SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • High-Security Wedge Barriers By Delta Scientific
    • SCD Wins Major Contract For HD MWIR Detectors
    • ASSA ABLOY And Honeywell Discuss Security Innovation
    • VIVOTEK's Role In Ecological Restoration & Safety
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Idesco Explains About Future-Proofed Access Control

13 Oct 2022

Idesco Explains About Future-Proofed Access Control
Contact company
Contact Idesco Oy
icon Add as a preferred source Download PDF version
Related Links
  • Visma Megaflex Introduces Phone As A Convenient Access Card Solution
  • High Frequency Integrates Idesco’s RFID Display Readers In Its Mobile Linen Hub
  • Idesco ID Makes Both Mobile Access And Especially Credential Management Much Easier

There has been talking about ‘future-proofed’ access control systems over the years. But what do those words mean? Simply, it means the system will remain secure, and provide enough capacity for future data transfer needs and additional devices. More to the point, it protects users' freedom to develop and expand their systems how they want. 

Users' reader choice has the greatest influence on the future functionality and expandability of their system. So, below, Idesco identifies factors users must consider to make the best RFID reader choice.

MIFARE DESFire readers

Idesco’s MIFARE DESFire readers are already based on the latest technologies, and provide the most secure data protection, all the way from the user to the host. They are also mobile-compatible, to simplify the future migration to mobile access.

Robust, durable, outdoor-compatible Idesco readers are designed to build a long-lasting, energy-saving access control system with minimal maintenance costs.

Secure technology

Secure access cards and their readers will often be assigned and programmed to a shared mutual security key

In many countries, RFID’s dominant access control technology has lagged in so-called UID, with most cases using low frequency, 125 kHz proximity technologies. Such technologies use nothing more than a card’s unique serial number (UID) to identify users. Since the cards don’t protect data, they can be easily read and cloned with readily-purchased devices.

So, users' obvious first task for future-proofing is to choose a secure technology. The best ones differ greatly from UID by providing highly-secure AES128-bit encryption. Such encryption is essentially unbreakable –  the same used to protect digital payments.

Secure access cards and their readers will often be assigned and programmed to a shared mutual security key. That is how they recognize each other during their ‘conversation’, which is technically referred to as the ‘mutual authentication process.

Proprietary or open technology 

Another important factor is that some secure technologies are proprietary, or ‘closed’, while others are referred to as ‘open’ technologies. A closed, proprietary technology only allows readers, cards, and their programming to be purchased from a single supplier.

This leaves users vulnerable to, not just their price and product availability, but also constrained delivery times, the long turnaround for service and support, and whatever product development roadmap they prefer. In short, users end up being vendor-locked to a sole source.

Open or closed technology?

By contrast, open technologies subscribe to common standards. However, they also provide an array of remarkable benefits only available in a common standard. For example, MIFARE devices from different manufacturers remain compatible with each other: a valuable benefit to purchasers.

By choosing open standard MIFARE DESFire for a system, users remain free to purchase future devices from any manufacturer they prefer.

Users can be confident in MIFARE’s market stability even if a particular supplier can’t deliver or stops manufacturing. There always remain other manufacturers continuing to develop their MIFARE offering. In short: open MIFARE DESFire is more than just the most secure but also the most reliable and cost-effective technology in the market.

Open technology vs. vendor lock

Before a user chooses a device manufacturer, they should also decide who will own and manage their security keys

Security keys and their programming are the core of a secure access control technology. Closed technology suppliers automatically deny users any security key flexibility with their readers and cards: all are factory-programmed, known only by them. Indeed, an open technology issue that often gets overlooked is that even a DESFire supplier can ultimately ‘vendor-lock’ users. How so?

It is because ownership and management of users' site security keys and their programming are often ignored. That means, before the user chooses their device manufacturer, they should also decide who will own and manage their security keys. Some manufacturers will withhold the security keys if they discontinue sourcing from them. Users will once again be prevented from getting compatible readers and tags despite using MIFARE DESFire for the system.

DESFire readers

That is why Idesco DESFire readers also protect the freedom to decide who will manage their security keys. Idesco often manages sites’ security keys according to the latest information security practices. Equally often, however, its customers will manage security keys, program readers, and cards themselves.

If users have enough resources and MIFARE DESFire expertise, it can be a beneficial option. Nevertheless, many other system installers opt to outsource it to us. With Idesco’s in-house coding, users always retain a secure, future-proofed option if they later change how they want to manage their security keys. This further maximizes the flexibility of sites and systems.

System Security

Although encrypting the data traveling from card to reader (as in DESFire), powerfully enhances security, traditional Wiegand lines may still create a vulnerability for the system. Why?

Because Wiegand cables transferring data from readers to hosts are forced to strip away that protection. Consider carefully whether that portion of the data’s journey could be a hidden hazard to the system’s security.

OSDP

OSDP is a bi-directional communication protocol it also supports sending data ‘downstream’ from hosts to readers

If so, the best solution is to implement OSDP over the RS485 cable. OSDP is a highly secure, open standard data protocol for mediating reader-host data transfer.

OSDPv2 provides robust encryption, equal to DESFire, but it also possesses other benefits. Since OSDP is a bi-directional communication protocol it also supports sending data ‘downstream’ from hosts to readers. It means the user can push fast, convenient reader updates ‘downstream’ from the hosting system.

Mobile-compatibility

Using a mobile phone to access doors continues to grow popular. If users anticipate implementing mobile access at some point, consider implementing a gradual migration into Idesco’s mobile-compatible MIFARE DESFire readers.

In addition to their mobile phone reading capability, they remain fully compatible with traditional MIFARE DESFire tags.

Robust, updatable devices

Users’ interaction with a system is always via its deployed readers. Therefore, the user-friendliness of the readers powerfully shapes how users will feel about the system. That is why Idesco pays a lot of attention to small details in the readers’ design. Cumulatively, these details help minimize system maintenance costs.

For example, optical tamper alarms are more reliable than vulnerable mechanical tampers for notifying when the reader is violated. High IP and IK ratings mean the readers’ resistance against moisture, dust, and impacts keeps them robustly reliable, for installation outdoors or in public places. Finally, their fast and easy installation combined with convenient reader updating will help keep users' overall system costs to a minimum.

Future-proof the system:

  • Choose the latest security technologies; UID cards and tags can be copied.
  • Secure the system and business by choosing open standards that maximize choices.
  • Remember security keys; don’t be vendor-locked.
  • Always carefully consider the system’s interface; is the data transfer truly secure?
  • Mobile access has begun arriving. Prepare the system with secure, flexible mobile-compatible readers.
  • Robustly-reliable devices will lower the system’s maintenance costs and extend its lifespan.

From facial recognition to LiDAR, explore the innovations redefining gaming surveillance

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Digital video surveillance
  • Electronic security systems
  • Application security
  • Industrial security
  • Commercial security
  • Perimeter security
  • Factory security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Covert cameras
  • Security monitoring system
  • Security access systems
  • Radio frequency Identification
  • Network monitoring
  • Asset tracking
  • Electronic door locks
  • Electronic access control
  • Fingerprint recognition
  • Building security
  • Facility security
  • Institute security
  • Industrial security systems
  • Wireless security
  • Door access control
  • Security software
  • Industrial surveillance
  • Physical Security Information Management (PSIM)
  • IP security solutions
  • Covert Surveillance
  • Security communication
  • Integration software
  • Perimeter protection
  • Cyber security
  • Corporate Security
  • Central Monitoring
  • Fingerprint Locks
  • Data Security
  • Mechanical Locks
  • Network Video Recorders
  • Digital Video Recorders
  • Warning Devices
  • Security Assessments
  • Cloud security
  • Mobile access
  • GDPR
  • Mergers & Acquisitions
  • OSDP
  • Touchless Security
  • Related links
  • Idesco Access control software
  • Idesco Access control readers
  • Access Control Software Access control software
  • Standalone/Networkable Access control controllers
  • Standalone / Networkable Access control readers
  • Proximity Access control software
  • Centrally managed access solution Access control software
  • Proximity Access control readers
  • RFID Access control readers
  • High Level Interface Access control software
  • ID Badging Software License Access control software
  • Issuance and identification system Access control software
  • Management Systems Upgrade Access control software
  • Related categories
  • Access control controllers
  • Access control software
  • Access control readers
  • Electronic keypads
Related white papers
One System, One Card

One System, One Card

Download
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Modernizing Access Control

Modernizing Access Control

Download
Related articles
High-Security Wedge Barriers By Delta Scientific

High-Security Wedge Barriers By Delta Scientific

What’s Behind (Perimeter) Door #1?

What’s Behind (Perimeter) Door #1?

TDSi Becomes TDSi By Hirsch In 2026

TDSi Becomes TDSi By Hirsch In 2026

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Corporate news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec