Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Speed, Quality, Flexibility in ID Printers

By Bill Zalud
January 1, 2007
High volume needs call for a high volume solution such as this model from Team Nisca.


Desktop printers that stress simplicity and convenience to produce professional IDs aim at lower volume needs and remote facilities. Pictured is a printer from Fargo.

When it comes to ID card printers, Diane Tatterfield is practical when it comes to her business operation. Tatterfield, assistant director, CatCard Services at the University of Arizona, produces identification cards, maintains and installs card equipment, and manages databases associated with identity management and available services for the University of Arizona.

Her operation produces roughly 23,000 cards annually using four Team Nisca
printers.

But when it comes to features and benefits she looks for, her list is down-to-earth. “Speed, quality, easy to clean, keeping cards clean and free of dust. I need a menu available to personalize print job and network capability.”

Tatterfield, like some other security executives, spent her valuable time at the
frontend of a printer purchase. “We evaluated 14 companies with printers, had six onsite demos, had a team of six people, both technical and non-technical, evaluating nearly every aspect of the printers. After months of research, we collectively chose our printers. Research is the key along with a practical demonstration using your identification software to produce one of your cards on their printers before deciding on purchasing.”




PRINTERS EVOLVING

ID card printers, from numerous sources, continue to evolve.

For example, Team Nisca, a business unit of Kanematsu USA, is spreading the word about its Thermo-ReWrite Patch overlaminate that can be applied by the laminator. Thermo-ReWrite or TRW technology prints quality images and text; erases and re-prints different data on the same card up to 500 times. As an enterprise solution, it aims at access controlled visitor cards, temporary employee badges, event access cards and even frequent shopper cards.

Such an approach offers dye-sub desktop customization. Traditionally, the film is applied to the card stock in the final assembly phase of the card production, but with the new film overlaminate solution, standard PVC cards can be customized with a dye-sub printer. Then, the inline laminator applies the film in the same manner a clear patch overlay is applied.

Quick printing, color and personalization are additional features sought by end-users.

At Europe’s CARTES 2006 event, Datacard showed enterprises a retransfer color printing module for edge-to-edge, full-color print and card personalization capabilities at speeds of up to 1,500 cards per hour -- fully inline with a broad spectrum of other personalization technologies. Such on-demand print capability allows issuers to efficiently consolidate small jobs, provides them with a solution to issue differentiated cards and helps operations reduce inventory costs, stock outages and scrap costs. The retransfer design allows card issuers to easily print on a broad spectrum of card stocks including polycarbonate, cards with contact and contactless smart card chips and cards with irregular surfaces. Process colors, spot colors, metallic colors and UV inks provide vivid images and enable customized card designs.




Software features can include customized card printing installations, advanced search capabilities, increased user password security, as well as the ability to import and export card designs between projects and batch import and export photos and images. Pictured is new software from Datacard.

SOFTWARE FEATURES IMPORTANT

The firm also boasted its ID Works identification software at CARTES 2006.

This software’s new features include customized card printing installations, advanced search capabilities, increased user password security, as well as the ability to import and export card designs between projects and batch import and export photos and images.

Dual-sided printing also is a feature of interest to end-users.

One example comes from Zebra with a desktop plastic card printer/encoder. Printing on both sides of the card offers many options for designing more functional and more attractive personalized identification, security, gift and loyalty cards. More printed information can be added and larger photographs can be used for easier visual identification. Reduced crowding of information provides better readability. For example, the front of an identity/access control card could feature an employee’s photo and name, the organization’s logo and a color code for level of access, while the back could include a barcode, plus text of employee information such as height & weight, department, supervisor and level of clearance. Membership, loyalty and gift cards can easily be personalized with a photograph and the bearer’s name on one side, with details about store locations, maps, or even special promotions on the back.

Contact smart card encoding and magnetic stripe encoding are available. With these options, users can encode magnetic stripes and encode/read ISO 7816 contact smart chips (the most common contact smart card standard). This and other ID card printers offer built-in Ethernet connectivity as a factory-installed or field upgradeable option, allowing remote printing and remote encoding.
 Faster and easier importing has a strong attraction to many end-users.
 At Security Essen, Digital Identification Solutions showed an enhanced version of EDIsecure Card Management Software 2.0. During ongoing development of the software, the main interest was this time to increase the ease of use and to extend the performance by optimizing internal software processes.




Some card solutions call for more information to be printed than there is real estate on the front of the card. Some printers offer dual-sided printing such as this unit from Zebra.

The functionality of the ODBC interface has also been revised, making the importing of images from external databases more comfortable. An advanced import function from external databases saves import settings, too.

Ease of use is a top enterprise requirement.

A Persona system from Fargo Electronics, appeals to K-12 schools, small corporations, clubs or recreation facilities that need high-quality plastic ID cards without high-security features. Complete set up takes just a few minutes, and the reliable performance of the printer means it runs virtually maintenance-free.

Fargo has also added ID card software in multiple languages available in French, German, Spanish, Italian and Portuguese. Build-A-Badge lets card program managers design ID cards, import or capture photographs and print single-sided cards with bar codes, text, logos and more, all from one application. Card designs can be selected from the library of templates, or can be easily created from scratch. When complete, the card template is saved and the personalized information is recorded to a database. To re-issue a lost or damaged card, the information can be recalled from the database, and the card reprinted.

There is also an end-user need for higher security.

One example is the high-security Magicard Tango +L from Ultra Electronics which features a robust metal construction for quality printing and long-term reliability. With a Plug & Play Windows driver, standard Ethernet and USB, and both hardware and software printer locking facilities, the Tango +L can include a customized Holokote. It ensures cards cannot be cloned. This special feature automatically prints a high security watermark into the overcoat panel during the print cycle without incurring extra consumables costs. The HoloKote pattern can be customized to your logo and text.




SIDEBAR: Solution Signposts for Printers

When evaluating card printers, consider the details of your solution – volume of cards produced, who will be operating the system, what will be on the cards or badges, the type of software being used and level of security.

Diane Tatterfield, assistant director, CatCard Services at the University of Arizona, spent many hours involving numerous people in evaluating printers. Among her key elements:
  • Speed
  • Quality
  • Easy to clean, keeping cards clean and free of dust
  •  A menu available to personalize print job
  • Network capability


Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Card Printers: Performance, Durability and Image Quality

    See More
  • Card Printers: Quality, Cost and Reliability

    See More
  • Gain Speed, Cost Efficiencies via Encoded Broadcast-quality Video

    See More

Related Products

See More Products
  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • Physical Layer Security in Wireless Communications

  • s in europe.jpg

    Surveillance in Europe

See More Products

Events

View AllSubmit An Event
  • June 24, 2025

    Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

    ON DEMAND: For today's security teams, making informed decisions in the first moments of a crisis is critical.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing