Identification Solutions

Oct. 27, 2008
New Offerings Blend Technology And Better Management Methods

Photo ID will continue to dominate the authentication markets, especially for access control. This is in part due to the government's move to standardized identification credentials for which cards are perfect. The problems that have occurred during the rollout of a nationally standardized ID depicts the same sequence of events which occur in most rollouts and new system deployments at any level of security or scale of deployment. These include: delays in implementing hardware; multiple technologies required; legacy systems already in place; and that old “Play It Again Sam” favorite: cost.

The fact is that a photo ID credential can be implemented into any level of security system, and the individual's image on it, empowers every employee in an enterprise to participate in and assist in the enforcement of their organization's security policy. That is what it takes to keep a place safe, making it everyone's concern.

Photo IDs fit any scenario and add professionalism and ethicality to any security management system. You don't need a database to immediately verify if a person is in possession of the proper credential. An image of the individual on a secure credential is second only to a biometric template but can be vastly more practical and ergonomic.

Credentials and photo IDs fall right into the evolution of security and authentication, even while flash and thumb drives are gaining ground in some markets. Systems are requiring multiple factor authentication, using multiple technology credentials with systems equipped to manage a variety of credential protocols. Even the most basic access control offers two factors, and many facilities are expanding their access control systems with multiple technologies and cross platforming databases.

There are considerations to be made with respect to throughput, reliability and cost when selecting credential technologies and our look at identity management tools will help you better select and advise your customers make an informed choice.

Merging Creates New Identity

HID Identity, a new organization offering a comprehensive set of solutions for the deployment of contact and contactless smart card-based identity credentials, combines AccessID, a leading custom security card solutions provider, and Synercard, a developer of critically acclaimed photo ID card and application control software. The new organization is designed to help streamline and simplify the acquisition and issuance of access control and multi-application credentials. HID Identity wants to achieve an important identity management goal: issuing a single secure credential that links the enterprise's diverse set of applications.

By merging AccessID and Synercard, HID Global has combined specialists in the design and manufacture of secure access control and identity credentials with experts in the design and development of software used to personalize, provision and issue credentials.

HID Identity will offer its suite of solutions to dealer integrators to present to your customer channel. The organization will also leverage HID Global's Fargo embedded/encoded printer solutions, along with its valued reputation as the “Trusted Advisor” and its worldwide network of more than 100 application solutions partners.

For more information, visit

ID Spoken Here

With a new organization firmly in place, Brady People ID, manufacturer of visitor management, employee badging and attachments/accessories is taking a clear position as a full-service source for identification. Bill Kieckhafer, Brady Corporation, concurs, “Our overall line of products is designed to provide every element of people identification.”

The company offers the industry's most complete line of identification products and solutions, including TEMPbadge Time Expiring Badges, which allow security personnel to issue badges based on specific time durations for visitors, contractors and temporary employees with instant verification of security status.

Additionally, Brady People ID offers CardHolder badging accessories ranging from lanyards and badge holders to retractable reels, as well as an array of leading manufacturers' printers, including Zebra, Fargo, Evolis, Magicard, Datacard and Nisca. Brady People ID is also the source for PassagePoint Visitor Management Software, including the innovative PassagePoint EDU designed specifically for education applications.

“While we are focused on being the industry's top ID products company, dealer support is also of primary importance to us,” states Kieckhafer. “We offer myriad printed and web-based marketing communications materials in addition to a host of programs for our authorized dealers. We have also increased our presence in the field with a larger direct sales force, to assist dealers in any way we can with the Brady People ID product line.”

An innovative new employee ID badge holder from the company is designed to prevent unauthorized data skimming of embedded information. The new Secure Badgeholder provides a shield against unauthorized access to contactless information stored on PIV cards, CAC cards, and other contactless smartcard applications.

Gone are the days of skimming information from contactless smart cards, according to Kieckhafer. A patent-pending rigid badge holder, the Secure Badgeholder affords privacy protection by providing a barrier to unknown or unauthorized wireless communications through the contactless interface found on many smart cards today. Secure Badgeholder is also designed to allow card reading without the need to remove the card. By squeezing the activation tabs, the card is able to communicate with a reader. As soon as the tabs are released the smart card is shielded again. The wearer controls who reads the card and when it is read.

Brady People ID's Secure Badgeholder is also designed to hold the PIV card securely in place, yet allows easy, one-handed removal of the card from the badge holder when necessary. The Secure Badgeholder protects the card and is weather- and water- resistant.

For more information about these products, visit,

Evolving Technology

IDenticard Systems is a specialist in integrated hardware and software solutions for biometric security identification and access control whose mission is to make every facility safer. IDenticard's line of systems products that include custom-designed laminated ID cards, PVC, smart cards, laminators, ID card printers, cameras, bar code and biometric readers.

I Denticard makes product sourcing easy and convenient. In addition, the company's system solutions are fully upgradeable to meet changing security needs.

IDenticard's wide array of choices in custom-printed security ID cards includes special applications designed to protect against unauthorized alteration or copying. The cards can store multiple technologies for maximum security management. IDenticard's new and innovative expressionsID and its flexible IVIS Plus digital imaging systems can accommodate virtually any level of card demand and can be upgraded as security needs grow, assuring no loss of initial investment.

“Our line of access control and biometric solutions is continually evolving with the advent of new technologies that result in the introduction of exciting products like expressionsID,” says Robert Hager, general manager, IDenticard Systems.

A key feature of expressionsID is the exclusive record navigator, which provides folder-based management of cardholder records, allowing the user to custom configure records to display in groups for fast, simultaneous viewing and eliminate tedious, record-by-record searches. The software features drag and drop design, making it easy to customize screens and cards and save them as new designs. There is also a default database and stylish design templates.

expressionsID makes it possible to take advantage of multiple card technologies, including mag stripe encoding, bar code or biometric data. Single or multiple cards can be encoded for photo ID, access control, time and attendance, and assorted applications such as vending, debit or library transactions.

For more information, visit