Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

As Printers Diverge

November 1, 2005
New users with low card volume and less of a need for higher security features seek out entry-level ID card printers.
There are signs of a diverging ID card printer marketplace. While this divergence is putting the pinch on some, it is providing new opportunities for others as less expensive entry-level products attract entry-level buyers.

Growth in such price-driven ID card systems for small companies, K-12 schools, health clubs and loyalty applications has been fueled by the Internet and its convenience in researching and purchasing products, contends Sharon Steinhoff Smith of Fargo Electronics, Eden Prairie, Minn. By unofficial count, she says, there are more than 20 card printer manufacturers worldwide, the majority of which are focused on entry-level products.

As card functionality, ease of use and basic security increase at the entry level through new technologies such as inkjet, organizations without current card programs will get on board.

Less competition is in place at the high-end of the market, namely government and large corporate applications. High security multi-function applications demand more complex solutions. For example, the growing use of smart cards has increased the demand for reverse image card printers. In this design, images print in reverse onto clear film, which is then fused into the surface of a blank card through heat and pressure.

Securing the process

Card printer/encoders are just part of higher security ID card printers, according to Steinhoff Smith. System integrators and end users are both looking for better ways to secure the card issuance process. Securing the card issuance process means identifying and eliminating any vulnerabilities in the production of ID cards.

Here is a sampling of questions that can help the integrator-end user team assess potential vulnerabilities:

Who has access to the printing equipment, at what times and at what authority levels? An area of vulnerability is the threat of someone creating false credentials within a legitimate card identity program. Software is now available with a printer access feature that offers security managers the ability to set passwords that are required to make the printer/encoder operational. This function reduces both internal and external threats of fraud or misuse by automatically disabling a stolen or illegitimately accessed printer

Some larger or more sophisticated end users now seek out products that bundle higher-level security of the card-making process. Photo of SecureVault inventory management system from Fargo.
Are the card production materials stored in a secure environment, protected from waste and theft? Blank card materials, in the wrong hands, can spell trouble. A materials management system helps reduce the vulnerability associated with stolen card materials. User access is tracked and the movement of card production materials is recorded. When any ID material is removed, replaced or replenished by a system operator, a digital record is kept of that activity, providing a secure audit trail.

Does the card itself contain security elements such as customized holograms, morphing images, fine line design, covert printing and other visual security features that will make the cards difficult to fraudulently copy? Customized elements like these not only add security to the client’s card, but also add a proprietary element to an integrator’s offering.

The key to developing a secure card issuance program is to add layers of security that cumulatively become a deterrent for potential counterfeiters. The result is a more secure and happy client and a more trusted and profitable integrator

There’s a diversity of reasons for a photo identification card. Such needs influence the type of printer. A Texas-based non-profit association, for example, uses its ID card printer to create credentials to add credibility to its legal alien workforce base.

Sidebar: Member Cards Add Credibility

While ID card printer use diverges along card production volume and level of security, it also can branch out as security needs blend into business and financial needs.

A case in point: The Federation of Employers and Workers of America (FEWA), a non-profit, Texas-based association created to help companies obtain a legal alien workforce in service industries under the Federal H2B worker program, recognized the need for a durable membership card that would identify its worker members. The non-profit organization decided to print its cards in-house so it could create them on demand.

FEWA provides legal information to its members relating to the H2B program and immigration matters. It also helps members prepare pre-printed H2B program forms and offers a wide variety of other support services to its member workers.

“We have about seven thousand worker members and we wanted a card that would identify them with their name and what company they are working for here in the U.S.,” says Donna Payne, business manager for FEWA. “We may eventually use smart cards and encode all of our members’ pertinent information right on the card.”

FEWA chose a Zebra (Zebra Card Printer Solutions, Cararillo, Calif.) P420i printer. It’s a stand-alone, dual-sided color printer and the printer ribbon synchronizes automatically, eliminating the need for operator intervention. “Three of our staff members who are trained on the printer have printed about five thousand cards in the past year,” Payne reports.

The FEWA membership cards include the member’s name, the company they work for and the FEWA Web site address on the back. It sports the FEWA letterhead design. Under the H2B program, workers can only be employed in the United States for 10 months at a time. They must leave the country and then reapply for the program. FEWA members who rejoin are issued a new membership card each time. Payne concludes, “It’s another form of identification for him and it makes it more desirable to be a FEWA member.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing