Key management vs. electronic locks

April 2017 Access Control & Identity Management, Asset Management, EAS, RFID

Looking after keys is a tedious task, but ineffective control can literally leave a company’s doors open to crime in various forms. Electronic locks offer a high-tech solution, and modern technologies have even infiltrated the domain of physical keys through innovative key management systems.

According to Morse Watchmans’ Joe Granitto, the software platforms used for managing physical keys and those managing virtual keys are still separate entities, but integration into an holistic access management system is a hot trend in the industry. “We are fully integrated with Lenel, Honeywell, Software House and Amag,” he explains. “Customers are looking for one central point to manage users and not in every system they purchase.”

The company offers the KeyWatcher system for physical key management, which he says can receive user, card and access group data from the access control system, and also send back transactions and alarm info to the access control system.

“There is much more to modern key management than simply showing who took which key, and when,” says Granitto. “We started with a few basic features and that has grown substantially. Integration is huge now, where in the early days it barely existed, and the software platform has also grown. There are dozens of powerful features and other functions that define the industry leaders. Operations and security managers are looking for complete control of their keys. They want to know when a key goes out and when it comes back. They want to be e-mailed if a key is overdue or if an alarm occurs. They want customised reports predefined and sent to them automatically. They want systems networked and keys to be able to be returned to any KeyWatcher they have.”

Johannes Tlhabi from ZKTeco supports Granitto’s statement that there is still a divide between software platforms used for managing physical keys and those managing virtual keys. “The reason for this is partly because these two have always existing as two different facets of key management, where the former emanates from the physical security point of key management and the latter more from a logical perspective of key management. The physical security product innovators have never entirely embraced the methods applied by the logical security innovators and the opposite also holds,” he says.

Management is crucial

Tlhabi goes on to say that key management has had to adopt a higher-security approach since some of the keys that are managed today provide access to intricate operations that can lead to serious security breaches; breaches that can run into millions of rands in losses, and can seriously endanger productivity or even cause injuries or loss of life if such keys were to fall into the wrong hands. Therefore a lot more now needs to be known about a key, its authorised users, the times that it can be used and the procedures that must be adhered to.

“The markets have started to realise that there is now, more than ever, a greater need to have proper key management systems, as opposed to a traditional cabinet hung behind some door where a person has control of one key that opens a key box to give access to all keys that are inside the cabinet, Tlhabi continues. “RFID card-based, half-decent key management units are increasingly making their début in the market and are quickly being grabbed by those customers who are aware of their benefits. In general, the trend is still such that only high-end customer markets, like mining and manufacturing, are more open to using the technologies, albeit at higher costs as they are perceived to be in a higher risk bracket when it comes to safety of keys.

With an eye on future developments, ZKTeco is partnering with innovators in key management to offer advanced biometric verification technologies to enhance their current methods of using RFID card-based technologies. “We are all at least well aware of the risks that are associated with cards-only based security transactions, and this knowledge leads to a natural progression towards biometric-based integrated key management solutions. We provide modules that can be incorporated into the key management

systems, as well as the software development kits that allow the innovators to customise their own access control solutions around the key management system, both hardware as well as software.”

Total cost of ownership

Electronic locks take a modern approach to getting around some of the problems with physical keys, but they also have challenges and constraints, especially when it comes to cost. SALTO Systems makes a number of products that can replace mechanical keys, and although on the surface they are more expensive than a traditional key system, the company’s Wouter du Toit says in the long run they are more cost-effective in more cases, and boast better security. “Expensive factors that are never considered include the fact that when a key is lost, you have to replace the lock and not just cut a new key to maintain security,” he warns. “This results in lost time that could equate to losses in revenue. Yes, you get high-security keys with master key systems, but this is expensive and still does not solve the problem in managing keys, and you still cannot report on the openings.

In mitigation of these issues, SALTO supplies electronic escutcheons and cylinders that du Toit says take no more than 15 minutes to install on an existing lock, leveraging the existing infrastructure without any expensive cabling and hours of labour. For higher security, the mortise can be replaced with a mechanical lock from SALTO or from another manufacturer.

“It’s never been easier – the concept in South Africa is growing and education is key. We want to solve the problem with keys, not mask it, and can do it in a cost-effective standalone solution that can manage up to 64 000 devices and millions of people,” he says.

A common concern over electronic locks is what happens when the power goes off or the batteries die. How then can access be gained, and if the powerless lock can be overridden, can someone with malicious intent simply do the same? “At SALTO, a lot of time and effort has gone into ensuring that this does not happen, but it is possible,” admits du Toit. “We have two approaches, the first is to supply a small battery pack unit that can give power to our units from the secure side, after which a valid access card can be used to open the door, following which the batteries can be replaced.

“The second approach is a unit called a PPD (portable programming device), which can be used to open a door without a card. It needs to be programmed by a system operator and each time it is used it will also record that it was used. It also has an expiry date that can be set to void any data written to it, and has a secure PIN feature. This can be used as the master key of the system, but with the ability to also power any SALTO device from the secure side in the event the battery has been drained completely. Battery status is also recorded in a database so maintenance staff know when they need to be replaced.”

Tlhabi believes electronic locks are the way to go, especially in applications where a high number of doors need to be managed from a central point and traditional ways of manual physical keys become cumbersome to control. While he admits that cost tends to be higher, he also points out that as market penetration increases and more users and vendors get on board, prices are likely to drop. ZKTeco offers an affordable range of electronic locks ranging from those that are predominantly used by the hospitality industry, to locks that can be deployed in the office environment and well as bulk accommodation infrastructure like student accommodation facilities and hostels.

Simpler, faster installation

One of the major benefits of electronic locks is they can be installed with minimal effort, compared to traditional access control systems where intricate cabling and door hardware installation is involved, Tlhabi opines. “The installer of electronic locks is not required to run any cabling, configure network switches, install cable management trays and trunking, etc. Cost and time of installation is highly reduced and a lock can be installed and set up in a matter of minutes if the preparation of the door was done correctly.”

Tlhabi says any required mechanical maintenance is simply on account of normal wear and tear replacement of movable components like springs, and some components of the mortices that over time and depending on the frequency of usage, will wear out and need to be replaced. “If it is not broken, do not replace. They are reasonably reliable,” he states.

Finally, Tlhabi says applications for managing users vary from fully standalone PC-based applications, where all right to access are

written into MIFARE cards, to fully online solutions using wireless communications between doors and the front-end software. “For our smaller locks we do offer Bluetooth applications that allow the administrator to manage the locks. We also offer a front-desk software application that manages electronic locks for the hospitality industry,” he concludes.

For more information contact Lars Jensen, Morse Watchmans, lars@lji.co.za, +27 (0)11 326 1450; Wouter du Toit, SALTO Systems, w.dutoit@saltosystems.com, +27 (0)11 534 8489; Johannes Tlhabi, ZKTeco, johannes@zkteco.co.za, +27 (0)12 259 1047.



Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Turnstar ramps up countermeasures
Turnstar Systems Editor's Choice Access Control & Identity Management News Products
Turnstar has developed and patented an early warning and deterrent system which will alert security, and anyone nearby, of any attempt to place ramps over the raised spikes.

Read more...
Suprema integrates biometric access control with Genetec
Suprema News CCTV, Surveillance & Remote Monitoring Access Control & Identity Management
Suprema has announced the successful integration of its biometric access control products with Genetec Security Center, a unified security platform that connects security systems, sensors and data in a single intuitive interface.

Read more...
IDEMIA South Africa achieves level 1 B-BBEE status
IDEMIA News Access Control & Identity Management
As part of the action plan to improve its status to Level 1, IDEMIA now works with over 40 black-owned local suppliers, representing over 30% of IDEMIA’s local suppliers.

Read more...
Suprema no. 1 in the global biometric market excluding China
Suprema News Access Control & Identity Management
According to the latest report by Omdia, a global market research firm, Suprema ranks first in global market share, excluding China, in the field of biometric readers.

Read more...
Dahua and Yeastar PBX-intercom integration
Dahua Technology South Africa News Access Control & Identity Management
Dahua Technology and Yeastar announced their new ECO partnership on PBX-intercom integration to provide a comprehensive and unified communication solution for small- and medium-sized enterprises.

Read more...
Traka launches experience centres
News Access Control & Identity Management
Traka launches inaugural Experience Centres in Australia and South Africa; aims to drive continuous collaboration and innovation.

Read more...
New platform for keyless access
Access Control & Identity Management
The new ABLOY CUMULUS platform for keyless access combines locking hardware with secure access and management applications in a single ecosystem with a risk-free, integrated cloud service.

Read more...
The importance of staying up to date
Access Control & Identity Management Government and Parastatal (Industry)
Africa’s cyber threat landscape is constantly evolving, with government’s facing a range of digital threats from espionage, critical infrastructure sabotage, organised crime and combat innovation.

Read more...
Dynamic Drop Arm Barrier
Turnstar Systems Access Control & Identity Management
Suited to medium-volume access and medium-level security applications such as office reception areas, health clubs, universities and libraries, the Dynamic Drop Arm Barrier also allows special needs access.

Read more...
Automatic tyre spike industrial vehicle barrier
Turnstar Systems Access Control & Identity Management
The Turnstar Velocity Raptor automatic tyre spike industrial barrier, with SwiftDrive technology, is aimed at high-volume and high-security access applications such as parkades, shopping centres, residential estates and airports.

Read more...