Security Technology Executive

NOV-DEC 2013

Issue link: https://securitytechnologyexecutive.epubxp.com/i/229956

Contents of this Issue

Navigation

Page 35 of 71

ACCESS CONTROL desktop card printer/encoder products also give organizations a single solution that can deliver the high-volume reliability and advanced credentialing features of large centralized printers, as well as the lower cost and smaller footprint required for the distributed printing model. Secure validation is another important consideration. Most ID card issuance systems simply compare the person presenting credentials with identifying data that is displayed on the card. This two-dimensional identifying data may be a simple photo ID or sophisticated elements such as higher-resolution images, or it might be a laser-engraved permanent personalization attribute that makes forgery and alteration virtually impossible. Smart-card chips, magnetic stripes and other digital components add an important third dimension of security. With expanded data storage, cards also can include biometric and other attributes to further enhance validation. Other elements to consider are speed and convenience. Printers with built-in programmers/encoders combine what previously were multiple processes into a single in-line card-personalization step, significantly boosting issuance speed, convenience and efficiency. Transition to a New Platform When is a good time to start the transition? There are many possible entry points from which to begin the migration process, including: Merger or acquisition: Mergers and acquisitions often involve rebranding and/or merging of disparate administrative and other systems, technologies and processes. Usually at some point in the process, the organization will need to issue new credentials. With the cost of new technology being competitive with legacy systems, this would be a perfect time to migrate to a more secure, sophisticated and capable system. Standardize on a single card: Due to rapid growth, decentralized administration systems and/or multiple physical locations, an organization may end up with several different access-control systems. Since new technology offers the ability to issue or change credentials remotely, it's now possible to integrate access control into one system that is centrally managed. Standardizing all locations and employees on one system can increase security and improve resource management. Going a step further to mobile access control delivers the benefits of over-the-air remote provisioning and management of secure identity credentials. Facility consolidation: If a company is moving or adding a building, new credentials will have to be issued for that location. This is an ideal time to look at access control for the entire organization. It may be time to standardize all locations into one system. Re-issuance process: As new employees join, many organizations manage costs by purchasing additional cards that work with their old technology. Some organizations may also need to change their cards due to a new brand image or logo, at which point they can upgrade to newer technology. together we can… educate inspire By supporting Mission 500, you can join the legions of security professionals who are donating their time and resources to help improve the lives of children around the world. Just $35 a month provides food, education and healthcare services to a child in need. A small investment in our collective future. Together with Mission 500 we can make a difference. 36 SECURITY TECHNOLOGY EXECUTIVE • November/December 2013 www.SecurityInfoWatch.com

Articles in this issue

Links on this page

Archives of this issue

view archives of Security Technology Executive - NOV-DEC 2013