Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

All-in-One

By Shawn McNichols
April 12, 2001
Integration—these days, it’s everywhere. Many products are now multi-purpose. Gone are the days of refrigerators being nothing more than a place to store food. Now, a refrigerator can connect to the Internet, your cell phone can give you the lat-est stock prices and your com-pany ID is also your office ac-cess card. The more technology advances, the more prevalent integration becomes.

Multi-tasking

Technological advancements have made it possible for people to get more done with one prod-uct. This also rings true for the security industry. Identification systems have become a major part of access control systems, asset protection systems, and time and attendance, to name a few.

Now, employee’s ID badges are used for more than just identifi-cation. They can be used to gain access into the office, access computer systems, and buy lunch at the cafeteria.

The Appeal

With the advancements in Smart Card technology, ID integration can be found in schools, gov-ernment agencies, and offices—large and small.

Why has it become such a popular security measure? Well, according to Gary Funck, vice president of marketing, IDenti-card, Lancaster, Pennsylvania, one reason is “People don’t have to worry about carrying multiple cards.”

The other reasons are as varied as the markets they serve. Col-leges can use the technology to combine a student’s cafeteria al-lowance and access to their dorm on their ID card. Offices can combine physical identifica-tion with access control, asset protection, and time and atten-dance. Government agencies can also combine physical iden-tification with access control, as-set protection, and asset track-ing.

The combining of technologies helps eliminate wasted time, lowers costs, and gives an over-all view of what is going on at the facility. For example, by combining an employee’s ac-cess control with their identifica-tion, a company can have a re-cord of who was in the building and when. Asset track-ing/protection goes one step fur-ther. It will give the company a record of who was in the build-ing, when they were there, and what equipment they were using or moving around.

Concerns

As with all new technology there are some issues of concern with ID integration. The main concern seems to be integrating photo identification into a total security system. Many companies worry about incorporating photo identi-fication into access control or asset tracking. Acquiring the proper software and equipment, and then getting it to work to-gether are all issues that need to be addressed.

Another concern is that once you incorporate the technology that you have the proper cards. “Making sure your ID cards have a printable surface—flat pol-ished PVC surface, is also im-portant,” says Mark Anderson, vice president of sales, Fargo Electronics, Eden Prairie, Minn.

Finally, another concern is whether or not printers will be able to work with the application software. Will the printer be able to perform the required tasks? “Will your printer be able to print barcodes, will it be able to en-code for proximity control are questions that should be asked,” says Anderson.

Trends

We are already seeing IDs being used to allow access to build-ings and computer data; the storage of personal information that can let people buy food in the office cafeteria or buy books at the school bookstore. What is next?

“What lies ahead is as products develop they become more market focused,” says Funck. The uses will become more specific and targeted. The IDs will have multiple uses based on the corporation or organization that is using them. They will de-cide what technology they need.

“We will also see more contact-less access cards, dual technol-ogy cards, and more with bio-metrics,” says Anderson.

The future of ID integration is boundless.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Shawn is a staff editor with SECURITY magazine. She can be reached at 630-694-4382.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • All-in-one Audio-video Unit

    See More
  • All-In-One Video Solution

    See More
  • All-In-One Video Solution

    See More

Related Products

See More Products
  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

  • GSEC.jpg

    GSEC GIAC Security Essentials Certification All-In-One Exam Guide, 2E

  • Hospitality-Security.gif

    Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing