Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Secure Issuance Advancements Simplify How Credentials are Produced and Distributed While Making Them More Secure

By Alan Fontanella
February 20, 2013
Organizations today have a rapidly expanding universe of choices for issuing secure credentials across a wide variety of applications.   Advancements in issuance solutions including printers, card materials and software are making it easier to meet the highest security requirements by incorporating critical visual and encoding technologies for multi-layered validation, and by using multi-layered management procedures that further improve security while enhancing issuance system efficiency.  Additionally, organizations can choose from a broad range of printer/encoder cost and performance options, from entry-level monochrome solutions to the most robust, high-throughput printers/encoders.

Choice is important given the wide range of credential needs.  The most common form of ID in the U.S. is the driver’s license, and the U.S. Green Card is also widely used to identify foreign-born residents living in the U.S. as permanent residents.  The Department of Defense (DoD) uses the Common Access Card (CAC), and Federal agency employees and their contractors use the Personal Identity Verification (PIV) card.  Beyond these cards and licenses, there are ID cards and badges used by Corporate America, academic institutions, healthcare facilities, and many other organizations.  Secure issuance solutions must be tailored to each application and environment while optimizing card, cardholder and system issuance security.    

Enhancing Security Through Multi-Layered Credential Validation

Most of today’s card issuance and licensing systems rely on two-dimensional identity validation.  The person presenting his or her credentials is compared with identifying data that is displayed on the ID card.  This identifying data was originally a simple photo. Since then, credentials have evolved to include sophisticated elements that enable more trustworthy visual authentication and also serve as deterrents to tampering and forgery.  Among these visual elements are higher-resolution images, holographic card over-laminates, and permanent and unalterable, laser-engraved personalization attributes.  These elements make forgery and alteration virtually impossible. 

Digital components, including smart card chips or magnetic stripes, give ID card and license issuance systems a third security dimension.  The use of smart cards with expanded data storage enables robust multi-factor authentication (i.e., something you have, such as a card, plus something you know, such as a password, plus something you are, such as biometric data), which increases the probability that the person presenting a card to a reader was actually issued that card.  Smart cards also leverage cryptography and keys to ensure that the user possesses the correct keys at that specific moment.

 

Enhancing Security through Multi-Layered System Management

In addition to protecting the integrity of credentials and cardholders through multiple layers of visual and digital security, it is also critical to protect the integrity of the overall issuance system through a multi-layered security approach.

The first layer is to limit unauthorized operator access to physical components. Mechanical locks should be used to control access to printers, including the card input and output hoppers as well as the rejected cards. Physical locks should be placed on all access points to protect consumables including ribbon and film.

The second layer is electronic security. This includes controlling operator access to each printer through the use of personal identification numbers (PINs). Make sure that print job data packets meet or exceed advanced encryption standards.  This will ensure system privacy, integrity and authentication all the way through to the final issuance endpoint.

The third layer is to ensure automatic elimination of personal data on used print ribbon panels. Some card printers increase security by including integrated sensors that only permit the use of custom print ribbons and holographic card over-laminates in authorized printers.

Picking the Right Printer/Encoder

Small, medium and large businesses have different needs that need to be considered when choosing to choosing a printer/encoder.

A key requirement for small businesses is a printer/encoder’s ease of use, since few of these organizations have extensive IT resources.  The solution should include features such as easy loading of card ribbon consumables, as well as integrated card design software templates within the printer. For small organizations that have few employees and require basic “one-off” card design, embedded card templates located within the printer browser can eliminate the need for separate software installation.  Alternatively, there are cost-effective, entry-level photo capture and card design solutions that work well for businesses with small databases.  

Mid-size organizations typically need intuitive solutions that are not only easy to use but also scalable, so they can meet evolving requirements.   Choosing a modular printer solution enables companies to, for instance, add dual-side printing functionality so they can scale with the organization's growth and more information-rich card requirements.   Mid-size companies often require electronic personalization/encoding that supports their technology migration needs.  An ideal printer/encode personalization solution for this type of organization would be capable of simultaneously accommodating both magnetic stripe as well as more robust, high-frequency technologies on a card so that the organization can migrate from one technology to another.

Large organizations have different needs.  They typically must be able to handle high card throughput to support growing requirements for staff, contractors and visitors.  These enterprise and government organizations are also increasingly looking for risk-appropriate solutions.  They need their card personalization system to address diverse requirements, from basic ID badges to highly secure credentials.  The latter might require hardware lamination modules for adding secure visual personalization elements, such as holographic overlaminates.  Additionally, large businesses invariably have offices co-located worldwide that also require an integrated card personalization software solution with the flexibility to link disparate databases.

Regardless of company size, there are other printer/encoder feature sets to consider, depending on the application requirement and the user profile for the organization. 

For organizations deploying contactless or contact smart cards, high definition print (HDP) retransfer technology is the best printer/encoder choice.  Retransfer technology doesn't print directly to the card's surface, which eliminates the risk of misprints of expensive cards due to surface or sub-surface irregularities or abnormalities.  Instead, it transfers the printed image to a special film, fusing it smoothly to the cards surface.  This approach yields higher quality print than traditional direct to card printing, with lower risk of misprints and waste.   

For extremely high throughput printing/encoding environments, organizations should opt for an ID printer solution that focuses on overall performance and productivity.  Printing/encoding jobs of 10,000 cards and above require hardware that is designed for continuous and seamless throughput.

On the opposite end of the spectrum, the latest generation of monochrome direct-to-card (DTC) printers offers an economical way to print higher-quality badges than can be created with thermal printers.  Monochrome DTC printers combine quality, reliability and ease of use, while providing organizations with a solution that is cost-effective to operate and offers a low total cost of ownership.

Generally, businesses should choose ID card printers that are designed to simultaneously support multiple types of electronic personalization in order to ensure their solution can meet their current needs and scale to support future requirements.  Businesses of any size should use an adaptable card personalization solution that can handle multiple card types (including magnetic stripe as well as contactless and contact encoding solutions that are becoming more common), plus new encoding options as security requirements increase within an organization.

Finally, organizations also must consider the costs for initial deployment, maintenance and consumables.  The cost for initial deployment varies based on a number of factors including: the number of employees in an organization; the type of card to be used (i.e., standard blank, or electronic/contactless smart card); the level of personalization to be applied (i.e., single- or dual-side printing); and the risk-appropriate level of security or card durability and life expectancy that is desired.  Adding security features through personalization rarely increases card costs by more than USD$1.00 per unit, even when using optional laminates.  And card printer maintenance is an inexpensive yet valuable habit to adopt.  This includes regularly cleaning printheads and the card feeding mechanism, which limits the risk of more expensive service and replacement. 

Today’s secure issuance technologies offer broad options for enabling virtually any organization to cost-effectively raise the security of its credentials, cardholders, and issuance system to the highest, multi-layered security standards.  Organizations can significantly reduce the potential for fraud while improving efficiency and enhancing convenience for cardholders.

KEYWORDS: ID card

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Alan Fontanella, Senior Vice President, Secure Issuance, HID Global

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Coding

AI Emerges as the Top Concern for Security Leaders

Keyboard

Marks & Spencer Hackers Tricked IT Workers Into Resetting Passwords

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Machine Identity

    Machine identities: What they are and how to use automation to secure them

    See More
  • video conference

    Making videoconferences more secure

    See More
  • API security

    How to build more secure APIs

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!