Asset Protection Enhanced with RFID Locker Management Systems

For more than 50 years, Radio Frequency Identification (RFID) technology has been available for use in business and security applications. We’re all familiar with RFID tag systems in retail stores as a theft prevention device. However, its use has expanded to include widely diverse applications including embedding tags in a casino’s high value poker chips and tagging test equipment and tools used at a jet engine maintenance facility. RFID tags are also a reliable solution for asset control of high value items such as laptop computers or tablets that may contain proprietary information. Similar solutions can be used to help ensure the security of evidence obtained by law enforcement officers.

RFID systems comprise three parts: a scanning antenna, a transceiver with a decoder to interpret data and a transponder or tag that has been programmed with information. The RFID tag serves the same purpose as a bar code or magnetic strip on the back of a credit card in that it provides a unique identifier for that tagged object.

RFID tags can be either passive, active or battery-assisted passive. An active tag has an on-board battery and periodically transmits its ID signal. A battery-assisted passive (BAP) has a small battery on board and is activated when in the presence of an RFID reader. A passive tag is cheaper and smaller because it has no battery; instead, the tag uses the radio energy transmitted by the reader. Tags may either be read-only, having a factory-assigned serial number that is used as a key into a database, or may be read/write, where object-specific data can be written into the tag by the system user.

When it comes to securing and managing valuable items, RFID tagging is only part of the solution. Another critical component is storing, accessing and tracking the tagged items. Knowing where a valuable laptop is, who may have last accessed the laptop and when it was returned or by whom is crucial information in asset management.

This need is now being met by RFID asset management locker systems which use RFID technology to track assets placed in or removed from the lockers. Similar in concept to an automated key control and management system, RFID asset management locker systems use the integrated RF antenna rather than a key fob to automatically record all user access activity. Designed for optimum security, a locker will not open until the system verifies that the user has permission to access the contents of that specific locker. And because the system automatically records all activity, custom reports can be run and delivered automatically to management on a scheduled or as-needed basis.

Biometric identification, large, easy to read touch screens, voice cues, LED illumination and status bar guides help to ensure a fast and easy procedure when accessing or returning tagged items to the locker. Available in a variety of configurations and are scalable to meet growing needs, asset locker systems can typically read several different kinds of tags beyond the tags that come with the system. Multiple tagged items can be stored in the individual lockers making the system even more economical and efficient.

Security is an evolving market with a consistent need for high performance, cost-effective, unified solutions that help ensure a safe and secure environment and the protection of assets. Advanced RFID-based asset management locker systems address those needs with a full range of choices and capabilities for enhanced asset protection.

Key Management Systems’ Open Platform Eases Operational Issues in Mergers and Acquisitions

Mergers and acquisitions, or M&A as it’s commonly known, is a growing trend in the security marketplace as reported by several industry reports. The convergence of technology is one of the driving reasons for this, according to various M&A trends reports (e.g. Deloitte), and the momentum includes both smaller strategic deals as well as major transformational deals.

Continue reading

Mall Security Supported with Key Control Systems

Administering the safety aspects of a large retail environment requires an expanded knowledge of security practices in order to make good decisions regarding the protection of the facility and its employees and visitors. Cash, goods, business information/data, personal items and even identities are prime targets for theft in a retail environment and these vulnerabilities can be heightened due to lost or missing keys and other security irregularities. As a result, key control with automated tracking is high on the list as a state of the art security practice.  Continue reading

Key Management Best Practices for Emergency Situations

Managing the consequences of a natural disaster or other emergencies is never easy, but it can be made more efficient with better preparation and follow up. Key and asset management systems are a valuable part of facility security, helping to protect staff, assets and areas and streamlining access for authorized users in both regular and emergency situations. When time is of the essence, these systems can also supply up-to-date and reliable information allowing personnel to react more quickly and proceed with established procedures regarding secure areas or valuable assets. Continue reading

How Unmanaged Keys Can Hurt Your Business

Managing a business, whether a small, family-owned company, a franchise operation or a branch office can be challenging—and it often is. Licensing regulations, paying too much for rent, labor or materials and poorly designed websites are just some of the issues that can adversely affect the business’s success. While there are no silver bullets to resolve these issues, management can minimize many of the problems through open communication, defined tasks and responsibilities, effective data collection/analysis and so on. Continue reading

Key Management ROI Offers Proven Cost and Time Efficiencies

Security departments within an organization often tend to underestimate how much productivity is lost to manual tasks that could easily be accomplished with automated systems. Technology solutions are readily available to help security management free up employee time so they can focus on more valuable tasks that help ensure safety and security. In considering these options, ROI is often a determining factor. Continue reading

Key Control Systems Provide Home Owners/Renters with Confidence and Peace of Mind

With the year drawing to a close, the busy season is in full swing for many organizations including retailers, travel agencies and schools. Additionally listed among this group are property management companies who often have the added seasonal duties of home/rental management for “snowbirds.” Tasks range from prevention services such as checking the vacant home for unwanted pests to arranging cleaning/repair services for winter residences. Continue reading

Key Inventory Systems Support Biometrics for Enhanced Security

A number of recent articles have put forth the proposition that the password as a security measure is dead. The reasons listed are many, including how easily they are forgotten, the password is weak or easily guessed and how quickly cyber criminals can get around them. Not mentioned in these articles but posing a similar challenge is the use of PINs or smart cards as security measures. Continue reading

Key Inventory Systems Lock the Door on Insider Threats

The role of the security professional has changed considerably over the past decade, with more focus on both mitigating threats and attacks as well as on the business needs of the organization. An added wrinkle to this expanded role is the threat from inside the organization from rogue/former employees, unscrupulous contractors who have authorized access and even unintentional security breaches by well-meaning or careless staff. These threats from within are often the most costly and dangerous.  Continue reading