Key management vs. electronic locks

April 2017 Access Control & Identity Management, Asset Management

Looking after keys is a tedious task, but ineffective control can literally leave a company’s doors open to crime in various forms. Electronic locks offer a high-tech solution, and modern technologies have even infiltrated the domain of physical keys through innovative key management systems.

According to Morse Watchmans’ Joe Granitto, the software platforms used for managing physical keys and those managing virtual keys are still separate entities, but integration into an holistic access management system is a hot trend in the industry. “We are fully integrated with Lenel, Honeywell, Software House and Amag,” he explains. “Customers are looking for one central point to manage users and not in every system they purchase.”

The company offers the KeyWatcher system for physical key management, which he says can receive user, card and access group data from the access control system, and also send back transactions and alarm info to the access control system.

“There is much more to modern key management than simply showing who took which key, and when,” says Granitto. “We started with a few basic features and that has grown substantially. Integration is huge now, where in the early days it barely existed, and the software platform has also grown. There are dozens of powerful features and other functions that define the industry leaders. Operations and security managers are looking for complete control of their keys. They want to know when a key goes out and when it comes back. They want to be e-mailed if a key is overdue or if an alarm occurs. They want customised reports predefined and sent to them automatically. They want systems networked and keys to be able to be returned to any KeyWatcher they have.”

Johannes Tlhabi from ZKTeco supports Granitto’s statement that there is still a divide between software platforms used for managing physical keys and those managing virtual keys. “The reason for this is partly because these two have always existing as two different facets of key management, where the former emanates from the physical security point of key management and the latter more from a logical perspective of key management. The physical security product innovators have never entirely embraced the methods applied by the logical security innovators and the opposite also holds,” he says.

Management is crucial

Tlhabi goes on to say that key management has had to adopt a higher-security approach since some of the keys that are managed today provide access to intricate operations that can lead to serious security breaches; breaches that can run into millions of rands in losses, and can seriously endanger productivity or even cause injuries or loss of life if such keys were to fall into the wrong hands. Therefore a lot more now needs to be known about a key, its authorised users, the times that it can be used and the procedures that must be adhered to.

“The markets have started to realise that there is now, more than ever, a greater need to have proper key management systems, as opposed to a traditional cabinet hung behind some door where a person has control of one key that opens a key box to give access to all keys that are inside the cabinet, Tlhabi continues. “RFID card-based, half-decent key management units are increasingly making their début in the market and are quickly being grabbed by those customers who are aware of their benefits. In general, the trend is still such that only high-end customer markets, like mining and manufacturing, are more open to using the technologies, albeit at higher costs as they are perceived to be in a higher risk bracket when it comes to safety of keys.

With an eye on future developments, ZKTeco is partnering with innovators in key management to offer advanced biometric verification technologies to enhance their current methods of using RFID card-based technologies. “We are all at least well aware of the risks that are associated with cards-only based security transactions, and this knowledge leads to a natural progression towards biometric-based integrated key management solutions. We provide modules that can be incorporated into the key management

systems, as well as the software development kits that allow the innovators to customise their own access control solutions around the key management system, both hardware as well as software.”

Total cost of ownership

Electronic locks take a modern approach to getting around some of the problems with physical keys, but they also have challenges and constraints, especially when it comes to cost. SALTO Systems makes a number of products that can replace mechanical keys, and although on the surface they are more expensive than a traditional key system, the company’s Wouter du Toit says in the long run they are more cost-effective in more cases, and boast better security. “Expensive factors that are never considered include the fact that when a key is lost, you have to replace the lock and not just cut a new key to maintain security,” he warns. “This results in lost time that could equate to losses in revenue. Yes, you get high-security keys with master key systems, but this is expensive and still does not solve the problem in managing keys, and you still cannot report on the openings.

In mitigation of these issues, SALTO supplies electronic escutcheons and cylinders that du Toit says take no more than 15 minutes to install on an existing lock, leveraging the existing infrastructure without any expensive cabling and hours of labour. For higher security, the mortise can be replaced with a mechanical lock from SALTO or from another manufacturer.

“It’s never been easier – the concept in South Africa is growing and education is key. We want to solve the problem with keys, not mask it, and can do it in a cost-effective standalone solution that can manage up to 64 000 devices and millions of people,” he says.

A common concern over electronic locks is what happens when the power goes off or the batteries die. How then can access be gained, and if the powerless lock can be overridden, can someone with malicious intent simply do the same? “At SALTO, a lot of time and effort has gone into ensuring that this does not happen, but it is possible,” admits du Toit. “We have two approaches, the first is to supply a small battery pack unit that can give power to our units from the secure side, after which a valid access card can be used to open the door, following which the batteries can be replaced.

“The second approach is a unit called a PPD (portable programming device), which can be used to open a door without a card. It needs to be programmed by a system operator and each time it is used it will also record that it was used. It also has an expiry date that can be set to void any data written to it, and has a secure PIN feature. This can be used as the master key of the system, but with the ability to also power any SALTO device from the secure side in the event the battery has been drained completely. Battery status is also recorded in a database so maintenance staff know when they need to be replaced.”

Tlhabi believes electronic locks are the way to go, especially in applications where a high number of doors need to be managed from a central point and traditional ways of manual physical keys become cumbersome to control. While he admits that cost tends to be higher, he also points out that as market penetration increases and more users and vendors get on board, prices are likely to drop. ZKTeco offers an affordable range of electronic locks ranging from those that are predominantly used by the hospitality industry, to locks that can be deployed in the office environment and well as bulk accommodation infrastructure like student accommodation facilities and hostels.

Simpler, faster installation

One of the major benefits of electronic locks is they can be installed with minimal effort, compared to traditional access control systems where intricate cabling and door hardware installation is involved, Tlhabi opines. “The installer of electronic locks is not required to run any cabling, configure network switches, install cable management trays and trunking, etc. Cost and time of installation is highly reduced and a lock can be installed and set up in a matter of minutes if the preparation of the door was done correctly.”

Tlhabi says any required mechanical maintenance is simply on account of normal wear and tear replacement of movable components like springs, and some components of the mortices that over time and depending on the frequency of usage, will wear out and need to be replaced. “If it is not broken, do not replace. They are reasonably reliable,” he states.

Finally, Tlhabi says applications for managing users vary from fully standalone PC-based applications, where all right to access are

written into MIFARE cards, to fully online solutions using wireless communications between doors and the front-end software. “For our smaller locks we do offer Bluetooth applications that allow the administrator to manage the locks. We also offer a front-desk software application that manages electronic locks for the hospitality industry,” he concludes.

For more information contact Lars Jensen, Morse Watchmans, lars@lji.co.za, +27 (0)11 326 1450; Wouter du Toit, SALTO Systems, w.dutoit@saltosystems.com, +27 (0)11 534 8489; Johannes Tlhabi, ZKTeco, johannes@zkteco.co.za, +27 (0)12 259 1047.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...
From identity to insight
neaMetrics Access Control & Identity Management
Identity outlives technology. When it is trusted, it becomes a foundation for insight and scale. When it is not, every system built on it inherits the risk. Identity quality matters, at both human and system levels, and getting it right is what allows security to endure.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.