Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Podcasts
    • Photo Galleries
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Utilities to Fleets: Remote’s Here

By Bill Zalud
March 1, 2005
At the heart of PowerKey’s fleet management system is keyless access control which also tracks OSHA, training, hours on duty and maintenance needs.
Traditional and new age security firms are blending time-honored access equipment with leading-edge technologies including wireless to protect vehicles and equipment at sprawling and sometimes remote utilities as well as provide security and return on investment for firms with fleets of trucks, cars and forklifts.

Power toolmaker DeWalt has a wireless alarm system for utilities and jobsites. It can include offsite monitoring by DeWalt.
One example, according to end users such as Brent Parent of Total Fleet Solutions, comes from International Electronics Inc. of Canton, Mass., and its PowerKey fleet management systems.

The system includes a keypad and LCD backlit display and onboard vehicle radio for wireless data transfer to a base station radio or through a local or wide area network. The design, platformed on a dedicated base station personal computer, can include an impact monitor for shock sensing as well as added proximity reader.

For a decade, Parent's Hollard, Oh.-based firm tracked Total Fleet Solutions, tracked vehicle and driver information manually. “We had a clipboard on every forklift,” he said. The new system aims at the core of Parent’s business: reducing administration costs and workload time. It works with companies that outsource lift truck and materials handling needs.

Secure Straps from Avery Dennison, in conjunction with RF Code, uses an active RFID real-time locating device.
PowerKey now provides a diversity of cost and safety services. As a way to gain access to the vehicle, an operator enters information into the keypad affixed to it. Some designs also call for use of a prox card. Following data displayed locally, the operator can follow a paperless OSHA compliance checklist with customizable reports generated remotely. The approach also boasts computerized, scheduled maintenance based on actual run-time hours and not guesswork. “You know what drivers are on what forklifts at any time,” said Parent. “And you know about collisions through use of the impact monitor.”

Another PowerKey user, Iron Ore Company of Canada, uses the system to control and monitor access to Ford pick up trucks that are used at their iron ore mining site and processing plants in Labrador City, Newfoundland. The PowerKey provides entry-level vehicle management for mobile assets requiring individual PIN control such as material handling equipment, pickup trucks, golf cart fleets, people carriers, and airport tarmac tugs.

Sidebar: What About Tools, Cargo?

Jobsite theft. Vandalism of utility facilities. Cargo tampering. These threats and more are today being matched with unique security solutions.

The maker of power tools, DeWalt of Towson, Md., for instance, now is selling SiteLock, a portable, wireless alarm system to monitor numerous pieces of equipment or areas simultaneously. SiteLock features a portable base unit and five wireless sensors. Through the base unit, stationed in an indoor location (most often a jobsite trailer), the remote sensors can be programmed individually to monitor key assets and areas. If an intruder tries to enter a secured area, disturb a piece of protected equipment or remove a sensor, the alarm activates and a signal is sent via wireless technology to a monitoring service.

Earlier this year, RF Code, Inc. of Mesa, Ariz., and Avery Dennison Corporation of Pasadena, Calif., demonstrated Secure Strap security monitoring and electronic seal technology. The product leverages RF Code’s TAVIS data management platform, active RFID technology and Avery Dennison’s tamper sensor. The Secure Strap tags contain electronic seal technology for tamper monitoring, tracking and locating of containers and other physical assets. Secure Strap consists of a radio lock (an active RFID real-time locating device) that is attached to a fiber-optic tamper sensor cable. If the cable is compromised in any manner, Secure Strap will send out a radio distress signal indicating its identification code and a tamper indication signal. An encrypted reset key will allow reuse of the radio lock component of the Secure Strap system.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 13, 2025

Inside the 2025 Security Benchmark Report

The 2025 Security Benchmark Report unveils the top trends CSOs and enterprise security executives are facing in today’s current climate and how each of these trends could potentially impact the enterprise’s global reputation with the public, governments, and business partners. 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • schools remote learning

    Schools, here’s how to stay cyber-safe in the age of remote learning

    See More
  • Protecting critical infrastructure and utilities as European Nations

    100-day plan: What European nations can do to protect utilities

    See More
  • cyber-security-shield-freepik

    Zero Trust vs. SASE - Here’s what you need to know

    See More

Related Products

See More Products
  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

  • The Complete Guide to Physical Security

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products

Events

View AllSubmit An Event
  • January 6, 2011

    From Here to There - Advancing in the Security Field

    Learn the three components that are critical for your advancement.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing