Covering All Bases

Ensuring recurring card and reader income while helping customers

“The perfect solution in any sale is when you’ve solved a big problem that the customer may incur while helping your own business,” said David Barnard, director dealer development at RS2. “More customers understand the threat of hacking. That’s why we suggest to our dealers that they show their customers how to help repel hacking attempts with a very simple solution that adds to their bottom line.”

As any security dealer or integrator knows, there are two revenue results of making an access control sale: the proceeds from the original sale itself and the potential recurring revenue that can be wrought from the sale down the road. That recurring revenue could be in the form of selling additional readers and cards as needed or when the company expands. However, just because you sold and installed the original system does not necessarily mean you will get the revenue from these additional sales. The buyer could easily buy cards and readers from somebody else. So, how can you assure that you will get these add-on sales?

Help Your Customer Solve a Major Problem

It is becoming quite well known that current RFID devices are not suitable for secure identification. They can be subject to skimming, eavesdropping and relay attacks. An attacker can fool the system by simply relaying the communication between the legitimate reader and token over a greater distance than intended. As these facts become better known, there has been a drive by security directors to overcome such shortcomings.

In addition, Wiegand, the industry standard protocol commonly used to communicate credential data from a card reader to an electronic access controller, is no longer considered inherently secure due to its obscure and non-standard nature. No one would accept usernames and passwords being sent in the clear nor should they accept vulnerable credential data. ID harvesting has become one of the most lucrative hacking activities. In these attacks, a credential’s identifier is cloned, or captured, and is then retransmitted via a small electronic device to grant unauthorized access to an office or other facility.

“With the ability to order specific coded credentials online, the popular formats can be copied and cloned very easily,” said Jeffrey Tepper, owner of Southgate Lock & Security in Cleveland, Ohio.

A novel way that dealers and integrators can help their customers protect their card based systems is to provide a high-security handshake, or code, between the card, tag and reader to help prevent credential duplication to ensure that readers will only collect data from these specially coded credentials. In a sense, it’s the electronic security equivalent of a mechanical key management system, in which this single organization is the only one that has the key they use. Such keys are only available through the integrator chosen for the job. Their integrator never provides another organization with the same key. No other organization will have the reader/card combination. Only their readers will be able to read their cards or tags and their readers will read no other cards or tags.

Let’s highlight the key information from the paragraph above that describes how dealers and integrators can ensure that they, and they alone, reap the rewards of follow-up sales. “Such (cards and readers) are only available through the integrator chosen for the job.” Nobody else is able to sell your customer cards and readers and readers that will work with their present cards and readers, which you originally sold.

“The MAXSecure format has been “win-win” product for us,” Tepper said. “It is a win for the customer because it gives them a higher level of security at no extra cost. It is a win for us because it keeps the customer coming back for credentials. As people come and go from companies, it makes us a point of contact to the person responsible for the access control system.”

MAXSecure is an option that can be added to Farpointe Data’s proximity and smart cards to provide customers with a way to protect their card-based systems from skimming, eavesdropping and relay attacks. Skimming occurs when the attacker uses an unauthorized reader to access information on the unsuspecting victim’s RFID card or tag without consent. From that point on, the attacker can control when and where unauthorized entries may occur. An eavesdropping attacker recovers the data sent during a transaction between the legitimate reader and card. In a relay attack, the invader relays communication between the reader and a tag which lets the attacker temporarily possess a ‘clone’ of a token, thereby allowing the assailant to gain the associated benefits.

What’s scary about all this is that the equipment used to perpetrate the above attacks can be quite inexpensive and is widely available. For organizations worried about such invasions of their proximity or smart card systems, access control system manufacturers and leading integrators can deploy Fairpointe proximity/ smart cards and readers that provide increased security while, at the same time, providing themselves with ensured recurring revenues. Like Tepper says, it’s a win-win situation. Tepper is not alone.

“Our dealers love the Farpointe MaxSecure option,” said Matt Kronholm, regional sales manager for TransTech Systems in Aurora, Ore. “Other comparable extra secure credentials formats cost extra and can easily be ‘cracked’ by ordering through generic vendors. Max- Secure is the easiest way to secure both the facility and the customer’s business without adding costs.” AlarmNet Security, a security integrator located in Miami which helps secure organizations in Florida and Georgia, agrees.

“We have been serving the South Florida and Orlando market for more than 14 years and have completed services for thousands of satisfied customers, local and nationwide,” said Tony Hasham, owner of AlarmNet Security. “We value personal service and the personal relationships we develop with our customers. We strive to continuously offer the best undivided attention to our customers in order to achieve the long-term satisfaction of our installations and follow-up services.”

AlarmNet believes in letting their customers become aware of all risks they could encounter, even after installing the new solution.

“An access system itself can be hacked so we show them the various solutions they can use to stop such attacks,” Hasham said. “MAXSecure helps them stop hacks at the point of communications between the card and reader as well as within the Wiegand protocol. Nobody else has cards such as theirs and nobody else ever will since we control the supply of the specific cards they use. That protects them now and in the future. Of course, a by-product of this security measure means that, since only we can supply the cards, only we will get the recurring sales of the cards and readers that they will need. This not only produces additional sales but also keeps us in front of our customers for any additional security products they need.”

Creative integrators should always be looking for ways that help the customer while helping themselves. Not only is that good business, but it is also a way to provide good customer service. As is so often said, “A happy customer will make you happy.”

This article originally appeared in the April 2016 issue of Security Today.


  • Progressing in Capabilities

    Progressing in Capabilities

    Hazardous areas within industries like oil and gas, manufacturing, agriculture and the like, have long-sought reliable video surveillance cameras and equipment that can operate safely in these harsh and unpredictable environments. Read Now

  • A Comprehensive Nationwide Solution

    A Comprehensive Nationwide Solution

    Across the United States, manufacturing facilities, distribution centers, truck yards, parking lots and car dealerships all have a common concern. They are targets for catalytic converters. In nearly every region, cases of catalytic converter thefts have skyrocketed. Read Now

  • Planning for Your Perimeter

    Planning for Your Perimeter

    The perimeter is an organization’s first line of defense and a critical element of any security and surveillance program. Even if a building’s interior or exterior security is strong, without a solid perimeter surveillance approach any company or business is vulnerable. Read Now

  • The Key Issue

    The Key Issue

    It is February 2014. A woman is getting ready in her room on a cruise ship when she hears a knock on the door; it is a crewmember delivering breakfast. She is not presentable so she tells him to leave it by the door. Read Now

Featured Cybersecurity

New Products

  • XS4 Original+

    XS4 Original+

    The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability that enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. Compatible with the array of SALTO platform solutions including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution, and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE and NFC technology functionality. 3

  • SecureAuth


    The acceleration of digital transformation initiatives as a result of COVID-19 has created a lasting impact on how businesses empower their workforce and engage customers. 3

  • PDK IO Access Control Software

    PDK.IO Access Control Software

    ProdataKey now allows for "custom fields" within the interface of its software. Custom fields increase PDK's solutions' overall functionality by allowing administrators to include a wide range of pertinent data associated with each user. 3