Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Technologies & SolutionsSecurity Enterprise ServicesAccess ManagementIdentity ManagementEnterprise Services

Trends & Technology Dictate ‘Smart’ Future for Access Control

By Jeffrey E. Barnhart
access card
November 29, 2019

While access cards still play a strong role in the access control market, some companies are moving toward smartphone Bluetooth-enabled technology to give residents frictionless access through secured doors, elevators and turnstiles. The introduction of mobile credentials has the potential to revolutionize the access control industry. Instead of carrying and swiping a card, a phone’s technology can help authenticate identity and grant entry.

There has been an uptick in the popularity of mobile credentials, which can be used via a smartphone to interact with an access control reader in the place of a physical card. Mobile credentials are more convenient, allow greater flexibility, improve privacy and can also lower the maintenance costs of credential management for end users.

Biometric technology is also increasing with fingerprint recognition and iris scanning. In some cases, multiple methods of biometric identification are combined with the use of a card (or used in place of a card) for even greater security.

Although technology continues to evolve and advance, when it comes to a trusted identity, physical cards will continue to play a valued role in securely granting or restricting access. Physical cards are an essential part of commercial security systems—keeping buildings and designated areas secure and safe by controlling entry or restricting access within a space. The combination of a physical card with a digital identity is powerful and provides multi-layered security.

Authentication Technology & Security

There are two categories of access control cards—nonsecure and secure—and both provide ways to monitor who is entering or exiting a building. A proximity card is the most common type of access card for commercial and residential buildings; however, they offer little security.

Typically the size of a credit card, an access card usually lasts five to 10 years before it has to be replaced. However, many factors affect the durability and lifespan of the card, such as the type of card substrate and personalization techniques used, how the card is stored and if the card is resistant to chemicals, abrasion, moisture and ultraviolet light.  

Although the three types of access control cards - proximity, magnetic stripe and smart - may look the same, the technologies driving them vary significantly.

Proximity (prox) cards can be made of several different materials, but they all work in the same way; by being held in close proximity to a card reader, without needing to make physical contact with the reader. Prox cards are an older technology and a low security card.

Magnetic stripe cards are one of the oldest forms of access cards and offer minimal security. They are copied very easily and are typically used in low security settings like hotels. They work by swiping a magnetic stripe through a card reader (like a credit card).

The most recent advancement in the access control card market segment—smart cards—were developed with the goal of being hard to duplicate. Smart cards offer the most security, operating at 13.56Mhz (compared to a prox card which operates at 125kHz). Smart cards feature an embedded integrated circuit and are capable of writing data in addition to reading it, which allows the cards to store more data than traditional prox cards, supporting a host of credential options. Smart cards can provide personal identification, authentication, data storage and application processing. They can be combined with other card technologies for increased security.

Smart cards are the best fit for commercial and residential building access because they provide greater security with an encrypted credential that must be decrypted by a reader. It’s much easier to clone or spoof proximity and magnetic stripe cards.

Personal Identity Verification & Credentials

For much of history, our identification systems have relied on face-to-face interactions and physical documents and processes. But digital technologies are transforming how identity is authenticated around the globe.

Access cards are tied to a person’s identity through a physical access control (PAC) system, which involves a two-step process that links a card to a person after the card has been printed. Some card personalization software systems can also connect to and update the PAC system after the card has been personalized. 

First, a system identifies an individual. Then, his or her credentials are authenticated via a badge, smart card, password, mobile device or biometric (such as a fingerprint). Following authentication, building access control systems grant entry.

Access control begins with a trusted identity, which validates the person who is entitled to the benefits associated with a credential.

The amount of personalization that occurs with access cards depends on what type of information and security is put on the card, for example, encoding a smart card with unique data, certificates and/or credentials.

Trends Shaping the Future of Access Control

In an era of growing security concerns, governments, corporations and property managers must elevate the importance of a trusted identity while balancing the demand for convenient and efficient access. Access control card use has increased globally with the demand for increased security driving growth.

Technological advancements in security systems, including the deployment of wireless technology, are enhancing access control. Security is a top concern for both private and public entities; many industries are transitioning to smart cards. Smart cards are the most secure type of access card and are used most often in government, health care and financial sectors, while proximity cards are commonly used in higher education and enterprise.

Cards will continue to be used for access, but there is a definite shift to mobile credentials and biometrics.

KEYWORDS: access control identification system mobile credentials

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Jeff barnhart 1
Jeffrey E. Barnhart is the founder and executive director of the International Card Manufacturers Association (ICMA), a global card association for card manufacturers and personalizers.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Access control technology

    Unlocking innovation: 4 trends in access control technology

    See More
  • SEC_Web_5Minutes-Campagnola-0824_1170x658.jpg

    The future of security and access control for office spaces

    See More
  • Do not enter sign

    New report identifies top 5 trends in physical access control

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing