Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

CONVERGANCE STRATEGIES (SPECIAL REPORT): An 8 Step ID Card Plan

April 3, 2006
The promise of improved card-based identification security through converged physical and logical access systems is becoming a reality. New access card technologies have improved the functionality and reliability of these systems dramatically.

Technologies like RFID and smart card printers, which can both print information and encode security data on a card, mean security-conscious organizations can centralize their security systems to reduce errors and streamline the credential management process. Some card printer manufacturers are offering built-in Ethernet capabilities, making integration of the card printer into the existing security network faster and easier.

Here are eight steps to putting a dual-use smart card system to work, according to Mike Eneberg of Zebra Card Printer Solutions, Camarillo, Calif.

STEP ONE

Assess Security
Policies and Levels

Organizational growth may necessitate upgrades to simple PIN-based computer security, or to manual credential management systems. In other cases, new government mandates like Sarbanes-Oxley are forcing change. Improved network security is often the biggest benefit of a converged access solution, because upgrading to a combination of card and a PIN code for network access makes it much more difficult for unauthorized access. However, an integrated credential management system improves physical security by reducing the possibility of errors in issuing credentials.

STEP TWO

Enlist a Champion to Drive the Transition

The role of Chief Security Officer is an emerging position in many security-sensitive organizations and is natural driver for this process. Alternatively, the IT department is an excellent choice because of its knowledge of technology, and its ownership of computer and network access security. In any case, adopting a converged system will include new hardware and support of networked card printers, making IT involvement and support essential.

Adding ID cards to your convergence plan should include training of Help Desk personnel as card printers move into various areas of the enterprise.

STEP THREE

Develop an Implementation Plan

An analysis of the required financial resources, and the organization’s internal planning and implementation competency should be conducted. System integrators can offer experience in assessing and implementing the right system – from smart card readers in computer workstations and network points of entry, to RFID readers at all doors.

STEP FOUR

Choose Your Access Technology

New developments in card technology and access control systems make this a critical decision. Smartcards (see sidebar) offer the best flexibility and security, but organizations can also choose magnetic stripe or barcode-based systems. Access control should be based on the level of security that best suits the organization.

STEP FIVE

Choose the Card Printer

The printer is integral to the success of a dual-card system and deserves an extensive review. In addition to integrated encoding and printing capabilities, Ethernet networking capabilities are increasingly important to facilitate access to multiple networked security databases and to allow IT departments to use standard network management applications when maintaining the printer. Printers with dual-sided printing capabilities improve visual identification by reducing the amount of non-essential information on the front of the card, leaving more room for a larger photo. When selecting a printer, it is best to evaluate the organization’s needs for the next two to three years and ensure the printer is future-proofed to meet those needs.

STEP SIX

Train the Help Desk
Staff on Password and Access Card Issues

According to industry estimates, between 30 and 60 percent of help desk calls are for password resets. A recent survey of almost 1,700 U.S. enterprise technology end-users, commissioned by RSA Security, showed that 28 percent of respondents managed more than 13 passwords at work, while 30 percent juggled between six and 12 passwords. With the changes in card access processes, help desk calls will go up and training is the best way to streamline the transition the new system.

STEP SEVEN

Implement a Pilot Program

Select a group of people within the organization that will thoroughly test the new access system and will give good feedback. Tech-savvy team members from the engineering or IT departments should be included, but non-technical staff also should be represented to ensure the system is usable by the entire organization.

STEP EIGHT

Communicate

The entire organization should know the importance of the system and how it ties into corporate security policy. Training and security rule enforcement is essential, but communicating the importance of the system can also help engage employees to properly use the system. People must believe that it’s the right thing to do or they will find a way around it.

Following these eight steps will help an organization get the converged access system that is best suited to its needs. Once the system is up and running, the end user must pay attention to ongoing credential management considerations, such as reviewing policies for retiring badges or replacing lost badges to ensure that any new smartcard unique numbers are linked to proper employee data.

FIPS 201 connection

The Security Industry Association has a report, The Roles of Authentication, Authorization and Cryptography in Expanding Security Industry Technology, which has impact on convergence and ID cards. This report, part of SIA’s Quarterly Technical Update series, explains key technological requirements for FIPS 201 compliance, as well as the major drivers for physical and IT convergence within the federal government: interoperability, enterprise-wide access control, increasing reliance on IP networks and adoption of digital certificates.

The 32-page report is available as a free download from SIA (www.siaonline.org) and CoreStreet (www.corestreet.com). Other Quarterly Technical Updates from SIA are also available on the SIA Web site for a relatively modest fee. SIA also offers a daily e-mail-delivered news services – also available at www.siaonline.org.

Getting Smart on Smart Cards

Contact standard ISO 7816 defines physical characteristics of a card, including dimension and contact position of the card and the electrical signals and transmission protocols.

Contactless standard ISO 14443 outlines contactless interface communications protocol, message sets, data dictionary and security protocols between the card and card interface devices.

De facto standards: Many de facto or vendor-specific standards are widely implemented. An example is Philips’ MIFARE, a contactless smart card technology that is used by many government agencies and companies. Before investing in a card printer, check to make sure that it will support the standards you’re working with.

Dual-technology cards: Two types of dual-technology cards are available. Hybrid smart cards consist of both a contact and contactless microchip for storing cardholder data, providing faster transaction speed and improved card reader reliability. Combi-cards have a single chip with separate contact and contactless interfaces. Generally, hybrid cards have a higher cost, but offer a higher security level due to the separate processors.

Links

  • Download the Report at www.siaonline.org
  • Download the Report at www.siaonline.org
  • Report is also available at www.corestreet.com
  • Report is also available at www.corestreet.com

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • CONVERGANCE STRATEGIES (SPECIAL REPORT): Putting the VoIP Fire Out

    See More
  • CONVERGANCE STRATEGIES (SPECIAL REPORT): IP Cameras Will Change Your Life

    See More
  • CONVERGANCE CONNECTIONS (SPECIAL REPORT): IP Cameras Will Change Your Life

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • 9781498767118.jpg

    Intelligent Video Surveillance Systems: An Algorithmic Approach

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing