classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Ergonomic design delivers practical benefits
November 2016, Access Control & Identity Management

As early as the 18th century, the workplace has been studied as it relates to the worker. Fast forward to the 21st century and the principle is still being studied, but now under the broader name of ergonomics.

The word ergonomics originates from the Greek word ergos (work) and nomos (natural laws). In an ergonomic workplace, tasks and tools are designed to fit individual capabilities and limitations so people can do their jobs with greater comfort and convenience, and without being injured. More broadly, ergonomics can be applied to optimise larger systems like resource management, work design, human-machine interfaces, etc. within the organisation (hence the term ‘organisational ergonomics’ from http://ergonomics.about.com/od/M-R/g/Organizational_Ergonomics.htm).

When Morse Watchmans was first making its way into the security industry with an automated key control and management system, ergonomics was fundamental to its design. We studied how people of all shapes and sizes would use the device to make sure the display was properly positioned for correct viewing; that actual key access was swift and unencumbered; and when two or more cabinets were installed that the door openings were uniform.

These particular findings, along with a multitude of other tests and studies, were used to develop a key control system that encompasses four main principles of ergonomic design; those being safety, ease of use, productivity/performance and aesthetics. Following are the benefits of smart key control systems that align with these ergonomic design principles.

Safety

It goes without saying, but misplaced keys and lost assets can compromise the safety of the individual. To this end, a vandal-resistant cabinet design helps security personnel ensure that important keys are safe from unauthorised access, while stainless steel locking rings add to key security by deterring tampering. The design is complemented by an on-board alarm system that will sound if the cabinet itself is tampered with or if incorrect codes are repeatedly entered.

Access to the cabinets and to individual keys is controlled at all times, and every key is accounted for. When networked, a firewall and AES256 encryption technology for data exchanged between the cabinet and the server help protect the system and the organisation’s assets.

Ease of use

On the physical level, security key cabinets are designed to offer the flexibility needed for installation at almost any height that allows for the user to easily reach the cabinet and interact with it. A slanted console provides a natural viewing angle and makes it easier to swipe a card or use fingerprint identification to access the key cabinet. Once the cabinet is opened, the requested key location is illuminated so the user can easily identify it. Both larger touch screens and audio prompts help make the interaction faster and more convenient and can help improve productivity.

Productivity/performance

Keys are attached to a fob that features an identification microchip and a stainless steel locking ring. The security key fob fits into a cabinet key slot and, critically, automatically records all access activity. No more time spent manually recording key activity. The recorded data lets authorised users more easily determine who has keys out and when they are scheduled to be returned; meanwhile, instant e-mail or text alerts reduce the burden on management even further, letting them know an overdue key or when it has been returned. And of course, key inventory systems with integrated tracking can help prevent lost keys and reduce vulnerabilities – not to mention wasted time and user frustration.

Aesthetics

The aesthetically pleasing key cabinet with its visual display of organised key placement is far more appealing than a messy box of keys. Cabinets are designed for horizontal or vertical placement and multiple units can be precisely installed to maintain a professional appearance. System maintenance is also considered in the design, which allows servicing of the unit to be accomplished with minimal disruption and/or disassembly.

These and other benefits of key inventory systems are cumulative, helping make life easier for users, while also supporting the company’s activities and reducing the risk of losses. All of this is welcome news for the business itself – who says good design can’t support good economics?

For more information, contact Morse Watchmans, +1 203 264 4949, morse@morsewatchman.com, www.morsewatchmans.com.


Credit(s)
Supplied By: Morse Watchmans
Tel: (001) 203 264 4949
Fax: (001) 203 264 8367
Email: morse@morsewatchman.com
www: www.morsewatchmans.com
  Share via Twitter   Share via LinkedIn      

Further reading:

  • T&A in financial services
    November 2016, Access Control & Identity Management
    The Shriram Transport Finance Company trusts Matrix time and attendance and access control solutions to efficiently manage its branch offices across India.
  • Not all IDaaS are created equal
    November 2016, Networks Unlimited, Access Control & Identity Management, Integrated Solutions
    IDaaS solutions are a more valuable target for threat actors, and as such receive a lot more attention – in the form of attacks.
  • Access control in 2017
    November 2016, CEM Systems, Axis Communications SA, neaMetrics, Suprema, This Week's Editor's Pick, Access Control & Identity Management
    According to IHS, the total installed base of access control readers, panels,credentials and electronic locks is expected to reach 2.3 billion by 2016, up from 1.8 billion in 2012.
  • The future of Checkpoint Delta
    November 2016, This Week's Editor's Pick, Access Control & Identity Management, Transport (Industry)
    Not only in scale, but also in opportunity, the airport is a true twenty-first century icon. But alongside are the vulnerabilities of post-cold-war politics and terrorism.
  • Security versus convenient access
    November 2016, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    As digital interactions increase in volume and complexity, identity and access security have become more critical for both the organisation and end-user.
  • IAM: Looking ahead
    November 2016, Access Control & Identity Management, Security Services & Risk Management
    Identity and access management and access governance: the immediate past and the future.
  • The biometric decision
    November 2016, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Biometric technology has come a long way to being a reliable, yet often misunderstood identification and authentication mechanism in business today.
  • Biometrics advance is relentless
    November 2016, Suprema, Virdi Distribution SA, ZKTeco, neaMetrics, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions asked the leading biometric suppliers in the region to tell us more about the market, as well as about reports claiming it is easy to fool biometric readers.
  • A password you can’t forget
    November 2016, Access Control & Identity Management, Security Services & Risk Management
    Voice biometrics doesn’t receive the same level of publicity that other forms of biometric technology do, but it is a fast growing form of identity authentication.
  • Using smart devices to provide recognition of individuals
    November 2016, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Security Services & Risk Management
    [ezine teaser] The very idea of a computer being able to recognise people in a similar way to which we as humans instinctively recognise individuals, is mind boggling.
  • Protecting against criminal use of stolen biometric data
    November 2016, HID Global, Access Control & Identity Management, Integrated Solutions
    Biometric technology is not invulnerable, but with the correct planning it is an effective authentication mechanism that binds a myriad of digital and physical credentials to a person.
  • Mobility and access meet
    November 2016, Impro Technologies, Salto Systems Africa, Access Control & Identity Management, Integrated Solutions
    Mobile technologies have made biometrics a household word and are now changing the face of access control with on-device credentials and simplified management functionality.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.