Access Management

9 Key Features to Consider in Asset Management

 

Building on their widespread use and popularity as a security management tool, key control systems’ functionality has been expanded to include custom modules and lockers that can accommodate plastic card keys or other valuable items. Lockers, available in various configurations, can be used for storing credit cards, small firearms, cellphones, two-way radios, laptop computers, tablets, cash trays and so on, and can be managed as efficiently as keys in key control systems.

Locker modules can easily be incorporated into existing key control systems or configured as stand-alone asset management systems. Their operation is identical to a key management system in that only pre-authorized users can access items in the lockers. Items can be returned to any open locker for convenience, and systems can be set up as a personal storage space for one or multiple users. The systems are also engineered to alert security management in case of an incident. An open door, the use of force to gain access, a power failure or even the misuse of the keypad will trigger an alarm and record the event in the log file.

To help in the selection of an asset management system, the following system features should be considered:

  • Security: Asset management systems are designed so that only authorized users can access stored items. Permission levels can be established for each user code such as time of day when access is granted or number of hours the item is allowed to be in use and so on. System managers can monitor data from any desktop connected to the network.  
  • Tracking:  A tracking system records who accessed the locker, when and for how long an item was removed. The system software can run activity reports and sort based on different criteria making it possible for system managers to generate useful and practical management reports, then analyze the information to maintain maximum control of access and security issues.
  • Scalability:  Systems can be tailored to individual requirements both now and in the future. This allows organizations to prepare for and adapt to change with minimal or no disruption to the daily operation. Locker modules and key control cabinets can be added where and when needed to support organizational growth while the overall system maintains high reliability and performance including the common usage of data bases and programming. Each additional module can be controlled by a single console and monitored by the software. 
  • Cost:  The cost of implementing an electronic asset management system can pay for itself when compared to the cost of losing master card keys or valuable electronics. In addition, upgrades can be accomplished without system overhauls or costly installations.
  • Convenience:  A key control and asset management system is easy to use and can accommodate a variety of items. Items can be returned to any open locker in the system, and if they are not returned, the software can send an e-mail alert to the system manager. 
  • Integrity:  Rugged stainless steel construction and tamper-proof alarms enhance the reliability of the system. Any time the locker is opened, the event is recorded. If a door is left open, force is used to gain access, there is a power failure or the keypad is misused, the action will trigger an alarm and record the event in the log file.
  • Access: PINs, access control cards, biometrics or any combination of the three are the most commonly used methods for accessing keys. Where protection of the locker module itself is mission-critical, a remote box configuration provides an additional layer of protection. The locker is installed in a secure room and requires a second individual’s PIN input and verification in order for an authorized employee to access items from the locker.
  • Aesthetics:  Compact size, top and bottom mounting options and aesthetically pleasing looks offer added options for installation.
  • Integration:  Compatibility with other security systems and network access offer added richness and usability to a system and integration with existing data bases saves time and money. A built-in RS-232 communications port allows ease of use for direct connectivity to printers or other devices, or networked connectivity via Ethernet.

Did you enjoy this article? Click here to subscribe to Security Magazine. 

Recent Articles by Fernando Pires

You must login or register in order to post a comment.

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security December 2014 issue cover

2014 December

This issue of Security Magazine covers our 12th annual Top Guarding Firms list. Check out the best of the best as of December 2014. The 21st century has brought with it new types of security threats. Read how to combat and protect against these threats.

Table Of Contents Subscribe

Security Emergency Preparedness Training

Which security personnel emergency preparedness training is the top priority to you and your enterprise?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.