Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

What’s Key to Managing your Keys?

By Fernando Pires
April 26, 2011

Security technology and applications are evolving at an accelerating rate, driven by the recognition of the need for stronger security measures to create safer environments. Still, in every facility there will be a large number of physical keys that are in use and they must be considered when implementing or upgrading a security system. Managing and controlling access to mechanical keys provides an extra layer of protection for personnel, property and facilities and can help achieve the goal of a safer environment.

Today's cost-effective key management systems offer state-of-the-art technology. They are fully integrated access control systems which communicate across the converged network and provide security management with a wealth of information that can be used to manage and improve the facility’s overall security operation. Systems can be configured to the exact needs of the facility with custom solutions that include multiple key modules, lockers, biometric access (i.e. hand readers, fingerprint recognition) and versatile installation options.

 

Securing and Accessing Keys

In our KeyWatcher® system, each key is locked into place inside the key cabinet using a SmartKey® that has an integrated chip, so a user can only remove a key which he or she has permission to use. The other keys will remain locked into place when the user enters his or her access code or scans their card or fingerprint. In this way, the system automatically controls who is able to use which keys. The system lights up the location of the key or keys he or she can remove once the code is entered and the box is opened. For added protection, our key control systems also send an alert in case of an incident.  An overdue key, an open door or even the misuse of the keypad will trigger an alarm and record the event in the log file.

To address security concerns in high risk environments such as correctional facilities or casinos where protection of the key cabinet itself is mission-critical, a remote box provides an additional layer of protection. The system is installed in a secure room where it is protected from any potential vandalism or tampering and the remote box is typically installed outside the secure room. Once an authorized employee inputs their PIN and other information into the remote box and it is validated, a second employee inside the secure room inputs their information as well, providing access to the key for which the first employee is authorized.

 

Scalable and Modular Systems

Sophisticated key management allows for a wide range of configuration and installation options, including controlling access to other items which need to be secured. Examples include radios, cell phones or notebook computers that are used by different personnel through the course of any given day and are both expensive and represent potential security breaches if stolen or misplaced. Additionally, as access control systems continue to proliferate, the access devices themselves such as magnetic cards or proximity devices need to be secured in the same way as physical keys do. Advanced systems also accommodate these devices with specifically designed modules that can be used in any combination with standard key or locker modules.

 

Maximizing the System

Multiple cabinets can form a single fully integrated system to hold hundreds of keys and other items in multiple locations, and it can all be controlled from a single PC interface. By integrating management software, users can control the system and maximize its reporting and programmable access capabilities.

For example, security managers can establish permission levels for each user code and monitor data from any desktop connected to the network. Security directors can view reports with data on every key that has been removed, how long it was out, who removed it and which location in which box it was returned to. Additionally, priority email alerts can be sent to security managers under a range of preset conditions. The software can run activity reports, sort based on different criteria, view and print reports and more.

Today’s key control systems deliver ample testament to the bottom-line benefits of key control in a security plan and help to ensure that the dollars spent confront security threats while integrating seamlessly within the security system.  

KEYWORDS: key cabinets key management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Fernando Pires is vice president, sales and marketing at Morse Watchmans.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Cybersecurity
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Popular Stories

Opened padlock on computer keyboard

10 Data Breaches to Know About (April 2026)

Laptop with desktop screen showing

Research: Microsoft Edge Loads Stored Passwords in Cleartext

Diverse Team Collaborating on Business Analysis

12 Tips for Building an Effective Security Budget

Laptop in darkness

Reframing MFA Bypass: Four Identity Gaps Attackers Exploit

Nurse

Why De-Escalation Must Be Part of a Layered Safety Strategy in Healthcare

SEC 2026 Benchmark Banner

Events

June 3, 2026

The Role of AI and Video in Measuring Health, Safety, and Security Standards

OSHA fines grab headlines, but most compliance issues start with everyday operational gaps: missed protocols, unsecured areas, or slow response. Learn how emerging technologies & AI can be leveraged towards a more proactive model of compliance.

June 10, 2026

Applying Agentic AI in Security Operations for Faster Decisions & Better Outcomes

Security teams have never had more visibility. We’ll explore how a new decision layer is helping security teams move from detection to decision. Turn alerts into decision-ready context, reducing reliance on manual triage and enabling faster action.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
Solutions by Sector webinar promo


The Role of AI and Video - Free Webinar - June 3, 2026

Related Articles

  • 9 Key Features to Consider in Asset Management

    See More
  • Keys to Managing Security Across Growing Organizations & Cities

    See More
  • How to Confront Data Center Security Threats with Key Management

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing