Ergonomic design delivers practical benefits

Access & Identity Management Handbook 2017 Access Control & Identity Management

As early as the 18th century, the workplace has been studied as it relates to the worker. Fast forward to the 21st century and the principle is still being studied, but now under the broader name of ergonomics.

The word ergonomics originates from the Greek word ergos (work) and nomos (natural laws). In an ergonomic workplace, tasks and tools are designed to fit individual capabilities and limitations so people can do their jobs with greater comfort and convenience, and without being injured. More broadly, ergonomics can be applied to optimise larger systems like resource management, work design, human-machine interfaces, etc. within the organisation (hence the term ‘organisational ergonomics’ from http://ergonomics.about.com/od/M-R/g/Organizational_Ergonomics.htm).

When Morse Watchmans was first making its way into the security industry with an automated key control and management system, ergonomics was fundamental to its design. We studied how people of all shapes and sizes would use the device to make sure the display was properly positioned for correct viewing; that actual key access was swift and unencumbered; and when two or more cabinets were installed that the door openings were uniform.

These particular findings, along with a multitude of other tests and studies, were used to develop a key control system that encompasses four main principles of ergonomic design; those being safety, ease of use, productivity/performance and aesthetics. Following are the benefits of smart key control systems that align with these ergonomic design principles.

Safety

It goes without saying, but misplaced keys and lost assets can compromise the safety of the individual. To this end, a vandal-resistant cabinet design helps security personnel ensure that important keys are safe from unauthorised access, while stainless steel locking rings add to key security by deterring tampering. The design is complemented by an on-board alarm system that will sound if the cabinet itself is tampered with or if incorrect codes are repeatedly entered.

Access to the cabinets and to individual keys is controlled at all times, and every key is accounted for. When networked, a firewall and AES256 encryption technology for data exchanged between the cabinet and the server help protect the system and the organisation’s assets.

Ease of use

On the physical level, security key cabinets are designed to offer the flexibility needed for installation at almost any height that allows for the user to easily reach the cabinet and interact with it. A slanted console provides a natural viewing angle and makes it easier to swipe a card or use fingerprint identification to access the key cabinet. Once the cabinet is opened, the requested key location is illuminated so the user can easily identify it. Both larger touch screens and audio prompts help make the interaction faster and more convenient and can help improve productivity.

Productivity/performance

Keys are attached to a fob that features an identification microchip and a stainless steel locking ring. The security key fob fits into a cabinet key slot and, critically, automatically records all access activity. No more time spent manually recording key activity. The recorded data lets authorised users more easily determine who has keys out and when they are scheduled to be returned; meanwhile, instant e-mail or text alerts reduce the burden on management even further, letting them know an overdue key or when it has been returned. And of course, key inventory systems with integrated tracking can help prevent lost keys and reduce vulnerabilities – not to mention wasted time and user frustration.

Aesthetics

The aesthetically pleasing key cabinet with its visual display of organised key placement is far more appealing than a messy box of keys. Cabinets are designed for horizontal or vertical placement and multiple units can be precisely installed to maintain a professional appearance. System maintenance is also considered in the design, which allows servicing of the unit to be accomplished with minimal disruption and/or disassembly.

These and other benefits of key inventory systems are cumulative, helping make life easier for users, while also supporting the company’s activities and reducing the risk of losses. All of this is welcome news for the business itself – who says good design can’t support good economics?

For more information, contact Morse Watchmans, +1 203 264 4949, [email protected], www.morsewatchmans.com.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...