to use.

Some universities have extended their use of ID cards with smart-card technology and may require students to swipe their cards before gaining access to buildings such as the library or dining facility. Further functions enable tracking of student meals through the ID card; parents can even create an account to deposit money into, which the students can access through their campus ID smart cards. They also can access other bank accounts, such as personal checking or savings, effectively making the campus ID card an ATM or debit card.

ISSUE: What factors should businesses consider when implementing an ID program?

SOLUTION: Businesses can use any variation of the ID card to ensure only approved personnel enter a building. Functions also can allow either full or restricted access to a facility—you can define admission only to certain areas or grant admission only at certain times. The control can even be extended to immediately invalidate a terminated employee’s card or to approve access for temporary employees or vendors requiring longterm access to the facility. Of increasing importance today is the ability to centrally and completely disable an employee or student ID when their permission to use the campus has been removed. Organizations that use these cards also may have the ability to track information on a user’s location, habits and interests.

ID cards are an essential tool for access control and secure organizations. It is now easier than ever to implement ID cards in a security system. Talk to a security integrator about the benefits and start making money by implementing the technology as soon as possible.

READER QUESTION: I operate a small manufacturing facility.We have a need to strengthen security in one sensitive area and are considering adding a biometric device. But a fingerprint reader will not work, as our employees often have their hands full with heavy parts. That might also make it difficult to use a retinal scanner. Do voice or other biometrics work reliably, and are they affordable?

SOLUTION: Mr. “Hands-full” probably would be best served by using a smart card or at least a proximity card that does not require anything additional. If high security is really necessary, a retinal scan device or even a voice recognition system may be useful. But these systems are in the higher price bracket and require more intimate contact, which many people object to. In a shop environment, it is possible these devices could be affected by dirt and high noise level.

Another solution could be to use a combination of prox card and video recognition system, especially if video is going to be deployed anyway. The card reading can call up an anticipated profile in the video system and do a facial recognition test, comparing the template to the live image of the presenter. The integrated access control/video system then decides whether to grant access based on how close the presenter is to the template on file. Facial recognition technology is still evolving but currently has good accuracy, is fast, is reasonably priced when added to a video system and is definitely user friendly. Once installed, accuracy can be raised by tightening the acceptable parameters of the facial recognition software. A secondary advantage is the ability to record on video all valid and invalid entry attempts.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.