Security. Built-in

Security
Written By John Fieldsend
Security. Built-in

What level of security features is right for your needs? If you're using cards purely for door access regardless of the identity of the holder, then the answer is probably very little. However, if you want to be sure that the person carrying the card is the person with access rights and hasn't faked an ID, you're probably looking for something rather more substantial.

This applies not only for physical access to a room or building but also for access to data, personal records, payments, a driving licence and even citizens’ rights.

Here are the unique options offered to you by Magicard:

HoloKote

technology was pioneered by Magicard to apply a secure watermark to each card during the printing process. This feature exploits the wavelengths and lens effect of the film to fluoresce
under UV lighting conditions and is available with all of our  direct-to-card and retransfer printers.

Custom HoloKote

This feature, available on some of our models, facailitates the implementation of a personalised HoloKote watermark into the standard print process. This watermark could be an organisation’s logo, or some other unique security design.

HoloPatch®

Unique to Magicard, HoloPatch® cards have a highly reflective gold ‘super diffuser’ seal. When the HoloKote watermark is printed on to the seal, the watermark becomes clearly visible under all lighting conditions.

HoloKote with HoloPatch® has a similar appearance to hologram seals. It provides a security mark which is visible from a distance, allowing a security guard or colleague to easily verify badge authenticity.

Specialist Security

The Magicard 600 and Magicard 300 offer additional security in the form of Digital Shredding™ – once data has been used for the print job, it is fragmented, rendering it irrecoverable, helping to ensure the Magicard 600 and Magicard 300 are not a repository for data.

PLUS, the Magicard 600 incorporates Threat Benchmarking where we run security scans against the National Vulnerabilities Database and push regular updates to the device, ensuring that the printer software and associated system configuration conform to the highest levels of security.

Want to know more? Contact us here.