Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Utilities to Fleets: Remote’s Here

By Bill Zalud
March 1, 2005
At the heart of PowerKey’s fleet management system is keyless access control which also tracks OSHA, training, hours on duty and maintenance needs.
Traditional and new age security firms are blending time-honored access equipment with leading-edge technologies including wireless to protect vehicles and equipment at sprawling and sometimes remote utilities as well as provide security and return on investment for firms with fleets of trucks, cars and forklifts.

Power toolmaker DeWalt has a wireless alarm system for utilities and jobsites. It can include offsite monitoring by DeWalt.
One example, according to end users such as Brent Parent of Total Fleet Solutions, comes from International Electronics Inc. of Canton, Mass., and its PowerKey fleet management systems.

The system includes a keypad and LCD backlit display and onboard vehicle radio for wireless data transfer to a base station radio or through a local or wide area network. The design, platformed on a dedicated base station personal computer, can include an impact monitor for shock sensing as well as added proximity reader.

For a decade, Parent's Hollard, Oh.-based firm tracked Total Fleet Solutions, tracked vehicle and driver information manually. “We had a clipboard on every forklift,” he said. The new system aims at the core of Parent’s business: reducing administration costs and workload time. It works with companies that outsource lift truck and materials handling needs.

Secure Straps from Avery Dennison, in conjunction with RF Code, uses an active RFID real-time locating device.
PowerKey now provides a diversity of cost and safety services. As a way to gain access to the vehicle, an operator enters information into the keypad affixed to it. Some designs also call for use of a prox card. Following data displayed locally, the operator can follow a paperless OSHA compliance checklist with customizable reports generated remotely. The approach also boasts computerized, scheduled maintenance based on actual run-time hours and not guesswork. “You know what drivers are on what forklifts at any time,” said Parent. “And you know about collisions through use of the impact monitor.”

Another PowerKey user, Iron Ore Company of Canada, uses the system to control and monitor access to Ford pick up trucks that are used at their iron ore mining site and processing plants in Labrador City, Newfoundland. The PowerKey provides entry-level vehicle management for mobile assets requiring individual PIN control such as material handling equipment, pickup trucks, golf cart fleets, people carriers, and airport tarmac tugs.

Sidebar: What About Tools, Cargo?

Jobsite theft. Vandalism of utility facilities. Cargo tampering. These threats and more are today being matched with unique security solutions.

The maker of power tools, DeWalt of Towson, Md., for instance, now is selling SiteLock, a portable, wireless alarm system to monitor numerous pieces of equipment or areas simultaneously. SiteLock features a portable base unit and five wireless sensors. Through the base unit, stationed in an indoor location (most often a jobsite trailer), the remote sensors can be programmed individually to monitor key assets and areas. If an intruder tries to enter a secured area, disturb a piece of protected equipment or remove a sensor, the alarm activates and a signal is sent via wireless technology to a monitoring service.

Earlier this year, RF Code, Inc. of Mesa, Ariz., and Avery Dennison Corporation of Pasadena, Calif., demonstrated Secure Strap security monitoring and electronic seal technology. The product leverages RF Code’s TAVIS data management platform, active RFID technology and Avery Dennison’s tamper sensor. The Secure Strap tags contain electronic seal technology for tamper monitoring, tracking and locating of containers and other physical assets. Secure Strap consists of a radio lock (an active RFID real-time locating device) that is attached to a fiber-optic tamper sensor cable. If the cable is compromised in any manner, Secure Strap will send out a radio distress signal indicating its identification code and a tamper indication signal. An encrypted reset key will allow reuse of the radio lock component of the Secure Strap system.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Zalud 2016 200px

Bill was the editor emeritus of Security Magazine, and he can be reached at (773) 929-6859.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Cybersecurity Education & Training
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security’s 2025 Women in Security

Security’s 2025 Women in Security

blurry multicolored text on black screen

PowerSchool Education Technology Company Announces Data Breach

Half closed laptop

Sudo Vulnerability Discovered, May Exposes Linux Systems

Events

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • schools remote learning

    Schools, here’s how to stay cyber-safe in the age of remote learning

    See More
  • Protecting critical infrastructure and utilities as European Nations

    100-day plan: What European nations can do to protect utilities

    See More
  • cyber-security-shield-freepik

    Zero Trust vs. SASE - Here’s what you need to know

    See More

Related Products

See More Products
  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • into to sec.jpg

    Introduction to Security, 10th Edition

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products

Events

View AllSubmit An Event
  • January 6, 2011

    From Here to There - Advancing in the Security Field

    Learn the three components that are critical for your advancement.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing