Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

As Printers Diverge

November 1, 2005
New users with low card volume and less of a need for higher security features seek out entry-level ID card printers.
There are signs of a diverging ID card printer marketplace. While this divergence is putting the pinch on some, it is providing new opportunities for others as less expensive entry-level products attract entry-level buyers.

Growth in such price-driven ID card systems for small companies, K-12 schools, health clubs and loyalty applications has been fueled by the Internet and its convenience in researching and purchasing products, contends Sharon Steinhoff Smith of Fargo Electronics, Eden Prairie, Minn. By unofficial count, she says, there are more than 20 card printer manufacturers worldwide, the majority of which are focused on entry-level products.

As card functionality, ease of use and basic security increase at the entry level through new technologies such as inkjet, organizations without current card programs will get on board.

Less competition is in place at the high-end of the market, namely government and large corporate applications. High security multi-function applications demand more complex solutions. For example, the growing use of smart cards has increased the demand for reverse image card printers. In this design, images print in reverse onto clear film, which is then fused into the surface of a blank card through heat and pressure.

Securing the process

Card printer/encoders are just part of higher security ID card printers, according to Steinhoff Smith. System integrators and end users are both looking for better ways to secure the card issuance process. Securing the card issuance process means identifying and eliminating any vulnerabilities in the production of ID cards.

Here is a sampling of questions that can help the integrator-end user team assess potential vulnerabilities:

Who has access to the printing equipment, at what times and at what authority levels? An area of vulnerability is the threat of someone creating false credentials within a legitimate card identity program. Software is now available with a printer access feature that offers security managers the ability to set passwords that are required to make the printer/encoder operational. This function reduces both internal and external threats of fraud or misuse by automatically disabling a stolen or illegitimately accessed printer

Some larger or more sophisticated end users now seek out products that bundle higher-level security of the card-making process. Photo of SecureVault inventory management system from Fargo.
Are the card production materials stored in a secure environment, protected from waste and theft? Blank card materials, in the wrong hands, can spell trouble. A materials management system helps reduce the vulnerability associated with stolen card materials. User access is tracked and the movement of card production materials is recorded. When any ID material is removed, replaced or replenished by a system operator, a digital record is kept of that activity, providing a secure audit trail.

Does the card itself contain security elements such as customized holograms, morphing images, fine line design, covert printing and other visual security features that will make the cards difficult to fraudulently copy? Customized elements like these not only add security to the client’s card, but also add a proprietary element to an integrator’s offering.

The key to developing a secure card issuance program is to add layers of security that cumulatively become a deterrent for potential counterfeiters. The result is a more secure and happy client and a more trusted and profitable integrator

There’s a diversity of reasons for a photo identification card. Such needs influence the type of printer. A Texas-based non-profit association, for example, uses its ID card printer to create credentials to add credibility to its legal alien workforce base.

Sidebar: Member Cards Add Credibility

While ID card printer use diverges along card production volume and level of security, it also can branch out as security needs blend into business and financial needs.

A case in point: The Federation of Employers and Workers of America (FEWA), a non-profit, Texas-based association created to help companies obtain a legal alien workforce in service industries under the Federal H2B worker program, recognized the need for a durable membership card that would identify its worker members. The non-profit organization decided to print its cards in-house so it could create them on demand.

FEWA provides legal information to its members relating to the H2B program and immigration matters. It also helps members prepare pre-printed H2B program forms and offers a wide variety of other support services to its member workers.

“We have about seven thousand worker members and we wanted a card that would identify them with their name and what company they are working for here in the U.S.,” says Donna Payne, business manager for FEWA. “We may eventually use smart cards and encode all of our members’ pertinent information right on the card.”

FEWA chose a Zebra (Zebra Card Printer Solutions, Cararillo, Calif.) P420i printer. It’s a stand-alone, dual-sided color printer and the printer ribbon synchronizes automatically, eliminating the need for operator intervention. “Three of our staff members who are trained on the printer have printed about five thousand cards in the past year,” Payne reports.

The FEWA membership cards include the member’s name, the company they work for and the FEWA Web site address on the back. It sports the FEWA letterhead design. Under the H2B program, workers can only be employed in the United States for 10 months at a time. They must leave the country and then reapply for the program. FEWA members who rejoin are issued a new membership card each time. Payne concludes, “It’s another form of identification for him and it makes it more desirable to be a FEWA member.”

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Security Leadership and Management
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Red block among white blocks

Plenty of Associations, But Not Enough Association

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Phone showing hearts and flirty emojis

Valentine’s Day 2026: Inside the Industrial-Scale Romance Scam Economy

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Card Printers Catch Up to ID Tech Advances

    See More
  • Speed, Quality, Flexibility in ID Printers

    See More
  • Card Printers: Performance, Durability and Image Quality

    See More

Related Products

See More Products
  • Security of Information and Communication Networks

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing