Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

9 FAQs on NFC Access Control

By Tim Phipps
Security key pad
Jupiterimages / PHOTOS.com>> / Getty Images Plus / Via Getty Images

Jupiterimages / PHOTOS.com>> / Getty Images Plus / Via Getty Images

June 9, 2015

What are some of the biggest opportunities for NFC in the secure identity space?

  • NFC is an ideal connectivity technology for what is called tap authentication – enabling users to simply tap their smart card to laptops, tablets, phones and other NFC-enabled devices for easy and convenient access to network resources, cloud apps and Web-based services.

What are the benefits of a tap authentication approach?

  • The tap authentication model is designed to improve both security and the user experience across a wide range of enterprise applications.  It reduces the need for complex passwords and diminishes password fatigue in environments where it can require 20 or more logins each day in order to access enterprise data and services. Users can authenticate to multiple apps and services on multiple endpoint devices without having to recall and re-type additional codes and passwords.  This model also makes it easier than ever for users to leverage a single smart card to seamlessly access data, login to cloud resources and open doors.

Can you elaborate on the security benefits of tap authentication?           

  • Protecting access to corporate data is becoming ever more crucial, especially in a mobile-first world. Employees expect access to corporate cloud applications, data and services anywhere, at any time, from their preferred mobile device. This anywhere, anytime access can potentially make corporate networks more vulnerable to security breaches, significantly impacting their top and bottom lines.  Reliance on passwords, alone, is also dangerous.  When hackers steal an employee’s user name and password, they can then often move through the network undetected and upload malware programs to other systems.  Tap authentication solves these security problems.

How big is the security problem?

  • According to a recent IBM Security Services Cyber Security Intelligence Index Report, cyber threats – such as phishing schemes and malware – are costing organizations up to 19 percent in revenue, 21 percent in lost productivity and a 29 percent reduction in reputation management. Protecting access to corporate data is becoming ever more crucial. 

How does tap authentication improve security in ways that other technologies can’t?

  • Tap authentication provides a faster and more seamless and convenient authentication solution than possible with dedicated hardware one-time passwords (OTPs), display cards and other physical devices.  Mobile tokens can be carried on the same card used for other applications.  After users tap their card to a personal tablet, laptop or other endpoint device to authenticate to a network, the OTP is unusable.  There are no additional tokens to deploy and manage, and users have only one item to carry – their smart card – and no longer must remember or type a complex password.

You mentioned single-card convenience – what kinds of applications could use the tap authentication model?

  • The most obvious one is gaining access to facilities.  Users already carry a smart card that replaces mechanical keys – now the same card can also replace dedicated OTP solutions for accessing data and cloud-based applications.  This model takes advantage of an access control ecosystem that provides a seamless user experience and can flexibly scale and adapt while delivering growing value to the organization. 

What is the tap authentication experience like for the user?

  • The process requires only three simple steps.  First, users open a browser on their NFC-enabled device and then type the application URL they wish to access.  Next, they enter their corporate username and password.  Finally, they tap their access control card to the back of their NFC-enabled mobile device or table to provide the second authentication factor.

How does an organization implement tap authentication using NFC?

  • Today’s solutions should be cloud-based and not require any on-premises hardware to install or service contracts to maintain.  IT deployment is a simple process of installing authentication system software and device apps, synchronizing users with the authentication cloud service, and notifying them when they can begin using the system.  Organizations should also have the option of deploying conventional card readers in areas where endpoints do not have built-in NFC readers.

Are there any other considerations for the most effective deployment?

  • User authentication is one of five security layers that every organization should consider.  The others include authenticating the device, protecting the browser, protecting the application, and finally authenticating the transaction with pattern-based intelligence for sensitive transactions.  Implementing these layers requires an integrated, versatile authentication platform with real-time threat detection capabilities.  This platform, combined with an anti-virus solution, provides the highest possible security against today’s threats.
KEYWORDS: NFC security FAQ smartphone security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tim Phipps, Vice President Product Marketing, Identity Assurance, HID Global

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • AMAG Symmetry Access Control Software V9 - Security Magazine

    Symmetry Access Control Software version 9

    See More
  • Access Control on Remote Control

    See More
  • Achieving Effective Access Control on a Tight Budget

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products

Events

View AllSubmit An Event
  • September 25, 2025

    Cloud or On-Premise: Navigating Access Control and Cybersecurity Choices

    ON DEMAND: Join Schneider Electric for an in-depth webinar exploring the critical decisions security professionals face when choosing between cloud-based or on-premise access control solutions. 
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing