Automated key control improves manual systems

May 2017 Access Control & Identity Management

Everyone makes mistakes and, in many cases, they can be good learning opportunities. However, some mistakes have more far-reaching and even potentially dangerous ramifications than others. In the case of security and its critical mission of protecting people, places and assets, mistakes can lead to losses and potentially cost lives.

In the event of a lost key or mismanaged keys for instance, locks may have to be re-keyed, inventories will have to be taken or audits performed, lost or damaged items replaced and there will have to be a follow up investigation to determine who may have been responsible or who last had the keys. Not only are these disruptive exercises but they can also be quite expensive depending on the number of doors that must be re-fitted and the types of locks required. A policy review may even be initiated to help ensure that keys are better managed and controlled and that measures are put in place so that the situation does not re-occur.

Without question, physical keys still play a vital role in the security process but key management is one of the most overlooked areas within security. Company policies regarding key control and usage are fine in theory but are too often ignored in practice. Keys are passed around and/or duplicated, manual logging is not reliable and so on. When it comes to tracking and controlling access to keys, lessening or even eliminating human error is a primary motivation for an organisation to make the decision to move from a manual system to an automated key management system.

Here are five areas where the implementation of an automated key management system can make a difference.

Key control

Not knowing if an employee attempts to get possession of a key they are not authorised to use, or when a key is returned by an employee other than the one who took it out, can quickly become a liability. Key control and management systems are designed to secure keys in a tamper-proof cabinet and access to the cabinets and to individual keys is controlled at all times, with every key accounted for.

Administrators can access, program and monitor the system over a network from anywhere. This convenience allows facility managers to see reports, change users, establish permission levels for each user code, monitor data or configure the systems from virtually any location, all providing added control.

Policies and procedures

Policies and procedures are established for a reason but they may not always be followed. One of the ways in which organisations can help ensure that employees follow company policy regarding key usage is to make sure that it is easy or convenient to do so. Key management systems with automated tracking relieve the responsibility of an employee having to manually sign out a key or log returns into the book.

Other time-saving features may include the option to return a key to any key cabinet in the system rather than having to return the key to the cabinet from which it was removed. Users can see which keys they have out, if any of their keys are overdue and when their keys will become overdue. Biometric identification, large, easy to read touch screens, voice cues and status bar guides help to ensure a fast and easy procedure when accessing or returning keys to the cabinet.

Improved security

Hardware and software technologies are not the only measures available to improve security; information often is just as valuable. Key management systems allow keys to be managed according to requirements (i.e. time/day available, personnel, etc.) and management can quickly query what keys have not been returned and when a key will become overdue. And if a key is not returned to the key cabinet as scheduled an alert is sent via email or SMS text to appropriate personnel so that immediate action may be taken. Mobile apps let authorised users to see a wide range of live information and interact remotely with the system.

In the event of an incident, management can query the system for specific details such as listing all transactions between certain times and when doing a follow up investigation, request a report for the hour preceding the incident. Or, immediately following an incident such as the discovery of a damaged or missing piece of equipment, a report can be generated showing who last accessed the particular key.

Key usage information

In addition to key tracking, the recorded data from a key management system provides a wide range of business intelligence that can be analysed for identifying policy and procedure infractions and/or improvements. Trends that could take weeks or months to detect manually can be seen almost instantly when relevant queries are programmed into the reporting software. This highly specific intelligence allows root causes of problems to be identified rather than symptoms, and enables management to enact countermeasures that will help prevent new incidents before they occur.

Integrated systems

Today’s advanced key management systems feature open protocols and partner certifications that let them integrate into broader security systems, including identity management, access control, and visitor control. Managed separately, they create unnecessary extra work for staff and leave open the potential for security vulnerabilities. When integrated though, processes can be streamlined and redundancies eliminated across common points. Employees can be entered into the access control system, for example, with their credentials’ profile information, access group, etc. instantly transferred to other systems. The system can also pass data about transactions and alarms back to the access control system.

To help ensure system integrity and protection from breaches, data can be encrypted with AES-256 technology. Other new features are continually being added to help protect the system from security breaches via the network.

Finally, all of these improvements made possible by implementing a key control and asset management system in place of a manual system can help to keep operational costs down: there are no lost keys to be replaced, easy use encourages adherence to organisational policies and procedures, control of keys makes facilities less vulnerable to break-ins and theft, analysed data can point out weaknesses and improved operational efficiencies in an integrated system save time and money.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...