The key to mall security

August 2016 Access Control & Identity Management, Asset Management

According to a recent survey by the Opinion Research Corporation (ORC), the shopping centre, in all its variety, has become the great crossroads where visitors go to buy, socialise, play and work. From recreational walking to attending fashion shows to dining and more, few other institutions compare to a shopping centre in today’s culture.

Because of the size, uniqueness and multiple activities, administering the safety aspects of a large retail environment requires an expansive knowledge of security practices in order to make good decisions regarding the protection of the facility and its employees and visitors. Cash, goods, business information/data, personal items and even identities are prime targets for theft in a retail environment; these vulnerabilities can be heightened when there are security irregularities including lost or missing keys.

With physical keys still in frequent use for securing doors and entrances at retail centres, key control is high on the list as a state of the art security practice. Key control and management systems, designed around hardware/software technology, offer enhanced security with capabilities that add convenience to operational tasks.

Hardware manages the keys

Key control and management systems are designed to secure keys in a tamper-proof cabinet and electronically release keys only to authorised users. Each individual key, whether a traditional mechanical key or a plastic card access key, is secured to a locking mechanism that features a built-in memory chip; data from the chip is stored when a key is inserted into or removed from its slot in the cabinet. From this data, management has a complete history of who removed or returned the key and when.

Even unusually shaped or larger size keys that are used to lock outdoor enclosures surrounding facilities’ heating and air conditioning units can be stored in the key cabinets. For sets of keys, tamper-proof key ring systems can accommodate several keys on a single ring and keys can be added or removed by replacing a hub, without any need to destroy the ring.

Knowing who has which keys to which locks, when they had them and when they were returned, is a vitally important issue for mall security. Failure to maintain this kind of control can result in opportunities for key mismanagement, which can lead to mild annoyances such as the replacement and cost for lost keys, or to more serious losses, such as theft or personal injury.

Key storage cabinets with automated tracking capabilities are available in a variety of sizes and are ideal for installation in mall security or management offices. Smart, tamper-proof designs help reduce the amount of wall space needed, and systems can be set up to be accessible via pass codes, access cards or biometrics. For additional functionality, the same key cabinets may also be configured with lockers to allow for safe storage of items such as PCs, notepad computers, cash drawers and other valuable devices.

The myriad conveniences of advanced key control systems include messaging and reporting. Notes can be written and stored regarding a key, such as ‘leave lights on when exiting room’; then, whenever that particular key is accessed, the note will pop up on the screen.

Software manages the data

The ability to manage all programming, remote functions and reports with a software-driven key management solution provides tremendous value in a shopping mall application. Similar in concept to popular access control systems, a PC-based package of key control management software streamlines and unifies day-to-day operations and activities. Profiles can be assigned for improved user control, and there are various options for tailoring administrative access privileges to specific needs, including reporting or alerting. The system can be set up to send priority email or text alerts to mall management, keeping them informed of the whereabouts of high value keys.

Built-in scheduling capability enables the user to automatically download data to a secure PC. Scheduled e-mail reports that detail what keys are in or out, who has or had them and for how long provide the up-to-date information security management needs to ensure the integrity of physical keys used throughout the mall. If an incident occurs, management can query the system for specific details such as a listing of all transactions between certain times; and when doing a follow up investigation, management can request a report for the hour preceding the incident. Or, immediately following an incident, a report can be generated showing which keys are back in the system and which keys are still out and who last accessed them.

The actionable information provided by the system to mall management optimises their ability to provide a safe and secure environment.

Enhanced security and operational convenience

Automated key control and management systems offer an increased level of security for retail environments by preventing unauthorised key access and reducing the incidence of lost or misplaced keys. As well, the streamlined procedure for accessing keys offers several advantages to users and management. For example, contractors, consultants and others who have been registered in the system with fingerprint identification no longer have to sign in and wait for a key to be issued. They simply place their finger on the key cabinet scanner to open the cabinet and access a key. Emergencies that occur during off hours can be more readily acted upon because contractors can access keys without having to wait for property management to arrive on scene.

Whether one goes to the mall to shop, go to a movie or have a meal, key management systems are helping to keep the environment safe.

For more information, contact Morse Watchmans, +1 203 264 4949, morse@morsewatchman.com, www.morsewatchmans.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.