This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » ‘Cheap Date’ ID Card Systems a Solid Business Investment

‘Cheap Date’ ID Card Systems a Solid Business Investment

September 11, 2008
Bill Zalud
Reprints
One Comment
The design for some photo ID cards can be simple without the need for additional security features. This tends to hold costs down.


Some applications can include additional security features such as barcode, magnetic stripe, proximity or a combination of some of them. In this case, the price of a system increases with the need for additional modules connected to a basic card printer.

Compared with intrusion detection, security management systems and security video, ID card and badge systems are a reasonably “cheap date” that can payoff quickly and effectively.

A survey of sources by Security Magazine discovered that with turnkey systems, card printer price tags continue to drop, sometimes – depending on features and optional models – starting at under $1,000. You can get 500 blank cards for about half a C note, while blank proximity cards can cost from under $2 to $4. Blank cards and badges can come preprinted with a company logo or other information. Accessories such as lanyards and badge holders typically run 50-60 cents for plain lanyards and $25 per 100 routine holders. The price of a digital camera specifically for capturing photos for the ID Cards can range widely from $100 to $2,000.

A system bundle – software, printer, digital camera, cards, supplies and warranty – rings the corporate cash register at $2,600 to $6,000. The chief security officer can even roll his shopping card up to ID card systems at some Sam’s Club and Costcos.

It's obvious that operator needs and after-purchase concerns. Often nonsecurity personnel handle ID card systems.

   
But security buyers rarely base ID system purchases on cost alone.

   
According to recent Security Magazine research, the top five purchasing triggers are ease-of-use, performance of the printer, durability of the card, image quality and, by the way, security features.



The security operation can also produce customer loyalty and identification cards for another department. In this case, the cost of the system can be spread across the various departments.

A FLAT BUSINESS

When printing on access cards, wavy and warped are enemies. Flatness is a virtue for access or identification cards when using dye sublimation printing. True flatness can be achieved in a number of ways. First, in the manufacture of the cards, and secondly, in their storage by the security department. Proper storage can prevent warping. The thickness of the card also influences flatness; and it also impacts price.

   
The rule of thumb: The best card material must be brand new, clean, flat and made for dye sublimation printing. So the experts advise that the security department check each card shipment for flatness. It can save expenses and redos later. If true flatness cannot is not there, it can be manufactured in through reverse transfer printing. With this method, the card information is printed on clear plastic film, which then is adhered to the card as a part of the ID card printer process. The name for the process derives from the fact that the ink is applied to the back of the film in reverse so it reads correctly when adhered and the printing is protected on the underside.

   
These printers can be up to three to four times as expensive as dye sublimation printers, but they also are faster. Another type of printing is thermal transfer, used for cards that only require a single color.



UPGRADE FOR NEW ENCODING

Upgrading of printers can be justified due to new encoding technology in which data can be put on a magnetic stripe, proximity or smartcard chip at the same time as the card is being printed.

   
Scanners also can be part of the ID card system. For contractors and visitors or when security must enroll personnel at remote locations, scanners can take information from business cards and driver’s licenses and enter them into a database and onto an identification card, sometimes from self-service kiosks into which they are built.

   
Another card/badge cost – maintenance – can be easily contained. Proper and timely maintenance is crucial to printers. Cleaning kits are available through the printer makers and third-party resellers. And just like ink cartridges for laser printers, it makes a difference to purchase high quality ribbons for ID card/badge printers. Some printer companies have machine readable labels on the ribbons; if the printer doesn’t read it, it won’t use that ribbon.

   
How PVC cards are originally manufactured is important to cost and the need to hold down maintenance. When they die-cut, sometimes security personnel will find a lot of particles, a lot of debris; and that may damage the printing head.

   
Applications for ID cards can create new printer and consumables needs. For example, when it comes to proximity cards, a lot of cardholders are walking around with blank prox cards. Some end-users suggest printing ID info on thin 10-mil cards and adhering them to proximity cards. When the employee leaves the access system, the ID can be peeled off the clamshell prox and the clamshell reused. These types of cards also can be used for one-time events.



SIDEBAR: Cards Getting Smarter About Thickness

Smartcard chips and antennas in proximity cards are not contributing as much as they have in the past to keeping cards from being flat. More enterprises are going to contactless smartcards. The ability to print on the card — to personalize it — is much better. Smartcards are just as flat.

   
There’s no difference printing on smartcards because most manufacturers have default settings in direct-to-card printers where the print head will not print color over a chip, so it doesn’t matter.

   
Reverse transfer printing is trickier. If it’s in the standard one of two standard locations, the chief security officer or assigned staffer can just click a box, and it will automatically avoid that area and not try to put an overlay on the chip.                   

Printing on cards with different types of technologies requires ways of compensating. All card types are not created equal. In general, some printer makers recommend slowing the printer down, because the end-user will get much better saturation of color.



SIDEBAR: A Diversity of Printer Sources

Most of the elements of an ID card/badge system are unique – card stock, card printers and specialized software. Often chief security officers can obtain these elements bundled into a turnkey system through the printer manufacturers. There also are wholesalers and third-party resellers.

 

Among the printer makers:

  • Brady People ID at bradypeopleid.com
  • Datacard Group at datacard.com
  • Digital Identification Solutions at digital-identification.com
  • Fargo Electronics at fargo.com
  • Hi Touch Imaging Technologies at hitouchimaging.com
  • Team Nisca at teamnisca.com
  • Ultra Electronics Card Systems at magicard.com
  • Zebra Card Printer Solutions at zebracard.com

Subscribe to Security Magazine

Recent Articles by Bill Zalud

In Tough Environments, Security Gets More Resilient

Video Surveillance Analytics is a Deal for Retailers

Day/Night Surveillance Cameras Pull Double Duty

Blue Collar Security and Access Systems for Industrial Manufacturing

Retrofit Fits the Bill for Outdated Security Technology

Zalud-2016-200px

Bill is the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

You must login or register in order to post a comment.

Report Abusive Comment

Subscribe For Free!
  • Print & Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

Major Retailer Macy's Is Hacked

server room, cybersecurity, penetration testing,

Explained: Firewalls, Vulnerability Scans and Penetration Tests

cyber network

How to Achieve Cybersecurity with Patience, Love and Bribery

ransomware-enews

British American Tobacco Suffers Data Breach and Ransomware Attack

cybersecurity-blog

European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

SEC2019_Everbridge_1119_360x184customcontent

Events

December 17, 2019

Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
January 23, 2020

The Value of a Unified Approach to Critical Event Management

From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
View All Submit An Event

Poll

Emergency Communications

What does your enterprise use to communicate emergencies to company employees?
View Results Poll Archive

Products

Effective Security Management, 6th Edition

Effective Security Management, 6th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
SEC500_250x180 clear

Security Magazine

SEC-December-2019-Cover_144px

2019 December

This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

View More Create Account
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners

Copyright ©2019. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing