Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalIdentity ManagementRetail/Restaurants/Convenience

RFID: A Fast Track for Improved Security

RFID technology is not new, but its applications are many, driving the demand for the technology nowhere but up.

By Jim Romeo
RFID labels have become flexible and easy to affix to different products and things when combined with technology that enables traceability and control for better security

RFID labels have become flexible and easy to affix to different products and things when combined with technology that enables traceability and control for better security. Photo courtesy of ThinFilm Corporation

RFID tags may now be used on any asset without being obtrusive

RFID tags may now be used on any asset without being obtrusive and are quite effective for product authentication and fraud prevention. Photo courtesy of ThinFilm Corporation

Keith Jelinek, Managing Director

“Retailers are adopting RFID at amazingly fast rates – the cost per item to tag, along with the monitoring hardware for retail stores and distribution centers is very affordable,” says Keith Jelinek, Managing Director at the Berkely Research Group in Los Angeles, CA. “This is a very offensive technology – instead of the traditional method of frequently inventorying product to then determine where there might be a loss, product can be rolled-up financially by location at any point in time.” Photo courtesy of Keith Jelinek

Mark Brown of GlobeRanger

RFID works best for security applications when combined with another measure such as biometrics, says Mark Brown of GlobeRanger, a company that provides IoT platforms that work in conjunction with RFID. Photo courtesy of Mark Brown

RFID labels have become flexible and easy to affix to different products and things when combined with technology that enables traceability and control for better security
RFID tags may now be used on any asset without being obtrusive
Keith Jelinek, Managing Director
Mark Brown of GlobeRanger
February 1, 2017

Cheap wine in expensive bottles – it’s one illegal way that counterfeit wine sales are taking place. A fraudster perfectly packages cheap imitation wine into the bottle of an expensive wine with all the packaging and labeling intact. A consumer wouldn’t know, and wine sellers were hard pressed to obstruct such fraud.

Thanks to RFID technology, things are changing, and such fraud is much more difficult. An RFID capsule may be fitted over the corked or capped wine bottle. The capsule contains a unique identification number to authenticate the bottle of wine. It uniquely identifies the bottle to the wine and ensures the bottle has not been tampered with and the product is genuine.

It’s just one of the multitude of ways that RFID is being used to build security and change the course of our lives. While the technology is nothing new, its applications are many, driving the demand for this technology nowhere but up.

According to research conducted by BCC Research, the global market for RFID technologies is forecast to reach $38.0 billion by 2021. This will be from $16.2 billion in 2016, and grow at a compound annual growth rate of 18.6 percent, during that timeframe. In the mean time, the technology is making major inroads into many different market verticals with various uses – from track and trace solutions, to asset control and management as well as authentication and fraud prevention, among them.

Retailers are using RFID technology extensively as a means of controlling inventory loss and expediting point-of-sale (POS) checkout. New York-based Rebecca Minkoff apparel and accessories, is utilizing RFID in its boutiques for self-checkout, much like a supermarket or big box store.

“Retailers are adopting RFID at amazingly fast rates – the cost per item to tag, along with the monitoring hardware for retail stores and distribution centers is very affordable,” says Keith Jelinek, Managing Director at the Berkely Research Group in Los Angeles, CA. “This is a very offensive technology – instead of the traditional method of frequently inventorying product to then determine where there might be a loss, product can be rolled-up financially by location at any point in time. This can be compared to POS data to determine if product was sold, or, was removed via theft. The same technology has another benefit, in that retailers are using it to monitor what is on the sales floor, and what is in the stockroom, to enable real time restocking opportunities.”

Luxury goods and retail merchandise have a long history of not only theft and pilferage, but also fakes and forgeries. Vulnerable buyers are interested in products because of their attractive price – attractive because it is a fake. RFID tags prevent this and are being widely used as a tool for not only theft, but also anti-counterfeiting.  They are used to authenticate products and prevent loss. 

Retailer Maria&Donato is incorporating SpeedTap tags into their luxury handbag lines as a means of providing simple, yet effective, product authentication funtionality to their customers, says Bill Cummings of ThinFilm in San Jose, CA. The company makes RFID tags.  Barbadillo, a leading Spanish winemaker, incorporated OpenSense tags into the bottles of a limited-edition run of its Versos sherry as a way to prevent tampering and authenticate the product. ThinFilm is in discussions with a number of other leading brands that are interested in its technology for authentication and anti-counterfeiting purposes. These companies represent a number of vertical industries, including tobacco, pharmaceuticals, cosmetics, and specialty foods such as olive oil, caviar and chocolate.

 

RFID and Intelligent Identity

RFID, in conjunction with other technologies, is becoming a very effective tool for smart authentication and identification of not just products and goods, but also people.

HID Global, who provides identity solutions, predicts that 2017 will be the year that the digital identity transformation leads a number of key trends, including mobile adoption credential issuance and management via the cloud, and innovative IoT. Digital identities that are used with RFID readers are poised to make trusted access and other physical and online interactions more personal, contextual and valuable.

The technology can be combined with other technologies such as cloud computing, mobile technology, biometrics and IoT for great impact. Other technologies include biometrics, where face recognition, thumbprints and other recognition technology can be utilized in conjunction with RFID for maximum security. It provides a whole new layer of security that allows very strict authentication linked to unique identity, where such identity is available.

RFID works best for security applications when combined with another measure such as biometrics, says Mark Brown of GlobeRanger, a company that provides IoT platforms that work in conjunction with RFID.  It can usually be thought of as a way to determine presence rather than identity; if someone pickpockets your RFID-enabled badge, they are suddenly ‘‘you’’ unless there is a multimodal authentication regimen in place, he notes. Therefore, as a standalone solution, it’s premature to utilize RFID technology as a true security application in most cases.

Like its interaction with biometric technology, RFID may also be used in conjunction with IoT.  The intelligence of an RFID tag or chip can be detected and monitored using the internet. This unveils many new opportunities for the technology as it may allow monitoring and control of so many different assets from anywhere in the world, by others anywhere in the world.

According to Mark Brown of GlobeRanger, RFID can be useful as a means of verifying identity. He notes that he’s done work for a client with operations in a remote part of Canada where cellular reception is limited to around two hours per day, making cloud-based biometric security measures virtually impossible. Their employees are given RFID-enabled badges with enhanced memory that pull up their photo – from the tag, not a connected system – on a computer screen when scanned for physical conformation.

According to HID Global, IoT presents better ways to connect people with things. Their outlook is that digital identities will increasingly be employed to help secure, customize and enhance the user experience across a growing range of industry segments and use cases. They will also help streamline processes with real-time location systems, condition monitoring and other capabilities. For instance, demand will grow for cloud-based authentication platforms that add trust to “proof of presence” and Internet of Things (IoT) applications. The ability to simply tap a phone to a trusted tag to prove you were there and have completed assigned tasks will have a profound impact on how people do their jobs and manage complex processes from remote locations using inherent speed, flexibility combined with mobile technology.

HID Global’s RFID is used by Datawatch Corporation, whose access control offers an example of how RFID readers used with mobile access technology are merging with the IoT in the smart building. Using mobile access technology helps facility managers efficiently control HVAC systems based on a person entering or exiting a suite or common area using a mobile ID. The HVAC and energy management systems will automatically adjust the settings, for example, turning off lights when the last person leaves the area. Datawatch has deployed HID Mobile Access and its RFID readers for building entry and access to internal doors, including common building areas, elevators, individual suites and apartments at nearly 30 commercial properties in major cities. 

For Datawatch as well as the Canadian client of GlobeRanger in a remote location, RFID-based security makes sense for them. What’s unique is its speed and flexibility notes Brown.  When the priority is completing a transaction as quickly as possible, RFID is a good choice since the result is nearly immediate, he says. As far as flexibility, it’s possible to do things like adjusting the detection range and integrating other databases. For example, you can link to a training database to quickly determine which employees have completed certain training courses, thereby identifying which ones are permitted to work on elements of a project that require special skills, or identifying which certifications have lapsed out of date literally to the minute.

In addition to remote location, RFID is a fitting solution for dispersed clients or employees in multiple locations. For workers who need to access their desktops from multiple locations, incorporating NFC or RFID along with another security check such as PIN code or biometrics allows them to do so on shared computer terminals, extending their access rights while combining these with local resource availability, says Brown.

Moving forward, RFID will only become more intelligent, more personal and more omnipresent.

At first, RFID was usually employed to track items in warehouses and other such large-scale applications, says Brown.  While these kinds of applications are sure to continue, we’ve also seen a recent trend toward making the technology more personal. Today, if you lose your keys, the RFID tag attached to them  will send a message directly to your phone to let you know exactly where they are through crowd sourced intelligence. Things like this will only become more ubiquitous and personal as the technology matures further.

KEYWORDS: asset management loss prevention Radio-Frequency IDentification (RFID) retail security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jim Romeo, Contributing Writer

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Security Leadership and Management
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Services

    Combines Video and RFID Data for Business Insights and Loss Prevention

    See More
  • fingerprint1-900px.jpg

    Wisconsin Company Pilots RFID-Microchip Implants for Employees

    See More
  • surveillance 2 responsive default security

    Senator Calls for Investigation of Billboards that Track Shoppers' Phones

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing