Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS

In this episode of CampusIDNews Chats, AJ Jacubenta, owner of MyPhoto, discusses how his company’s student ID photo upload software has evolved since its inception in 2010.

Originally developed at the request of a university customer, MyPhoto automates and streamlines the student ID photo submission process. The current version MyPhoto 5, incorporates advanced AI-driven features to improve efficiency, security, and photo quality across campus card programs.

“Basically, it automates the student ID photo upload process,” says Jacubenta. “It eliminates the need for in-person photo sessions and reducing administrative workload for campus staff.”

He explains that the process is designed with simplicity in mind for students. Using their mobile phones, students log in with their university credentials and take a selfie, which is then automatically evaluated by the system.

AI-powered quality control and identity verification

Once uploaded, photos are reviewed using AI to detect poor image quality, offensive content, or other unwanted attributes, such as inappropriate clothing or text. If approved, the image is automatically rotated, cropped, and enhanced with background removal before being placed onto a sample ID card for student review.

Using facial recognition and AI, the system matches the student’s uploaded photo against a government-issued ID.

To further strengthen identity assurance, MyPhoto 5 offers optional government ID verification. This feature is particularly valuable for remote learners who may never physically visit campus.

“For students that may never step foot on campus and are remotely taking courses, the university needs to provide some way of authenticating that particular person,” Jacubenta explains. “Using facial recognition and AI, the system matches the student’s uploaded photo against a government-issued ID and cross-checks key data with university records.”

He says that they are working with third-party partners to enhance verification and validate government IDs through external sources.

Flexible deployment and expanding markets

Recognizing varying institutional needs, MyPhoto is available in on-premise, cloud, and private cloud deployments. This flexibility allows institutions to choose how and where data is managed.

Since launching, MyPhoto has grown to serve hundreds of customers and is now expanding beyond higher education into K-12 and corporate markets, continuing its mission to modernize ID photo capture and identity verification across multiple sectors.

To watch the full interview, click the image at the top of this page.

 


TRANSCRIPT

Hi, my name is AJ Jacubenta, and I'm the owner of MyPhoto.

We developed the application as a result of a request from one of our customers in 2010. Basically, it automates the student ID photo upload process.

MyPhoto 5 is the latest release and incorporates many AI features.

Typically, the way that the application works is the student takes their cell phone, logs in using their student credentials for the university, and takes a selfie. Then we run it through our system to check for a number of different categories looking for bad image quality, offensive content, or things written on their shirt – a number of things that are unwanted attributes of a photo.

If that passes that step, then the photo is automatically rotated, cropped, and the background is removed. Then that photo is superimposed on a sample card for that university.

The student can review it, and if they like what they see, they go on to the next step. It is optional, but they can upload their government ID and even a signature.

Government IDs basically take the vetting process one step further. With our software, they already have to log in. They have to have an account.

However, for students that may never step foot on campus and are remotely taking courses, the university needs to provide some way of authenticating that particular person.

We still have requests from our customers to be on-premise, especially where the data is located. That's why we offer it in three different flavors. It could be on-premise, in the cloud, or in the private cloud.

Our application allows that person to upload their government-issued ID, driver's license, passport, etc.

We use facial recognition and AI technology to match the photo that they uploaded for their student ID with their government ID. We also match certain elements of the government ID with what the university has on campus.

One of the new things that we're working with a third-party partner right now is further government ID verification.

If our customers want to take it one step further and they want a positive match, they can be assured with about 99% accuracy that the ID that was presented is not only valid, but also has been verified by an external source.

We still have requests from our customers to be on-premise, especially where the data is located. That's why we offer it in three different flavors. It could be on-premise, in the cloud, or in the private cloud.

There are many benefits to each of them. If they don't want it to manage, they can put it in the cloud. If they want to have somewhat of a management, but they don't want the hardware, they can put it into Azure or AWS. And if they want to have it on-prem –because they want the data to reside in their location – then that is an option, too.

Since we started back in 2010, we've experienced tremendous growth. We have hundreds of customers at this point.

Now we are focusing not only higher ed, but other vertical markets including K-12 and corporate accounts as well.

If you're interested, you can go to our website MyPhoto5.ai and you can simply click on “Schedule a Demo” and it'll interface with my calendar. I will be happy to give you a personalized demonstration, and you'll have everything that you need to know within an hour.

We'll follow up with a proposal and a sample agreement, and you'll be good to go.

Food waste is a massive financial challenge for the commercial foodservice industry. In 2023, the U.S. sector generated nearly $10 billion worth of unsold or uneaten food, according to Transact + CBORD. Kitchens discarded between 7% and 15% of their annual food budgets.

Higher ed dining services is a prime example as food waste is a major cost leak. With ingredient costs volatile and margins tight, campus dining is under pressure to improve forecasting accuracy and production efficiency.

StreamLine's AI-powered scales give dining operators insight into production volumes and food waste.

StreamLine AI-powered scales give dining operators insight into production volumes and food waste.

To address this challenge, Transact + CBORD and Topanga are partnering to help commercial kitchens reduce food waste and improve operational efficiency through AI-powered production tracking.

The collaboration integrates CBORD’s popular NetMenu platform with Topanga’s StreamLine solution. Together, they are working to deliver real-time insights that enable kitchens to optimize production, cut costs, and minimize waste without disrupting existing workflows.

Waste persists, at least in part, because culinary teams lack reliable, actionable data. Manual service worksheets rely heavily on estimates, and many staff members are reluctant to adopt systems that slow down kitchen operations.

This new partnership addresses these challenges by embedding AI-driven intelligence directly into the tools kitchens already use.

NetMenu and StreamLine deliver real-time visibility

CBORD’s NetMenu platform is a menu management and foodservice production solution for large-scale dining operations like higher education. It enables operators to plan menus, manage recipes and ingredients, analyze nutritional and allergen information, forecast demand, and control food costs – all from a single, centralized system.

StreamLine’s AI matches captured food items to NetMenu, creating a complete picture of production, carryover, and waste.

The integration connects NetMenu’s menu planning and recipe data with StreamLine’s compact, AI-powered smart scales. The scales automatically identify, weigh, and analyze food items throughout preparation and service, eliminating the need for manual tracking.

StreamLine’s AI matches captured food items to NetMenu recipes, ingredients, and associated costs, creating a complete picture of production, carryover, and waste.

It provides culinary teams with access to real-time dashboards and automated reports that highlight overproduction trends and optimization opportunities. Better data, enables dining leaders to adjust prep volumes, refine menus, and forecast demand more effectively. Key to success is that it does this without adding administrative or operational burden to staff.

NetMenu and StreamLine help Vanderbilt University slash food waste

Topanga reports that kitchens using StreamLine reduce food waste by an average of 50% within just four months of deployment. Some operations have lowered cost-per-meal by 5% in a single semester.

Vanderbilt achieved a 53% reduction in total food waste and an estimated $150,000 in food cost savings in the first year.

Vanderbilt University Dining serves as a compelling early example of the integration’s impact. After deploying the combined NetMenu and StreamLine solution in July 2024, Vanderbilt achieved a 53% reduction in total food waste and an estimated $150,000 in food cost savings in the first year.

Analysis from the Vanderbilt experience revealed that nearly 90% of recorded waste stemmed from overproduction. The solution empowered chefs to make immediate, data-driven adjustments to prep volumes and menu plans.

"What excites us about this partnership is that StreamLine doesn't ask kitchens to change their workflow – it makes their existing NetMenu data work harder,” says Chris Setcos, Senior Vice President, Partnerships and M&A at Transact + CBORD. “We're seeing operations identify six-figure savings opportunities within weeks, not months. That's the kind of transformative impact our customers need right now."

iLOQ offers mortise and deadbolt cylinders that retrofit directly into existing mechanical locks, eliminating the need for wiring, cabling, or batteries. In a recent episode of CampusIDNews Chats, Christopher Chuakay, Sales Manager at iLOQ, discusses how – with iLOQ on campus – complexity is reduced, maintenance is virtually eliminated, and deployment speed increases.

All the existing hardware can stay, and it's an easy retrofit. There are no wires, cables, infrastructure, and no need to change batteries.

“Everything is battery-free, cable-free, wire-free, so implementation is a super easy process,” says Chuakay. “Our smart locking platform lets institutions keep their existing door hardware, replace only the cylinder, and immediately enable smart access.”

iLOQ gets power from the smartphone

A key differentiator of iLOQ’s platform is its use of NFC technology in the user’s smartphone to power the lock. This eliminates the need for batteries or a wired power source, as the lock draws the energy it needs directly from the phone during a tap.

The mobile app powers the lock, reads credentials, and grants access in seconds. This approach ensures continued access even during power outages, blackouts, or emergencies, making the system particularly resilient for campus environments.

iLOQ on campus eases res halls move-in and move-out

Chuakay highlights a major higher ed use case in residence halls, where managing access at move-in and move-out is a persistent challenge. With iLOQ Manager, campuses can issue mobile credentials to students in seconds, set them to expire automatically at the end of the term, and eliminate the need for physical keys.

Beyond doors, iLOQ’s heavy-duty, IP68-rated padlocks support outdoor and extreme-temperature environments, providing audit trails for gates, sheds, and equipment cabinets.

To listen to the full interview, click the image at the top of this page.

 


TRANSCRIPT

Hello everybody, I'm Christopher Chuakay, one of the sales managers here at iLOQ. iLOQ is the first and only battery-free, wire-free, smart locking platform.

What we're bringing to the market here in the higher education sector are our mortise cylinders, deadbolt cylinders, and our padlocks. Everything is battery-free, cable-free, wire-free, so implementation is a super easy process.

You to take one of these mortise cylinders or a deadbolt cylinder and retrofit it into your existing key mechanical cylinder. Then, simply open your app, tap the lock, it'll locate the NFC, power it instantly, and now you can have access to your room.

Simple as that.

iLOQ padlocks are great for gates, equipment sheds, and cabinets where you want to get verification and access logs of who is tapping to open.

Most of the times, people ask us, how do you do battery-free? How do you do something without any wires or cables?

We're actually using the power of what everybody else carries around all the time, your cellphone.

So you have your app, we're going to try to open the lock, we basically tap, it's going to power the lock, read your credentials, and now we turn, and we're in.

The biggest thing that most people struggle with when implementing access control or any type of smart locking solution is the implementation.

With ours, it's a mortise or deadbolt cylinder.

All the existing hardware can stay, and it's an easy retrofit. There are no wires, cables, infrastructure, no need to change batteries after you install it, so it's really maintenance-free.

One of the interesting use cases in higher education are residence halls. The biggest thing is how do we move the students in at the start the semester and how do we move them out at the end of the semester?

With iLOQ on campus, our iLOQ Manager system, let's you set up these digital keys or mobile credentials sent for the students at the beginning of the semester. It's downloaded on their mobile device really easily, 30 seconds, and then at the end of the semester, it automatically expires.

So now, a resident can go onto their door, they can tap to unlock, they can have the freedom to just leave their dorm with just their cell phone. Now you've gone to mobile credentials.

We've also got some interesting use cases with padlocks.

These can be great for gates, equipment sheds, cabinets, things like that, where you want to get verification that someone's tapping to open. You know who was the last one in there, who was the last one to lock it up, so you've got that validation, those access logs now.

These are good for outdoor uses, so if you've got extreme temperatures like cold, wind, or rain, these will hold up to minus 40, plus 80, they're IP68 rated, it's really heavy duty stuff.

The best part about it is, again, is no maintenance. I've talked to a lot of people today that say they'll have a hurricane or a blackout where there's no power, and they can't get into their rooms because they're wired or networked.

With our system, it's literally just plug and play, leave it in there, and use your phone to actually power on the lock and the device. You'll always be able to get access.

If you're curious to learn more, visit us at iLOQ dot com, you can reach out to your local partners.

Across campuses, security teams have steadily added more systems and devices to their physical security infrastructure – cameras, access control, intrusion detection, and emergency communications. What hasn’t kept pace is how those systems are documented, maintained, and managed over time.

For example, designs live in CAD drawings, installation details are maintained elsewhere, and service history is somewhere else. Most campuses don’t have a true system of record for physical security.

SiteOwl was built to address that gap.

SiteOwl and Openings Studio together

Openings Studio is an information management software solution for doors, frames, and hardware. SiteOwl complements ASSA ABLOY’s existing Openings Studio platform, but it extends deeper into a user’s security environment. Learn more about Openings Studio here.

In August 2025, ASSA ABLOY added SiteOwl to its portfolio of companies. The announcement described SiteOwl as a cloud-based platform focused on physical security lifecycle management.

SiteOwl addresses a common challenge across campus environments

When a device goes offline, the first step is often identifying what it is, where it’s located, and whether it’s under warranty. Teams spend time tracking down details before work can begin. Technicians often arrive without full context, leading to delays or repeat visits.

SiteOwl covers the entire physical security environment from access control and video surveillance to intrusion detection and critical communications.

Planning work presents similar challenges. Budgeting for replacements relies on estimates rather than clear lifecycle data. “These aren’t technology problems, they’re information problems,” says Su Subburaj, Chief Marketing Officer at SiteOwl. “Security teams are managing real risk, but they’re often doing it without a complete picture.”

As campuses grow and systems become more distributed, those inefficiencies become harder to manage.

The SiteOwl solution for campus security teams

SiteOwl is designed to help campuses and integrators with design, installation, project management, asset management, and planning. It is ideal for tracking warranty information, raising service tickets, and conducting preventive maintenance audits.

SiteOwl complements ASSA ABLOY’s existing Openings Studio platform, but it extends deeper into a user’s security environment.

“Openings Studio is an information management software solution for door hardware,” explains Subburaj. “Architects and the professional services team use it to specify and manage technical information about doors, frames, and hardware.”

She says SiteOwl, on the other hand, has broader application. It covers the entire physical security environment from access control and video surveillance to intrusion detection and critical communications.

SiteOwl screenshot

SiteOwl centralizes security information and ties it to interactive digital floor plans, making it easier to understand what is installed, where it is located, and how it has evolved over time.

SiteOwl at Wake Forest University

At Wake Forest University, a six-person security team was tasked with completing the largest security update in the university's history.  The campus infrastructure included more than 25 buildings and 1,700 devices, and they were expected to complete the project in just 18 months.

A key goal was to centralize security data, streamline vendor collaboration, and provide real-time project tracking.

Wake Forest benefitted from 30% faster project timelines, 50% reduction in time spent on site walks, 25% decrease in change orders.

They were faced, however, with fragmented data stored in different spreadsheets, emails, and other formats. This was the result of decades of work with numerous different vendors.

The team knew they would need to consolidate all the security information in one place, because they couldn't do cross system upgrades without centralizing this data.

They used SiteOwl for everything from designs to installation management. It provided visibility into all their projects, and because both the vendors and the security teams were using SiteOwl, they were in lockstep to successfully complete the project.

According to a case study, project highlights include:

SiteOwl for security integrators

Integrators use SiteOwl to streamline their entire process from sales to service. Rather than using a series of disparate tools – email, AutoCAD, project management software, ticketing system – to run the project, SiteOwl provides a single place to capture information and carry it forward. Details such as device models, mounting requirements, photos, and configuration notes are documented once and remain accessible throughout the lifecycle.

“It reduces the friction that tends to happen at handoff points,” says Subburaj. “Sales, engineering, operations and service are all working from the same information instead of recreating it at each stage.”

Rather than managing a project with email, AutoCAD, project management software, and a ticketing system, SiteOwl provides a single place to capture information and carry it forward.

This continuity helps integrators reduce rework, improve accuracy during installation, and transition more smoothly into ongoing service. For their customers, that continuity translates to fewer surprises after installation and more predictable service.

SiteOwl for university end users

For campus security teams, SiteOwl provides a clearer picture of their security infrastructure. Information that is typically scattered is brought together and tied to interactive digital floor plans. This makes it easier to understand what is installed, where it is located, and how it has evolved over time.

Just as importantly, it gives them a shared working environment with their integrators. Rather than relying on separate documents or informal knowledge, both sides reference the same information over time.

“Security teams and integrators are working toward the same outcome, but they don’t always have access to the same information,” says Subburaj. “SiteOwl gives them a common reference point throughout the lifecycle. Today, in the market, there is no other solution that provides this level of visibility.” 

SiteOwl tablet used in the field by a technician

Security teams and integrators can identify issues and then share accurate information with technicians in the field.

Lifecycle visibility changes outcomes

The value of lifecycle management becomes most visible when something goes wrong.

On many campuses, responding to a device issue means first tracking down basic information: where the device is located, what model it is, whether it’s under warranty, and when it was last serviced. That work happens before any repair can begin and often leads to repeat visits or delays.

With a centralized view of the environment, security teams can identify the issue, share info with their integrator, and resolve problems rapidly.

With a centralized view of the environment, that context is already available. Security teams can identify the issue, share accurate information with their integrator, and resolve problems more predictably.

The same principle applies during projects. When design information, installation details, and asset data are connected, teams spend less time reconciling documents and more time executing. Quotes are more accurate, progress is easier to verify, and handoffs are clearer on both sides.

“When everyone is working from the same information, you avoid a lot of unnecessary back and forth,” says Subburaj. “It changes how teams experience both projects and service.”

SiteOwl joins ASSA ABLOY

ASSA ABLOY’s acquisition of SiteOwl reflects a practical view of how physical security is evolving. Organizations can use Openings Studio for specification and SiteOwl for ongoing lifecycle management. Together, they support a more consistent flow of information from planning through operations.

For SiteOwl, joining ASSA ABLOY opens doors.

Subburaj say they could not have asked for a better partner, as culture has been front and center at SiteOwl since it was founded in 2020.

“Because ASSA ABLOY shares the same growth mindset, they completely understand where we sit strategically within their portfolio of other technology products,” she says. “It gives us the opportunity to expand the scope of what we do and benefit from a vastly expanded sales channel.”

No one knows more about what we American’s have delivered to eat than Grubhub, and each year they share the details in a fun, digestible report. They analyze millions of orders to see what new items made the cut and what dropped off.

In 2025, we didn’t just want meals that tasted good – we wanted food that performed. The company’s 2025 Delivered Trend Report reveals a nationwide shift toward what they coined Foodmaxxing – the pursuit of foods and drinks that maximize nutritional value and social-media appeal.

Flavor wasn’t enough. We wanted energy, protein, gut health, convenience, and aesthetics.

The year of the bean

If 2025 had a mascot, it would be the old school bean. Grocery bean orders on Grubhub skyrocketed 135%, amounting to more than 1.5 tons. Bean salads dominated lunches and wellness snacks. In the Foodmaxxing era, fiber wasn’t optional and beans delivered.

Canned fish rises from the depths

Another old school pantry item stepping into the spotlight was canned fish. Grubhub orders tripled, and grocery purchases surged 209% compared to 2024. This former outlier became a curated social media experience with high protein, healthy fats, quick prep, and unmatched camera appeal.

Protein becomes a lifestyle

2025 wasn’t just high-protein – it was protein-infused. Protein-labeled grocery items increased nearly 20%, extending into both desserts and snacks. But the real protein superstar remained the chicken nugget. Grubhub users have already ordered more than 5.2 million nuggets and strips this year.

Cold foam and matcha lead the drink category

Foodmaxxing didn’t stop at meals – it dominated beverages too. Cold foam became the go-to morning upgrade, with orders up 75% as consumers looked for more than last year’s coffee upgrades.

Matcha also enjoyed its mainstream moment. Orders increased 34% as the drink became synonymous with energy, calm, and TikTok-worthy preparation rituals.

Eggs and convenience foods Redefined Everyday Eating

Eggs continued their comeback story with grocery orders up 58%. From restaurants, the undefeated champion remained the classic sausage, egg, and cheese sandwich.

Perhaps following in the footsteps of convenience store dining in Japan and Korea, Americans shifted from just ordering snacks and candy to hot meals such as taquitos, chicken, and hot dogs.

According to Grubhub, 2025 was the year we demanded more from our meals. From beans to cold foam, matcha to nuggets, the Foodmaxxing era is proving that functional foods aren’t a niche – they’re the new norm … at least until next year.

Jason Ouellette, Vice President of Innovation and Technical Partnerships for ELATEC and Chairman of the Board for the Physical Security Interoperability Alliance (PSIA), discusses the Alliance’s latest specification called Public Key Open Credential (PKOC).

“PSIA is dedicated to bringing open standards and specifications to solve complex problems for access control,” he says, noting that the group has long recognized the industry challenge of siloed, non-interoperable credential systems.

The value of interoperability and enhanced security

Ouellette stresses the importance of interoperability. He outlines how PKOC improves on typical credential technologies by shifting from symmetric to asymmetric encryption.

With asymmetric encryption, there is no key. Thus, there's no argument of who owns it or how to secure it.

Symmetric systems rely on shared secrets between reader and credential manufacturers, creating vulnerabilities and key ownership challenges. In contrast, PKOC’s asymmetric model uses hashing rather than shared keys. He says this provides a much higher degree of security and eliminates debates over key ownership or control.

Enabling gradual, cost-effective migration

Ouellette emphasizes PKOC’s role in easing transitions for institutions with large installed infrastructures. He highlights the difficulty many organizations face when considering wholesale reader replacement or campus-wide credential reprovisioning.

“Using something like PKOC enables the ability to migrate slowly over time in a way that you can afford,” he explains.

PKOC-enabled devices support multiple technologies, allowing old credentials to function with new readers and vice-versa until the migration is complete. This staged approach reduces disruption while ultimately leading to a fully modernized, more secure system.

Although PKOC is still emerging – with only about three years since inception and its first commercial deployment occurring this year – Ouellette encourages stakeholders to explore PSIA’s educational resources, including a detailed Q&A available on the Alliance’s website.

To watch the full interview, click the image at the top of this page.

 


TRANSCRIPT

In this episode of CampusIDNews Chats, we spoke with Jason Ouellette, Vice President of Innovation and Technical Partnerships for ELATEC, who also serves as Chairman of the Board for the Physical Security Interoperability Alliance. He discussed the Alliance’s new Public Key Open Credential (PKOC) standard, which provides interoperability to both mobile and smart card credentials.

Here’s what he said:

I'm Jason Ouellette and I'm the Vice President of Innovation and Technical Partnerships for ELATEC, but I also serve as Chairman of the Board for the Physical Security Interoperability Alliance, a consortium of companies aimed at trying to bring open standards and specifications to solve complex problems for access control and specifically credentials today.

So PSIA or the Physical Security Interoperability Alliance has been around for over 15 years. It is made up of a lot of players that are in either physical access control, credentials, locks, identity management, integrators – so a community that has understood the challenge of not having an interoperable solution for using credentials.

We've come together to one common table to try to solve this problem, which is where Public Key Open Credential (PKOC) comes from.

The alliance previously brought out the Physical Logical Interoperability Access Standard or PLAI, which is commercialized today, and now our second specification that's been released is the Public Key Open Credential.

So one of the first questions people really come to is what are the benefits of interoperability? Why is this important? Why should I care?

The challenge is we're living in a world where typically my credential works with my reader, and what that causes is the problem of being able to get one credential that can work across an entire ecosystem.

So interoperability is about solving that problem, bringing down the complexity and being able to use one credential for everything.

Public Key Open Credential is a higher degree of security over what most credentials offer today, with the difference really being symmetric versus asymmetric encryption.

What that comes down to is symmetric encryption is based on a shared secret, meaning there's a key that must be shared with reader and credential manufacturers in order for them to work together.

Asymmetric has none of this.

It uses a hash to verify the source that sends it, but there is no shared secret, making this a much higher degree of security around the use of a credential.

As an add-on to talking about the difference between asymmetric and symmetric, with asymmetric, there is no key.

Thus, there's no argument of who owns it or how to secure it.

Now we get to the point of just being able to focus on how do we enroll it, because we've already solved the fact that there is no key or ownership issues to worry about creating a proprietary solution.

One of the things that we always have to face, and really doesn't matter what vertical or industry you're coming from, is that there tends to be whatever's in place today, and the idea of having to rip and replace all the readers or reprovision all of the students and faculty is overwhelming and very costly.

Using something like PKOC and PKOC-enabled devices that are multiple technology for the reader and credentials, which also can support multiple technology, now enables the ability to migrate slowly over time in a way that you can afford. But at the same time not creating a pain point for the people who are using the credentials.

Old credentials get through new readers and new credentials get through old readers just alike until the migration is complete, at which point you can now turn off all the older weaker technology and you end up in a more secure place.

So PKOC is really new. It's only been around right now for about three years since its initial inception.

This year we are in our first commercial deployment, so when you think about standards and specifications that's really fast, but it's probably too early to be reaching out and asking for a quote.

It's still largely an education process and figuring out how and what's the best move for you.

So on the Physical Security Interoperability Alliance website under the Secure Credential Initiative is a white paper or a Q&A paper that addresses almost any question you could have about what PKOC is.

I certainly recommend that you pick that up. It's everything from one-page answers to the deeper dive of everything you wanted to know and more.

The wait is over.  We finally know who will lead Transact + CBORD ... and what we will call the merged company. Greg Brown, a seasoned SaaS leader who served as prior CEO for Udemy and Reflektive, will take the reins on January 5. Illumia will be the new name following an official brand reveal at the company’s annual conference in March.

According to the press release, “Brown is a veteran SaaS leader with more than 25 years of experience guiding technology companies through hypergrowth and major strategic milestones.”

Illumia sits at the intersection of mission-critical operations and meaningful human experiences – dining halls, campus access, patient care, tuition payments; moments that shape how people feel about the brands they're part of.

Most recently as CEO of Udemy he grew the company into a $750M+ enterprise learning platform, integrating generative AI across its learning products. Previously, he was CEO of Reflektive and held senior leadership roles at Blackhawk Network, Achievers, and WebEx.

"Illumia sits at the intersection of mission-critical operations and meaningful human experiences – dining halls, campus access, patient care, tuition payments; moments that shape how people feel about the brands they're part of," says Brown. "My career has been built on helping software and payments organizations deliver for their customers through technology, and Illumia is a unique opportunity to do both at scale.”

Harold Flynn, Group Executive at Roper Technologies, served as interim CEO for Transact + CBORD.

On the appointment of Brown, he says, "Greg’s deep commitment to customer success, combined with his track record of scaling SaaS businesses and driving operational excellence, makes him the ideal leader for this next chapter."

Describing the launch of the new brand, the release states, “the businesses [Transact and CBORD] now share a unified identity bringing formerly separate platforms and teams under a single, shared innovation strategy.”

In an "Introducing Illumia FAQ” on the Transact website, there were several questions of interest to Transact or CBORD transaction system clients. Examples include:

Stay tuned as we learn more and get to know more about Greg and his plans for Illumia. And I apologize in advance for our team struggling to stop saying “Transact, CBORD, or Transact + CBORD,” (we still slip up and say Blackboard now and then).

Promoting campus card services doesn’t require a formal marketing team – just strategic use of existing tools, strong campus partnerships, and a focus on simple, repeatable workflows. Insights from NACCU members Courtney Petrizzi (University of Alabama), Jennifer Banfield (University of Florida), and Jessica Peterson (South Dakota State University) show how card offices can launch and grow services effectively with minimal resources.

The three presented their ideas in a popular round table session at the NACCU 2025 Annual Conference and later turned that live session into a webinar. An abridged version was also released on NACCU’s Positive IDentity blog.

Build a small, efficient toolkit

A few low-cost tools can power an entire promotional strategy. Canva – free or paid –enables anyone to create high-quality graphics, signage, and quick videos. A mobile phone serves as camera and editing station, making content creation accessible. Be sure to add UTM tracking to every link and take advantage of QR codes with UTMs so you can monitor engagement and refine messaging based on measurable results.

Add UTM tracking to every link and QR code so you can monitor engagement and refine messaging based on measurable results.

Digital signage can be an essential asset. By mapping screen locations and knowing who manages each display, card offices can push simple, clear 16:9 slides in consistent two-week cycles tied to high-impact moments like orientation, move-in, and fee deadlines. Scheduled social posts through Meta Business Suite ensure communication continues even during peak workload periods.

Expand reach through partnerships and student creators

Campus partners can dramatically extend a card office’s reach. Dining, Housing, Bookstore, and Student Government often welcome plug-and-play graphics and shortform content they can drop directly into newsletters and social stories. Students are powerful creative collaborators. Leverage them and their mobile phones for videos and images that resonate. A one-hour session with a mascot or ambassador can generate reusable assets for years.

Small giveaways – funded by off-campus merchants who trade donated items for social shout-outs – help boost followers and engagement without affecting the card office budget.

Measure performance and build repeatable campaigns

Tracking performance is essential for proving value and securing future resources. QR scan data, UTM parameters, and a simple results log reveal which screens, posts, or campaigns drive action.

The authors provide examples of three turnkey campaigns – mobile credential tips, orientation photo submission, and commemorative cards – each with defined goals, assets, partners, and metrics. They also include a one-week starter plan with a roadmap of simple steps you can take to begin promoting your services without a dedicated marketing staff.

To explore these great assets and find a link to the webinar, check out the full article at NACCU’s Positive Identity Blog.

In this episode of CampusIDNews Chats, David Stallsmith, Director of Product Management at ColorID, discusses the company’s CardExchange Cloud solution. He says it is transforming credential management in higher education and other markets.

The platform is designed to manage the full identity lifecycle – from initial creation to termination. This includes issuing and replacing cards, printing IDs, supporting mobile credentials, and managing permissions as users’ roles evolve.

By decoupling identity management from other large operational systems, campuses gain more freedom and control while allowing all existing systems to continue functioning as they do today.

He explains that many institutions currently rely on their one-card system or physical access control system to handle identity management, but these platforms often offer limited flexibility, particularly when sharing data with downstream systems. CardExchange Cloud addresses this by moving identity lifecycle functions out of those legacy systems and placing them into an independent, cloud-based “meta layer.”

This architecture allows the platform to receive data from a trusted source of record and then integrate seamlessly with multiple systems, including one-card and access control solutions. By decoupling identity management from other large operational systems, Stallsmith says, campuses gain more freedom and control while allowing all existing systems to continue functioning as they do today. The result is a more flexible, connected, and efficient credential management environment.

To listen to the full interview, click the image at the top of this page.

 


TRANSCRIPT

 

Hi, I'm David Stallsmith, the Director of Product Management at ColorID.

We are at NACU 2025 in beautiful Henderson, Nevada in the desert and it looks on the banks of a lake like we're in a Mediterranean village here.

We've been showing CardExchange Cloud here to many people. There's a very high level of interest in this cloud product that's built to manage the identity life cycle of a credential from inception till termination and everything in between. Replacing cards, printing cards, mobile credentials, all of these things that relate to who a person is on campus, what they can do, what they have permission to do and then the ability to manage that as changes are made throughout the life cycle.

We're getting a lot of interest in this because CardExchange Cloud allows people to take the identity management creation life cycle out of whatever system it's been in.

In higher ed, this is often the one card system. Sometimes it's the physical access control system.

In other markets, it's definitely the physical access control system where it would only give you limited ability to manage these credentials, especially share that data with other systems downstream.

By lifting it out of this other much larger process, it can sit in its own meta layer, receive data from a source of record and then connect to other systems downstream, including the one card system and the access control system.

So everything else gets to keep on doing what it's doing, but this gives you freedom with your own separate, independent and yet well-connected platform to be able to manage credentials.

If you'd like to learn more about CardExchange Cloud, ColorID is now the proud owner of this fine software product and you can contact us at ColorID.

We're not hard to find, colorid.com.

Document and card security today is far more complicated than a list of features or materials. To meet modern fraud threats, card issuers – from governments to campuses – need to design documents with comprehensive approaches to protect against attacks along multiple fraud vectors. With foresight and planning, issuers can link and layer the right design, personalization modalities, and security elements to maximize security.

Counterfeiting trends

Not so long ago, staying ahead of counterfeiters was as easy as opting for a newer card design and employing a secure printing technology. That was typically enough to keep credentials secure and fakes easy to spot.

“A few years ago, a spoof was good enough,” says John O’Rourke, Director, Product Management for IDEMIA Identity & Security, N.A. “Counterfeiters would use a blank piece of PVC and an ink jet printer to create a card with a similar appearance, but today, that is not what we are fighting.”

Modern counterfeiters are sophisticated, well-financed enterprises with access to industrial card production equipment, advanced materials and techniques. A host of counterfeit ID vendors operate globally, and with such sophisticated operations, the legitimate secure credential vendor community must continue to innovate to stay ahead of fraudsters. And they must do this while still providing secure credentials at price points that are still affordable.

Profit drives counterfeit ID market

Today, the primary threat comes from a robust offshore counterfeiting industry, protected by the veil of Bitcoin and motivated by the vast potential market of underage drinkers in the US.

By some estimates, the market for fake identification cards is in excess of $100 million in the United States alone. And, while a small percentage of the market for fraudulent credentials consists of hardened criminals, the vast majority of all fake ID purchases are being used as “drinking licenses” by underage people.

Secure card design must combine the right layout, materials, personalization, and security features to guard against alteration and simulation attacks.

The law enforcement problem is that while underage drinking is an issue, it tends to fall below the radar when compared to other more serious criminal uses for fake IDs — “think identity theft and much worse,” explains O’Rourke. These uses of counterfeit IDs greatly concern federal investigators, whose jobs are made harder by the increasing sophistication of the fakes.

The large number of underage drinkers creates something of a subsidy for the highly criminal end of the spectrum. According to US census data, roughly 20 million people are between 16 and 20 years old, and that number stays relatively steady from year-to-year.

Where underage drinkers of the past may have turned to a back-alley establishment with a printer and a laminating machine, today the market has shifted online. And we aren’t even talking about the dark web here.

A simple Google search will yield a menu of commercial providers — many using highly advanced materials and equipment. And, because the transactions are largely done through Bitcoin, they are anonymous and untraceable — not to mention untaxed.

The large, stable demand for fake IDs has attracted a number of online counterfeit providers that are motivated by the highly profitable market. Counterfeit suppliers now compete based on price as well as the quality of fakes offered. For less than $100, a nearly perfect replica credential is available for virtually any jurisdiction, replicating sophisticated security features, intact holograms and even scannable barcodes and magnetic stripes.

Card substrates at the core of anti-counterfeit battle

The valid secure credential vendor community offers fraud-resistant card substrates to mitigate counterfeiters. Whether it is PVC composite, Teslin, polycarbonate or polyester, there are advocates out there who claim their card material is the counterfeit killer.

Unfortunately, while some substrates are better than others, any card material can be counterfeited. PVC composite is the traditional “sandbox” that fraudsters like to play in, but all materials are available to a fraudster willing to pay the price.

“The most important thing is to approach the credential knowing that no single design element and no single card material will make the card secure,” says O’Rourke. “Multiple layers of fraud deterrence are the only effective approach to building secure credentials.”

Modern counterfeiters are sophisticated, well-financed enterprises with access to industrial card production equipment, advanced materials and techniques

In the past, securing the credential was all about making an unalterable document — something that was highly tamper resistant. But card technology advanced with solid body card substrates and personalization embedded within the document. This made tampering with real credentials more difficult.

So fraudsters shifted tactics.

Now, the vast majority of the counterfeits simulate document material and features, rather than altering original documents. This opened the door to mass production of fake IDs as it is no longer necessary to have an original document to modify.

Secure card design must combine the right layout, materials, personalization modalities, and security features to balance the security protection against alteration and simulation attacks. This must also be weighed against the business needs of card life in the field, location of personalization equipment, and, of course, cost.

Conclusion: Materials alone cannot deter fraud

The counterfeit ID industry has grown rapidly as an ever-increasing demand combines with the anonymity of the web and crypto currency. Easy access to raw materials and advanced printing equipment enables modern counterfeiters to simulate IDs from virtually any jurisdiction.

The physical card materials can no longer stand alone as the primary security feature.

The key is to issue cards that can be made as secure as possible in the environment required, and at a price point that works — and to make sure that the credentials are employing as many deterrence factors as possible to keep ahead of the rapidly evolving counterfeit industry.

A new secure credential paradigm is needed that extends beyond a list of physical materials and basic security features. This new paradigm must encompass multi-modal personalization, an array of security features, the right materials and a linked and layered design to counter multiple sophisticated fraud vectors.

CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Great inverview on the Public Key Open Credential (PKOC) standard with ELATEC's Jason Ouellette, Chairman of the Board for the @PSIAlliance.

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2026 CampusIDNews. All rights reserved.