How to become a smart farmer with RFID technology

How to become a smart farmer with RFID technology

South Africa produces some of the best wines in the world. It has brought an array of economic benefits to the country including many employment opportunities.

Wine farms bring in an estimate of R2 billion to the economy. This includes direct expenditure from tourism/visitors and indirect from goods bought by wineries from other local businesses.

This expansive growth of industries has enabled wine farms to unlock all available opportunities to offer the world the best quality wines.

The issue at hand

Hand-picking is the only way to harvest grapes properly and effectively to ensure that the best quality grapes are selected.

The timely and old process of tracking the number of grapes picked by the harvesters to get their weekly wages is outdated. It involves labour intensive work and human error.

Wine farms continue to grow in South Africa, better processes are necessary to reduce time wasted.

Technology must be implemented to help systemize the process. Allowing processes to be faster, accurate and efficient.


Farmers have found many ways to adopt the latest technology to improve agriculture. Technology is used to save time, cut costs and improve yields.

RFID helps to automate the process of hand-picking in the wine industry.

HID (human interface device, an RFID producer) is finding new alternative ways to help the production process become more efficient, accurate and productive (RFID world, 2021).

With the new solution, each harvester is issued an armband with a unique HID card. The grape collection bins are tagged with HID tags and the vineyard supervisors are fitted with NFC (near field communication) enabled smartphones.

To activate the system, supervisors simply place their smartphone next to the harvester’s armband triggering an audible beep that assures both the harvester and supervisor that the collection bin has been counted and credited to the right person.

This new system will reduce administrative expenses and time, saving the vineyard valuable money and enabling them to get better harvest and yields.

The harvesters are also valued more for their efforts as it is better monitored and measured. They are compensated more fairly and thus motivated to work knowing their efforts will be properly rewarded. 

The NFC and RFID system generates more detailed, real-time information that can be used to guide better management decisions. Allowing wineries to present the best wines to their customers. Growing the industry to its full potential.

5 benefits of RFID technology in the wine industry

  1. Anti-counterfeit wine

RFID track and trace wine preventing fake wines from being put on the market. Both the wine retailer and customer can check whether the wine is authentic by checking the attached tag. Enabling a tamper-proof bottle and placing the RFID tag at the bottom of the bottle defeats counterfeits. Assuring authenticity can build brand reputation and value (Wang Y, 2013). 

  1. Real-time monitoring

Temperature is an important factor in preserving wine and preserving its value. This reduces spoilage of the wine and can monitor its shelf life. By using RFID tags, Bluetooth and 3G networks monitoring temperatures on their way to retailers. Every bottle will arrive with a complete history of temperature change information. This enables the product to be kept at the optimal temperature and not spoil along the supply chain. Consumers can check the safety of the products, making more informed decisions about their purchases. 

  1. Tracking and tracing

Barrel tracking allows you to visibly track your cargo’s movement, improves the efficiency of transport and increases the accuracy of where your cargo ends up. Identification of the bottle enables the farmer to manage cargo and be more cost-effective providing better proof of ownership to reduce theft and increase transparency (Ruiz-Garcia L, 2011).

  1. Labour cost and saving

RFID does not require human interference, reducing human error and employment costs. More time can be spent on customer services and less on production monitoring, inventory counting and information mix up.

  1. Data security

The data on RFID technology can only be read through coding preventing counterfeit. This will protect the brand’s value and enhance the brand’s competitiveness in the market. 


RFID eliminates many problems. These devices help automate farming processes, enabling farmers to have better control over their products, managing time more efficiently and managing crop inventory.

All of these systems in place make the process easier to sell to its customers. Providing a better experience for all. Ensuring that the quality of the product is not affected and the reputation is upheld.

South Africa has always been admired for offering the best quality products and services including wine. Consumers enjoy this product because of the relaxed sensation and good feeling they receive from consuming the beverage.

To keep moving on this growth path, the wine industry needs to keep on improving with the times. Technology is an important way to help the industry unlock its full potential and become the best producers in the world.


Donaldson, J. (2021). RFID Nips Growing Problem in the Bud. Mojix [Online]. Available: 29 January 2021

Kumar V & Srivastava A. 2018. The Role of RFID in the Agro-Food Sector. Agriculture research and technology, open-access journal. 14(4): 121-123.

RFID world. (2021). RFID and NFC Technology Helps Automate Age-Old Processes in the Winery Industry. RFID World [Online]. Available: 22 January 2021.

Ruiz-Garcia, L. 2011. The role of RFID in agriculture: Applications, limitations and challenges. Science direct: Elsevier. Vol 79(1): 42-50.

Wang, Y. 2013. Research on the Influence of RFID Technology on French Wine Supply Chain Management in China’s Wine Market. Université de Strasbourg. 1(1):2-47.

How RFID is changing the world

How RFID is changing the world 

RFID (radio frequency identification) uses radio waves to identify people or objects. 

These radio waves send out information about their identity to nearby readers which then decide what to do with that information (granting access or not). 

There are three types of tags:

  1. Active – this comes with a battery that powers the tag, transmitting information frequently without the need for a reader. These can store a lot of data and their signal can reach several km. 
  2. Passive – these have no battery and utilise radio energy from the reader to power themselves. These can only store a small amount of data and their signal can only reach a few cm. 
  3. Battery-assisted – a tag whose battery powers it when it gets close to a reader.

Frequency is the physical contact between the tag and the reader allowing communication. There are three categories of frequencies:

  1. Low Frequency (125-134 kHz) – very short range, restricted to just a few centimetres and limited memory storage. Data transmission speeds are low, and only a small number of tags can be read at once.
  2. High Frequency (13.56 MHz) – range of a few inches, but larger memory capacity and higher data transfer rates. 
  3. Ultra-High Frequency (433 MHz & 856-960 MHz) – long range, up to 70 feet, with large memory capacity and high transfer rates.

Most RFID systems are found at a high frequency using passive tags.

History of RFID

RFID cards have been around for decades, evolving from its early roots of World War II until today’s advanced security technology use. 

RFID Key Fobs

In World War II the Germans, Japanese and Americans used radar to warn their troops of foreign plane intruders that were approaching kilometres away. To differentiate planes that belonged to the enemy and their own, the German’s rolled their planes as they returned to base camp which would change the radio signal that reflected. Showing that these planes were not intruders. RFID helped save lives in a time of need, differentiating friends from foe and preventing their planes from being shot down in the process. 

RFID world war 2

Today, radar and RF communications are used to identify objects remotely. Companies began commercializing anti-theft systems using radio waves of whether an item had been paid for or not. Electronic article surveillance tags are used to track whether an item is paid for or not. If the item is not paid for, readers at the door signal an alarm to alert the owners of theft. 

RFID tags

Charles Walton was the first person to receive a patent for a passive transponder. He was able to unlock a door without a key. Instead, he used an access/RFID card or tag. 

What is an access card/tag?

This key card/tag is a big antenna (active RFID) with a chip inside of it. The chip is powered through the antenna so that there is no power source included. Once it is powered it will transmit a series of zeros and ones at a specific frequency. Just like a radio would. These are low-frequency transmitters of 125 kHz. 

The reader from the door transmits on a specific frequency too. When the card answers, it sends it specific information to the controller. If the description matches the description on the card it will read the correct card number and give access. The reader will then unlock the door. 

Deciding which user should have access & encoding?

What is an RFID tag

Everything is programmed from access software on a computer. Each access control card comes with a key encoded machine, which will set up permission for your card. The system should allow you to grant permission for multiple doors, configure date and time for access and even the number of times a user can access the space.

All these details are built into a very complicated algorithm, which is written into your keycard’s magstripe. This magstripe contains thousands of tiny magnetic bars, each can be polarized either north or south. Polarizing these magnets creates a sequence that is encoded on your card. Finally, the unique ID will grant access to some and not to others based on what permission you have granted. 

How has RFID changed the world?

RFID is used in many industries including:

  • Access control.
  • Time & attendance.
  • Grant identification.
  • Contactless smart cards.
  • Anti-theft devices in cars (the car will not start without the passive RFID tag).


RFID is widely used in logistics. A group of scientists wanted to use RFID to track trucks and their cargo with the use of transponders. This was done by using readers at the gates of secure facilities. The gate antenna would recognise the transponder in the truck responding data with an ID (mainly the driver’s ID). This was commercialised in the mid-1980s where an automated toll payment was created which is widely used today (also known as the dreaded E-tol in SA). 


Today RFID systems are found as high as 13.56 MHz (1K & 4K Mifare). 

Track and trace & improved supply chain 

This was especially important for business as a manufacturer could let their business partners know when the shipment left the dock at the warehouse, allowing the retailer to let the manufacturer know when the goods arrived. It allows companies like Takealot to track & trace their entire supply chain easily. Ensuring uninterrupted services and identifying missing goods instantly. 

Automated shopping 

Some of the biggest companies in the world use RFID including Amazon, H&M and Zara. According to Statista, “In 2020, the global market for RFID tags is projected to be sized at around 24.5 billion U.S. dollars. Retail applications are expected to account for the largest share of the market.” (Kumar, A. 2019). 

Amazon wanted to create the quickest checkout experience so that you do not have to wait in line and can simply “just walk out”. All you have to do is enter the Amazon store via the RFID Amazon app, pay for your item and walk out. Creating incredible customer experience and service.

Keeping track of your pets

By putting a RFID tag on your pets collar you will be able to keep track of them if it gets lost. Important ID information will be found on the RFID tag about the owner allowing those that have found the animal to bring it back to its owner. 

What are the risks?

What are the risks

The main issue in today’s age is security. Data can easily be captured and copied, allowing misuse of important information. To capture data, the scanner has to be in the range of the RFID chip. Making passive chips the safest option as they have a small range. In order to prevent data from being captured, you can carry your keys or cards in a protective pouch (mainly consisting of tin to prevent data from being copied). 

Privacy is another big issue. RFID can track your preferences, spending habits and physical movements without your knowledge or consent. This can then be used in many areas of unauthorised activities like target marketing and dynamic pricing. By storing all your data on a database, people can have access to all your personal information. And if this gets into the wrong hands it can be dangerous.

At Easi-card we promote DESfire as one of our most secure and safest options. DESfier provides the most secure, practically unbreakable 128 encryptions. The Desfire tag/card cannot be cloned, the reader cannot be hacked and the transaction cannot be skimmed.  Making it the safest option for you. 

Where is it going?

Where is it going

RFID is changing the world quickly in the most cost-effective way as prices decrease for this technology over the years. 

RFID is increasingly innovative and progressive. RFID provides important information that can assist your organization all the way. They help save time and increase your profits since staff can work more efficiently. 

RFID is a continually increasing innovation. It is expected to branch off into many more industries in the future. 

At Easi-card we strive to make life easy for you and your customers. Find out more about the RFID cards we sell in the link below. 

Written by Sherry Johnstone



IDESCO. 2019. How does DESfire work? IDESCO, [Online]. [03/11/2020].

Konica Minolta Business Solutions. 2020. RFID: how businesses use chip technology, [Online]. [03/11/2020].

Kumar, A. 2019. 5 Big Brands that Use RFID Technology in Business Smartly: asset, [Online].  [03/11/2020].

Pritchett, D. 2018. 5 ways that RFID is changing the world: Rockwest solutions. [Online]. [04/11/2020]. 

Violino, B. 2020. The history of RFID Technology: Radio frequency identification has been around for decades. Learn how it evolved from its roots in World War II radar systems to today’s hottest supply chain technology, [Online]. [03/11/2020].

How to stop illegal miners from accessing your mine

What is the problem?

South Africa’s mining sector has shrunk considerably since its peak in the early 1980s. As depicted in the figure below, mining contributed more than 20% of the country’s GDP. In contrast, that number has fallen to less than half in recent years. 

Source: South African Statistics, 2015 (pg 15.1 and 6.1)

Source: South African Statistics, 2015 (pg 15.1 and 6.1)

Over this period, nearly 6000 mines were abandoned, and tens of thousands of South Africans retrenched. Although many displaced workers have sought a living elsewhere, some have seen these derelict mines as a business opportunity and operate outside the law to extract any left-over resources. Zama Zamas, or ‘chance-takers’, is the colloquial term given to these nearly 30 000 illegal miners (Martin, 2019, p. 2).

The operations of Zama Zamas are not exclusive to dormant mines, however. Many illegal miners have found footing within the shafts of legitimate mines and are the cause of significant economic damages. Although all types of mines are affected, gold mines are their favorite targets. The Global Initiative for Transnational Organized Crime estimates that Zama Zamas are responsible for at least R14 billion in lost gold production, annually (Martin, 2019, p. 3).


Source: Sifile, L. 2018.

Safety is another concern. Zama Zamas can spend upwards of six months below ground on a single expedition and, without appropriate gear, supervision or knowledge, are a danger to themselves and those around them.

When they are above-ground, illegal miners regularly engage in turf wars with rival gangs that involve deadly shootouts, imperiling the lives of anyone unlucky enough to be caught in the crossfire.

Whether it be the loss of life, the theft of valuable goods or the damage done to property, wherever Zama Zamas go danger follows.

With the threat of illegal miners more prevalent now than ever before, how can you protect your mines from invasion? Read on and we will tell you.

How are illegal miners gaining access to your mines?

Zama Zamas gain access into active mine shafts by bribing on-site officials. Once the illegal miners have access to inside information, it is easy for them to infiltrate the premises and avoid security sweeps (Martin, 2019, p. 5). For any mine, the most critical problems to address come from the inside.

What can you do to stop illegal miners from accessing your mines?

A typical response is to request the assistance of law enforcement. However, there is an endemic problem with this approach: corruption. The South African police force is unreliable, and members are prone to bribery (Martin, 2019, p. 6). Illegal mining enterprises use this to their advantage.


Managing internal security has proven to be much more effective than outsourcing help from the authorities. After a mining firm spent R366 million on improving its security systems they caught and expelled over 1400 illegal miners (Martin, 2019, p. 7). Although it was an expensive investment, the mine quickly made up for it by avoiding further damages to their resources and infrastructure. 

You might be sweating at the prospect of paying such a large sum upfront, but there are more cost-effective ways of enhancing your mine’s security. By installing an ID-card issuance system, you can gain significant security benefits at an appealing price point. 

How does an ID card security system work?

An ID card system allows cardholders to access the premises of a business. Each card comes with an electronic chip that interacts with a scanner. The scanner recognizes the chip in the card. It sends a signal to an entrance or exit door, instructing it to open if the chip is authorized or to remain closed if it is not.

As a business owner, this gives you the flexibility to:

  • Monitor when and where cardholders enter your business.
  • Remotely control access to specific parts of your business.
  • Set parts of your business to automatically lock for extra security.
  • View activity logs of who has accessed your business, from where and at which times throughout the day

For the above reasons and many more besides, introducing modern security measures is a must for any business operating in uncertain conditions. This is especially true for South African mines. Prevention is the best protection.

Why choose Easi-card?

Easi-card supplies everything a mine would need to set up their ID card security system. Whether you want to outsource printing or purchase an ID card printing machine, we have you covered. In addition, we can arrange for alcohol breathalyzers as an added layer of occupational safety. Should you encounter a snag, we offer round-the-clock support and on-site technical assistance.

Our experience, detailed portfolio and product offerings make us a force to be reckoned within the industry. With the support of the Easi-card team, you will significantly reduce the risk of illegal miners and other unwanted individuals interfering with your operations. Do not hesitate to contact us if you would like to find out more about the measures you can take to enhance your business security.

Protect your investment with Easi-card. Leave the chance-taking to the Zama Zamas.


Primary Sources

Republic of South Africa. 2017. Mining: a brief history, Stats SA [Online]. [2020, July 24]

Martin, A. 2019. Uncovered: the dark world of the Zama Zamas. Enact. [Online]. [2020, July 24].

Sifile, L. 2018. Zama Zama turf war fears after 7 bodies found in veld. IOL. [Online]. [2020, July 24].

Further Readings

Power talk. 2019. Listen: what will it take to legalize Zama Zamas? Power 98.7. [Online]. [2020, July 24].

Minerals council South Africa. 2020. Brief history of mining in South Africa, Mining for schools. [Online]. [2020, July 24].


By R. J. Steens | Updated 23/10/2020




What Entrust Datacard’s new name change means to you

What Entrust Datacard’s new name change means to you

It’s not uncommon to hear global companies changing their names.
As the environment changes rapidly, so does the pressure to provide solutions to new and complex problems.
Often, the quest for new, results in change, like a company’s vision and mission, or at least an updated and improved one.
But, sadly, this is not the only reason why a company may change its name. They also can change them to hide or burry their former identity. To get rid of problems rather than to solve new ones.
In South Africa, recently, the latter has been the case. With many corruption scandals being brought to the publics awareness, Auditing & Management Consulting firms have been busy with expensive makeovers.
So why am I telling you this?
Well, with Entrust Datacard’s big reveal in September, I thought I would start off by assuring you that it has everything to do with solving new problems and nothing to do with hiding them!
Entrust Datacard is now Entrust ????????
What does this mean to you?
If you are a dealer of Entrust Datacard’s current product range, you will be excited to know there’s a whole lot more to add to your arsenal.
Or if you aren’t, don’t worry we will be supplying them to you soon!
And I’m not just talking about ID desktop card printers, but a whole new range of Identity, Payment and Data protection solutions. Products that look to solve growing security problems the world is currently facing!
” While this change may seem straightforward, it’s so much more than a shortening of our name. It’s an evolution. A shift in mindset. A powerful moment in our company history. ” – CEO of Entrust | Todd Wilkinson
what kind of security problems are Entrust at the forefront of?
Let’s dive in:
  • Immigration Control for Governments
  • Payment credential security for large banks
  • Access control for Government Agencies
  • Securing enterprise remote workforce data
You can now see that Entrust is positioning themselves as a leader in developing the core technologies needed to keep the world moving safely.
Where does this tie into the current COVID19 pandemic and the future?
A quote from Todd Wilkinson sums it up nicely for us:
“The global impact of the COVID-19 pandemic has shown us how critical digital transformation is in our daily lives, As consumers, we depend on digital technologies and security to do more than ever, whether it’s making purchases, crossing borders, accessing government services or logging into corporate networks.
We are proud that some of the world’s largest governments, organizations and enterprises trust us to keep citizens, commerce and information moving safely. Making Entrust the foundation of our brand reflects how our technology and innovation are central to securing this ever-evolving world”
At Easi-card we stand behind the vision and mission of Entrust.
Aligning our vision and mission “to help protect businesses and their people, by reducing the barriers to security, be it cost, knowledge or advice”.
If you would like to connect with us and are interested in Entrusts new product range, please feel free to drop us an email by clicking this link.

How the Datacard SD460 can protect your property from illegal miners

Nowadays, the counterfeiting industry continues to gain ground. However, when your private properties or possessions are at stake, it’s good to know how to defend yourself effectively.

In this context characterized by an innovation race, a lot of new technologies are emerging, thus giving a new impetus to the field of security.

That’s why we get involved, in order to offer you innovative and quality equipment, in particular to produce tamper proof ID Cards.

Currently, everybody is aware of the importance of illegal mining, which is very difficult to prevent. Indeed, among the 6,000 abandoned mines recorded in South Africa, it is estimated that their are 30,000 Zama Zamas mining a large quantity of resources.

The name “Zama Zama” comes from the Zulu langauge, and means “those who seek their destiny”.

A beautiful metaphor, but which constitutes a major problem not only in Africa but also worldwide. Indeed, Zama Zamas do not only work in abandoned mines, which are often very dangerous.

Sometimes they may decide to enter your own mines, much more secure and easier to access. This is a concern, not only because they get themselves into danger, but also because they are entering places they are not supposed to have access to.

Murders, accidents, fraud, money laundering, illicit economy, are enormous dangers linked to this uncontrolled clandestine activity, which must not be allowed to enter your territory.

Destabilizing the balance of international trade, it was actually estimated in 2005 that 10% of South African gold traded around the world was mined and sold illegally. In 2017, the Minerals Council confirmed that the state was losing as much as 21 billion rand, or nearly 1.3 billion $US, with these illegal practices.

So having a way to prevent illegal minors from entering your mines, to face this massive well-known issue, is essential. That’s why the stakes linked to innovative ID Cards should not be neglected.

Indeed, you don’t ignore that, if your identification systems are easily falsifiable, nothing will prevent identity thefts. It is child’s play to reproduce or print a banal card with your own photo on it. But when your ID Cards are made in a unique way, completed with a 3D logo you have chosen, the challenge is suddenly much harder to take up.

That’s why we offer a wide panel of ID Card Printers, so that you can design unique and reliable ID Cards for all your employees. For example, our Datacard SD460 Card Printer features the tactile printing technology, so your logo can be embossed, making it impossible to duplicate.

Fraud attempts can therefore be easily stifled. So, in addition to offering ID Cards with a stylish, personalized design, the Datacard SD460 Card Printer will protect you from identity thefts and illegal minors.

The principle is simple: you choose the image you want to see in 3D on the background of the ID Cards, and which will be realized in relief thanks to the inline lamination module of the Datacard SD460 Card Printer. Also, each laminate can be numbered, so you know which unique individual the ID Card belongs to.

The transparent film covering the ID Cards, on the other hand, cannot be removed without leaving traces. If the photo has been changed, you will notice it immediately. And all this can be done in a single pass, for quick and easy creation.

Equipped with encodable chips, these ID Cards are therefore adaptable to all your security needs, including the digital ones.

Thus, opt for the maximum security in your mines, thanks to Easi-Card!

Are Card Holders Really Necessary?

With so many enticing ads on google, social media and YouTube, that follow you around wherever you go, its easy to fall victim to buying something you don’t need. 

Like a limited edition sock, or a non-alcoholic beer brewed in some cold country with evergreen trees. 

For us, in the card industry, its Card Holders. The question I often hear is: “Are card holders really necessary?” “Why should I buy them?” “Isn’t that what my wallet is for?”.

For some time, to be honest, I haven’t really answered it in depth, only giving surface level explanations like, “it protects your cards” or “it saves you money in the long run” without knowing by how much exactly.

So that’s what this blog post is all about, giving you the real reason why they are necessary and by how much they can impact your business. Prepare to be shocked.

How long do card holders protect your cards for?

There are many types of card holders on the market, frosted or clear to begin with and then there are a number of different types based on function:

  • Luggage card holders with a suitcase handle 
  • A card holder with 2 handles
  • Card Caddies 
  • Conference Card Holders
  • Twinprox Card Holders 
  • Luggage Card Holders with a Suitcase Handle
  • Keyring Card Holders for Drivers License

 If you take the basic most common card holder, the luggage’s card holders with a suitcase handle – on average – if you left it to degrade the plastic itself would take 1000 years!

If Henry II had bought a card holder and for some reason left it in his chamber of treasure and we found it today, it would still be in one piece. 

But what if Henry used it? How long would it last then? 

Advantages of PVC Cards

Advantages of PVC Cards

PVC Cards, known as Polyvinyl Chloride are plastic cards composed of a graphic quality version. When it comes to these types of cards, Easi-card aims to keep the level of quality at top priority. The high quality PVC cards that we carry are all optically scanned and vision inspected to verify the purity and cleanliness.

The PVC card industry is growing through new printing technologies. Businesses and individuals are looking to swap from traditional cards to plastic. This means that PVC cards are accessible and affordable worldwide.

Plastic has many uses that come in almost every single size, colour and shape. It has become increasingly popular due to fact that it is durable and versatile. Putting cards onto plastic ensures that they can last longer and consistently represent a brand or individual, as opposed to other materials that are used which can be easily damaged.

It takes a lot to wear out a PVC card, which is why many companies are now venturing into the world of plastic cards for business practices.

To further support the above statements; here are some advantages that PVC Business Cards can offer you.

Diversity of Use

PVC Cards have a variety of different uses. They can be used for security, ID cards, business cards, rewards and membership cards. Name what you need a PVC Card to do and Easi-card can do it for you.

Customizable Design

PVC cards are able to apply any graphic, photograph, bar code, logo, artwork or text. These cards are only limited by the users’ imagination.

No matter the design, PVC Cards have an attractive look due to customers’ expectations for companies to stay innovative and creative.  Using this type of card can help you steer away from traditional and move towards the future. These cards create a great impression which counts the most within business practises.


There are many types of card protection procedures that can be utilized to make your cards resistant to tampering or alteration. Precautions like hologram overlay ensure that a card is secure and cannot be easily reproduced or counterfeited.


Protection materials such as overlay patches and varnishes provide high levels of card durability. This makes the cards resistant to UV light exposure, water damage, exposure to liquid chemicals and mostly abrasion.


PVC cards support a professional look, making it easier for customers to keep the cards for future use. Their size allows them to easily fit into a pocket, wallet or purse making them long-lasting and create a continuing impression when handing them out. For example, plastic business cards give stability and durability that efficiently brands a company or individual. A professionally designed card will make you stand out from the others. It encourages a customer to pick it up and make an enquiry. PVC Cards used within business practises can be perceived as valuable and increase the chance that a customer will keep the card. 


If you want to move to PVC Cards, let Easi-card help you out. Contact our friendly sales team on 011 487 1536 to discuss your card requirements. Give us your design and we will make the magic happen.


10 Reasons Why You Need HID Mobile Access

Ten Reasons Why You Need HID Mobile Access.

The future of Mobile Access has finally arrived. It is the latest development in physical access security. It gives users the advantage in the increasing mobile-first world by allowing our smart devices such as our phones to work as a credential.  It is an innovative, convenient and dynamic way to utilize our mobile devices for effective security measures.

HID Mobile Access has a reputable history of successfully enabling physical access control going forward. It leverages standard mobile devices to create a solution that is accessible, simple to manage and easy to use. Mobiles are consistently around us and a part of every aspect of our daily activities, making it the most valuable form of technology that we own. HID Mobile Access combines convenience with security by storing identities on your mobile to allow access to gates and doors with just a tap!

To further justify the convenience of HID Mobile Access, here are ten reasons your dynamic company can benefit from implementing the HID Mobile Access into your business practice.

  1. Card technologies have been around for many years, offering little choice to the end users, as opposed to moving to tablets, phones, watches or wristbands which offers a wider choice for the end-user, supporting user’s convenience and choice.
  1. Cards are rarely perceived as innovative, whereas the HID Mobile Access system is perceived as modern and advanced yet convenient in the ever changing environment which revolves around technology. The users’ experience is also enhanced by the ease of the tap or gestured technology.
  1. Cards can easily be lost, stolen or shared which puts your environment at a security risk. Mobiles are generally closely guarded due to personal data and costs. If a phone is lost or stolen, precaution measures such as Find my IPhone is commonly used to erase data off mobiles devices.
  1. Card technologies have been known to have weaknesses and abilities to be copied. Security protections are built into the mobile credentials which make them highly reliable and secure.
  1. ID Cards do not offer integration of physical and logical access, whereas using the right mobile access like HID can unify physical and logical access controls on your mobile device.
  1. Card technologies do not meet the world of practising the best security and privacy standards. However, mobile access employs the best practice among other multi-layered authentication which is more secure and protects privacy throughout the use of the HID Mobile ID.
  1. Cards require a visible reader on the wall, which increases the risk of potential vandalism. HID Mobile Access has a long range to read your phone. It allows readers to be inside the building or behind the locked door which reduces the risk of vandalism.
  1. Issuing, cancelling or changing access rights of an ID card can be a slow procedure, as opposed to HID Mobile Access whereby mobile credentials are managed within a strong online portal which can be issued, revoked or changed, wirelessly on-the-spot.
  1. Card technologies are not that eco-friendly which is a growing issue and ethical consideration for all companies, big or small. Mobile access supports sustainability efforts by moving access control into a greener footprint by upcycling an existing mobile device.
  1. ID Cards can become unmanageable. Through HID Mobile Access, mobile credentials can be managed through an easy-to-use Web Portal.


Feel free to contact our friendly Easi-card sales team on 011 487 1536 for more information or specifications on HID Mobile Access.