Cut & Paste to Digitally Streamlined Credentials

Cut & Paste to Digitally Streamlined Credentials

Using a robust, web-based ID software to create credentials with high-security features for a community’s public employees

Incorporated in 1979, the Town of Paradise, California is situated in the foothills of the Sierra Nevada Mountains, about 90 miles from the city of Sacramento. Like other cities and towns across the country, Paradise has its own dedicated Police Department.

Paradise relies on their credential program to provide Town department employees with ID cards that o­ffered a unified form of photo identification designed to authenticate badges and prevent fraudulent access. They also depend on their cards to verify their employment, status, and training ID number during on-site and o­ - site training. At the head of the program is Valerie Lynch, Paradise Police Department’s Administrative Assistant. Since 2001, Lynch has managed the Town’s credential program – from designing badges to printing them and finally distributing them to officials.

Find an Agile, Easy-to-Use ID Card Software Program Solution

When Lynch first began working at the department in 2001, she would run paper cards through a typewriter, take the employee’s photo with a film camera, pick up the photos at a local drug store, cut it out and glue the headshots onto the paper cards and manually laminate cards. “Using a typewriter, glue and laminate to make each of our ID cards was extremely time-consuming, sometimes messy and not at all convenient,” Lynch said.

When her department decided to digitize their ID card program as well as their card-making process with a plastic ID card printer in 2006, Lynch was delighted. She began researching online for reputable photo ID retailers who could make the transition smooth and streamlined. That’s when she found ID Wholesaler and ordered the department a Fargo C30e direct-to-card printer and entry-level software. It worked great for many years, but around 2015, it began to show its age.

Once again, Lynch was tasked with finding a new card printer. She decided they also needed an upgrade to their ID software that could accommodate multiple users at different locations across the police department’s network. Although the software she’d originally purchased with the C30e fit their business needs at the time, her card program now demanded more advanced features and capabilities. The next requirement was the software’s ability to integrate fingerprint and signature images into the design of the ID card. The final requirement was a software that was simple for users to learn and easy for them to create high-quality, professional-grade ID cards.

Integrate a Powerful & Secure Cloud-based ID Software

Lynch called her long-time ID Wholesaler Account Manager, Mathew Foss. He explained the features of the Magicard Rio Pro Printer and told her about a web-based software called CloudBadging.

He added that CloudBadging combines all the features and benefits of standard desktop ID card software into a cloud-based SaaS application (“Software as a Service”). It requires no installation and can be used virtually anywhere using a PC or Mac with internet access. Best of all, it came with a free subscription which allowed Lynch to “test drive” the software before purchasing it.

The free subscription allowed her to try the software and gain a better understanding of its features and capabilities. Most importantly, it was Lynch’s full responsibility to find a new software, so it was critical that it could manage the needs of the Paradise Police Department. Her reputation was riding on it.

Rely on the Expertise of a Leader

Asked whether she had any recommendations for someone looking to produce professional-quality ID cards, Lynch exclaimed, "Call ID Wholesaler…we had great success with them!"

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.