Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Consolidation is Key to Successful ID System

By John Mesenbrink
March 12, 2002
By now you’ve had time to digest some of the latest industry offerings at the ISC West show. Securing facilities post-9/11, IT relationships and integrated systems continue to be some hot topics of conversation. Another topic with as much importance is securing access to areas using an ID that integrates multiple uses of technology.

With the increase in global B2B and B2C Internet commerce, it has become increasingly difficult for parties to truly know with whom they are dealing. The driving force for multi-technology IDs is to insure the authorized, legal identity of the person in both the physical and virtual worlds. Multi-tech cards integrate two or more separate technologies into a single piece of plastic, without sharing information between these technologies. Technologies may include proximity, magnetic stripe, bar code, contactless smart chip, contact smart chip, Wiegand strip or barium ferrite loads. The card evolves from being simply a carrier of technology to an ID credential with the addition of a photo ID, digital watermark, hologram or other form of secure ID data printing, which serves to enhance the security of the card.

SECURITY recently spoke to Debra Spitler, vice president of marketing for HID, Jim Johnson, smart card product manager for HID, Dovell Bennett, business development manager for ASSA ABLOY Identification Technology Group (ITG), to get the low-down on this emerging technology. Also, Tom Stiles, director of channel sales for DataCard, Minneapolis, Minn., and Neil Roberts, regional manager for Infographics, Garden Grove, Calif., add to the discussion.

What size company is most interested in multi-technology IDs, and why? Spitler/Johnson/Bennett—Medium-to-large companies have shown the most interest in multi-technology IDs. These companies typically have multiple sites, systems of different types or ages and have implemented a photo ID policy. Additionally, in the last year or so, these types of companies have begun to express interest in using a single card for multiple applications including access control, PC or network secure log-on, cashless vending and health record storage. The multi-technology ID provides them the ability to leverage their existing investment in various systems, while at the same time promoting future cost-effective upgrades to more advanced technologies. As technology costs drop, sophisticated security eventually becomes available to even the smallest organizations. A question that an organization, no matter how large or small, must ask itself is: What is the value of my employees, data and assets? Roberts—It’s not necessarily the size or even the global presence of a company, but the corporations internal IT, HR and security department’s requirements.

What features are the most important to the end user? Spitler/Johnson/Bennett—It enables the use of multiple levels of verification. For instance, a credential that offers five levels of verification might include a photo, the credential’s proximity serial number and PIN number, a digital watermark to insure the credential is not counterfeit and a smart chip that holds a biometric template. Roberts—Single card for personnel badging, proximity access into common areas, such as elevators and parking. Contactless stored personnel information, such as their unique biometrics, electronic purse for vending and cafeteria purchases and medical records. Stiles—Integrated card issuance, security, ease of use and low cost.

Are most systems easily expandable and upgradeable? Spitler/Johnson/Bennett—When considering a multi-technology ID card, the end-user must consider multiple factors including: What existing systems are in place? Which existing systems will be kept as is, which will be upgraded and which will be completely replaced? What new applications are needed to successfully manage the environment? Stiles—It is important to integrate the card issuance operation seamlessly with the other systems that read the card—access control or network security. This provides lower cost and higher confidence. Connection to a common data source is the key—one database, one enrollment process and one card issuance process.

How have these advancements benefited the end user? Spitler/Johnson/Bennett—Companies are discovering the value of utilizing one card for multiple applications. With smart card technology, users can even incorporate their driver’s license, health and auto insurance onto their card. Biometrics will remove the problems of remembering PINs and passwords. Now one’s fingerprint can gain secure access to a number of points, and there is nothing to remember. PKI in combination with smart cards will help make the Internet, Intranet and Extranet a safer place to conduct business. In organizations with advanced or integrated systems, IDs allows for individual access levels to various systems to be connected throughout the company. For example, if an organization were to change an employees’ building access level, that change could automatically affect the employee’s access to the IT network. Multi-technology IDs also allow the end-user to leverage their existing infrastructure, while adding new systems that capitalize on the latest technology. Rather than replacing all systems, cards can be replaced that utilize existing and new infrastructure simultaneously. Stiles—The ability to store a biometric template on a smart card for use as a “second factor” of authentication has become a reality. Organizations need this additional security to protect their physical and intellectual assets. The implementation of global standards has helped the smart card advancement.

Where do you see multi-tech ID technology heading in the next 5 - 10 years? Spitler/Johnson/Bennett—The need for higher levels of security and stronger methods of authentication will drive the use multi-technology IDs in the future. Multi-tech credentials enable the use of legacy systems, while enabling users to benefit from new identification technology. Roberts—Becoming the standard credential in our marketplace augmenting the current proximity technologies. Stiles—Multi-application smart cards that conform to standards. Contactless RF technology. Biometric template stored on the card.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

John Mesenbrink is managing editor for SECURITY Magazine. He can be reached at 630-694-4026

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Why Risk Intelligence is the Key to Successful Security

    See More
  • Toy blocks separated by color

    Consolidation is coming to corporate security technology

    See More
  • cyber-data-freepik1170x658x82.jpg

    Consolidation and automation key as cybersecurity becomes a competitive edge in 2022

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

See More Products

Events

View AllSubmit An Event
  • March 6, 2025

    Why Mobile Device Response is Key to Managing Data Risk

    ON DEMAND: Most organizations and their associating operations have the response and investigation of computers, cloud resources, and other endpoint technologies under lock and key. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing