The ABCs of key control

February 2014 Access Control & Identity Management

In developing a comprehensive physical security strategy, it’s important to include a key control plan as part of the overall security package. Key management systems can reinforce access control policies that are already in place and can also help to reduce the costs that are associated with lost keys or unmanaged access.

It’s also important to know that it is never too late – or too early – to implement a key control and management plan as part of an overall physical security strategy. And if you’re not sure about how to proceed, the following three questions may provide the answers for you.

Fernando Pires.
Fernando Pires.

What is key control?

Key control and management systems are defined as an orderly and secure solution for addressing controlled usage and safekeeping of mechanical keys. The tamper-proof systems are designed so that only authorised users, using pre-programmed PIN codes, access cards or biometrics, can access keys and on-board advanced technology automatically records all access activity.

A basic system typically consists of a computerised key storage cabinet, a key locking mechanism and a tracking system. From this basic package, several options and design variations can be added to customise the solution and help protect the investment as needs grow and change.

For networked installations, management software can also be included in the system. Permission levels can be established for each user and data can be monitored from any desktop connected to the network. Additionally, the software can run activity reports, sort based on different criteria, view and print reports and more.

Why do I need it?

Today’s key control and management systems have become a higher level management tool for effectively addressing the safety and security of building occupants and the security of the building assets. Knowing the identity of authorised key holders, which keys they have in their possession or have access to and when they were used is all essential information needed to help ensure a safe and secure environment.

Further, technology developments and open protocols have made it possible to integrate key control with access control and other security systems as part of a facility’s networked security system. Now, a user who has taken a specific key can be denied egress from the facility until the key is returned – and selected management can be alerted via e-mail if a key has not been returned on time.

Physical changes in the facility may also dictate the need for a key control system. For instance, a closet that may have once been used only for storing office supplies may now be used for holding more valuable items and should be locked. In some cases, convenience for the security staff can even be substantially increased. For example, changes implemented over the LAN are effective immediately which can help prevent incidents such as denying access to keys to recently terminated employees. The network connectivity of the system also allows management to remotely release any key, adding to the convenience and inherent safety provided by a key control and management solution.

Where can I use it?

Key management systems have become an operational necessity in environments such as correctional institutions, hospitals, car dealerships, property management, casinos and educational facilities, to name just a few examples. It is also a critical function for anyone overseeing security at conference centres, government agencies, control rooms, automotive businesses and corporate buildings. However, key control can and should also be applied to businesses of all sizes because of the measurable benefits of enhanced security, convenience, increased staff productivity and accountability.

Most recently, key control systems’ functionality has been expanded to include custom modules to accommodate valuable items. Lockers, available in various sizes, can be used for storing small firearms, cell phones, 2-way radios and other valuables. Items can be returned to any open locker for convenience, and systems can be set up as a personal storage space for one or multiple users.

These asset management systems can also be configured with additional security features to help maintain the integrity of the system. For example, where protection of asset lockers itself is mission-critical, installation of a remote access device provides an additional layer of protection by enabling the locker system to be placed in a secure room. A second individual’s PIN input and verification is then required in order for an authorised employee to access the contents of a locker.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.