Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Why Physical Keys Should Still Be a Part of your Security Strategy

March 2, 2010

Lost keys, unauthorized duplicate sets of keys and manual tracking of keys are just some of the challenges faced by management using conventional key/lock systems. But given the tremendous range of conventional applications for key/lock systems and the cost-effectiveness of these devices, the need for physical keys will continue to play a significant role in an organization’s overall security strategy. That said, today’s key management systems provide cutting-edge solutions that incorporate compelling form and functions to provide increased value and flexibility to key management security. 

A Key Management Definition

Key management or key control can be defined as the storage, use and tracking of a physical key or keys. A key management system includes a key storage device, locking rings complete with identification chips and auditing software. The ideal integrated key control and management solution is modular, scalable and designed for interoperability with access control and other security and business systems. This combination of hardware and software enables the user to move beyond key control to a more sophisticated and integrated access control solution, complete with accountability.
The driving force behind the evolution of key management systems has clearly been the development of advanced application software. This allows systems to be virtually hardware agnostic in terms of their actual configuration of access technologies, and their integration with access control and security systems control systems themselves. The software also provides a remotely accessible data trail for every key management system and each of the keys within those systems.

 For example, with some systems, users can only access keys for which they have an authorized user code, while keys can be retuned to any location in the box. Priority email alerts can be sent to security managers to advise them if specific keys have not been returned, or of other identified situations. Alarms can also be triggered under a range of conditions such as the use of force to gain access or remove a key, three consecutive invalid user codes, a door left open for more than 10 seconds after use, power failure, a key missing or not returned on time or a key returned by the wrong user.


Digital Technology Drives Integration

Although the basic premise and purpose for key management systems remains quite fundamental – to secure keys – the technology inside these boxes is quite sophisticated. Digital technology and system integration has made key management a higher level management tool rather than just a way to control keys. To start, the systems themselves are scalable – multiple cabinets can form a single fully integrated system to hold hundreds of keys and other items in multiple locations across an enterprise. And they can be tailored to suit a variety of access control needs, including a built-in keypad, biometrics such as fingerprint readers, and a magnetic or proximity card reader.

 This capability provides users with tremendous versatility that can be further enhanced with the use of auditing software. By integrating management software, users can control the system and maximize its reporting and programmable access capabilities. For example, system managers can establish permission levels for each user code and monitor data from any desktop connected to the network.


Building on the Solution

With the success and popularity of key control systems, solutions have been expanded to include other items to which access needs to be controlled and configurable locker systems provide the ideal solution.

For example, some police precincts and other enforcement agencies have established policies where firearms must be locked and controlled. Other devices such as radios, cell phones, hand-held computers, etc., that are used by different personnel through the course of any given day are also expensive and represent potential security breaches if stolen or misplaced.

Additionally, as access control systems continue to proliferate, the access devices themselves, such as magnetic cards or proximity devices need to be secured in the same way as do physical keys.

Finally, when products are engineered for interactivity with other security systems, best of breed solutions can be implemented without costly upgrades or overhauls.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Shopping mall

Victoria’s Secret Security Incident Shuts Down Website

Laptop with coding on ground

Stepping Into the Light: Why CISOs Are Replacing Black-Box Security With Open-Source XDR

Gift cards and credit cards

Why Are Cyberattacks Targeting Retail? Experts Share Their Thoughts

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

From animal habitats to bustling crowds of visitors, a zoo is a one-of-a-kind environment for deploying modern security technologies.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • AI robot

    Implementing AI security solutions: A crawl-before-you-run strategy

    See More
  • CISO looking at finances

    With a recession looming, security leaders should plan for the impact

    See More
  • Advice to School Administrators: Don’t Let Security Drown in a Flood of Financial Woes

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing