Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementEducation: K-12

How RFID and NFC Technology Enhances the Enterprise

RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.

By Claire Meyer
Fairfield Inn & Suites

The front desk at Fairfield Inn and Suites in Brooklyn is designed to be a streamlined, easy area to navigate. By changing the hotel’s access control to an RFID-based program, granting access and managing credentials has become a simpler, hassle-free process for employees and visitors alike. Photo courtesy of VingCard Elsafe and Fairfield Inn and Suites.

Academy of Art University

At the Academy of Art University in San Francisco, basic metal locks and keys were no longer enough to protect students and their high-value portfolios. Director of Campus Safety Mike Petricca advocated the move to RFID technology in an effort to better protect the school’s students and assets while building a multi-value system for the future. Photos courtesy of HID Global.

Fred Emery & Heartland Payment Systems

Fred Emery and Heartland Payment Systems are working with Ingersoll Rand on an NFC pilot program at the enterprise’s Colorado Springs office: “On a corporate campus, it’s a convenience factor,” he says. Photo courtesy of Heartland Payment Systems.

Fairfield Inn & Suites
Academy of Art University
Fred Emery & Heartland Payment Systems
January 6, 2014

In the consumerization of IT, such as the Bring Your Own Device movement, employees and stakeholders want their services delivered according to their preferences, and more and more are demanding digital, high-tech solutions.

RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.

“This technology is still somewhat new, but with upcoming proliferation,” says Fred Emery, Vice President OneCard Sales of Heartland Payment Systems’ Campus Solutions Division. Heartland provides solutions that support business and administrative processes across the entire life cycle of higher education, including card processing and payment managing for single-card ID and access solutions on campuses across the country, for financial transactions such as paying for printing, laundry, meals or other purchases.

“We’re working with tech-savvy clients, and we have to look to students’ expectations down the road,” Emery says.

At the Marriott/Fairfield Inn and Suites in Brooklyn, NY, the addition of RFID access control was a move for future-proofing the enterprise, as well as adding convenience for the customers. Previous magstripe-based access cards could become demagnetized by visitors’ cellphones, resulting in more visits to the front desk. This location also has a large percentage of international visitors, many of whom are used to touchless or RFID technology.

“Our customers are looking for safe and efficient technology they can understand,” says Marc Freud, Managing Principal of the Troutbrook Company, which developed and manages the Brooklyn hotel. “Hotels have a large amount of access points, and we needed better control and safety for employees and guests. We also wanted a more efficient front desk process.”

And the efficiency extends beyond the front desk, Freud adds – the new RFID readers increase accountability for staff, including food services, engineering, security, maintenance, general management and more, so management can better learn who had access to an area in the event of an incident.

“We promote a more widespread understanding of the system within the staff,” he says. “The staff knows and realizes what the benefits are, and we also let them know our new accountability standards through the system – all actionable events are recorded.”

The system extends to a customer service function well; the hotel – located merely five blocks from the Barclays Center – offers certain areas within the building as meeting or office space, specifically for technology startups. This Workspace on Demand area is designed as an incubator for tech companies at a minimal cost, aimed to attract more millennials to the hotel, however it also requires access control. Users can sign up for the space and register at the front desk for an access card. The RFID card can be programmed with time restrictions for the space, and it would be deactivated outside of that timeframe, allowing the hotel to provide a service without sacrificing accountability.

Managing incidents without auditing is a huge pitfall in access control, and outdated access management can lead to some embarrassing situations. According to Mike Petricca, Director of Campus Safety for the Academy of Art University in San Francisco, “We had 20 locations scattered across the city housing classrooms, offices and residential halls, each of which had multiple points of access and was protected only by basic locks and metal keys. Not only was this insecure, it didn’t give us an access control platform that would be easy to expand without forfeiting earlier investments. The inadequate security of our prior security arrangement became painfully apparent after a daylight break-in and burglary at the university’s Academic Building resulted in significant property losses. The thieves were captured, but it sent a message we needed to change our current practices, and we began the process of upgrading to a university wide card access system.”

In the same effort to improve security, the university migrated to an in-house campus safety organization that leveraged public safety best practices, resulting in a system that can be completely locked down with all access controlled through a single, centralized system – the first university in the U.S. to be able to do so, says Petricca.

The goal for the system was a balance between security and scalability, which required an access control system based on an open architecture that could support multiple card technologies and future enhancements.

“The university has realized a number of important benefits from our new access control system, including documented reductions in theft even as enrollment has increased, and an improved campus experience,” Petricca says. “The system has also significantly improved reporting capabilities, enabling the security team to, for instance, provide valuable input about building usage that resulted in new building access hours and policies. Also, with our new access control foundation in place, we can now embrace change and rely on this system infrastructure to support future improvements that will benefit faculty and staff, as well as students and their parents.”

Another enterprise-wide benefit of RFID is the option to add near-field communication, or NFC, capabilities moving forward. According to Freud, “Our ROI is probably going to occur in the near-future, based on the adaptability of the (RFID) lock, as in when the next-generation of access control, NFC, comes along.”

But in some organizations, NFC has already come along – Heartland Payment Systems’ office in Colorado Springs features a pilot program of NFC technology. Employees can use their NFC-enabled Android smartphones, or iPhones with a special case, to access the building, as well as for vending.

“On a corporate campus, it’s a convenience factor,” says Emery. “Initially, NFC is an enhancement to your RFID card, and later its use can lead to less loss of cards, faster reporting of loss and faster deactivation. Plus, the PIN code on smartphones is an additional layer of security.”

In terms of point of sale functions, such as vending or on-campus shopping, smartphones are often considered more efficient and easier than cards – smartphones are easier to grab and are not often left behind. Even in an office, employees would be more likely to take their smartphone with them to lunch or to a conference room than their access control card.

According to Emery, the use of NFC-enabled devices or multi-function RFID cards can lead to a “cashless” society on campus – a cohesive solution on one credential. Heartland has seen this switch lead to an increase in transactions, consolidation of financials, increases in impulse purchases, less possible theft (due to less cash), and more transaction process visibility, such as photo verification for meal purchases to reduce fraud.

“Overall, it turns into a service function. It makes the student’s life easier, and happier students will promote and stay at your institution,” Emery says.

At the Academy of Art University, a Knight Kash program complements the university experience – students can use their cards for dining on campus as well as at off-campus merchant partner establishments. The university also uses the cards for a part- and full-time employee payroll system, and Pettrica says that school officials are considering using the cards for student attendance systems and other future applications, as well as considering smartphone-based ID management.

He remarks, “At first there was a little reluctance in terms of the students’ and staff’s acceptance of the new system.  Over time it has become second nature.  Parents of our students love the fact that our doors are locked, and it gives them peace of mind. They realize we are committed to providing a safe and secure learning experience. Guests are never allowed on campus without written permission from a Department director.

“We also believe we are driving our students to be ID-centric which better prepares them for corporate life after graduation.” 

KEYWORDS: hotel security NFC technology Radio-Frequency IDentification (RFID) smartphone access value added security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Passengers purchase the RFID bag tags which provide convenience and unique services for passengers as well as operations data for airlines.

    Just How Versatile is RFID Technology?

    See More
  • RFID: The 'Almost Everything' Tool

    Pharmaceutical Industry taking a Quantum Leap with RFID Technology

    See More
  • digitalization

    How Cybersecurity Can Best Support the Digital Enterprise

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Events

View AllSubmit An Event
  • September 3, 2024

    From DDoS Protection to WAAP: How Layered Protection Enhances Your Cybersecurity Strategy

    ON DEMAND: By participating in the webinar, attendees will gain enhanced knowledge of cyber threats and understand the current spectrum of cyber threats facing businesses.
View AllSubmit An Event
×
The front desk at Fairfield Inn and Suites in Brooklyn is designed to be a streamlined, easy area to navigate. By changing the hotel’s access control to an RFID-based program, granting access and managing credentials has become a simpler, hassle-free process for employees and visitors alike. Photo courtesy of VingCard Elsafe and Fairfield Inn and Suites.
At the Academy of Art University in San Francisco, basic metal locks and keys were no longer enough to protect students and their high-value portfolios. Director of Campus Safety Mike Petricca advocated the move to RFID technology in an effort to better protect the school’s students and assets while building a multi-value system for the future. Photos courtesy of HID Global.
Fred Emery and Heartland Payment Systems are working with Ingersoll Rand on an NFC pilot program at the enterprise’s Colorado Springs office: “On a corporate campus, it’s a convenience factor,” he says. Photo courtesy of Heartland Payment Systems.

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!