blog-header

Securing Keys, Assets & People - News, Tech and Trends Blog

Mobile Device Management: An Unexpected Problem Going Paperless

By Shannon Arnold on Oct 15, 2019

Lessons from a Correctional Facility Going Paperless

Real Time Networks has helped law enforcement agencies deploy AssetTracer smart lockers for a variety of different reasons. Some facilities are interested in securing firearms and equipment when they’re not in use. Others care about managing chain of custody for their evidence kits or inmate belongings.

Continue Reading

5 New Uses for Mobile Credential Access Control

By Shannon Arnold on Oct 9, 2019

Real Time Networks recently announced its new partnership with VIZpin. We’re really excited to offer VIZpin’s mobile credential access control technology as an authentication option in our KeyTracer and AssetTracer management systems!

Continue Reading

Police Division Uses KeyTracer to Improve Fleet Efficiency

By Shannon Arnold on Sep 25, 2019

Real Time Results — A Series of Confidential Case Studies

This case study is part of an ongoing series that gives readers a behind-the-scenes look at some of the most challenging and sensitive business problems that Real Time Networks has helped solve. The clients are confidential. The results are real.

Continue Reading

Real Time Networks to Reveal New Features at GSX 2019

By Shannon Arnold on Sep 3, 2019

The GSX 2019 conference is almost here. Running September 8th-12th at McCormick Place in Chicago, this could be the largest GSX yet. And this year Real Time Networks is proud to debut a range of upgraded features for our key, asset, and people management solutions. Here are some highlights, but make sure to come see them for yourself at Booth 2153!

Continue Reading

101 on Asset Tracking Technology (or "Content Surveillance")

By Shannon Arnold on Jul 2, 2019

What is Content Surveillance? When should you use it, and when shouldn’t you use it?

The real power of the business and physical security solutions that we develop lies in how they integrate together. Possibly the best example of this is the content surveillance system available in our AssetTracer smart lockers for asset tracking. It connects physical asset lockers with centralized management software and our other real-time security systems. Whole new workflows are possible when these tools are integrated together.

Continue Reading

Key Control Helps Reduce a Major Telecom's Fleet Expenses 28%

By Shannon Arnold on Jun 25, 2019

Real Time Results — A Series of Confidential Case Studies

This case study is part of a new ongoing series that gives readers a behind-the-scenes look at some of the most challenging and sensitive business problems Real Time Networks has helped solve. The clients are confidential. The results are real.

Continue Reading

Ultimate 2019 Real Time Location System (RTLS) Tech Guide

By Shannon Arnold on May 29, 2019

It seems like two or three new wireless technologies are announced every year. And most are touted as the perfect tool to run a Real Time Location System (RTLS).

Continue Reading

Our Top 6 Creative Uses for Smart Lockers

By Shannon Arnold on May 15, 2019

There’s a reason that we call our asset lockers ‘smart lockers’. When people think ‘asset locker’ they often just envision storage space. But they can be much more.

Continue Reading

Best Practices for Emergency Evacuation Planning

By Shannon Arnold on May 7, 2019

When It Comes to Emergency Mustering, Keep It Simple

Emergencies can’t be predicted, they can only be planned for. But if your plan is so complicated that it’s distracting during evacuations, you might as well have no plan at all. The best plans are both thorough in the range of events they cover and clear to follow.

Continue Reading

The Importance of Physical Key Management

By Shannon Arnold on Apr 30, 2019

It may seem obvious put this way, but if physical keys give access to your organization’s spaces, assets, and people, than they should get as much protection as those spaces, assets, and people. There are very real financial and operational risks if you don’t know who is going where with your keys.

Continue Reading

4 Aspects of Hotel Security Solutions that Matter

By Shannon Arnold on Apr 23, 2019

Identifying the best security tools that actually align with your hotel’s needs can be challenging. Even just researching new systems can feel like wading through a sea of buzzwords. RFID, analytics, IoT. It’s frustrating trying to figure out what’s actually relevant for your particular facility.

Continue Reading

Ultimate 2019 Physical Security Credentials Guide

By Shannon Arnold on Apr 16, 2019

Digital and physical attacks remain on the rise. That makes the authentication methods that your organization uses to secure its assets and facilities more critical than ever.

Continue Reading

Aloft Liverpool Hotel's Key Management Challenges

By Shannon Arnold on Apr 2, 2019

Historic Buildings, Modern Problems 

Aloft Liverpool located in city center Liverpool, England had a lot going for it. In just five short years it had established itself as a boutique destination hotel in an up and coming corner of the City Center district. Within walking distance of museums, concert halls, Liverpool’s Conference Center, and the scenic River Mersey, Aloft had turned the deteriorating Royal Insurance Building and surrounding area into an attractive mixture of “history and modernity,” as they liked to say.

Continue Reading

IoT - What It Is & How its Used in Real Time Location Solutions

By Shannon Arnold on Mar 19, 2019

IoT’ stands for Internet of Things, and it looks to remain a popular topic in both the consumer and enterprise tech spheres through 2018. It is of particular interest to security experts as the IoT holds both massive potential to aid their efforts and represents a massive threat.

Continue Reading

Thank You for Making 2018 a Great Year!

By Matt Belo on Dec 18, 2018

With 2018 drawing to a close, and a holiday season quickly approaching, we wanted to take this time to thank you for your continued business, loyalty and support. We strive every day to exceed expectations and, thanks to your continued feedback, we have introduced some brand new features and products to better help and serve you. Our priority is to offer the absolute best experience when it comes to Key and Asset Management. 

Let's use this opportunity to kick-back and take a look at a few of the things that made 2018 special.

Continue Reading

3 Types of Insider Threats and How to Protect Against Them

By Matt Belo on Dec 11, 2018

Every organization worries about insider threats and insider attacks, and with good reason. Enterprise security surveys over the last decade have consistently shown between 50% and 60% of reported thefts and other losses annually have originating internally.

Continue Reading

Considering BYOD? Pros, Cons, and Solutions for Device Management

By Shannon Arnold on Dec 4, 2018

Allowing staff to bring and use their own devices such as laptops, tablets, and smartphones has been adopted by some businesses and is often referred to as a BYOD, “bring your own device”, policy. It’s a trend in today’s business climate as apps, social media, and remote workforces expand. Should you consider adopting a BYOD policy? Here are a few pros, cons, and a device management solution that we think allows for the best of both worlds: BYOD Lockers.

Continue Reading

Hotel Tablets - How to Manage Electronic Devices

By Matt Belo on Nov 27, 2018

By its very nature, the service industry is in a constant search for ways to improve and optimize the customer experience. Quicker sign in, improved staff workflow, and offering a personalized experience for each customer are all ways hotels aim to set themselves apart in an increasingly competitive industry. As a result, they’re turning to new methods and technologies to give themselves a competitive edge; the most recent trend we’re seeing in hotels and hospitality is the usage of handheld tablets, phones and iPods to staff members, concierges, and directly into rooms for customer use. The initiative has been put in place to enable staff to better serve customers and to help remain engaged in their day-to-day work. So you can expect a bit more than a mint on your pillow next time when you check into your hotel room for your next trip.  

Continue Reading

KeyTracer RFID Key Fob Torture Test

By Matt Belo on Nov 19, 2018

No Key Fobs were harmed in the making of this video.
Continue Reading

5 Pitfalls to Avoid When Developing an Enterprise Security Strategy

By Shannon Arnold on Nov 16, 2018

The goal of any security system is to permit only the movement that you actually want of people, assets, or data within your facility. That principle remains the same whether it’s officers and inmates in a corrections facility, mobile devices with sensitive data at a power plant, or forklifts in a warehouse. 

A proper Enterprise Security Strategy requires end-to-end execution, relying on a wide range of different access control and security systems integrated together. The challenge is cover any possible breaches, while being flexible as trends change. Rather than using brute force or expensive tactics, you should focus on carefully integrating all parts of your system so that there is no opportunities for malicious activity to take place. A carefully planned, fully secure system will save you more money in the future in the event you have a knee-jerk reaction to correct a problem when it's already too late.

Continue Reading

7 Reasons Why Law Enforcement Offices Are Using Electronic Lockers

By Matt Belo on Oct 30, 2018

Police and Law Enforcement Officers rely on a wide range of equipment to complete their every day job. Aside from relying on firearms and safety equipment, they deal with evidence, seized narcotics, and many objects that have unique storage requirements. Law Offices need to ensure the security, safety, accountability and reliability of every weapon, communication device, and items of interest that comes through the front door. As theft continues to increase, law officials are turning to tools that help them better manage dangerous assets, and to maintain proper chain of custody for evidence.

Police require control over a large number of varied items, and strict requirements on managing and tracking who has possession over them. Lockers are necessary to keep Firearms, Equipment, Pepper Spray, Evidence or hazardous items locked up and out of the wrong hands. They ensure the control and tracking of Assets and Equipment needed every day on the job, and assist with the tagging and filing of evidence. But many Law Enforcement Offices are now taking things a step further and implementing Electronic Smart Lockers, for higher security, more precise access control, better accountability, and additional tracking. 

What is an Electronic Asset Locker (or Smart Locker)?

Continue Reading

The True Cost of Asset Loss in a Digital World

By Matt Belo on Oct 23, 2018

As we all know, theft and asset loss are an unfortunate part of running a business. According to recent studies, 25% of employees have lost important assets relating to their job, and shoplifting combined with Employee Fraud and Theft cost retailers nearly $50 billion last year. While there are many tools to mitigate this loss, human error will always be present among even the most careful employees. 

Continue Reading

See you at Security Canada 2018 in Toronto!

By Matt Belo on Oct 19, 2018

Join us at Security Canada Central, the largest and most important security show in Canada this year at the Toronto Congress CentreWe wanted to personally invite our valued customers and followers to come visit us at the show. You can find us at Booth #333.

Topics: Announcement
Continue Reading

Key Fobs with a Lifetime Guarantee! See KeyTracer at G2E 2018

By Matt Belo on Sep 21, 2018

Key Management Systems are designed to keep your keys safe and secured. However, the main issue with many keys on the market is that they rely on metal contact. These attract rust, grime dust... and after hours of daily use... I'm sure you can imagine how well they work.

Continue Reading

KeyTracer has been rebranded as Real Time Networks!

By Matt Belo on Sep 20, 2018

Say "Hello" to Real Time Networks

You may have noticed that recent communications with us have been from Real Time Networks. We're very excited and happy to announce that KeyTracer has undergone a corporate rebranding, and is now part of the Real Time Networks family of products. You can continue to purchase the industry-leading RFID KeyTracer Key Control and Management Systems, but KeyTracer is now part of a larger suite of integrated security solutions.

Topics: Announcement
Continue Reading

Come See the Latest AssetTracer Smart Lockers at IACP 2018!

By Matt Belo on Sep 11, 2018

The International Association of Chiefs of Police Conference is quickly approaching. We wanted to take this time to personally invite our valued customers and followers to come visit us at the show. You can find us at Booth 1470. There will be lots of exciting things to see, as well as several ground-breaking new products.

Continue Reading

Real Time Networks to Reveal Asset Lockers at GSX

By Matt Belo on Sep 4, 2018

Global Security Exchange (GSX 2018) is quickly approaching, and we wanted to take this time to personally invite our valued customers and followers to come visit us at the show. You can find us at Booth 2143. There will be lots of exciting things to see, as well as several ground-breaking new products.

Continue Reading

Battle-Tested: 7 Access Control Best Practices

By Shannon Arnold on Jul 13, 2018

It's not if, but when your organization will suffer a security breach. Whether they’re large or small, or protecting from internal or external attacks, every organization must remain vigilant. Even the NSA, arguably the most secure US federal intelligence agency, failed to stop Edward Snowden from releasing an estimated 1.7 million sensitive records .

Continue Reading

Enterprise Security Trends: 2018 Mid-Year Update

By Shannon Arnold on Jun 12, 2018

Enterprise security threats continue to evolve, and it seems like it’s happening at an ever-increasing pace. Enterprise security solutions seem to be changing faster too. So we’re doing a mid-year update of our Access Control trends piece now that we’ve had a chance to see how 2018 is progressing.

Continue Reading

5 Ways Security Tech Helps Utilities with NERC Compliance

By Shannon Arnold on May 22, 2018

The utilities industry has the rare challenge of being accountable both for its own security and for the public’s. The penalties for even a small lapse in compliance are severe, let alone an actual breach. And as recent announcements by NERC make clear we can only expect Critical Infrastructure Protection (CIP) standards to get more rigorous over time.

Continue Reading

ROI Series: 6-Step Security Solution Purchasing Process

By Shannon Arnold on May 8, 2018

To help businesses as they head into budget planning, Real Time Networks has produced a new guide for getting maximum value from new physical security capital purchases.

Continue Reading

5 Benefits of Automating Key Management in Pharmaceutical Companies

By Shannon Arnold on Apr 17, 2018

Over the last decade, the pharmaceutical industry has seen overall growth, unexpected breakthroughs, sudden mergers, and just as sudden contractions. In such a turbulent market businesses are looking to create reliability wherever they can.

Continue Reading

Artificial Intelligence Trends in Security for 2018

By Shannon Arnold on Mar 21, 2018

2018 looks poised to be a breakout year for artificial intelligence (AI) in the security field. And it’s likely just the tip of the iceberg. Gartner Research anticipates the widespread adoption of AI technologies in core business areas across all sectors over the next 2-5 years.

Continue Reading

New Solution Brings Flexibility to Fleet Management

By Shannon Arnold on Nov 15, 2017

As your vehicle fleet grows, so does its management overhead. Mundane tasks like updating maintenance logs, tracking vehicle availability, or even just knowing where all your keys at a given time can get quite complex.

Continue Reading

Why Electronic Key Management is Critical for Fleet Managers

By Shannon Arnold on Oct 31, 2017

Fleet managers shoulder the responsibility for high value, potentially dangerous equipment. Not only are they tasked with maximizing the life of the fleet, they must also keep a close eye on security and liability concerns. And because most government, municipal and corporate fleet vehicles display the name and seal of their community, their operation and condition carries a strong public relations message.

Continue Reading

Key Management Systems Comparison

By Shannon Arnold on Oct 5, 2017

A wide range of key management systems are available today. It can be a challenge to decide exactly which one is right for your needs. This decision is critical, as not every key control system will work for every organization. Purchasing the wrong one can have serious financial repercussions.

Continue Reading

How to Choose the Right Access Control Card Technology

By Shannon Arnold on Aug 29, 2017

Access control cards may all look the same, but ‘under the hood’ the technologies driving them vary considerably. Different card systems have very different strengths, weaknesses, and price tags.

Choosing the card technology that best fits your business was already going to be challenging. But gone are the days when buying a security system meant that you only had to think about that one system. In our era of universal connectivity it’s essential to consider how a card system integrates with the rest of your security environment.

In this article we’ll take a look at the leading card technologies on the market today. We’ll also highlight some of the access control platforms that Real Time Networks products can integrate with. Our RTNHub management system was designed from the ground up to work smoothly with all of them, and other major business and security platforms, like Verizon Connect fleet management, Windows Active Directory, C-Cure, and S2 Security.

We’ll start with the more simple systems better suited for lower security environments, and then move up to more advanced RFID card systems.

Barcode Cards

Think scanning items at the grocery store. For access control, barcodes on access cards contain user credentials, which are scanned by card readers at control points. While cards and readers are inexpensive, they’re not very secure. They literally can be duplicated in 10 seconds at the office photocopier. They’re only applicable in very low risk security environments.

Magstripe Cards

These cards use the same technology as credit cards. The magnetic stripe holds credentials as a simple binary code that’s read when the card is swiped. The bad news is that magstripe card copying equipment is readily available online. So this is also best treated as an ‘entry level’ access control method for low risk settings.

Our technology partner Lenel sells magstripe systems for such a need, compatible with their Lenel OnGuard platform, in addition to their wider range of RFID card systems (More on those, below).

Wiegand Cards

This technology exploits a quirk in the behavior of magnetic fields around twisted metal wire to encode information. In access control, ‘Wiegand wires’ are embedded in plastic cards and magnetically encoded with unique credentials. These cards became popular in the 80s as a more secure upgrade to barcode and magstripe cards. Since credentials are encoded at manufacture, Wiegand cards cannot be reprogrammed or erased, and they’re harder to duplicate. While they’re still in use today, generally they’ve been made obsolete by more modern technology, namely…

Radio Frequency Identification (RFID) Cards

RFID cards transmit their credentials via binary computer code over the air. A card does not need to make physical contact with a reader to communicate. They contain small computer chips programmed to hold credentials to specific facilities. Cards receive wireless power when they’re in close proximity to readers. Credentials can also be encrypted in some versions, greatly enhancing security and making the cards much harder to duplicate.

RFID cards are currently the most common access control card type on the market. Two types dominate, each with different advantages.

Low Frequency RFID ‘Prox’ Cards

This is the most common RFID format. Prox is short for ‘proximity.’ These cards send credential information one way: from the card to the reader. The 26-bit version is an open format used by many manufacturers. Blank cards in that format are readily available and inexpensive.

You may have already guessed that this makes illicit duplicating easier. Which it does. Duplicating tools, and even online services, are very easy to come by. And the duplicates are difficult to identify and trace. That said, proximity cards are quite popular at low-to-mid levels of enterprise security. Especially in stable security environments, where needs don’t change year to year. They’re require no contact, which is good for usability and—we’ve found—means less maintenance.

Both AMAG Technologies and Lenel offer a variety of prox card options. Real Time Networks products easily integrate with both of their management platforms.

High Frequency RFID ‘Smart’ Cards

Smart cards were developed with the express purpose of being difficult to duplicate. Equipped with on-board processors, they’re essentially single-function computers, which—thanks to advanced encryption— authenticate the carrier with a unique code generated new for each individual transaction. Because they use two-way communication to authenticate, smart cards are much harder to duplicate. There’s also potential for connecting them to card payment systems and other personal identity-based tools.

AMAG, Lenel, and Genetec are all major carriers of smart card access control systems.

So How Do You Choose?

As with most security technology decisions there’s no one one-size-fits-all answer. Identifying the correct access control card system for you requires consideration of budget, desired security level, and future business directions. Smart cards are highly secure and adaptable if needs change, but are more expensive. They may not be the right fit if your goal for the next 10 years is just to regulate access to one university lecture hall, for example. On the other hand, if your university were investigating chip payment cards that might be able to run on the same standard, then it might make sense.

One specific question we hear a lot is what to do if you have a large install base of older cards. Replacing hundreds or even thousands of access cards in one fell swoop is going to be expensive, not to mention a logistical challenge. In this instance, we generally recommend first replacing legacy card readers with newer, multi-format readers that can accommodate both your legacy system and the new one. Then cards can be replaced simply through attrition. As new cards need to be issued, or old cards replaced, the newer proximity or smart cards are issued instead.

Hopefully now you’re in a good place to start the conversation with your business’s leadership and security providers about the best access control option for your needs. But if you’re looking for further help selecting the right integrated security systems, feel free to contact Real Time Networks today for help.

Contact Us Today!

 

Editor's Note: This post was originally published on August 28, 2017, and has been updated for accuracy and comprehensiveness.

Continue Reading

Ameristar Casino Hotel Improves Key Control and Security

By Shannon Arnold on Aug 22, 2017

Ameristar Gains in Efficiency and Ensures That Stringent State Regulations are Met

Pinnacle Entertainment properties are not strangers to automated key control and key management best practices, having implemented these many years ago. However, over the years, their initial experience with key control had shed light on opportunities for improvement, which were recently put into practice at the Ameristar Casino Hotel in Iowa.

The Need for More Reliable Key Control

The organization’s first key cabinets relied on metal-to-metal contact for key tags to be accurately read by the system. Chris Hamblin, Director of Security and Facilities at Ameristar adds: “The reality is that metal-contact key tags get dirty and corroded over time, which affects the system’s ability to make contact, and its reliability. It’s labor intensive to keep them clean, and that often falls under the responsibility of Security.”

Continue Reading

Electronic Access Control: A Computerized Gatekeeper

By Shannon Arnold on Aug 14, 2017

Plenty of folks have had the experience of being "buzzed" through a door. It happens like this: After checking your ID or recognizing your face, a receptionist presses a button. You hear a buzzing sound indicating that the door is now open. (And by the way, if you’ve never seen the old “door buzzer” skit with Carol Burnett and Tim Conway, open a new tab and Google it. Now. It will add a whole new layer to your understanding of access control). The “door buzzer” experience illustrates the inner workings of an Electronic Access Control (EAC) system. In its simplest form, an EAC system consists of an electronic door lock, a reader (such as a card reader or keypad), and some form of controller. In our example, the receptionist's eyes are the reader that allows her to recognize you. Her brain is the controller. If her brain is convinced that you belong inside, it will send a signal to her finger, ordering it to press a button and release the lock.

Continue Reading

Key Cabinets + CPTED Make Your Business a Harder Target

By Shannon Arnold on Jul 25, 2017

Except for the more garish super villains, criminals avoid the spotlight. Most prefer to operate in theaters where they can remain in the shadows and maintain a level of control.  Enter Crime Prevention Through Environmental Design (CPTED). CPTED is not a new sensor or camera. Rather, CPTED is a set of design principles intended to take the sense of anonymity and control away from the bad guys; and by doing so, make your facility a harder target. CPTED principles, when properly applied, allow you to anticipate the thought process of potential offenders and reduce the opportunity for crime.

Continue Reading

An Effective Key Control Policy in 4 Steps

By Shannon Arnold on Jul 19, 2017

The pin tumbler lock has been around for about 6,000 years. The Egyptians developed a lock and wooden key (about 2 feet long!) using the same basic principles as your front door deadbolt. With so much attention paid to the high-tech layers of a security program – intrusion detection, video analytics, electronic access control – it’s easy to forget just how critical a well-designed lock is; and just how vulnerable an inexpensive metal key can make you.

Topics: Key Control
Continue Reading

Make Your Physical Security Investment Bullet-Proof in 4 Steps

By Shannon Arnold on Jul 6, 2017

Many organizations design their security program from the perspective that it’s just another cost of doing business. Money you have to spend so the rest of the business can do its work in peace.

Continue Reading

Defend Against Insider Threats with Real-Time Asset Management

By Shannon Arnold on Jun 7, 2017

Many people see asset management systems only as ways to protect their company’s electronics and hardware from theft. But current security technology collecting real-time, location-based data is also effective at protecting your company against a range of insider threats.

Continue Reading

Asset Management in the Age of the BYOD Workplace

By Shannon Arnold on May 30, 2017

Managing electronic assets at your business is difficult enough without having to worry about your staff’s personal devices. But this has become a common problem with the advent of Bring Your Own Device (BYOD) expectations at many companies. Sometimes the expectation is pushed by employees, but sometimes it’s driven by employers themselves. 

Continue Reading

Automated Roll Call & Mustering Solutions Protect Staff

By Shannon Arnold on May 2, 2017

The best way to protect your business against emergencies is with preparation. Emergency situations can happen unexpectedly and at any time. Your staff—especially your emergency response team—needs to divide its attention among a large number of equally important tasks, like first aid, emergency shutdown procedures, and even basic roll call of evacuees.

Continue Reading

KeyTracer Integration with AMAG Symmetry Access Control Software

By Shannon Arnold on May 1, 2017

AMAG Technology, the security management system manufacturer, has announced Real Time Networks as the newest certified partner within the Symmetry Preferred Partner Program.  As a certified partner, Real Time Networks' KeyTracer Key Management System integrates with AMAG’s latest Symmetry Access Control software.  AMAG Technology and KeyTracer cooperatively tested and certified this integration.

Continue Reading

Universities Face A Wide Array of Security Threats

By Shannon Arnold on Apr 18, 2017

What’s Your Protection Profile?

You protect physical assets from security threats. The type and strength of protection you implement is driven by the kind of business or organization, and the type and severity of the threats you face. That new hospital wing—major security is demanded. The dirt lot next to it that you haven’t yet developed: a chain link fence will do. One organization might make the largest investment in protecting keys; others in protecting people; still others in protecting trucks and equipment. Every business touches multiple threat categories, but they’ve each got their focus. Of course, educational institutions have their own set of unique security threats.

Continue Reading

Best Practices for Designing Security Guard Tours

By Shannon Arnold on Apr 18, 2017

Reliable guard tour systems help any business maximize the benefits of their security patrols.

Continue Reading

4 Reasons for Infosec & Physical Security Convergence

By Shannon Arnold on Apr 11, 2017

In a few short years ‘convergence’ has gone from just a buzzword, to a supposed fad, to now the new normal way of operating. This rapid shift in thinking has come about mainly because technological convergence is no longer a trend specific to the security industry, it now reflects a larger change in our society.

Continue Reading

5 Common Mistakes to Avoid: Building Security Systems

By Shannon Arnold on Mar 31, 2017

The goal of any physical security system is to permit only the movement that you actually want of people, assets, or data within your facility. That principle remains the same whether it’s officers and inmates in a corrections facility, mobile devices with sensitive data at a power plant, or forklifts in a warehouse.

Continue Reading

ISC West 2017

By Shannon Arnold on Mar 22, 2017

Meet Our Team at ISC West 2017 - BOOTH #12126

Real Time Networks will be demonstrating its real time location technology and applications at the ISC West Conference & Expo - April 5-7, 2017 at the Sands Expo in Las Vegas, NV. We'll be showing how our solutions allow security personnel to be proactive in mitigating risk, managing emergencies and eliminating security threats altogether. 

Topics: RTLS
Continue Reading

Need To Know: Defending Your IoT Security Systems

By Shannon Arnold on Mar 7, 2017

Internet of Things (IoT) technology continues to disrupt both the consumer and enterprise sectors, and as each powerful new use is found its adoption is only expected to grow.  But many IoT security risks remain.

Continue Reading

How Key Management Systems Ground Commercial Security

By Ralph Goodman on Mar 7, 2017

Key management systems have become essential parts of commercial security protocols. They open new levels of security that were previously inaccessible to many business owners. These systems make it possible to organize access levels to a plethora of things which include, but are not limited to, warehouses, restricted facilities, and equipment.

Continue Reading

Need Better Asset Protection? Decide With This Quick 3-Step Appraisal

By Shannon Arnold on Feb 22, 2017

Determining the correct amount of protection to give your assets and facilities can be difficult. Ensuring you use only the most cost-effective security solutions requires you to first have a good understanding of your unique security threats and operational needs.

Continue Reading

Six Access Control Trends for 2019

By Shannon Arnold on Feb 15, 2017

Editor's Note: Originally published February 15, 2017. Updated in January 2019 for accuracy and comprehensiveness.

It's a new year, and what better time to look at some of the changes over the past year that lead to new trends in 2019. For access control, those trends are moving steadily toward more devices, more points of access and definitely more data. 

Continue Reading

Six Signs That You Need Better Physical Security Controls

By Shannon Arnold on Jan 17, 2017

Your business or institution may not be as safe or secure as you imagine. Here are a half dozen signs that your security isn’t as strong, smooth or efficient as you might think.

Continue Reading

Electronic Key Management : A Framework to Analyze ROI

By Shannon Arnold on Jan 10, 2017

Continue Reading

A Buyer's Guide: The Top Ten Checklist for Key Management Systems

By Shannon Arnold on Oct 27, 2016

There are many key management systems available on the market, and many competing providers make similar claims. To help guide your planning and purchasing process and make wise choices, Key Tracer has tapped its 10+ years of industry experience with the questions that we get asked every day to create a best practices guide. If you’re considering buying a key control system for the first time, or looking to upgrade your existing system, there are principles that you want to keep in mind. We've summarized some of the key points from this guide below.

Continue Reading

The Evolution of Fleet Management Solutions

By Shannon Arnold on Oct 24, 2016

It wasn’t that long ago that fleet management was more of a guessing game, with labor-intensive manual logs. What's more, key-cut businesses were racking in the dough cutting multiple keys for local businesses with fleets. When a key went missing, a runner was sent to get a new one cut.

Continue Reading

Real Time Networks Introduces New Radio Lockers

By Shannon Arnold on Oct 20, 2016

We always like to remind people that Real Time Networks tracks more than key control—eliminating the cost and risk of managing keys for companies, campuses, correction facilities and more. We’re also committed to protecting all your secured assets—from weapons to electronic devices to two-way radios.

Topics: asset lockers
Continue Reading

Don’t Optimize Your Key Management Process, Eliminate It!

By Shannon Arnold on Sep 20, 2016

Think for a moment about all the steps and all the people involved with doing something that seems so simple; issuing, tracking and returning keys. Guards or other personnel are appointed to the key management process—often more than one and often 24 hours a day. There are supervisors monitoring those guards. There are sign in/out sheets and logs maintained and regular reporting that has to be done. And that’s if things go smoothly. If physical keys are lost or stolen, more people get involved, more forms are filled out, and sometimes outside vendors brought into to re-key locks.

Continue Reading

Syracuse University Automates with Key Control and Gun Lockers

By Shannon Arnold on Aug 18, 2016

Countless Hours Spent Tracking Keys and Firearms Resolved by Automating with Key Control and Firearm Lockers

When Syracuse University implemented electronic key cabinets and asset lockers, they immediately found that the automated system increased efficiency and significantly reduced labor costs associated with key control and asset management.

Continue Reading

Garland County Increases Key Security and Accountability

By Shannon Arnold on Jul 6, 2016

Paper Logs Result in Errors, Lost Keys, and Time Wasted

Before implementing an electronic key security system, Deputies at Garland County’s Sheriff’s Office and Detention Center would report to work, and obtain keys in a locked key box behind the old booking desk.
Continue Reading

Key Tracking: 8 Facts You Need to Know About Key Loss

By Shannon Arnold on Jun 22, 2016

The Need for Better Key Tracking

Here are 8 facts that you need to know about the reality of key loss and why you should take
preventive measures to avoid the risk and cost associated with losing master keys. 

Continue Reading

Olympic Park Tightens Security with Real-Time Key Tracking

By Shannon Arnold on Jun 14, 2016

Key Control Challenges

Prior to automating key control, the Montreal Olympic Park had been using a handwritten registry to track the issue and return of approximately 2,500 keys. Each day, someone was responsible for manually recording which key sets were being checked out and by whom, on which day and time, and recording the return of the keys.

Continue Reading

Key Management a Challenge for Walla Walla University

By Shannon Arnold on Mar 7, 2016

Walla Walla University prides itself on a student-based employment program that encourages students to earn money while they attend school. Because of this, security can be an issue when multiple students are provided access to different areas of the school and there’s no way of tracking the keys.

Continue Reading

Real Time Networks Solutions Now Available in the United Kingdom

By Shannon Arnold on Oct 1, 2015

Real Time Networks opens new offices overseas to support increasing demand for key control systems in the UK.

Topics: uk
Continue Reading

RFID Technology Delivers the Best ROI on Key Management Solutions

By Shannon Arnold on Sep 8, 2015

Shopping for Key Management Solutions? - Ask about RFID

Those metal tags you use to manage and monitor your keys are costing you a lot of time and a lot of money—without delivering a lot of value.

Continue Reading

The Benefits of Implementing a Key Management System

By Shannon Arnold on Mar 10, 2015

 

Security is a huge concern in the modern world. Threats arise both big and small that can be costly and time consuming to businesses. Not only do businesses contain valuable equipment and cash inside their premises, there can also be client information and other types of data that is confidential, as well as exclusive ideas and inventions.

 

Continue Reading

Top 3 advantages of a RFID-Based Guard Tour System

By Shannon Arnold on May 9, 2012

Manage and monitor the security of premises using a guard tour system

It proves beneficial to the patrolling guards and improves their efficiency as well. Moreover, this system keeps a complete audit trail of your guards' tours and checkpoints. Amongst several benefits that it offers, the top 3 advantages of RFID-based guard tour systems are discussed below.

Topics: guard tour
Continue Reading