Securing More Than Just Keys

Read More
All Posts

Securing More Than Just Keys

Securing More Than Just Keys

Can key control control more than just keys?

Not only can it – it does. More and more organizations are finding that their need to secure a range of valuable items can be perfectly met by key control systems.

Panic Buttons

For example, a key control and management system is the best way to store, track and account for the panic button fobs in growing use by hotels and hospitality businesses. A new law in effect in Seattle, New York City and other locations now requires hotel employers to provide a “panic button” to housekeepers and other workers. For employees who enter guest rooms, this can protect them in case of harassment or other threats. Using one of these buttons enables a worker to instantly broadcast a call for assistance from a security officer or other authority. Typically the buttons are on key fobs carried by staff members.

Many of today’s hotels must purchase these panic buttons, sometimes in large numbers, to properly equip personnel. Because housekeeping staff follows a 24-hour schedule, it makes financial sense for the fobs to be shared among employees. This necessitates a way for hotel management to store unused panic buttons and to account for each one at all times.

When not in use, each fob can be locked safely in a key control cabinet, and only removed or replaced by the individual who is scheduled to use it at that time. All activity can be tracked, so management gets a clear picture of whether employees are adhering correctly to the program.

Authentication tokens

Another use case for key control systems that house more than just keys can be made by the growing popularity of encrypted authentication tokens or fobs to ensure safe log-in to websites that require a password for access. As more and more individuals and businesses are discovering, hackers can get around virtually any password protection at will. This puts personal information, intellectual property, financial records and other important data at risk.

A number of manufacturers have addressed this problem with new hardware-based authentication devices. These use USB, NFC (near-field communications) or Bluetooth technology, typically via U2F or FIDO2 protocol, to enable two-factor authentication. The device creates a one-time cryptographic code and pairs it automatically each time the user visits a previously-authenticated website. This provides much stronger and safer protection than most of the passwords in use today.

Many hackers find that the easiest way to get into a network is to break into a facility and steal a laptop or server. With this in mind, organizations using the tokens must protect them from being stolen. Key control systems provide an ideal way to secure, protect and track them.

Kitchen Tools

While fobs and tokens may seem a natural fit with key control systems, it might be surprising to learn that some organizations use them to store potato peelers.

In a correctional facility kitchen, inmates are permitted to use tools such as knives, forks and peelers. Naturally, all of these must be carefully controlled, counted and tracked in order to ensure no sharp implement ever leaves the kitchen. In the hands of a dangerous person, a steel potato peeler could be used as a weapon and could cause serious harm or worse.

Beyond protecting the items, the system can be configured so that each has a specific time limit set for its use. Alarms can sound and notify authorities if a peeler, knife or other implement has not been returned on time.

In addition to kitchen tools, firearms, ammunition, Tazers and other weaponry can also be kept in a key control cabinet at a correctional facility.

In all of these cases, access to each individual device stored inside the key control cabinet is limited to authorized individuals. Permissions are verified by credentials, which can include biometrics such as iris recognition, fingerprint or facial recognition for added security.

From fobs to firearms, panic buttons to potato peelers, there’s almost no limit on what you can secure and protect in a key control cabinet.

Discover how key control and asset management systems can be an effective way to boost security by downloading our free whitepaper.

Tim Purpura
Tim Purpura
VP Global Sales & Marketing

Related Posts

How to Improve School Safety with Emergency Key Control

Today’s K12 schools have to be prepared for anything and everything – especially an emergency. With both natural disaster and active shooter events on the rise, it is critical for schools to implement comprehensive emergency preparedness plans that prioritize the safety and well-being of those inside. These plans most often consist of lockdown, evacuation, and shelter-in-place drills with approximately 98% of public school students actively drilled on lockdown procedures.

5 Benefits of Key Control For Small Municipalities and Medium Size Cities

Securing smart cities with smart locks might be the next big thing – but what about securing small and mid-sized municipalities and cities that still rely on traditional locks and keys? With so much talk about the use of keyless entry, it seems as though the reliance on physical keys that persists throughout all municipalities has been largely overlooked.

Enforcing Zero Trust Security at Hotels Using Key Control

Hotels play host to priceless experiences: family vacations, million-dollar views, and once-in-a-lifetime adventures. But as every hotel executive knows, it is the assets inside that are even more valuable: people, property, and sense of safety. Protecting hotel assets therefore requires an iron-clad approach to security, also known as zero trust. With the help of key control solutions, hotels can easily begin implementing zero trust security policies that start working on day one.