Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementEducation: K-12

How RFID and NFC Technology Enhances the Enterprise

RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.

By Claire Meyer
January 6, 2014

In the consumerization of IT, such as the Bring Your Own Device movement, employees and stakeholders want their services delivered according to their preferences, and more and more are demanding digital, high-tech solutions.

RFID-based access control can build those consumer-friendly functions for enterprises while still streamlining the business for smoother operations and security.

“This technology is still somewhat new, but with upcoming proliferation,” says Fred Emery, Vice President OneCard Sales of Heartland Payment Systems’ Campus Solutions Division. Heartland provides solutions that support business and administrative processes across the entire life cycle of higher education, including card processing and payment managing for single-card ID and access solutions on campuses across the country, for financial transactions such as paying for printing, laundry, meals or other purchases.

“We’re working with tech-savvy clients, and we have to look to students’ expectations down the road,” Emery says.

At the Marriott/Fairfield Inn and Suites in Brooklyn, NY, the addition of RFID access control was a move for future-proofing the enterprise, as well as adding convenience for the customers. Previous magstripe-based access cards could become demagnetized by visitors’ cellphones, resulting in more visits to the front desk. This location also has a large percentage of international visitors, many of whom are used to touchless or RFID technology.

“Our customers are looking for safe and efficient technology they can understand,” says Marc Freud, Managing Principal of the Troutbrook Company, which developed and manages the Brooklyn hotel. “Hotels have a large amount of access points, and we needed better control and safety for employees and guests. We also wanted a more efficient front desk process.”

And the efficiency extends beyond the front desk, Freud adds – the new RFID readers increase accountability for staff, including food services, engineering, security, maintenance, general management and more, so management can better learn who had access to an area in the event of an incident.

“We promote a more widespread understanding of the system within the staff,” he says. “The staff knows and realizes what the benefits are, and we also let them know our new accountability standards through the system – all actionable events are recorded.”

The system extends to a customer service function well; the hotel – located merely five blocks from the Barclays Center – offers certain areas within the building as meeting or office space, specifically for technology startups. This Workspace on Demand area is designed as an incubator for tech companies at a minimal cost, aimed to attract more millennials to the hotel, however it also requires access control. Users can sign up for the space and register at the front desk for an access card. The RFID card can be programmed with time restrictions for the space, and it would be deactivated outside of that timeframe, allowing the hotel to provide a service without sacrificing accountability.

Managing incidents without auditing is a huge pitfall in access control, and outdated access management can lead to some embarrassing situations. According to Mike Petricca, Director of Campus Safety for the Academy of Art University in San Francisco, “We had 20 locations scattered across the city housing classrooms, offices and residential halls, each of which had multiple points of access and was protected only by basic locks and metal keys. Not only was this insecure, it didn’t give us an access control platform that would be easy to expand without forfeiting earlier investments. The inadequate security of our prior security arrangement became painfully apparent after a daylight break-in and burglary at the university’s Academic Building resulted in significant property losses. The thieves were captured, but it sent a message we needed to change our current practices, and we began the process of upgrading to a university wide card access system.”

In the same effort to improve security, the university migrated to an in-house campus safety organization that leveraged public safety best practices, resulting in a system that can be completely locked down with all access controlled through a single, centralized system – the first university in the U.S. to be able to do so, says Petricca.

The goal for the system was a balance between security and scalability, which required an access control system based on an open architecture that could support multiple card technologies and future enhancements.

“The university has realized a number of important benefits from our new access control system, including documented reductions in theft even as enrollment has increased, and an improved campus experience,” Petricca says. “The system has also significantly improved reporting capabilities, enabling the security team to, for instance, provide valuable input about building usage that resulted in new building access hours and policies. Also, with our new access control foundation in place, we can now embrace change and rely on this system infrastructure to support future improvements that will benefit faculty and staff, as well as students and their parents.”

Another enterprise-wide benefit of RFID is the option to add near-field communication, or NFC, capabilities moving forward. According to Freud, “Our ROI is probably going to occur in the near-future, based on the adaptability of the (RFID) lock, as in when the next-generation of access control, NFC, comes along.”

But in some organizations, NFC has already come along – Heartland Payment Systems’ office in Colorado Springs features a pilot program of NFC technology. Employees can use their NFC-enabled Android smartphones, or iPhones with a special case, to access the building, as well as for vending.

“On a corporate campus, it’s a convenience factor,” says Emery. “Initially, NFC is an enhancement to your RFID card, and later its use can lead to less loss of cards, faster reporting of loss and faster deactivation. Plus, the PIN code on smartphones is an additional layer of security.”

In terms of point of sale functions, such as vending or on-campus shopping, smartphones are often considered more efficient and easier than cards – smartphones are easier to grab and are not often left behind. Even in an office, employees would be more likely to take their smartphone with them to lunch or to a conference room than their access control card.

According to Emery, the use of NFC-enabled devices or multi-function RFID cards can lead to a “cashless” society on campus – a cohesive solution on one credential. Heartland has seen this switch lead to an increase in transactions, consolidation of financials, increases in impulse purchases, less possible theft (due to less cash), and more transaction process visibility, such as photo verification for meal purchases to reduce fraud.

“Overall, it turns into a service function. It makes the student’s life easier, and happier students will promote and stay at your institution,” Emery says.

At the Academy of Art University, a Knight Kash program complements the university experience – students can use their cards for dining on campus as well as at off-campus merchant partner establishments. The university also uses the cards for a part- and full-time employee payroll system, and Pettrica says that school officials are considering using the cards for student attendance systems and other future applications, as well as considering smartphone-based ID management.

He remarks, “At first there was a little reluctance in terms of the students’ and staff’s acceptance of the new system.  Over time it has become second nature.  Parents of our students love the fact that our doors are locked, and it gives them peace of mind. They realize we are committed to providing a safe and secure learning experience. Guests are never allowed on campus without written permission from a Department director.

“We also believe we are driving our students to be ID-centric which better prepares them for corporate life after graduation.” 

KEYWORDS: hotel security NFC technology Radio-Frequency IDentification (RFID) smartphone access value added security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Claire Meyer is a former Managing Editor for Security magazine.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Just How Versatile is RFID Technology?

    See More
  • RFID: The 'Almost Everything' Tool

    Pharmaceutical Industry taking a Quantum Leap with RFID Technology

    See More
  • digitalization

    How Cybersecurity Can Best Support the Digital Enterprise

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing