In a recent CampusIDNews Chats interview, Brista Hurst-Kent, Business Technology Services Manager at the University of Texas at Tyler, shared her experience attending the NACCU Data Summit.
This two-day workshop focused on empowering participants to use common reporting tools – specifically Microsoft Excel with Power Pivot and Power Query – to create interactive dashboards that provide actionable insights into campus card transaction data.
At the end, I've got this perfect dashboard with charts, and as new files come in, it's super easy to just drop them into a location and refresh.
She highlighted how the training broke down complex functions into manageable steps, helping attendees feel more confident in working with new Excel features.
Throughout the summit, participants learned to set up templates that could be easily refreshed with new data files, enabling automatic updates to charts and dashboards.
One major takeaway was the ability to implement key performance indicators (KPIs) with customizable color codes, offering quick visual cues to identify issues without the need for time-consuming data sorting or filtering.
Hurst-Kent emphasized the practical value of the summit, calling it a “dream come true” and noting how it fulfilled a two-year goal of hers. She believes the skills gained will greatly enhance her ability to communicate data trends to campus leadership and colleagues. She strongly recommends the NACCU Data Summit to anyone interested in learning how to use data more effectively to inform decisions and streamline reporting processes.
Transcript
The NACCU Data Summit was the topic of a conversation with Brista Hurst-Kent, Business Technology Services Manager, University of Texas at Tyler. In this episode of CampusIDNews Chats, she describes what she learned and how it will increase insight into her transaction system data.
According to Hurst-Kent:
The data summit is a class that allows us to take tools that we already use and build skills that will allow us to go back to our campuses and use the common reports that we get every day to generate a dashboard. It will help us to communicate directly about what's going on in the campus card office to our administration or people who maybe just want to be able to glance at something and get an idea of what's going on.
During the two-day event, we got there each morning and started on our own laptops, and we were given files that would allow us to load data in once we got everything set up.
We opened up Excel, and the teacher taught us how to use Power Pivot and Power Query to set up a template that would allow us to load in files of a similar setup every single day or weekly or monthly as we get them and refresh that to give us insights about our transactional data, but on a higher level.
It was really great because they gave us the opportunity to knock it down into bite-size pieces so you weren't so overwhelmed with the new functionality that you were using in Excel, and it just made you feel a lot more confident about your ability to pull this off.
At the end of everything, I've got this perfect dashboard set up that has charts that as new files come in, it's super easy to just drop those files into a location and refresh.
Refresh your workbook, and it will change the chart based on the new transactional data that came in.
It is honestly, I know it's a little hyperbolic to say it's a dream come true. But for me, I have been wanting to take the data summit for two years now, and so finally having the opportunity to do it, see those dashboards, to see the pivot tables around it, just absolutely a dream come true.
One of the great things that we're going to be able to take advantage of on campus now is key performance indicators (KPIs).
We learned how to set the pivot tables up in a way with the KPIs enabled on them.
Doing that gives you an immediate understanding of the status of something.
You can set red, yellow, green statuses, and it's customizable so you can set the different levels to trigger the different colors. Immediately just looking at something, you know this thing is way out of range, and it's a problem.
Not having to dig through and sort and filter and conditional format all of that – you can still do that, but in this scenario once you get this template set up, you're just dropping the new data, refreshing it, and then there's the exact detail that you're looking for without having to search for it.
The one thing that I think that people really need to know is that the NACCU Data Summit is worth your time, it is worth your money.
I just got finished with it, so I can't prove the return on investment yet, but I am sure that when I get back to campus and I'm able to teach my boss to do this as well, it'll be like a two for one. So, if you're a person who likes to learn, who likes to work with data, this is the exact class that you need to be taking and sharing the knowledge with your colleagues.
Three main components underlie modern credential technology – chips, formats, and encryption. Each are applicable to both cards and mobile credentials and understanding them is key to making informed decisions for your campus card program.
Each concept is applicable to both cards and mobile credentials, and understanding them is key to making informed decisions for your campus card program.
In this series of articles, we will dive into each component, but first a brief preview.
Chips are the core of the credential equation. Like the chips that power almost everything we use in our modern lives, they both store and process the data required for identity transactions.
A format – also known as a card format or data format – is the standardized pattern used to store data on a chip. The format holds information such as ID numbers that allow access control and other systems to make decisions about the cardholder. Because data formats are just patterns or structures, they can be used on different chips. This enables different chip types to be used in the same system.
Encryption is the primary method used to secure data on the chip and in transit between the chip, reader, and system. Encryption levels in credentials vary greatly, from none-at-all to best-in-class, and everywhere in between.
In this first of these three articles, we’ll dive into chips.
Most chips on ID cards are either proximity chips that operate at the 125 kHz frequency or contactless smart chips that operate at the higher 13.56 MHz frequency.
The chips used in proximity or prox cards are older, non-secure technology. They do not support encryption and are really a storage mechanism to hold data such as an ID number. Because they lack security, they are extremely easy to clone and thus have fallen out of favor for secure applications like campus credentials.
You can go to a kiosk at Bed Bath & Beyond, insert your prox card or key fob, and they'll give you a duplicate of it.
According to Todd Brooks, Vice President of Products and Technology at ColorID, prox card cloning is easy and inexpensive due to the lack of encryption. There are vending machines and online devices that facilitate cloning.
“You can go to a kiosk at Bed Bath & Beyond, insert your prox card or key fob, and they'll give you a duplicate of it,” says Brooks. “Or you can buy a $25 device on Amazon that can clone cards very easily.”
For these reasons, higher education and most other security-conscious organizations have moved on to high-frequency 13.56 MHz contactless or Near Field Communication (NFC) technology.
But just because these chips operate at a higher frequency doesn't make them inherently more secure. It's what you do with it.
“A lot of people think, oh, it's contactless or NFC, so it's secure,” says David Stallsmith, Director of Product Management for ColorID. “But NFC only defines the communication frequency and a couple other very simple parameters. If it's not encrypted, it's still not much better than prox.”
In practice, however, most implementations of contactless chips do incorporate encryption. Of course, some do it better than others.
Common 13.56 MHz chips include MIFARE Classic and MIFARE DESFire from NXP, iCLASS from HID, and FeliCa from Sony.
Encryption for MIFARE Classic was compromised years ago, so that chip is not used often in secure applications, though it is still common in low-security situations.
For campus cards in the U.S., FeliCa and the initial versions of iCLASS were popular options, but they are not used much for new implementations. Many institutions that deployed them in the past, however, continue to use them.
There have been four versions of DESFire since its introduction in 2002. Today’s gold standard for security is EV3.
iCLASS Seos – the latest version of HID’s iCLASS – is extremely secure, and its usage is rising rapidly, says Stallsmith. While in this case Seos is the name of a specific chip, it can also be a secure identity object that can be used on other chips.
In recent years, DESFire has been the go-to for campuses and other markets seeking a secure credential.
There have been four versions of DESFire since its introduction in 2002. DESFire, DESFire EV1, DESFire EV2, and DESFire EV3.
According to Brooks, today’s gold standard for security is EV3.
The original DESFire product was phased out by NXP years ago, and EV2 was phased out more recently as NXP released the successor EV3 chip.
Because of its widespread use, EV1 is still available, though its phase out is also starting.
“EV1 still uses high-end AES encryption,” says Brooks. “It hasn't been broken, but we're just seeing NXP starting to phase it out.”
That leaves EV3 as the clear leader for new implementations.
“Many of our campus clients opt for EV3, and that is what we’ve been recommending for some time now,” says Stallsmith. “Because it was designed for backwards compatibility, it can even be blended into existing implementations that utilize prior DESFire versions.”
The other key component with chips is memory size. The larger the non-volatile memory, the more data and applications the chip can hold. DESFire EV3 chips are available in 2k, 4k, 8k, an 16k sizes.
iCLASS Seos chips are available in 8K and 16K.
Often you will hear the terms like 26-bit and 32-bit discussed when talking about contactless cards, but don’t confuse this with a chip’s memory size. These terms refer to data formats, the topic for the next article in this series.
Obviously, older less secure technology is going to be less expensive, but there are also large variances in the quality of a card’s manufacture.
It follows then that low-quality prox and MIFARE Classic cards are typically the least expensive, often just a couple bucks. But high-quality cards with the same chip can be significantly more expensive.
With any card, however, when it comes to longevity, durability, and good-looking printing, you get what you pay for.
Because of their low cost, many organizations still use non-secure prox and MIFARE Classic cards. Some are not aware of the security vulnerabilities and others choose to take the risk. If the use cases for the card are not high risk in nature, it can be a sensible decision.
With any card, however, when it comes to longevity, durability, and good-looking printing, Brooks says you get what you pay for.
“You can find inexpensive high-frequency cards, but you can also get cards – depending on what you've done with them – that are $10,” he adds. “So, there's a huge range in what you can get from high frequency.”
Here’s what campus card and security personnel should remember about chips for ID cards.
Apex Order Pickup Solutions launched a new modular system of automated order pickup lockers that can be stacked or setup in custom configurations. The OrderHQ Array Series lockers work in any floor plan without expensive remodeling.
In an interview with Food On Demand, Kent Savage, founder and executive chairman of Apex Order Pickup Solutions, compares the modular lockers to LEGO blocks: versatile, easy to configure, and designed to fit any space.
“You can have two beside each other, three standing on top of each other, all kinds of combinations,” he says. “And they can be added to if volume grows.”
Smart lockers help campuses and other foodservice operators eliminate pickup bottlenecks, optimize staffing, and prevent order mix-ups and theft.
The modular lockers are like LEGO blocks – they are versatile, easy to configure, and designed to fit any space.
Completed food orders are placed securely in compartments and retrieved using an app, campus ID, or unique access code. This eliminates the need for manual order handoff by restaurant staff and reduces pickup time.
OrderHQ Array features include:
Once a locker grouping is established, each array operates as a cohesive system that is managed centrally through the ApexIQ technology platform.
The platform integrates with the institution’s existing mobile ordering and back-of-the-house systems. With insights into order completion, wait times, and peak usage, dining teams can plan smarter and operate more efficiently.
In a recent interview, HID Global’s Amy Surprenant discusses the project management component of the mobile credential launch at George Washington University (GWU). With 26,000 faculty, staff, and students, the project marked a significant milestone for the institution and its partners, including HID, CBORD, and various on-campus departments and vendors.
The deployment of HID Mobile Access at GWU took more than 32 months of planning and collaboration.
She says managing a project of this scale is complex due to the numerous third-party systems involved – ranging from door access and printing to parking, transportation, and more.
GWU is a CBORD school, they use HID but they also have Allegion door access hardware. With just a firmware update, their Allegion locks were able to read the HID credential.
The shift to mobile ID required a full audit of every system currently relying on physical cards to ensure each could be supported by the new credential. This is mandatory due Apple’s 100% use case requirement.
In addition to HID hardware, GWU’s infrastructure also includes Allegion door hardware. Effective collaboration between technology providers ensured that both companies’ readers could accept the mobile credential.
Surprenant says the successful implementation at GWU illustrates how thoughtful planning and strong partnerships can deliver a modern, secure, and user-friendly campus experience.
To watch the full interview, click the image at the top of this page.
Transcript
Hi, I am Amy Surprenant, end user business development manager for higher education. I work at HID Global and I'm here at a conference for end users specifically in the higher education realm.
I'm proud to say that I was part of the GWU launch, George Washington University, they have 26,000 faculty, staff and students.
From a project management perspective, there's a lot of third-party applications – printing, bookstore, transportation, parking – it doesn't just include door access.
It was an awesome project implementation phase. After 32 months or so of meetings after meetings, we had HID on the phone, CBORD, and all the different on-campus departments and vendors.
It was a great project. You have to think about all the third-party use cases, door access, it just launched three weeks ago yesterday for mobile and they are beyond happy, so it was a definite success.
So as far as the project management piece, there's a lot of third-party applications that you have on a campus, whether it's printing, the bookstore, transportation, parking – it doesn't just include door access.
You need to make sure that those third-party systems integrate with data feeds out to the right system, so it's definitely a big lift, but it's definitely a lift that's worth it in the end. That is because the student experience, it's not only for convenience, but also safety. It's audit control, because it makes you actually look at wherever a student uses that plastic card today. They have to be able to use their mobile, because of the Apple 100% use case requirement.
You need to make sure that those third-party systems integrate with data feeds out to the right system, so it's definitely a big lift, but it's definitely a lift that's worth it in the end.
So, it's just seamless and convenient for the students, and let's face it, Generation Alpha is here, and they want mobile, everything is on their phone.
George Washington University is a CBORD school, they use HID but they also have Allegion door access hardware on campus. They're able to have Allegion locks that can read the HID credential with just an update on their firmware. It's an HID mobile identity, so we were pivotal in making that relationship work and forming a great partnership with all.
Our team is always here to help, we're dedicated all the time, I don't want to say 24-7, but we are. We have a great team of people that covers the entire country. Please reach out to us at any time, we're here to help.
Denison University and Florida Institute of Technology (FIT) rolled out mobile credentials to students and staff across their campuses. The projects were very different, however, because of the existing reader infrastructure on the two campuses.
Each partnered with Allegion and Transact + CBORD to deliver the new digital IDs – stored in Apple Wallet or Google Wallet. Now students access facilities, residence halls, and other campus amenities using their phones rather than traditional plastic cards.
Both institutions were already users of Allegion door access readers and the CBORD transaction system and access control system, CS Access.
Still, the workload was very different for each.
The per door work at Denison was not nearly as intense given their recent move to Allegion locks with CBORD CS Access. Most firmware already supported mobile Wallet.
“The campuses had different starting points in terms of prepping their electronic locks and readers for mobile,” says Jeff Koziol, Business Development Manager for Mobile Credential at Allegion.
“FIT has been an Allegion customer for more than a decade, so they have ten-year legacy hardware on campus,” he explains. “This required some at-the-door firmware and hardware updating.”
Specifically, some read heads in the existing Schlage AD-400 wireless locks had to be replaced.
In contrast, Denison College installed its Allegion hardware just four years ago. Their Schlage MTB readers and LE/ NDE mobile-enabled wireless locks already supported mobile credentials.
“The per door work at Denison was not nearly as intense given their recent move to Allegion locks and readers with CBORD CS Access,” says Koziol. “Most of the firmware already supported mobile Wallet.”
Both have small enrollments showing that mobile isn’t reserved for large, power-five-conference institutions only.
While the infrastructure was different, they have other things in common.
Both have small enrollments – Denison serving 2,400 and FIT 3,600. They show that mobile isn’t reserved for large, power-five-conference institutions only.
Additionally, the move to mobile at both institutions is a direct response to student feedback and the desire to align campus services with the needs of today’s students.
“By adopting digital IDs, schools like FIT and Denison are doing more than modernizing credentials – they're showing an earnest commitment to student success," said Rasheed Behrooznia, Executive Vice President & General Manager, Campus ID and Commerce for Transact + CBORD. "Digital IDs have proven to remove barriers, foster a greater sense of belonging, and meet digital expectations.”
Palm Beach State College’s campus card office has opted to forego mobile credentials and stick with their longtime magstripe cards. While the decision may seem unusual to some, Jessica Bender, the college’s auxiliary services manager, explains to CampusIDNews the rationale and the research that went into it.
With a student population of 40,000, the college would face significant costs in transitioning to mobile, including annual licensing fees of $2 to $5 per credential. This compares to a onetime cost of just 25 cents per magstripe card.
She emphasizes that as a commuter-based community college, students don’t use their ID cards daily.
I don't think our students suffer by us not going mobile. As a community college, I'm not sure that they even know about it.
Most ID usage is tied to periodic events such as printing, financial aid transactions at the bookstore, or accessing the wellness center. They don’t have door access or meal plans that typically justify mobile adoption.
The average student age is between 23 and 26, and most live in the surrounding community.
If the college expands door access requirements to all students, the cost-benefit equation could shift. Then, Bender says, they would be open to reconsidering the decision.
She stresses that implementing mobile credentials should not be driven by trends. Incorporate careful evaluation of infrastructure, budget models, and long-term costs – including lost revenue from card replacements.
To watch the full interview, click the image at the top of this page.
Transcript
Our college has decided right now not to go mobile. One of the reasons is we're a very large community college and our use case doesn't really lend itself to mobile.
We have about 40,000 students, and we're still using magstripe cards. The cost is 25 cents a card.
To move to the mobile is a huge cost. We're carding 40,000 students. You have $2 to $5 annual cost per mobile.
We're not doing door access. We're not doing meal plans. We're doing mostly just stored value. So, for now, the magstripe works for us. That's why we decided no mobile for now.
I don't think our students suffer by us not going mobile.
Being a community college, I'm not sure that our students even know about it.
I hear the story that mobile makes the student decide whether they go to college A or college B. It gets a little bit different in the community college market because students stay near home to go to college.
Our students are not 18 to 21-year-olds. They're 23 to 26-year-old average.
I don't think that our students are suffering because we haven't gone mobile.
As a community college, we are all commuters, meaning we don’t have the residence halls so students don't need their card every day.
You know, I hear universities say that's why they found mobile because students always have their phone.
At a community college, the things students need their card for like printing, so you're not doing that every day. Financial aid at the bookstore, that's a semester thing. They want to maybe go to wellness center, so they need their card for that.
But it's not like a residential campus where you constantly need to present the credential.
I think that you really have to look at your use case to see if that makes sense.
That's funny that you should bring up when we might consider mobile. I was just in a meeting last week and we're slowly moving towards door access for our academic buildings. I was told by our chief safety officer that her goal is to have everything locked down 24x7.
And what that would mean would be someone would have to have a credential to present to get into buildings.
Right now we are using a MIFARE card for certain staff to have a limited amount of door access. But if you turned around and told me that from now on, every student was going to need to get that MIFARE card, so now you're at that same kind of price point at $5.
If that's where we get to, then I would say at that point that would change the conversation. Because you can save some costs by eliminating printers, eliminating staff at the printing locations, and still, you're going to be spending $5 on a MIFARE card. So I could spend $2 to $5 on the licensing for the mobile.
I just think when making a decision about mobile, it's a case by case decision and every school is going to be different.
I think some schools went with it because it was the cool, shiny thing to do, but I think you have to think about it.
Coming to things like NACCU and reading up on the industry, can help you understand all the costs involved.
Yes, the shiny new thing, but what I didn't know until I talked to a school that went mobile is it's an ongoing annual cost.
You have to have the infrastructure and the budget model to support that, and then you lose some income.
You lose your replacement fees and things like that, so you really need to make an informed decision and get all the facts before you decide, well, I'm going to do the shiny thing by going mobile.
To gain access to secure university services and student accounts, Princeton students use a multi-factor authentication solution from Duo. In the past, users could opt to receive secure codes from Duo via text message or phone call, but these methods have been phased out.
An article in the Daily Princetonian cites an email from the university’s Office of Information (OIT) Technology saying that these older methods are now, “a common target for hackers looking to compromise accounts.”
Between 2022 and 2024, there was a 44% increase in unique phishing emails and a 186% rise in reported incidents.
In mid-June, the switch was made, and all users must now rely on one of two more secure methods.
OIT’s preferred method is the Duo Mobile app, which uses push notifications that require the account owner to verify that the login attempt is valid. Second, biometric authentication using Windows Hello; TouchID or FaceID on Macs and iPhones; and Android biometric options may be enabled.
Princeton is not the only campus to take this action. Some have already eliminated SMS and phone options in their Duo system, and others are in process of doing so.
The rise in phishing attacks at Princeton prompted the institution to make changes to its spam filters and email delivery processes earlier in the year.
In the two years between 2022 and 2024, there was a 44% increase in unique phishing emails and a 186% rise in reported incidents.
In response, Princeton’s Information Security Office ratcheted up the threshold on its spam filters, making it harder for phishing emails to reach inboxes. They also began diverting more of these messages directly to the user’s trash folder, bypassing the junk folder altogether.
These phishing emails are often sophisticated and targeted to the student community. They promise research assistant positions or internships, include university logos, and appear to come from actual university leaders.
The Princetonian received data from OIT on phishing attacks dating back to 2021. Authors did an in-depth analysis, and the findings provide great insight.
Specific areas of analysis include:
The trends at Princeton are likely pervasive throughout higher education, so the article is a must read for all campus administrators.
A significant acquisition in the security industry is set to impact the campus card space. On June 12, door access reader and mobile credential provider, Allegion, announced that it will acquire ELATEC for $380 million.
Germany-based ELATEC manufactures door access readers, USB-connected readers, and embedded reader modules. While Allegion already provides industry-leading electronic door access readers, ELATEC’s USB-connected readers and modules will be a new addition to Allegion’s offerings.
Sarah Bowling, ELATEC’s VP of Sales, Business Development, and Marketing told CampusIDNews that this means a stronger, more unified approach to mobile-first in higher ed.
ELATEC readers are frequently used to address challenging use cases, enabling existing contactless and mobile credentials to be used for print/copy control, dining, library patron ID, EV charging, and network authentication.
“Allegion and Elatec share a vision of creating open, interoperable access infrastructures,” says Bowling. “Together, we can provide colleges and universities with a broader suite of solutions – from campus card systems and door hardware to multi-credential readers that support mobile wallets and future-ready authentication.”
For Allegion, the acquisition helps support the company’s non-residential markets – such as higher education – and increases strategic relationships with channel partners like campus card and transaction system providers.
In the campus market, ELATEC readers are frequently used to address challenging use cases.
Their connected readers enable existing contactless and mobile credentials to be used in applications such as print/copy control, dining, library patron ID, EV charging, and network authentication.
Because they can be programmed to return a custom string of data to a computer via USB, they are also ideal for supporting legacy applications.
According to the press release, “ELATEC readers support nearly 100 credential types, making the company a leader in interoperability, which aligns well with Allegion’s partner of choice strategy.”
“Elatec supports more than 300 colleges and universities globally through our embedded technology partnerships with OEMs,” says Bowling. “With Allegion’s reach and established presence in higher ed, we fully expect this partnership to help us scale faster, build deeper integrations with campus systems, and introduce new innovations tailored for the market.”
The acquisition is expected to close in the third quarter of 2025, and ELATEC is expected to generate $65 million in net sales in 2026.
Last summer, Harvard announced that it was phasing out its decades-old Crimson Cash declining balance program. Citing declining usage and the prevalence of open system debit and credit cards, they began a yearlong multi-step elimination plan.
This month, the final stages of this plan will be complete, and the one of higher ed’s pioneering declining balance and off-campus merchant programs will be no more.
In 2024, residential dining, gyms, and vending ceased to accept the payment method. The once-popular off-campus merchant program managed by the university also ended, with Grubhub stepping in to fill the gap.
At the start of 2025, Crimson Cash was no longer accepted at retail dining locations.
This left three areas to complete the phase out – laundry, copy/print, and Student Grilles. These areas were more difficult to eliminate as they relied heavily or exclusively on Crimson Cash.
The solution for laundry came via a payment app from the institution’s laundry provider CSC. The CSCPayMobile App lets students add funds to a dedicated laundry account to pay for services.
“This will be a significant improvement to user convenience accepting all major credit cards as well as Apple Pay and Google Pay,” says the Crimson Cash website. “In addition, the app will show the availability of machines, wash and dry cycle status, and account balance information.”
TouchNet is providing the solution for the Grilles and copy/print services.
The Student Grilles – which previously only accepted Crimson Cash and flex bucks – will now accept credit and debit cards via the TouchNet solution. They will continue to accept BoardPlus, the $65 of flex bucks provided with undergraduate meal plans.
Harvard’s copy and print services, known as Crimson Print, will complete the transition to a dedicated account that can be recharged via debit or credit card through the TouchNet payment gateway.
As described by the Crimson Cash site, “students and guests will be able to add to or manage their printing account balances from the Crimson Print web portal.”
As of June 30, there will be no place left for students to use any remaining Crimson Cash funds. They can, however, request a refund online until June 30, 2026.
R.I.P. Crimson Cash. You were a model for campuses across the country and made life better for hundreds of thousands of students over the years.
A new facial recognition reader from Assa Abloy’s Control iD line can store 100,000 templates on the device, enabling standalone usage or integration with existing security systems.
In a conversation with CampusIDNews, Jeff Bransfield, Regional Director of Digital Access Solutions for Assa Abloy, introduces the iDFace Max. The new seven-inch facial identification terminal is receiving significant attention for its ability to support multiple deployment configurations.
In standalone mode, it manages access privileges, enrolls users, and authenticates identities without relying on a system of record. Alternatively, it can serve as a reader connected to systems like Genetec, Lenel OnGuard, or Software House CCURE 9000, pulling cardholder databases directly for rapid deployment.
In addition to biometrics, it supports a wide range of contactless and NFC wallet credentials.
iDFace Max is especially suited for environments like athletic facilities, where managing physical credentials is cumbersome. Using facial recognition as the primary credential streamlines access while enhancing security and convenience.
Thanks to its integrated HID OmniKey core, it also supports multiple credential types – including Seos, Prox, NFC wallet credentials, QR codes, PINs, and more.
To watch the full interview, click the image at the top of this page.
Transcript
Hi, I am Jeff Bransfield, Regional Director of Digital Access Solutions for Assa Abloy.
We're here this week following up after ISC West. We have a lot of interesting products that we've shown at the show. Now we're at NACCU and talking to campuses and really highlighting one specific product that's getting a lot of buzz.
So Control ID, we launched a new terminal this year called iDFace Max. It's our seven-inch facial identification reader controller. iDFace Max is a transformational technology.
It has the ability to be deployed in so many different flexible deployment modes, meaning I can put this thing out there standalone, have it run all the access privileges, rules.
I can enroll all my users standalone.
I don't need to rely on an access control system of record necessarily.
If we do have an access control system, we can actually hook it in as a reader so that the access control system actually makes those yes/no decisions, but I'm managing the templates on the device and the facial identification on the device.
And then lastly, we have the ability to have a fully native integration to the software OEMs as well.
So, if I'm running a Genetec or a Lenel OnGuard, or Software House CCURE 9000 system, they can literally bring the cardholder database to the terminals directly so that I can deploy tomorrow and I've already got cardholder photos in the system of record.
In they go. It's authenticating their face and we're ready to move forward.
So we're seeing a lot of use cases, especially around the higher educational institutions where athletics facilities, you know, places where managing credentials or lack thereof for credentials is a difficult task to do.
iDFace really gives the ability to just use the human as the credential so they can just walk into the facilities. It's an intentional act of using your face as the credential. It's security and convenience really coming together in those facilities and allowing for flexibility of deployment.
With iDFace Max, the seven inch terminal we're releasing, it also has an HID OmniKey core inside of it.
So I can support all of those contactless credentials as well, whether that's Seos, whether that's Prox, whether that's NFC or wallet credentials. I can support all of those inside that terminal.
So you can have one device at the opening doing facial rec, you can do PIN, you can do QR code, you can have a card, you can have a mobile wallet, etc. It's an extremely powerful device.
So what's really nice about the terminal too is whether it's connected to an access control system of record or it's native integration, or if it's standalone, iDFace Max has the ability to do up to 100,000 faces inside the terminal itself.
It can process 100,000 faces, and you can distribute QR codes to hundreds of thousands more users as well.
If you're connected to an OEM, a software OEM, you're kind of limitless at that point as far as the users that can be pushed down because then the system can manage however many.
If you have access to that terminal or that door, that's when iDFace will actually download the template to the device.
So like with every Assa Abloy product and family that we have, we've got a ton of resources in our sales teams. We've got over 700 people that just represent everything opening solutions.
So if you need door hardware questions, you need door questions, you need decorative handle questions, electronic questions, we've got people on the team that can direct you in the right place.
I would reach out to your local Assa Abloy people, whether that's your campus rep, whether that's your integrated solution specialists, or just go visit our website.
So www.intelligentopenings.com is a great place to start for all the smart stuff on the digital access side.
So I appreciate and look forward to hearing from you.