Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Identity Management

How Outsourcing Can Increase Badging Efficiency and Reduce Cost

By David Finkelstein
May 28, 2013
badging_enews
New options in ID badging, including adding QR codes, can reduce the costs of adding layers of new information to cards, all while making the data accessible via smartphone. Image courtesy of InstantCard.

 

Security officers often deal with photo ID card issuance as an afterthought, but companies should take advantage of the fact that these cards are the most visible daily reminder of security policy. When used strategically, ID cards can greatly facilitate deployment of a consistent companywide security policy.

Photo ID cards are evolving from their most basic level (a printed piece of plastic) toward advanced features, which may include barcodes, magstripes, proximity cards, smartcard technology and the newest development, Quick Response (QR) codes.

Typical company ID card programs, while not hugely expensive, are hugely inefficient. Most large organizations issue a multitude of different types of ID cards, at different locations, in different divisions, for different requirements. But every ID card is designed to positively identify the bearer and describe in some way his or her rights. Faced with the disparity of systems governing the issuance of ID cards, the CSO ought to have a plan for converging toward a common, secure, controlled card-issuance process.

This is particularly difficult in a multi-site organization, and especially where each site is relatively small. Because of the difficulty and apparent cost of rolling out a companywide program, many CSOs have simply put off implementing systematic programs and policies. The result is a relative degree of anarchy, with some sites well under control, and other sites open to significant security breaches.

As the CSO thinks through his options, he or she typically sees two equally unattractive alternatives: either set up an expensive headquarters operation to produce badges for everyone in the company, or delegate responsibility to regional and/or field offices. The first alternative ensures control but involves significant operational and logistics costs. The second alternative involves the costs of multiple underutilized assets and a loss of control and consistency.

Since traditional physical security has been local, many field organizations are left to their own devices to produce cards, implement technologies and apply policy. The result is often an inconsistent mish-mosh.

Any inconsistent security policy automatically opens up greater potential for security breaches. Consistency involves human factors, IT systems, operational procedures and managerial control. Once the photo ID card policy has been set, this requires clear communications and adequate means to avoid making adherence to policy overly onerous. Policies must be implemented uniformly at both headquarters and in the field.

Consistency can be achieved through centralized ID card production, where all cards are produced at HQ, based on information supplied from authorized managers in field offices. But the overhead and logistics costs can be very high, and service to the field offices is often poor. Few multi-site organizations have been able to effectively implement such a program in a way which is satisfactory to field managers.

There is another choice. Outsourcing is a highly cost-effective but often overlooked alternative. ID card production is well suited to outsourcing because it’s not a core function, and specialized service providers offer significant economies of scale. Outsourcing can change a capital cost into an operating expense, turning fixed overhead expenses into costs that vary with demand. Specialized ID card providers can often ensure same-day service to remote locations, at a far lower cost, than either centralized or decentralized in-house production.

Outsourcing ID card production can ensure consistency across all offices. By choosing a single external supplier, the CSO can ensure that all ID cards conform to enterprise norms and can track when/where card programs are on track, and where they need remediation.

Technology

Many CSOs want IDs to go beyond simple “flash” cards and look to smartcards as a solution. While combining the smartcard with the photo ID card offers powerful, advanced security features, the costs are high because of the complex infrastructure required.

Adding QR codes to ID cards can often provide similar benefits — such as being able to instantly see the cardholder’s authorizations and credentials — at a fraction of the cost. A QR code is the black-and-white square often seen in magazine advertisements. QR codes, a non-proprietary scanning technology, can be printed on photo ID cards at little added cost.  The codes can be read in the field with any smartphone: iPhone, Android or Blackberry.

There are more options in photo ID cards than ever. With a little research, you can find the right choice for your organization.

KEYWORDS: ID badges outsourcing security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

An expert on photo ID cards and related technology, David Finkelstein is president of InstantCard (www.instantcard.net), a leading online provider of photo ID cards and credentialing services. He can be contacted at 301-216-3846 or dfinkelstein@instantcard.net.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • 5_minutes_with_Kemper_1021_900px.jpg

    5 minutes with Kat Kemper – Using security technology within healthcare to minimize risk, increase efficiency and reduce costs

    See More
  • How to Improve Efficiency, Reduce Fraud and Enable Intelligence in Credit Unions

    See More
  • How Test Sites Can Decrease Incidents and Increase Buy-In

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing