Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access Management

Integrated Key Control Provides Mission Critical Solution for Emergency Planning

By Fernando Pires
keys
February 23, 2016

In recent years, many organizations have taken a fresh look at their emergency plans to be sure that they cover the range of potential incidents. While high-profile incidents of terror such as school shootings and bombings at public events have raised this awareness, other events ranging from flooding and power outages to fires and broken water mains have also interrupted operations for a much greater number of businesses.

Among other technologies, today’s advanced key management systems can help lessen disruptions and vulnerabilities when an emergency situation occurs. The automated key management systems include functionality that lets them integrate into broader security systems, including identity management, access control, and visitor control. These networked security systems provide new functions and benefits for daily operations and they also provide for new capabilities that affect how emergent situations can be planned for, managed, and recovered from, that may be less obvious.

The following examples demonstrate how networked key management systems can improve the effectiveness of emergency plans.

Company fleet vehicles, school bus holding areas, trucks and other construction equipment and so on may all come under threat from flooding, fire or other emergency situations. Evacuation or emergency procedures for such conditions can benefit from the real-time information available from key management systems whereby the needed keys can be quickly located and potential damage to assets can be minimized.

Vehicle keys are held in a tamper-proof cabinet when not in use and can only be accessed by authorized users with a proper code, badge or biometric identification. All access activity is automatically recorded and from this data, management can determine which vehicles are off property and which need to be moved. When managing the situation remotely, a mobile app enables authorized users to see live information and to interact with the key management system to allow access to vehicle keys so they can be used to move vehicles out of a pending danger area.

Another critical component for security management when responding to an emergency situation is overall awareness of the current environment. Key management software can run activity reports, sort based on different criteria, view and print reports and more. All this and more makes it possible for managers to generate useful and practical reports, and then analyze the information to maintain maximum control of access and security issues – both during an emergency situation as well as throughout daily operations. 

The very notion of emergency planning covers a wide range of situations. At a minimum, emergency planning should include procedures, assigned responsibilities and training to help ensure all staff is current and familiar with aspects of the plan.

Key management systems play an important role in emergency situations in that the system provides security personnel with immediate and live information so that procedures and assigned responsibilities can be carried out. For example, even if all employees are accounted for after a building is evacuated because of a fire, the key management system may show that a set of keys used by an outside contractor are signed out. With this knowledge, security knows they need to confirm that the contractor is accounted for and out of the building.

In a school environment, a key control system makes it easier for administration and teachers to act in accordance with emergency procedures such as shelter-in-place and locking doors from the inside. Key control systems allow emergency personnel to quickly and easily have access to locked classroom doors, closets and other spaces where children and teachers might be hiding from a gunman – or where a criminal may be hiding. First responders’ badges can be pre-configured and distributed to designated first responders, enabling them to scan their badge into the system to access critical emergency keys.

Networked key management systems also enable management to take action when not on site. In the recovery from an incident, managers can remotely grant the release of keys to specific areas to those on site such as fire or law enforcement responders, or employees that do not normally have such access. The network connectivity of the system allows management to remotely release any key, adding to the convenience and inherent safety provided by a key control and management solution.

Keys and locks are one of the most reliable and effective physical safeguards available in today’s security marketplace and when paired with a key management system the potential for emergency preparedness is vastly improved.

KEYWORDS: access management emergency planning key control key management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Fernando Pires is vice president, sales and marketing at Morse Watchmans.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Hurricane Ida hits Louisiana

    4 key lessons from Hurricane Ida and what they mean for emergency planning

    See More
  • Integrated Systems: Critical Business Elements and Key Assets

    See More
  • Combining Key Control and Guard Tours for Effective Asset Management

    See More

Related Products

See More Products
  • 9781138378339.jpg

    Surveillance, Crime and Social Control

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Photonic Sensing: Principles and Applications for Safety and Security Monitoring

See More Products

Events

View AllSubmit An Event
  • August 20, 2012

    Radiological Emergency Planning: Terrorism, Security, and Communication

    Participants will examine the latest principles and requirements to prepare for and respond to a radiological emergency as well as develop the skills necessary to effectively communicate with the media and public during crisis situations.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing