More and more business security practices are going digital. Every year, it seems like something you took for granted as a physical process is automated or made electronic. Will physical keys be next?
We don’t think so. On the contrary, there are many reasons to expect physical keys to be a mainstay of corporate security programs for years to come. First and foremost, they’re cost-effective solutions for access control at organizations of any size.
They’re an excellent option for SMBs that need to manage their security budgets closely. Enterprise businesses may have larger budgets, but they also tend to have much larger facilities. As a result, switching to electronic access controls at scale can be incredibly expensive.
So physical keys are here to stay, but they need proper management or they can quickly turn from security assets to liabilities. Key management systems are designed to limit those liabilities and cut other operating costs through automation.
What is key management?
Key management is the process of securing, tracking, and distributing physical keys. Why is this important? Since keys grant access to sensitive locations and assets within your organization, when you improve the security of keys, you enhance the security of those valuable resources.
Key management systems also control the costs that come with using physical keys. These systems reduce overhead through automation. They reduce and often eliminate the need for re-keying whole facilities due to key loss or security breaches.
Some smaller companies might be able to employ a pen-and-paper key management protocol. Larger companies, or those that want better insight and control over keys, usually opt to use electronic key management systems.
Why use a key management system?
A key management system can be a cornerstone of your key control process. At the most basic level, key management systems do two crucial things pen-and-paper systems cannot: They securely store and distribute keys, and they enhance how effectively your organization uses keys through automation and analytics.
Key management systems provide other specific benefits as well, including:
- Reduced costs. Key management systems ensure keys are always accounted for. Your staff won’t waste hours hunting down missing keys, so productivity stays high. As a result, key losses will drop, and therefore, so will re-keying costs.
- Better risk management. A key management system maintains a transaction log, so you’ll have an airtight record of who used which keys when. Your staff will be fully accountable for keys in their possession.
- Improved operations. A key management system affords tighter control over how keys are used in your facility. For example, you can prevent staff from signing out keys on specific shifts, set curfews so keys must be used and returned by a particular time, and allow staff to reserve keys for a specific time slot for time-sensitive tasks.
The Components of a Reliable Key Management System
Four primary components power a key management system:
1. Key Cabinets
Keys are stored in a secure cabinet. These cabinets have an outer locking door to prevent unauthorized access. More advanced key cabinets keep key rings in individual locked slots that only unlock after a user authenticates themselves and specifies which key ring they want to sign out.
The lock slots are all part of the panel inside the cabinet. You can often select different panel configurations for different sizes and quantities of key rings.
2. Smart Terminal
To unlock the cabinet’s outer door and individual key ring slots, users must authenticate themselves at an attached smart terminal. These terminals accept one or more authentication types. For example, Real Time Networks’ key cabinets can accept PIN codes, radio frequency identification (RFID) fobs, swipe cards, smartphone authentication, or different biometrics such as fingerprints or iris scans.
You can also use smart terminals to present users with checklists they need to complete at key sign-out or return. For example, you may want to prompt them to enter the reason for key access if you need to maintain a chain of custody in high-security environments. Or you can require drivers to log mileage and maintenance issues when returning fleet keys.
3. Key Fobs
In more advanced key management systems, your key rings will be attached to a tracking fob. Sensors in the cabinet will scan the fob when keys are signed out and returned to verify that the correct keys are present.
Key management systems provided by Real Time Networks uses RFID key fobs. RFID is a short-range wireless communications standard most often used for machine-to-machine communication. For high-security tracking, you can even embed RFID sensors around your facility so you can track keys everywhere in real time.
4. Management Software
Automating your key management at the point of the transaction provides a great deal of value. But when you have access to management software that allows you to monitor and control how your staff uses keys, you’re able to improve the aspects of your business in which those keys are used.
What can you do with a key management system?
Key management is about both improving key security and increasing the amount of business intelligence you can generate around how your keys are used. Automating this process with an electronic key management system increases your intelligence-gathering capabilities far beyond what human staff members can do by hand and provides many other benefits.
Improve Access Control
By better securing keys, you improve your access control over the spaces and equipment that those keys unlock. Better access control is especially important when you need to permit temporary workers to access those spaces—for example, by giving contracted cleaning crews access to high-security facilities.
You can use your key management to streamline providing temp workers with one-time key access. In addition, the system can log all of their after-hours key access, keeping everyone more accountable.
Enhance Your Risk Management Practices
The software in a good key management system can generate reports on key usage, user access requests, access irregularities, and losses. In addition, you can track and audit key use in real time. When combined with a comprehensive key control policy, you’ll enforce better accountability over key use to meet any industry or risk management compliance standard.
Lower Costs & Prevent Losses
You incur direct costs when an employee loses a key, including replacement key purchases or re-keying locks when a master is lost. The indirect costs of key loss are often more significant though. This is because employees first spend time hunting for lost keys, then processing replacement requests, all of which is time not spent on productive work.
Automated key systems reduce the chance of keys ever getting lost. You can set curfews for sensitive keys, so staff members are accountable for returning them by a specific time. You can send text or email alerts to supervisors when particular keys are not returned at the end of a shift or by one of those curfews. Starting the search for lost keys as soon as possible increases the chance of recovery significantly.
As we’ve discussed, keys are frequently used during critical workflows, such as a security officer’s patrol or a fleet mechanic’s servicing schedule. A key management system allows you to control those workflows better.
For example, you can restrict access at set hours or enable staff to reserve keys when they need them for a time-sensitive task. Your mechanic’s schedule becomes irrelevant if someone accidentally signs out the truck they were scheduled to service that day.
Provide Better Fleet Management
Automating your fleet key management provides many benefits. As we’ve already discussed, you can require drivers to log mileage and maintenance issues before they’re allowed to return keys at the end of a shift. In addition, you can rotate key sign-outs for different vehicles so drivers don’t pick their favorite truck every time.
You can also use a customizable user database to track driver’s licenses and certifications. The system can send supervisors warnings if someone’s license is about to expire, so you don’t expose your company to unneeded liability.
What process should you follow to buy and install a key management system?
It takes an investment in time up front, but you’re more likely to get the most cost-effective and efficient key management system if you follow this three-step process:
Start by defining your desired outcomes. Get together stakeholders in your company and decide what you want to accomplish by adding an automated key management system to your company’s operations. Then set some key performance indicators for what improved management might look like.
You’ll note that you’re not even considering different products in this first step. You need to identify the business outcomes you want before even considering specific technology.
Only after those outcomes are set should you begin considering what tools you’ll need. First, identify the necessary hardware components that you’ll need. For example, you might decide you need two key cabinets: one for the warehouse and one for your front office.
Then identify the locations where these systems will need to be installed. For example, you might want your front office key cabinet next to the security desk, and you might want the warehouse cabinet next to the time clock. Figure out what will be most efficient in your particular environment.
Then determine the system configuration. You will need to decide how many key rings each cabinet will hold, what type of access control you’ll use, and whether you need real-time key tracking throughout your facility.
Finally, evaluate different products on the market and determine which ones fit the needs you’ve identified in the previous two steps. Key management systems are complex technology that needs ongoing support. So you’ll need to evaluate service and technical support options in addition to the actual hardware and software.
Ideally, you’re looking for a key management service provider who’ll be with you for the system’s entire lifecycle. They’ll be closer to a business partner rather than just a vendor.
Key management systems can be the cornerstone of your security program.
A key management system does more than just secure keys. It protects, manages, and improves entire workflows in which those keys are used. If a workflow includes a key, then there’s a good chance a key management system can improve that work.
Do you want to find out if a new key management system is worth it for your organization? Then check out our Key Control ROI Calculator.
About the Author
Jay Palter, VP of Marketing