fbpx
Home SectorsCritical Infrastructure How to deal with legacy cards and credentials

How to deal with legacy cards and credentials

by Geny Caloisi

Legacy credential technologies can leave organisations in a vulnerable position. RFID and key copying devices and services are becoming more accessible – a £30 card copier can spoof any credential that communicates via a 125kHz radiofrequency. Hacking tutorials are also now prevalent on YouTube and easily searchable.

Fortunately, more modern credential technologies can offer protection against these threats.

HIDs Seos and MIFARE DESFire EV3 credentials are based on peer-reviewed global standards. They offer essential security features like secure messaging, mutual authentication, and calculating card-specific keys bound to specific applications.

Seos is the first finished physical access control card certified by Germanys independent security laboratory TÜV Informationstechnik (TÜViT), a division of the TÜV NORD Group division.

Yet secure technologies are only one piece of the puzzle when it comes to protecting critical assets. Organisations need convenience, choice and flexibility as they upgrade physical access systems.

With solutions that are easy to customise, deploy and maintain, HID’s portfolio streamlines security through a simple framework that supports multiple form factors and communication protocols. It also makes it easy to power applications beyond traditional access control, from secure printing and cashless vending to network logins and time and attendance.

Scalable Solutions

Large organisations often possess a staggering array of facilities, equipment and assets that need to be accessed securely. This is further complicated because each needs to be accessible to only a selection of employees. If it is managed improperly, this complexity can introduce vulnerabilities.

HID provides key management, card formatting and card number tracking. These are best practices that adhere to the highest standards of data protection and governance.

How Key Management works

HID securely generates a unique authentication key for each customer, and this key is used to protect the number within the cards access control application.

Card formatting and number tracking enhances security and prevents card number duplication.

Open Technology

Contemporary organisations are complex, and so are their security needs. Thats why HIDs credential deployment process makes it easy to design and maintain secure systems regardless of which technology is selected. 

HIDs secure credential portfolio supports multiple form factors and communication protocols, enabling you to customise a system that works for your entire organisation. This framework streamlines ongoing management while bringing users flexibility and choice, including:

  • Traditional cards, clamshells and key fobs
  • Mobile devices, including smartphones, tablets and wearables
  • Compatibility with iOS, Android and other operating systems
  • Support for communication technologies including NFC, and Bluetooth to name but a few.

Encryption levels and security features can be selected to suit specific risk profiles, including two-factor authentication using biometrics with the template stored on the card.

Out with the old?

Older access control systems, like Prox or iCLASS open the door to security risks, however, the secure option is not necessarily to start from scratch. Legacy technologies, existing vendors, and other IT systems can increase the complexity of implementing new security systems.

HIDs secure credential portfolio is compatible with almost all legacy physical access technologies via the availability of a wide selection of multi-technology cards.

HIDs migration process includes extensive support and options for pre-programmed hardware, field programming, or at-scale card data provisioning done by HID. Its extensive channel partner network can help when its time to service or acquire new Seos and MIFARE capable products, making it a more flexible and adaptable solution.

Seos is compatible with all HID Signo and iCLASS SE readers without any additional reader configuration.

To learn more about HID’s range of credential technology, visit https://www.hidglobal.com/products/cards-and-credentials