Maximizing Event Security with ID Cards

May 2007
Security: Solutions for Enterprise Security Leaders;May2007, Vol. 44 Issue 5, p42
Trade Publication
The article discusses the applicability of identification cards (ID) to provide security for special events in the U.S. Most organizations still rely on ID technology which ranges from less expensive barcodes or magnetic strips to more sophisticated radio frequency identification system (RFID) technology that combine multiple technologies on a single card. Furthermore, ID cards are just one facet of a successful security program for the events that prevent any incidents from occurring.


Related Articles

  • Combo Those Cards. Blank, Eric // Security: Solutions for Enterprise Security Leaders;Feb2005, Vol. 42 Issue 2, p28 

    Focuses on combining radio frequency identification-enabled plastic cards with advanced card printing and manufacturing techniques for additional security in multiple operations. Addition of hidden patterns and information printed on the surface of a card for another level of security to assess...

  • Trucks to Get ID Cards?  // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p30 

    Reports that Bob Cool, a Georgia Southern University professor is developing a nationwide system based on radio frequency identification (RFID) devices at truck weigh stations and law enforcement vehicles to gather information for a national truck tracking center; Existing RFID applications;...

  • An EU-funded think tank has delivered a warning against the adoption of biometric ID cards and passports.  // SC Magazine: For IT Security Professionals (UK Edition);Dec2006, p8 

    The article reports on the warning given by the Future of Identity in the Information Society regarding the adoption of biometric ID cards and passports in Great Britain. According to the society, the biometric designs of travel ID will reduce security and privacy. Data can be read or heard from...

  • Outwitting Card Forgers. Blank, Eric // Security: Solutions for Enterprise Security Leaders;May2004, Vol. 41 Issue 5, p36 

    Reports on the risk and potential liabilities of radio frequency identification technologies for card forgers. Aid of the technologies to security management of companies; Need for security to constantly look to more advance methods to protect companies, employees and customers; Offer of a...

  • Visitor ID Integrates with Access.  // Security: Solutions for Enterprise Security Leaders;Oct2008, Vol. 45 Issue 10, p48 

    The article reports on the modification of the visitor management system of Connecticut Children's Medical Center in Hartford. According to Phillip LeClair, the medical center's security manager, says that the facility is using radio frequency technology to transmit information about the user...

  • FYI on RFID. Menzel, John // Security: Solutions for Enterprise Security Leaders;Sep2005, Vol. 42 Issue 9, p34 

    Presents a background on radio frequency identification (RFID) systems. Capability of incorporating the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person; Main components of an RFID...

  • A Digital Security System with Door Lock System Using RFID Technology.  // International Journal of Computer Applications;Aug2010, Vol. 5, p9 

    The article focuses on a study which explores the development and implementation of a digital security system with door lock system using Radio Frequency Identification (RFID) system which can activate, authenticate, and validate the user. Security, asset tracking, and access control application...

  • People Tracking -- It's a Good Thing. Zalud, Bill // Security: Solutions for Enterprise Security Leaders;Nov2006, Vol. 43 Issue 11, p28 

    The article focuses on people tracking solutions for healthcare facilities in the U.S. Healthcare security executives enlarged the business model to include wandering patients and residents who suffer from dementia, Alzheimer's or similar conditions at risk of wandering off. However, solutions...

  • Security tagging mobile users. Holburt, Jonathan // Enterprise Innovation;Aug/Sep2007, Vol. 3 Issue 4, p32 

    The article discusses how security solutions are tagging mobile device platform users in business enterprises. The author highlights that the security systems ensures that fewer good go missing an employees are more productive. He also points out that no discussion of mobile security would be...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics