Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Are Smart Cards Right for You?

March 1, 2005
Building Access – By using smart cards as the employee badge, end users can add new capabilities like computer security as well as corporate cafeteria and vending payments. Photo courtesy: Axalto
Smart cards are rapidly becoming the most effective way to secure buildings while incorporating key functions such as cashless purchasing, securing assets and storing biometric identifiers for highly secure facilities. Smart card benefits are widely understood and continually validated but until recently, most organizations were hesitant to consider using these systems. Various barriers including high costs, complexity of transitions, limited knowledge of potential uses and waiting for a single standard to be adopted were holding up widespread smart card adoption.

Recently, these barriers were eliminated with the introduction of new reader technology, and security executives can now consider adopting this valuable technology. The next generation of access control readers, unveiled in late 2004, simultaneously read both smart and proximity cards from different vendors to allow for simpler transitions. They also leave room for future advances in card technology to protect investments over time.

While exciting for the security market, these new readers may not be for every business. Smart cards are designed to address certain market needs; however other access control technologies such as proximity and magnetic stripe have their place in the market. The question then presents itself: How do decision-makers within an organization determine whether or not adopting smart card technology is right for their business?

Consider these 10 points to help determine whether or not your company should adopt smart card technology.

USB Token – Some smart cards provide a convenient way to secure PC and network access, replacing the highly vulnerable user ID/password approach.

1. Physical and logical access control for employees:

When it comes to deploying smart cards, the most fundamental use is the ability to bring physical access and IT user identification onto a single authentication point. Smart cards have the ability to hold more memory, which means multiple applications can be addressed with a single card – something other access control technologies such as proximity are unable to do. By using one card for both physical and logical access, both costs and potential security concerns associated with credentialing employees are reduced.

2. Provisioning of access to databases and locations:

When an organization requires advanced authentication from certain users and not others, smart cards allow for simple, secure provisioning of cardholders to ensure that only the employees authorized to reach certain IT and physical locations in a company attain those areas. Smart cards alleviate the need for complicated tracking of multiple users and instead impart a simple method of user provisioning.

Duplication and corruption-resistance:

Smart cards, unlike other secure credentialing technologies, are difficult to duplicate. In the past, the only option to ensure that cards were not duplicated was to adopt a proprietary technology, which, unfortunately, meant higher costs. In today’s environment, smart cards are highly secure and very difficult to corrupt or duplicate.

Simple upgrade:

Security managers have long avoided moving to new card and reader systems because, in order to do so, old cards needed to be re-issued and old readers needed to be ripped out and replaced overnight. With new reader technology, current proximity cards can be used with new reader technology and cardholders can be re-badged over time.

5. Multiple standards:

Many organizations would like to upgrade to smart cards but are confused by the many standards that exist. Security managers are waiting to see which standard will be adopted and are not willing to risk guessing on selecting one over the other. Today, with new reader technology, multiple standards are met with a single reader to avoid the guessing game and ensure that investments chosen today are protected. There is no longer a need to wait for a standard to be adopted. Smart cards can be implemented now.

6. Cashless purchases and vending:

Companies can now have a single unified token for purchases made in on-site dining, vending or transportation services at the company or university. Organizations can avoid spending huge dollars to link disparate systems while employees avoid carrying cash.

7. Using biometrics:

Highly secure facilities such as government buildings and data centers need to have more than a single token of authentication. They often choose to use biometrics to ensure only the right people have access to protected areas of a facility. Unfortunately, biometric templates stored in a centralized database can take some time for the authentication process. As such, the best approach is using a smart card with the template stored directly on it; this offers the fastest retrieval and processing of cardholders.

8. Simple tracking of contract employees.

In organizations where there are a number of contract employees, issuing credentials to these employees and provisioning their access to physical locations as well as IT assets is essential to maintaining security. Smart cards, with their ability to hold information on both physical and logical security, make this an easier process for the security and IT departments to manage

9. Time and attendance:

Access control information stored on a smart card can be routed into human resources databases, allowing employers to track the attendance habits of their employees in a more structured manner.

10. Controlled spending:

Organ-izations can exercise better control over the allocation of budgeted dollars by allotting a set amount of money to certain individuals or departments, much like a pre-paid calling card. For example, the human resources department can be allotted a certain amount of dollars for an employee reward program. The currency allotted for this program can be allotted on a smart card.

The incorporation of smart cards won’t be immediate; but over the next year the industry will experience the beginnings of a true paradigm shift. The advent of new multi-technology readers opens up many new options in terms of access control. In corporate climates where security is of the utmost importance, many organizations are eager to take advantage of the technology. Businesses this year will undoubtedly reap a multitude of benefits through the implementation of smart card technology, and the adoption of new open solutions like multi-technology readers.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

World Cup trophy beside goal

World Cup Safety and Security Is About More than Just Crime

Woman in suit

Can the Industry Do More for Women in Security?

Art museum

Object-Specific Protection: The Non-Negotiable Foundation of Art and Asset Security

NYPD car

Explosives Thrown in Attempted Terrorist Attack Near NYC Mayor’s Home

American flag

Security Leaders Discuss Trump’s Cyber Strategy for America

SEC 2026 Benchmark Banner
SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • Maybe Those Hot, New Smart Cards are Not Too Secure

    See More
  • It’s Cool! But Is It Right For You?

    See More

Related Products

See More Products
  • CPTED.jpg

    CPTED and Traditional Security Countermeasures: 150 Things You Should Know

  • 150 things.jpg

    Physical Security: 150 Things You Should Know 2nd Edition

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing