Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Closing the Card Chasm

January 1, 2006
A high technology visitor identification system boasts a “fill-in-the-blanks+” screen that can be used by security, a receptionist or even the visitor himself.

There is a major loophole in security access controls for many organizations. Call them visitors. At PTC, a software company in Needham, Mass., visitor security had consisted of using regular security badges. “We had a bunch of active badges in a drawer,” recalls John O’Brien, global security manager at PTC. “When visitors arrived they were handed a badge just like the ones employees carry.”

Manufacturer International Truck and Engine, Inc., Warrenville, Ill., had an even more primitive method: the written log. “Most of our facilities are access-badge only,” says Mike Scribner, technical support and development, corporate security. “Yet the old way [to do visitor security] was hand-written logs and maybe sometimes they would write out a badge they would stick on themselves.”

Both PTC and International Truck and Engine felt the need to improve visitor security and both chose an automated visitor management system (EasyLobby, Needham, Mass.).

A printer is important to visitor badging. Quality and security elements can be matched to the application through the use of printer features.

Software updates

As a software company, O’Brien felt his firm should be up-to-date on technology in their visitor security as well.

“We do a large customer base, so we get a lot of customers coming in to get demos on software and learn how to use it,” O’Brien says. “I thought a visitor management program would be ideal.

“I had looked at a few other systems, but I felt that EasyLobby was the most user-friendly.”

The visitor badging system integrated with PTC’s access control system, allowing security to design its own visitor badges to fit any need. For example, there are regular visitor ID badges and corporate visitor ID badges, with a different design. “We have CEOs of other companies visiting,” O’Brien says. “It’s more official looking.”

While it is a capability of the system, PTC doesn’t incorporate pictures on its visitor badges. “We have so many groups that come in 40 at a time,” he says. “It would be nearly impossible.” However, they do have an e-mail set-up that goes right to the desk, so they can print badges ahead of time for larger groups. “We can have a bunch of already printed out badges and just hand them out. If someone is not on the list it takes 30 seconds to make one.”

Check out two-sided card printing. For example, the Zebra P120i is affordable and easy-to-use and makes dual-sided printing.

Revamping visitor policies

At International Truck and Engine, the EasyLobby system was part of an overall effort to improve visitor security.

“We had a need to improve the way we handle visitor management,” Scribner says. “What we wanted to do was make sure all our visitors were properly identified and properly badged. We wanted to make it so any individual walking around the facility, it would be easy to see they had been identified through reception or security.

“A program like (this) makes professional-looking badges and also stores all the visitor information in a database,” Scribner says.

The company had installed EasyLobby at its headquarters in 2001. So when they decided to take the technology company-wide, it was one of the top choices. “We narrowed our search to two companies,” Scribner says. “We test drove each at two of our larger facilities.” In the end, EasyLobby won. “It just fit into our infrastructure,” Scribner says. “The price point was right and it had all the functionality we required.”

A paper-based visitor log transforms into an easy-to-use visitor badging system that increases security as well as provides a diversity of features.

The visitor badging system collects all the information about the visitor the company requires. This includes name, the company they are with, title, reason for the visit and the employee they are there to see. International Truck and Engine also grabs a photo and signature for each visitor. It purchased a few EasyLobby peripherals to make this process easier. “We used a driver’s license and business card scanner,” Scribner says. “They can scan that and pull the name and photo off the license, or the name, company and title off the business card. If they can’t get a picture from the license, we have a camera and we have a signature pad that they sign their name on. It captures the signature electronically.”

Both companies have plans to expand their systems. At International Truck and Engine, there are 20 EasyLobby stations in 16 facilities. “Our designation was that any facility with 100 or more employees we wanted EasyLobby installed,” Scribner says.

Expansion is mainly international, he adds. “Right now we have it in most of the U.S. and one in Canada. We are putting one more in Canada, and we want to roll out to Mexico and eventually into South America. We’re pretty much done with the U.S. Our expansion efforts now are foreign.”

At PTC, the system is due to be installed in two offices in the U.K., as well as two U.S. locations. “I’m moving to put an EasyLobby system in every office with a training facility,” O’Brien says. The training rooms all use card access, he explains. For PTC there will eventually be about 10 locations that have the system.

Both Scribner and O’Brien feel the technology has improved visitor security at their facilities immensely.

“What we found with the visitor log was a lot of times our people didn’t know to ask for driver’s licenses or weren’t checking,” Scribner says. “If the company wanted to look up someone on the visitor log, they would need to search through 100s of pages. It was like looking for a needle in a haystack. That’s where the database comes in handy. We can see who visited where, and even track their progress if they visited more than one plant.”

Another benefit, Scribner says, is emergency management. “If we have an emergency, at any time we can electronically see, through the EasyLobby system, exactly which visitors are on the premises.”

O’Brien, too, believes visitor security is better served with the technology. “I liked the whole tech thing. We are a technology company and I felt we should move on through technology. Now we are able to track visitors better and not leave a drawer full of active cards lying around. That’s a security benefit right there.”

Smart cards & platform standards

There are emerging smart card options for consistent visitors. The challenge here – standards. Smart card organizations, enterprise end-users and governments need to work together in developing global standards for smart card and identification applications. Further, open platforms, due to their scalability and security features, will have to evolve as strong foundations for the credible execution of such vital applications. In addition, Palo Alto, Calif.-based Frost & Sullivan (World Battle of Platforms) says that unit shipments for open platform cards totaled 400 million in 2004 and 1.15 billion by 2011.

Open platforms such as Java Card and MULTOS are for dynamic, secure and multi-application smart card applications. These technologies provide the option of upgrading the cards with minimal efforts and without incurring additional costs or having to replace the card.

In an attempt to break into the lower end, fixed functions markets, Java Card and MULTOS have introduced the Java Card S program and the Step/one program, respectively. While the Java Card S program does not accommodate dynamic downloading capabilities, it does allow for interoperability with full function Java Cards that the issuer may launch at a later stage.

Government ID projects are key for open platform cards; there is a shift to contactless and dual interface cards. Nevertheless, the majority of contactless cards in banking applications remains with native platforms.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

Popular Stories

Tree shaped as dollar sign

The Salary of a Chief Security Officer

Jaguar logo

New Update on Jaguar Land Rover Cyberattack: Q3 Wholesales Down 43%

Man in suit

How to Safeguard Executives Through Proactive Planning and Managing Online Presence

2026

What Security Leaders Could Expect in 2026

Phone with message icon

The Post-Breach Narrative: Winning Back Trust After the Headlines Fade

SEC 2026 Benchmark Banner

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

February 26, 2026

Zero Incidents vs. Zero Tolerance – Workplace Violence Prevention Best Practices that Work

Workplace violence remains one of the most complex challenges facing healthcare organizations today. For executive security professionals, the stakes have never been higher: protecting staff, patients, and visitors while preserving a culture of compassion, dignity, and service.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • skills-freepik1170x658.jpg

    Stuck in the cybersecurity talent chasm? Here's how industrial organizations can climb out

    See More
  • office building windows

    Disparate systems: The importance of closing the gap

    See More
  • Closing the CEO, CSO Gap

    See More

Related Products

See More Products
  • 150 things.jpg

    The Handbook for School Safety and Security

  • The Complete Guide to Physical Security

  • s and the law.jpg

    Surveillance and the Law: Language, Power and Privacy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing