Campus ID News
Card, mobile credential, payment and security
FEATURED
PARTNERS

When Julia Lehman first arrived at State Fair Community College (SFCC) in Sedalia, Missouri, she was lost and unsure where to head.

“I was a bit disoriented, and like, ‘Where is the nearest map?’” said the incoming freshman business management major.

Lehman didn’t have to look far for help to find her way around campus. She pulled out her mobile phone, opened her school’s campus app, and began navigating.

“We have Google Maps in there,” said Tammie Montgomery, director of enterprise communications for SFCC. “Students can even drill down to the building, find the room numbers, and take a look around. They can see where their classrooms are before they get here.”

SFCC uses 360u from TouchNet as their campus app platform. It houses the student ID and connects students to campus services and resources to navigate student life. Users simply scan a barcode on the app to make payments and access a wide range of services.

Navigating campus life with a mobile app

Using the 360u app to navigate unfamiliar surroundings is one of the first ways it can help students as they transition from a structured day in high school to being fully responsible for their schedule.

Incoming freshman Ziek Barth-Fagan knew going to college would be a big life change and that he would rely on the app during the transition.

When I downloaded the app, I felt like I was finally in college and out of high school. It made me feel accomplished.

“Transferring from high school to college – definitely going to be a struggle,” he joked. “The app will give me structure, help me plan my schedule, and get through the next two years. When I downloaded it, I felt like I was finally in college and out of high school. It made me feel accomplished.”

Setting their students up for success is one of SFCC’s goals. As students begin arriving on campus for their first classes, the college hosts a program called “First Two Weeks,” designed to help students acclimate to college life.

“During those first two weeks, we have multiple activities each day for students, and they use the app as for entry to those activities,” said Brent Bates, SFCC president. “It helps us track students’ participation to evaluate the success of our events, and it also helps us make informed decisions about what is working and what is not.”

Supporting student success with campus ID data

Data from OneCard – the student ID system that powers 360u – not only helps improve student activities, but it can alert campus workers to those who may be struggling.

Students access their digital student ID within the 360u app to use their meal plans. These transactions create data that alerts campus workers to potential problems.

One of the reports I use regularly shows students who haven’t used their meal plan in the past week. It’s an early notification that maybe a student might be struggling.

“One of the reports I use regularly shows students who haven’t used their meal plan in the past week,” said Montgomery. “It’s an early notification that maybe a student might be struggling. I send it off to the residence director, and they can check up on the student to see if there’s a problem.”

In addition to maps and meals, students can use their campus app as a declining balance account. Students can load funds to their student ID that can be used for purchases at vendors including the campus bookstore where they can pick up school supplies and swag.

Having the ID on their phone comes in handy as younger generations rely less and less on traditional wallets.

“Students appreciate their digital IDs on their cell phone because they’re never too far away from them,” said Nancy Theisen, account receivable specialist at SFCC. “They grew up with cell phones and have their phones with them all the time. They may not have their wallet or a physical ID card, but now it's always handy on their phone.”

Saving time and money for students and the card office

The digital student ID prevents students from paying for a new ID, because they are less likely to lose their mobile phone than a physical ID card. Not only does a digital ID save money and time for students, but it does so for the business office as well. In addition to reducing the number of physical cards printed, each student can upload their picture within 360u, eliminating the need for campus employees to snap student photos.

“Printing cards costs money because we have to order the supplies, the cards, the ink, the ribbons, and the printer,” said Montgomery. “So, we save by not having to print for every student. We also have extended campuses, so now we don’t have to print the cards and courier them to the other locations. We don’t need staff to take pictures, print cards, manage the cards, or mail the cards.”

Physical cards cost money because of the supplies, cards, ribbons, and printers. Now we don’t need staff to take pictures, print cards, manage the cards, or mail the cards.

For Barth-Fagan, the 360u app is not only something he’ll use as part of his college life, it mirrors the rise in technology he’s grown up with.

“My phone is my go-to instead of my wallet. I use my phone for basically everything from keeping my documents organized to paying for whatever I need at stores. Technology has played a major role in my life.”

To learn more about TouchNet 360u and the OneCard Campus ID platform, visit touchnet.com.

 


Melissa Medeiros, TouchNetAbout Melissa Medeiros
With over twenty years in the payments industry, Melissa has partnered, brought to market, and managed multiple innovative solutions. With expertise in security and compliance, breaking down complex concerns into easy to understand solutions is what she does. Melissa brings that expertise to support a team of high-performing professionals committed to driving solutions for higher education by simplifying and building consistency with familiarity in student and administrative engagement across campus.

Higher education is facing a new reality. As enrollment numbers fluctuate and budgets contract, colleges and universities must either embrace data-driven decision-making or risk obsolescence. The implementation of sophisticated data analytics platforms has evolved from a mere advantage to an essential survival tool.

Modern universities compete not only through academic excellence but through operational innovation. This chasm between acknowledging data's importance and successfully implementing data-driven strategies threatens many institutions' viability. So much so that three important bodies in higher education, The Association for Institutional Research (AIR), EDUCAUSE, and the National Association of College and University Business Officers (NACUBO) created the Change with Analytics Playbook to showcase the power of data and analytics to make better decisions and fulfill their institutional missions.

Breaking down barriers: The power of unified data

Modern analytics platforms transform fragmented information – from financial metrics to student performance data – into actionable intelligence. These systems demolish traditional departmental barriers, revealing crucial patterns that drive institutional success.

Western Washington University implemented a comprehensive data system to pinpoint inefficiencies, predict enrollment trends, and allocate resources more effectively.

Western Washington University exemplifies this transformation. By implementing a comprehensive data system, the institution has revolutionized both its day-to-day operations and strategic planning. Viewing its operations through the lens of aggregated data, they have been able to pinpoint inefficiencies, predict enrollment trends, and allocate resources more effectively.

The sophistication of these platforms extends beyond mere data collection. Advanced analytics engines uncover subtle patterns invisible to human analysts, from student success indicators to optimal financial aid strategies. This capability transforms university administrators from reactive problem-solvers into strategic planners, anticipating and addressing challenges before they materialize.

In today's fiercely competitive academic landscape, where institutions vie for students, funding, and prestige, this predictive capability proves invaluable. Universities leveraging comprehensive data analytics navigate changes with evidence-based confidence while enhancing student outcomes. Here are some examples:

Strategic enrollment management: Universities can deploy predictive analytics to identify and recruit high-potential students, diversifying their applicant pools and strengthening incoming classes. College administrators face a paradoxical challenge: while the Common App and test-optional policies have led to a surge in applications, overall enrollment continues to decline, making it crucial for universities to leverage predictive data analytics to identify candidates most likely to succeed at their institutions.

Only 76% of full-time U.S. university students persist to their second year of college, but patterns in tuition payments, class attendance, and campus engagement can help.

Enhanced student success: Through sophisticated analysis of academic performance, campus engagement, and payment systems, institutions identify at-risk students early and intervene before they drop out.

Only 76% of full-time U.S. university students persist to their second year of college. Predictive analytics allow schools to examine patterns in tuition payments, class attendance, and campus engagement, enabling timely interventions like financial counseling or flexible payment plans.

Optimized resources and campus services: Comprehensive facility usage analysis optimizes everything from classroom scheduling to energy consumption, generating substantial cost savings while improving campus operations. Meal plan and campus commerce systems with real-time tracking and inventory management capabilities allow colleges to make data-driven decisions on everything from what snacks to offer at the rec center to seamlessly integrating reusable container programs into dining services.

The road ahead

Ian Ashworth, Transact

Ian Ashworth, Director of Product Management at Transact Campus


Colleges and universities that fully integrate advanced analytics into their operational DNA will distinguish themselves as the educational innovators versus those who will be left behind in the coming decade. Success hinges on bridging the implementation gap between acknowledging data's importance and fully deploying systems. The good news is that emerging cloud-based, secure, easy-to-integrate and deploy data platforms can quickly turn this potential into measurable success.

The next decade will likely see a widening gap between institutions that successfully leverage data analytics and those that don't. While the implementation challenges are real, they're not insurmountable. As more universities bridge the gap between recognizing data's importance and actually deploying effective systems, they're discovering that the true value lies not in the technology itself, but in how it transforms decision-making and student outcomes.

Generative AI is showing promising potential for enhancing productivity and personalizing learning experiences in the education sector. AI tools are helping educators automate administrative tasks, generate lesson plans and even create personalized learning pathways for students.

According to McKinsey, generative AI can significantly impact activities related to supervision, documentation and communication. To put it in perspective, teachers can use AI to automate grading, summarize long educational content and generate customized instructional materials. This allows educators to focus more on teaching and interacting with students, which enhances overall productivity1.

Generative AI is also making strides in personalized learning. By analyzing data on student performance and engagement, AI can recommend individualized learning goals and resources, helping students progress at their own pace. This approach reduces the burden on teachers to manage diverse learning needs and frees up time for more targeted support​2.

By leveraging the latest Large Language Model (LLM) technologies, AI-driven tools are raising the bar on safety, efficiency and service.

Additionally, AI tools like chatbots can assist with administrative support in education institutions, handling student inquiries and simplifying tasks like scheduling—thereby allowing educators and staff to concentrate on more complex responsibilities​3.

But an area that’s still largely untapped in the world of AI is campus safety and data privacy. Tools like Alert Enterprise’s AI Security Chatbot have potential to transform how campuses approach security and daily operations. By leveraging the latest Large Language Model (LLM) technologies, these AI-driven tools are raising the bar on safety, efficiency and service.

When you think of today’s college campuses, you think of bustling dorms, state-of-the-art research labs, large lecture halls and hundreds (if not thousands) of daily visitors. But with this constant activity comes the challenge of keeping everything and everyone secure. Traditional methods of campus security, while reliable, are increasingly falling short in a world that demands real-time responsiveness and precision.

Modern security solutions need to be proactive, not just reactive. They should be able to detect potential threats before they escalate and provide clear communication to everyone on campus when emergencies arise.

To put things into perspective, public schools across the nation reported various incidents of criminal activity since 2022: According to a survey, approximately 35.8% documented instances of vandalism, 20.2% reported incidents of theft and 4.2% recorded cases of robbery—whether with or without the use of weapons4.

With rising threats, it’s no wonder that many are turning to smarter solutions. That’s why platforms like Alert Enterprise’s Guardian powered by Gen-AI are transforming how campuses approach security and daily operations.

Why campus security needs a smarter approach

Campus security teams are responsible for managing various complex tasks, including access management, incident response and emergency protocols. With the sheer volume of people and high-traffic areas that need to be monitored, traditional systems are often unable to keep up with the speed and scale required for effective security. Universities can’t afford to rely solely on outdated systems that are slow to respond or lack the adaptability needed for dynamic environments. Many are sitting on a goldmine of valuable data which can be leveraged for powerful insights.

This is where a smarter, more advanced security approach becomes essential. The demands on campus security now extend far beyond simply keeping doors locked and monitoring cameras. Modern security solutions need to be proactive, not just reactive. They should be able to detect potential threats before they escalate, manage access in real time and provide quick, clear communication to everyone on campus when emergencies arise.

AI chatbot on laptop

A smarter approach also means prioritizing the experience of students and staff. Security measures shouldn’t be intrusive or create bottlenecks in high-traffic areas. Instead, they should enhance convenience—like offering quick access to secure facilities and providing real-time assistance when needed. By integrating advanced tools like AI chatbots and virtual agents, campuses can streamline security operations, ensuring safety without compromising on the flow and accessibility that students and staff expect.

In essence, universities need a security system that does more than simply protect—it should actively contribute to creating a safe, efficient and welcoming environment for all. By adopting AI-driven solutions, campuses can achieve that balance, delivering a smarter approach to security that’s built for the unique needs of modern university life.

AI chatbots: Reinventing campus access control

Recent stats show that approximately 70% of faculty and school staff are required to wear badges or picture identification5. But effective access control on campuses is no longer just a matter of scanning ID cards. AI chatbots can provide instant answers to a security personnel’s questions about access or location, like how many students and staff are in a specific building. To add to that, they can provide consistent recommendations for standard operating procedures (SOPs) when suspicious activity or an incident is identified. By analyzing access patterns, these Security AI technologies add an extra layer of security, flagging any unusual behavior that might signal an issue.

AI chatbots can provide instant answers to a security personnel’s questions about access or location, like how many students and staff are in a specific building.

Security AI can also continuously monitor for suspicious behaviors, flagging potential threats before they escalate—like repeated denied access attempts and access attempts outside of standard operating times. This constant vigilance ensures security teams are always aware of what's happening across campus.

Also notably, Alert Enterprise’s AI technology for predictive maintenance of devices can eliminate outages and close security gaps. For example, it can notify security teams in advance which devices—like readers and cameras—may soon be down and need replacing.

Keeping students and staff secure, 24/7

AI chatbots provide a reliable, 24/7 point of contact for students and staff needing assistance. Whether it’s reporting an issue or finding the nearest emergency exit, users have a digital guide on hand at all times. This accessibility is particularly valuable during emergencies, where a chatbot can automatically provide clear, immediate instructions.

And let’s be honest: In critical situations, response time is everything. AI chatbots can provide automated recommendations for standard operating procedures (SOPs) in response to emergencies and incidents. By following predetermined protocols and coordinating with security systems, these chatbots ensure everyone on campus is kept informed and safe.

More than just security: AI drives campus efficiency

AI doesn’t just enhance security—it can also handle routine tasks, freeing up campus staff to focus on more complex issues. From managing visitor registrations to ensuring compliance checks are done, AI chatbots streamline these processes so security teams can focus on tasks that matter most.

AI chatbots are highly effective at analyzing data to identify potential vulnerabilities, allowing campuses to address issues before they become serious.

Then there’s proactive risk management. AI chatbots are highly effective at analyzing data to identify potential vulnerabilities, allowing campuses to address issues before they become serious. Understanding patterns in foot traffic, access requests and other data points allows the AI tool to provide insights that help prevent potential risks and streamline campus operations.

Say goodbye to privacy concerns

The Guardian AI chatbot enhances data security and privacy by allowing users to interact with powerful AI without exposing sensitive information. Alert Enterprise’s patented system uses a predefined query language to communicate with large language models, ensuring your enterprise data remains protected. Whether you need to query data or execute tasks, the AI processes natural language queries, generates precise syntax to interact with your internal systems, and delivers accurate results—without ever accessing or exposing the underlying data itself. That’s our dedication to responsible use of security AI.

A smarter, safer campus awaits

Security today is about more than just keeping intruders out; it’s about creating an environment where everyone feels safe and supported. AI chatbots like the Alert Enterprise AI Security Chatbot are helping universities achieve this by enhancing security and operational efficiency. With tools that can analyze, respond and communicate insights instantly, campuses can stay ahead of potential threats and provide a better experience for students and staff alike.

Contact Alert Enterprise to learn how we can help you get a lot more done in way less time—without compromising on safety and security. Ready?


headshotAuthor Bio

Jamshed Patel, Vice President of Value Engineering at Alert Enterprise, brings over 25 years of tech industry expertise to the table. A seasoned leader, he’s a pioneer in machine learning, using AI to help organizations gain insights, predict outcomes and automate complex tasks. Before joining Alert Enterprise, Jamshed was at the helm of Product Strategy at DataVisor, working on cutting-edge AI-based fraud detection. With his extensive background at companies like Workday, ADP, Honeywell and Oracle, Jamshed is a key force behind the innovation at Alert Enterprise. Passionate about creating real-world solutions, he’s thrilled to be part of the mission to make security smarter, faster and a whole lot more effective.


1https://www.mckinsey.com/capabilities/mckinsey-digital/our-insights/the-economic-potential-of-generative-ai-the-next-productivity-frontier

2 https://assets.asana.biz/m/25388d9dbeadd06e/original/FY25_Q2_State-of-AI-at-Work-Anthropic_Final.pdf

3 https://www2.deloitte.com/us/en/pages/consulting/articles/state-of-generative-ai-in-enterprise.html

4 https://www.statista.com/statistics/183638/incidents-of-crime-at-public-schools-by-type-of-crime/

5 https://nces.ed.gov/fastfacts/display.asp?id=334

In today's rapidly evolving technological landscape, choosing the right access control solution for your building is more critical than ever. Whether you're working on new construction or retrofitting an existing structure, the decision between wired and wireless solutions can have far-reaching implications on installation costs, maintenance, operational efficiency, and overall security. With a myriad of options available, it can be challenging to determine which system best meets your specific needs.

There may be more than just five considerations when selecting wired or wireless systems for your building and specific needs. However, some key considerations can help initiate the decision process, like advantages and drawbacks of both wired and wireless systems, and accounting for factors such as building construction and materials, Wi-Fi availability, IT infrastructure, and aesthetics. This helps enable you to make a well-informed decision that balances cost, reliability, and futureproofing for your access control system.

Choosing between wired and wireless access control systems can significantly impact installation costs, maintenance, and overall security.

1. Wired or Wireless?

Wired: Ideal for New Construction

Wired systems are often the preferred choice for new construction projects for several reasons. One significant benefit is eliminating ongoing maintenance tasks like changing out batteries. This can save both time and money in the long run. Additionally, wired connections are generally more reliable and less susceptible to interference compared to wireless solutions, ensuring stable and consistent performance. However, it's important to note that wired systems require a significant amount of cable footage between openings and data closets. This can be both costly and labor-intensive, making it a less attractive option for updating existing buildings.

Wireless: Better for Retrofit

In contrast, wireless solutions are typically more practical for retrofitting existing buildings. Wireless systems can help avoid potential issues like asbestos exposure when wiring to every door, which is particularly beneficial in older buildings where construction materials may pose a hazard. Furthermore, wireless solutions often result in lower labor and material costs as they do not require extensive cabling between doors. This can lead to significant savings in both installation and long-term maintenance.

Wireless access control solutions offer practical advantages for retrofitting older buildings, avoiding issues like asbestos exposure and reducing labor costs.

A building's construction and materials play a crucial role in the effectiveness of wireless systems. It is essential to ensure that wireless data can get through the building materials, as some materials, such as concrete or metal, may block or weaken signals, affecting the system's reliability. The absence of extensive cabling can be particularly advantageous in buildings with complex layouts or challenging construction materials, leading to both cost and time savings.

Is Wi-Fi Available?

Before opting for a wireless solution, it's essential to verify if Wi-Fi is available and reliable throughout your building. A robust Wi-Fi network is crucial for the effective functioning of wireless access control systems. Without a dependable Wi-Fi infrastructure, the performance of wireless systems can be compromised, leading to potential security risks and operational inefficiencies.

A robust Wi-Fi network is crucial for the effective functioning of wireless access control systems, ensuring reliability and security.

Consider your IT department’s policy and the network's capacity for handling unique IP addresses per door. This can impact the scalability and management of your wireless system. If your IT infrastructure is not equipped to handle a large number of unique IP addresses, you may need to explore alternative solutions. Understanding these limitations beforehand can save time and resources in the long run.

2. Requirements of the Opening

Different doors may have different requirements, and it's essential to assess these needs carefully. For example, determine if you can live with intermittent communication or if near real-time communication is necessary. High-security areas may require real-time monitoring and immediate response capabilities to ensure safety and security. Additionally, evaluate if doors require lockdown capabilities or alarms during certain conditions. This is particularly important for areas that need to be secured quickly in case of an emergency, ensuring that the access control system meets all security requirements.

Also consider whether certain doors should be always locked, like student dorm room doors, or if the opening may benefit from a schedule where they unlock during normal academic hours and relock at the end of the day, like the entrance to an academic or residence hall. Perimeter doors and openings with higher traffic during certain periods of the day tend to benefit most from the convenience of such schedules. Alternatively, there are some openings that may benefit from being locked and unlocked manually, like faculty offices where the individuals’ convenience matters. Heads up—local codes may dictate how and when electronic locks and automatic locking features are used across campus, so be sure to consult with a code expert.

3. Credentials and Futureproofing

Current and Future Credential Technologies

Evaluate what credential technologies you currently use and what you might adopt in the future. Consider if a large deployment justifies transitioning to advanced credential technologies like high security smartcards or digital credentials in Apple Wallets for iPhones or Google Wallets for Android phones. This can enhance security and user convenience, making it easier for authorized personnel to gain access while maintaining high security standards.

Many colleges and universities are evaluating digital wallet capabilities because of the increased security blended with an enhanced student experience. Not only is it convenient for busy students on the go, but it helps alleviate the burden of creating and correctly distributing physical cards to thousands of students arriving on campus for their first year.

4. Annual Maintenance Costs

Factor in the ongoing costs associated with your chosen solution. Are you prepared for the maintenance involved in changing batteries? Wireless systems often require regular battery replacements, which can be time-consuming and costly. Additionally, understand the manufacturer’s warranty policy and whether you can self-repair or need to replace components entirely. This can impact both the cost and downtime associated with maintenance, so it's crucial to have a clear understanding of these aspects.

5. Mechanical Aspects of The Opening

Don't overlook the mechanical aspects of electronic locks. Ensure locks can withstand the wear and tear commonly found in high-abuse and high-traffic environments like colleges and universities. Some doors, like those at the entrances of residence halls, academic buildings, or the student union, may be opened thousands of times on any given school day, putting significant wear and tear on hardware. ANSI BHMA Grade 1 locks are highly recommended for campus environments due to their durability.

High-traffic doors’ – especially exterior or perimeter doors – may be better served by “fixed” hardware. For example, to maximize the life and minimize the maintenance of the door hardware, a fixed pull exit trim on an exit device may be a more appropriate solution than a dynamic wireless lock that requires thousands of rotations and pull force on a lock handle.

In addition to the number of high cycles and abuse the perimeter door hardware experiences, high-traffic doors’ batteries may drain quickly, so these openings will be better served by a line-powered access hardware than battery-powered wireless locks.

Some doors, like those at the entrances of residence halls, academic buildings, or the student union, may be opened thousands of times on any given school day, putting significant wear and tear on hardware.

And while we are talking about battery life, when wireless lock options are being evaluated at lower use openings, choose a product that minimizes the frequency of battery replacement.  Battery performance and efficiency do vary from manufacturer to manufacturer.

Consider if you need key overrides and whether these locks should be on the same mechanical key system as the rest of the campus. This can provide a backup method of access in case of electronic failures or where battery power has been exhausted, ensuring that security and access are maintained at all times. You may also need to consider deploying a new or separate key system if the campus key system is out of control.

Aesthetic Considerations

Finally, think about the aesthetics of the locks. Select styles and finishes that complement the design of your space. This can enhance the overall look and feel of your building while providing the necessary security features. Balancing functionality and aesthetics ensure that the access control system not only meets security requirements but also contributes to the building's visual appeal.

Choosing between wired and wireless access control solutions is a complex decision that requires careful consideration of various factors. Both options come with their own set of advantages and drawbacks, making it essential to evaluate your specific needs and constraints thoroughly.

Making an informed decision about wired versus wireless access control solutions involves a comprehensive evaluation of your building's needs, construction materials, IT infrastructure and long-term maintenance considerations. By weighing these factors carefully, you can select a system that balances cost, reliability, and futureproofing, ultimately enhancing the security and functionality of your building.

By Ryan Audus, Vice President of Product Strategy, TouchNet

Colleges and universities are increasingly supplementing their core revenue sources of tuition and fees, endowments and investments, and grants and appropriations from government sources. Institutions are developing alternative revenue sources, which include a seemingly endless range of activities on campus and online. The benefits of developing alternative revenues are many and include improvements that go beyond counteracting volatile budgets.

Common examples of alternative revenue sources are auxiliary services such as dining, bookstores, housing, recreation centers, and transportation. Many other alternative revenue sources exist, too, and these often take advantage of unique attractions and assets of an institution. Examples include collecting entrance fees for an archaeology museum and selling permits to cut down firewood from a university-owned forest.

Touchnet ROI banner

 

Campus IDs readily connect to activities that generate alternative revenue

A campus ID that is integrated with other systems on campus, and is capable of making payments, is ready-made to help institutions develop alternative revenue sources. With a tap or swipe, the ID can be used to quickly and conveniently purchase goods, access services, attend events, and more activities that generate additional income for the institution. A student’s ID facilitates nearly every activity in their day to day campus life, many of which present a revenue opportunity such as:

Payments via campus ID increases usage

Today’s students prefer the quick, frictionless experience of digital transactions. An integrated campus ID that can make payments satisfies those expectations and fosters engagement, as evidence shows that expanding campus ID capability increases ID usage, especially purchases of goods and services.

Declining balances makes purchases convenient and quick

A further convenience of a campus ID is connecting it to a declining balance account. Using the campus ID as a closed-loop payment option makes purchasing goods and services easy for students, amongst many other benefits. 

Campus IDs support alternative revenue generated by non-students

Institutions can extend their campus ID use to non-students who visit campus for a variety of reasons in all seasons, such as all-inclusive youth summer camps, visiting researchers presenting at academic conferences, and building and repair contractors working on campus. These are opportunities to drive additional revenue by allowing non-students to use their temporary campus ID for purchases across campus.

Partnering with vendors provides options and flexibility

An integrated campus ID allows you to expand the array of goods and services available for purchase because the campus ID system’s open platform facilitates secure payments to campus vendors. When legacy systems reach end-of-life, or perhaps a newer solution is preferred to meet changing needs, an integrated campus ID provides the flexibility to make changes.

Campus ID systems present highly valuable data for improving processes

An integrated campus ID system will collect and generate lots of data from the thousands of transactions it facilitates. Campus ID data is highly valuable in assessing revenue streams, helping to find ways to forecast trends, reduce costs, and increase sales. Data analysis ensures that the ID system’s functions are satisfying to users and efficient and productive for the institution.

Campus IDs create flowing streams

Campus IDs support a nearly endless list of activities that are alternative revenue streams. That’s because the campus ID is like a Swiss army knife—a single object with many capabilities, applicable to traditional needs as well as new, creative uses. 

If your institution is interested in using your campus ID to generate alternative revenue streams, download our playbook, Empowering Alternative Revenue Streams in Higher Education, to learn more.

Whether it’s a K-12 school system or large university, campuses all have the same basic security needs: safety and security, and giving students, parents and staff the confidence that administrators are on top of things with a multi-layered approach.

Controllers are an increasingly important element for meeting these needs. In the past, they were largely single-purpose devices, but today’s intelligent controllers play a much larger and more pivotal role, enabling organizations to integrate disparate systems into one unified solution for enhanced security, efficient management and innovative building capabilities. Controllers leverage open architectures to improve flexibility, ROI, scalability and cybersecurity throughout the life cycle, and streamline the path to upgraded capabilities while still supporting legacy solutions.

Importance of Open Standards and Platforms

Open standards and platforms are the foundation for an access control infrastructure that simplifies upgrades and the integration of third-party applications so that users aren’t “locked in” to a finite set of capabilities and can adapt to support new functionality. School administrators want limitless options, flexibility, and freedom to choose products, systems and integrations they can leverage through a common application and interface rather than a rip-and-replace project. OEMs who serve them likewise want to seamlessly integrate controllers with both on-premises and cloud-based access control environments.

Open standards and platforms are the foundation for an access control infrastructure that simplifies upgrades and the integration of third-party applications so that users aren’t “locked in.”

To accomplish these objectives, intelligent controller hardware must support many open standards including OSDP, BACnet, PSIA, MQTT and numerous networking protocols. This enables many different devices and applications to be integrated using an Application Programming Interface (API).

An example of this approach is Mercury’s recently launched MP Series controllers that provide an open, cybersecure platform for delivering future-ready performance. Supported by an OEM ecosystem comprising approximately 30 OEM partners, these controllers were designed to give users the freedom to choose best-of-breed manufacturers through whom they could have long-term control over their investments in the total cost of ownership in their access-control infrastructure.

These products also leverage a future-ready third-party app development environment within the controller to further streamline and expand integrations. This puts integration control in the hands of those implementing the technology. The controllers easily integrate with complementary devices, from wireless locks to intrusion detection products that naturally integrate within the access-control infrastructure for a better, more intelligent system. Each new device in the ecosystem extends options while building upon previous integrations and investments.

Once campus security teams standardize on a controller, they benefit from both existing and future supported devices and integrations within the ecosystem. They realize these benefits through a simple firmware or app update on the controllers already installed on the wall.

Security in an Open World

Some argue that APIs are less secure, but the truth is that a proprietary solution is not inherently better than an open solution from a data and information security standpoint. All products must be designed, built and integrated, from the ground up, with a cybersecurity perspective in mind.

This means that development teams must be governed by the policy of a secure design lifecycle spanning everything from processors to firmware to APIs and the Software Development Kit (SDK). From the initial design phase forward, everything must be built with cybersecurity in mind and leverage the latest encryption and other standards and capabilities that IT departments demand of all network elements.

Ultimately, the cybersecurity question isn’t whether a solution is “open” or “closed” – it is whether it has been built to deliver the desired processing method and functionality, on the foundation of a secure design lifecycle policy.

Solving the Legacy Problem

Two of the more important problems to solve with open-architecture controllers is simplifying the path from legacy to current access control systems and increased/updated cybersecurity protections.

Controllers installed decades ago cannot provide the cybersecurity protections that are required today. Most have likely been on the wall for 10 or more years and are exposing educational institutions to failure risks and cybersecurity threats. While these aging controllers continue to serve their purpose, many institutions including universities with enterprise-level security needs must upgrade them to the latest generation as quickly as they can – without being forced to before they are ready because a product has reached End of Life (EoL) and is no longer supported.

The ideal solution is ensuring that each new generation of controllers can operate in “legacy mode” to emulate the prior generation product. Delivered through firmware, this capability combines backwards compatibility with earlier product generations and an easy migration path to new product generations. This dual-pronged approach eliminates previous challenges related to upgrading and also navigating end-of-sale and end-of-life situations. Users can continue to grow and expand their current environment with new controllers that offer new benefits but can also behave like the prior generations of controllers.

Also important for this upgrade path is that the physical design of all new controllers use the same footprint as previous product generations. A common form factor across all products makes for a seamless board swap when replacing an earlier generation to move into the future. With no requirement of a forced upgrade from a prior generation product family, customers can move forward with upgrades at their own pace rather than having to follow an artificial timeline mandated by the manufacturer.

Maximizing Benefits

To maximize the value of intelligent controllers as the foundation for a future-proof access control infrastructure, it is important to evaluate intangibles. These include elements like the controller brand trust factor and manufacturer commitment to further enhancing security in their products, from secure boot capabilities to cryptography.

There also are significant upcoming controller innovations to consider. Controller technology is evolving to enable versatile processing close to the security decision point, which includes expanding the power and storage available on the hardware and increasing the options for developers to create new solutions. As controllers get smarter, they will run diverse and sophisticated apps locally with high performance, and connect to a widening range of sensors, devices and systems. They also will be executing complex procedures in real time using advanced analytics at the edge, providing faster performance than devices that are dependent on upstream network communications.

Controllers have come a long way in the past several decades. As they evolve to support advanced software execution capabilities locally, they will elevate security at the point of execution for a future-proof infrastructure that evolves at the speed of software and supports dynamic operations that need a flexible and extensible PACS edge computing solution. In the meantime, open-architecture controllers are already creating a more capable, flexible and scalable access control infrastructure and providing the kind of “openness” that matters most to university security teams.


By Tim Nyblom, Director, End User Business Development, Higher Education, HID

By Martha Wilson, ISA Director, Product Compliance, TouchNet
Campus ID systems rely on technology to make processes more efficient, productive, and convenient. In these processes, ID systems collect and generate a lot of data. This is both an intensely valuable benefit and a significant liability to manage.

Data is a crucial resource for higher education administration. Colleges and universities depend on data analysis to understand student behaviors, improve services, better allocate resources, and more. Data is also the world’s most valuable resource, more than oil and precious metals, and attracts security threats, raises privacy concerns, and involves compliance obligations.

The result is higher education is rich with data and a growing target for cybercriminals. These bad actors not only want financial information but the personally identifiable information (PII) connected to it, and they will use fraud methods to take, use, and ransom data. The cost of a data breach can be substantial and is increasing every year.

Best practices for privacy and security

Properly managing campus ID data to make it private and keep it secure, while achieving regulatory compliance, is imperative to the daily operations and long-term health of an institution. Here are best practices to help your institution create and maintain privacy, security, and compliance of campus ID data:

1. The human element is the most important element

The human element is the number one root cause of breaches, not technology. Ploys include email phishing, fake invoices and documents, account takeover, and human errors such as weak or shared passwords, not updating software and hardware to new versions, and more.

Technology is designed to be private, secure, and compliant, but humans still need to monitor and maintain technology to ensure it performs correctly. When changes happen, technology usually does not change itself, humans must intervene to adjust it.

2. Gain visibility to get control

You can only manage what you know about and can control. Dig into every corner of the institution where there may be physical and digital items in need of privacy, security, and compliance measures. Having both a solid data asset map and a physical security map is critical to maintaining control across your entire institution.

Once you know what data exists, gain visibility into the data’s life cycle: what data you have on hand, how it’s generated or collected, where it’s stored, who can access it, what are your data retention policies, and more.

3. Different types of data deserve different management

Not all data is the same, and it should not be treated the same. Certain types of data require more extensive protections or particular management to satisfy both business needs and compliance requirements. Make sure your organization conducts due diligence to identify different types of data and the best ways to manage them.

4. Manage vendors’ access to data and commitment to security

Identify and actively manage the access third-party companies and organizations have to institutional data, including how they use that data. Ensure industry-standard security practices are followed by third parties and review and update contracts with them. Request independent third-party security audits of any vendors that process student data. Make sure you understand what types of restrictions vendors implement when processing student data. These and other management steps will likely require coordination between IT, legal, procurement, and other stakeholders at your institution.

5. Surround yourself with experts and resources

Stay up to date on developments in technology, regulations, and changing human habits (legal and illegal) by joining higher education and technology industry organizations. Consult with experts in those organizations and use the information and resources they provide. Communicate and coordinate with your institution’s legal counsel, information technology, privacy, and campus security teams as well as other key stakeholders.

6. A platform approach to solutions improves privacy and security

A platform approach to solutions provides a comprehensive strategy to integrate software and hardware, standardize processes, and deliver consistent privacy and security measures across an entire system. A single platform is easier to learn, control, configure, and monitor, and covers more ground than multiple disconnected solutions with disparate approaches to privacy and security.

Get your guide to navigating the evolution of privacy, security, and compliance

TouchNet is a longstanding leader in developing campuswide ID management solutions and services that are private, secure, and compliant by design. Download our ebook to learn more best practices in privacy, security, and compliance and how they can help your institution prevent and mitigate fraud.

By Mike Harris, VP of Sales East US, Alert Enterprise

College enrollment is up again; new data suggests higher education enrollment is increasing, especially at community colleges which suffered the harshest enrollment declines in the last few years. The not-so-great news? With more foot traffic comes the need to manage physical access for more students, faculty and visitors—no small feat when you consider the time, effort and cost that goes into ensuring a safe, sustainable and convenient campus experience.

To make secure access more accessible for all, Alert Enterprise developed Guardian: A robust Physical Identity and Access Management (PIAM) and visitor management tool designed to meet the needs of higher education institutions and one-card offices. By using our advanced automation, seamless integrations and scalable cloud-based platform, institutions can enhance security, improve efficiency and provide smarter access for card holders and visitors alike. Let’s dive into all the ways Guardian can revolutionize your campus security and access management with a student-approved, mobile-friendly experience.

Out with the old, in with a breeze

Many higher education institutions rely on self-built automation applications that are often a hassle to integrate, upgrade and maintain. But there’s a smarter way in: Guardian by Alert Enterprise is a modern, integrated solution that can turn these outdated systems into simplified solutions for access management. Our platform seamlessly integrates with your campus’ existing systems for a smooth transition, covering access control, payments, library services and lockers. By retiring old applications and self-built integrations, your institution can reduce complexity and IT maintenance, improve security and ensure your access management processes are always up to date.

By automating processes, Guardian ensures that card issuance, access provisioning, and deprovisioning are handled efficiently and accurately, allowing the card office team to focus on improving the overall campus experience

Guardian is a cloud-based application, meaning it can easily scale to meet the growing needs of your institution. This scalability is particularly beneficial for IT departments because it eliminates the need for costly and time-consuming upgrades and maintenance associated with on-premises systems. With Guardian, your institution can quickly adapt to changing requirements without the hassle of managing physical infrastructure.

Streamlining operations with a layer of automation

One of the standout features of Guardian is its powerful automation, which significantly reduces the workload for one-card office staff. Traditional manual processes are prone to errors and consume valuable time that could be better spent on more strategic tasks. By automating these processes, Guardian ensures that card issuance, access provisioning and deprovisioning are handled efficiently and accurately, allowing your team to focus on improving the overall campus experience.

Empowering card holders with a unified solution 

Using a smart access platform like Guardian enables card holders to request physical access through a unified, mobile-friendly solution that’s deeply integrated with your institution’s physical access systems. In other words, no need for them to wait on physical cards to be mailed or deal with system errors that keep them from receiving a card on time.

Whether a student needs access to a new dormitory or a faculty member requires entry to specific labs, Guardian makes it easy for users to request access tailored to their needs—with a simple tap of their phones. This seamless integration with your institution’s physical access systems ensures that all requests are processed swiftly and accurately, enhancing security and convenience.

woman at computerStreamlined approval processes

Once access requests have been sent through, they’re automatically reviewed and approved by relevant authorities, such as faculty members, area owners, or vendor sponsors. The structured approval process not only improves security but also ensures accountability; each access request is approved by the appropriate personnel. This reduces the risk of unauthorized access and ensures that all card holders have the necessary permissions.

Seamless integration with scheduling applications

One of the key advantages of Guardian is its ability to integrate with scheduling applications, which ensures automated semester-over-semester provisioning of new access and de-provisioning of old access so students and staff always have the right access at the right time. By synchronizing with academic schedules, Guardian eliminates the administrative burden of manually updating access permissions, ultimately saving time and reducing errors. In short: Fewer manual entries, more orchestrated access control.

Best-in-class visitor management

Our visitor management platform provides a best-in-class experience for guests while also being fully customizable based on visitor or event type. Whether it's a prospective student tour, a guest lecturer, or a large campus event, Guardian ensures that your visitors are welcomed with a streamlined, branded experience that reflects your institution’s identity. This not only makes for a better visitor experience but also ensures that security protocols are consistently followed.

--

With the new school year quickly approaching, there’s no better time to ensure you have the right access controls in place for a safe and productive year ahead. Contact us to learn how Guardian’s cyber-physical identity access management platform can create an unparalleled user experience for all.


Mike Harris, Alert EnterpriseAbout the author:

Mike Harris is the VP of Sales for the East US region at Alert Enterprise, where he specializes in physical security transformation, automated compliance, process optimization, and centralized management and scalability. With over 20 years of diversified experience spanning integration, consulting, end-user roles and software sales, Mike is a seasoned professional dedicated to revolutionizing security through innovative solutions. Mike's passion for innovation and his strategic approach to security management have made him a trusted advisor and leader in the field. At Alert Enterprise, he continues to push the boundaries of what's possible, delivering transformative solutions that safeguard businesses and enhance their overall resilience.

Phishing-resistant multifactor authentication (MFA) can help colleges and universities protect sensitive data and reduce the risk of ransomware and other types of cyberattacks. For many higher education institutions, passwordless login can be achieved using the existing contactless cards or NFC credentials in combination with user PINs. This is an easy way to protect faculty and staff accounts and endpoint devices such as computers and printers.

Why ID + PIN?

ID + PIN meets emerging cybersecurity standards for phishing-resistant MFA, such as those recommended by the Cybersecurity & Infrastructure Security Agency (CISA). Phishing-resistant MFA solutions are those that reduce risks associated with phishing, social engineering and other forms of data interception. As sophisticated attacks have arisen to defeat common forms of MFA, such as one-time codes and push notifications, more secure forms are now recommended to secure high-value user accounts – such as faculty and staff accounts – and endpoint devices on the campus network.

MFA solutions utilizing contactless and NFC technology make it impossible for attackers to trick users into revealing their passwords. These solutions meet CISA and NIST standards for phishing-resistant MFA.

ID + PIN eliminates the most vulnerable element of user sign-in, the username and password combination. Instead of typing in login details, users simply tap their contactless card or mobile credential. The second authentication factor can be a simple user PIN or, in some cases, biometric authentication on the smartphone.

Here's how ID + PIN helps higher education institutions:

Five Steps for Implementing ID + PIN on Campus

ID + PIN is a simple MFA solution to implement. Here are a few steps and considerations.

  1. Decide which user groups and devices will be covered: A campus environment will usually have a mix of employees with university-provided computers and students using their own computers under a "bring your own device" policy. There may also be computer labs, multifunction printers, and other networked devices to consider. It may not be practical to implement phishing-resistant MFA on student-owned devices due to the necessity of providing a reader for each device. However, implementing secure passwordless login for faculty and staff accounts with higher access levels and thus greater security risks is easy to accomplish. Additionally, implementing the same solution on shared, university-owned computers, computer labs, and printers will significantly increase campus cybersecurity.
  2. Pick your authentication technology: Contactless cards, mobile credentials and physical security tokens can all be applied for secure, passwordless login and phishing-resistant MFA. If users already carry a modern campus ID, the same card or mobile credential can be leveraged for device and network login. This eliminates the need for additional token provisioning by IT and means that faculty, staff and students don't have to carry anything extra. With the right reader, it is possible to set up a system that uses both forms of authentication – for example, ID badges for faculty and staff and mobile credentials for students.
  3. Choose the right reader: The endpoint reader can be attached to or embedded in a computer or printer for authentication purposes. There are more than 60 contactless and RFID technologies in use worldwide. A large multi-campus institution, or one supporting visiting students and faculty from sister schools, may need to support multiple technologies. If you plan to use existing campus ID badges, make sure the reader is compatible with the current transponder technologies. For maximum flexibility, opt for a multi-technology reader that supports a wide range of high-frequency (HF) and low-frequency (LF) RFID tags, as well as mobile credentials using NFC or Bluetooth® Low Energy (BLE). This choice allows educational institutions to accommodate multiple credential types with a single reader and adapt to evolving needs in the future.
  4. Connect the reader to the device: This is usually a simple and straightforward process. For computers, the reader is usually connected externally via a USB cord. In most cases, the login system and/or MFA software will automatically detect the reader for easy setup. For easy integration, look for readers that are compatible with the directory service(s) and SSO solutions in use on the campus network (e.g., Active Directory, Google Cloud, Azure, LDAP, Amazon Web Services).
  5. Roll out the solution with users: User acceptance for ID + PIN systems is typically very high, as most people prefer this method over cumbersome passwords and one-time codes. To ensure a smooth transition, provide clear instructions on how to attach the RFID reader to the computer (if users will be doing this themselves), how to set up the user PIN, and how to reset the PIN if needed. This guidance will help users feel confident and comfortable with the new system, increasing overall acceptance and compliance.

Working with a full-service solution provider will further simplify implementation for campus IT staff. Look for a knowledgeable solution provider with the right software partnerships in place who can work with you every step of the way, from initial planning to post-installation support. By implementing phishing-resistant MFA with ID + PIN now, colleges and universities can ensure that their campuses are prepared to face emerging cybersecurity threats.


Mike Harris, Elatec

 

Mike Harris, senior manager of business development for ELATEC, is responsible for connecting ELATEC market needs and its internal teams, including Product Development, Engineering, and Sales.

 

The access control landscape on college campuses is going through a rapid and profound transformation. Advances in innovative access technology are proving pivotal in bolstering campus security while enriching day-to-day experiences for students and staff alike. By understanding these five access trends, campus administrators can make informed, impactful decisions that shape a safer, more connected campus.

1. Balancing security with convenience and openness

As security is increasingly top of mind on campuses, campus administrators are integrating more technology, like surveillance cameras and video management systems, to provide higher levels of visibility and protection. Along with these precautions, access control systems can play a valuable role in helping to layer security on campus to keep everyone safe.

At the core of modern campus security lies the need to balance robust security protocols with convenience and openness. Traditionally, campuses have been open communities where students, staff and even visitors can access the grounds and spaces with keys, plastic cards or fobs. While secure, these methods can be inconvenient, creating user frustration and bottlenecks during events.

2. Digital transformation

To be clear, digital transformation in access control systems is more than an upgrade — it's a paradigm shift. By integrating advanced technologies, campuses can achieve the right balance between security and convenience to create smarter, more connected — and open — campuses.

Digital transformation helps campus officials strike the balance between security and convenience by shifting from traditional physical credentials to more sophisticated, digitally-powered access solutions.

Mobile credentials are at the forefront of this shift, allowing secure access through devices — like smartphones and smart watches — that users already carry. Mobile access has become a standard expectation on campus, and this includes the ability to control access through mobile devices. The technology allows students, staff and visitors to seamlessly access buildings, rooms and amenities with a swipe or tap while reducing the risk of unauthorized use via lost or stolen cards.

Another digital tool — a cloud-based access management platform — simplifies and supports access operations while increasing visibility, control and security. Likewise, cloud-based technology allows security teams to leverage cloud hosting to quickly and efficiently provision and deprovision mobile identities, while reducing the need for physical locations previously used for card printing and distribution.

3. Upgrading access technology

Momentum toward mobile identity use is building, and as a result, organizations are steadily upgrading older hardware with multi-tech readers able to recognize both physical cards and mobile credentials, according to HID’s 2024 State of Security and Identity report. As mobile access becomes more common, legacy hardware can no longer support new technologies effectively.

Upgrading legacy panels and locks also helps future-proof campus security, ensuring compatibility with existing infrastructure and new technologies while providing flexibility to incorporate future access control advancements.

A key factor in upgrading hardware is interoperability, or the ability of a component — like a reader — to exchange information with various credential types, from RFID cards to mobile. The capacity for different components and even systems to communicate seamlessly reduces the potential for information silos, streamlining security management and response strategies. This ensures a flexible security infrastructure that is also future-proof.

In addition, interoperability gives administrators a more holistic view of campus access, supporting more informed decision-making and facilitating a proactive approach to threat identification and mitigation. It elevates the level of security on campus while significantly enhancing the user experience by accommodating the convenience of various access methods.

4. Hybrid working schedules

Another trend driving mobile adoption is the increasing popularity of hybrid working models among campus staff. Models that blend remote and on-campus work require access technology that can adapt to varying access needs. As a result, access control systems must be dynamic and flexible enough to accommodate different levels of access based on factors like time, location and role.

5. Access solutions as the lifeblood of the campus

Traditionally, access control has been siloed in the campus environment, with decisions handled by one department, often security. Now that credentials can power so much of a campus — from libraries to cafeterias to recreation centers — access control is becoming central to building a holistic student experience. As a result, upgrading access control requires input from all stakeholders, including decision-makers from human resources, libraries, housing, security, IT and more.

Cementing the credential’s place as central to campus life requires full support and endorsement from senior leadership. Campus administrators can facilitate this journey by helping leaders fully understand the value of an advanced access solution across the campus ecosystem. For example, along with improving student experience, strengthening security and streamlining operations, it enhances sustainability by decreasing plastic card use and reducing the footprint of credentialing offices.

What’s next in trends?

Even as mobile technology becomes increasingly prevalent, other technologies are on the horizon. Biometrics — particularly facial and fingerprint recognition — eliminate the risk of lost or stolen cards or credentials. They also make access to campus property and amenities a virtually effortless experience for students and staff.

Ultra-wideband (UWB) technology represents another new frontier in campus access control. UWB provides a truly keyless and contactless entry experience, where lock is opened when an authorized device, like a smartphone, is within a defined physical proximity — granting access without the need to take out the device or press a button.

Making sure access control makes the grade

As college campuses navigate the complexities of modern security, it’s essential for administrators to consider the integration of advanced technologies and the strategic upgrade of access control systems. By understanding these trends, decision-makers can drive meaningful changes that create safer, more connected campuses and enhance the day-to-day experiences of students and staff.


Author: Tim Nyblom, Director, End User Business Development, Higher Education, HID

CIDN logo reversed
The only publication dedicated to the use of campus cards, mobile credentials, identity and security technology in the education market. CampusIDNews – formerly CR80News – has served more than 6,500 subscribers for more than two decades.
Twitter

Attn: friends in the biometrics space. Nominations close Friday for the annual Women in Biometrics Awards. Take five minutes to recognize a colleague or even yourself. http://WomenInBiometrics.com

Feb. 1 webinar explores how mobile ordering enhanced campus life, increased sales at UVA and Central Washington @Grubhub @CBORD

Load More...
Contact
CampusIDNews is published by AVISIAN Publishing
315 E. Georgia St.
Tallahassee, FL 32301
www.AVISIAN.com[email protected]
Use our contact form to submit tips, corrections, or questions to our team.
©2025 CampusIDNews. All rights reserved.