Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

9 FAQs on NFC Access Control

By Tim Phipps
Generic Image for Access Management
June 9, 2015

What are some of the biggest opportunities for NFC in the secure identity space?

  • NFC is an ideal connectivity technology for what is called tap authentication – enabling users to simply tap their smart card to laptops, tablets, phones and other NFC-enabled devices for easy and convenient access to network resources, cloud apps and Web-based services.

What are the benefits of a tap authentication approach?

  • The tap authentication model is designed to improve both security and the user experience across a wide range of enterprise applications.  It reduces the need for complex passwords and diminishes password fatigue in environments where it can require 20 or more logins each day in order to access enterprise data and services. Users can authenticate to multiple apps and services on multiple endpoint devices without having to recall and re-type additional codes and passwords.  This model also makes it easier than ever for users to leverage a single smart card to seamlessly access data, login to cloud resources and open doors.

Can you elaborate on the security benefits of tap authentication?           

  • Protecting access to corporate data is becoming ever more crucial, especially in a mobile-first world. Employees expect access to corporate cloud applications, data and services anywhere, at any time, from their preferred mobile device. This anywhere, anytime access can potentially make corporate networks more vulnerable to security breaches, significantly impacting their top and bottom lines.  Reliance on passwords, alone, is also dangerous.  When hackers steal an employee’s user name and password, they can then often move through the network undetected and upload malware programs to other systems.  Tap authentication solves these security problems.

How big is the security problem?

  • According to a recent IBM Security Services Cyber Security Intelligence Index Report, cyber threats – such as phishing schemes and malware – are costing organizations up to 19 percent in revenue, 21 percent in lost productivity and a 29 percent reduction in reputation management. Protecting access to corporate data is becoming ever more crucial. 

How does tap authentication improve security in ways that other technologies can’t?

  • Tap authentication provides a faster and more seamless and convenient authentication solution than possible with dedicated hardware one-time passwords (OTPs), display cards and other physical devices.  Mobile tokens can be carried on the same card used for other applications.  After users tap their card to a personal tablet, laptop or other endpoint device to authenticate to a network, the OTP is unusable.  There are no additional tokens to deploy and manage, and users have only one item to carry – their smart card – and no longer must remember or type a complex password.

You mentioned single-card convenience – what kinds of applications could use the tap authentication model?

  • The most obvious one is gaining access to facilities.  Users already carry a smart card that replaces mechanical keys – now the same card can also replace dedicated OTP solutions for accessing data and cloud-based applications.  This model takes advantage of an access control ecosystem that provides a seamless user experience and can flexibly scale and adapt while delivering growing value to the organization. 

What is the tap authentication experience like for the user?

  • The process requires only three simple steps.  First, users open a browser on their NFC-enabled device and then type the application URL they wish to access.  Next, they enter their corporate username and password.  Finally, they tap their access control card to the back of their NFC-enabled mobile device or table to provide the second authentication factor.

How does an organization implement tap authentication using NFC?

  • Today’s solutions should be cloud-based and not require any on-premises hardware to install or service contracts to maintain.  IT deployment is a simple process of installing authentication system software and device apps, synchronizing users with the authentication cloud service, and notifying them when they can begin using the system.  Organizations should also have the option of deploying conventional card readers in areas where endpoints do not have built-in NFC readers.

Are there any other considerations for the most effective deployment?

  • User authentication is one of five security layers that every organization should consider.  The others include authenticating the device, protecting the browser, protecting the application, and finally authenticating the transaction with pattern-based intelligence for sensitive transactions.  Implementing these layers requires an integrated, versatile authentication platform with real-time threat detection capabilities.  This platform, combined with an anti-virus solution, provides the highest possible security against today’s threats.
KEYWORDS: NFC security FAQ smartphone security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Tim Phipps, Vice President Product Marketing, Identity Assurance, HID Global

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Coding on screen

Research reveals mass scanning and exploitation campaigns

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • AMAG Symmetry Access Control Software V9 - Security Magazine

    Symmetry Access Control Software version 9

    See More
  • Joel Jensen

    Access Control on Remote Control

    See More
  • Two doors open to the sky

    Achieving Effective Access Control on a Tight Budget

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing