Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
PhysicalAccess Management

Creating Operational Efficiencies with Key Management Access Control Systems

Key usage information can be tracked, collected, sorted and analyzed.

By Fernando Pires
keys on keychain
November 8, 2016

In an earlier era, business decisions were often made based on gut instinct, golf games, politics, and very occasionally market research. Since that time, organizations have moved away from this type of marketing and adopted a more research-backed, results-driven approach to business.

Today, businesses of all sizes and types rely on research, obtained through data mining, to help them see the big picture and identify trends and patterns that can help create operational efficiencies. With the concept of “Big Data,” every piece of data (from digital to conventional) is a potential piece of information that can be tracked, collected, sorted and analyzed.

Take for example the use of key management systems in an organization. These systems are designed to store and control access to mechanical and other keys used throughout a facility. Keys can only be accessed by pre-authorized individuals with a proper code, badge and/or biometric identification. All access activity is automatically recorded and from this data, management has a complete history of who removed and returned which key and when. The data gathered from the automatic recording of access activity can be used to analyze trends to generate valuable, actionable intelligence for both physical security and business practices.

 

Tracking

For security purposes, keys can be controlled according to requirements (i.e. time/day available, personnel, etc.) and management can quickly query what keys have not been returned and when each key will become overdue. And if a key is not returned to the key cabinet as scheduled an alert can be sent via email or SMS text to appropriate personnel so that immediate action may be taken. To make key management even more convenient, a mobile app lets authorized users to see a wide range of live information and interact remotely with the system.

In the event of an incident, management can query the system for specific details such as a list of all transactions between certain times or a report for the hour preceding the incident. Immediately following an incident such as the discovery of a damaged or missing piece of equipment, a report can be generated showing who last accessed the particular key. Together with the audit data from an access control system, a key control system’s reporting feature provides a strong evidence trail.

 

Collecting and Sorting

Built-in schedulers can be programmed to automatically download all data to a secure PC as required by the user, including online as transactions occur; periodically; daily at a specified time; weekly with specified day and time; or monthly with specified day and time. Email delivery of customized or standard reports can be scheduled for any frequency or specific time, or they can be accessed using a smart phone app. With this capability, management can better sort and analyze information to maintain maximum control of access and security issues.

Advanced functionality additionally allows enhanced filtering of users and transactions, as well as the ability to create a customized report template that provides the information and insight end users want, when they want it during the day or after hours. Human resources for instance may want a report of all key access beyond regularly scheduled hours. Or, compliance requirements in a casino may require the collection and sorting of information that details illegal door and alarm activity over a 90-day period. Reporting software can be programmed to ensure the information is reportable, retrievable and traceable.

 

Analyzing

Key usage data provides a wide range of business intelligence that can be analyzed to identify policy and procedure infractions and/or potential improvements. Trends that could take weeks or months to detect manually can be seen almost instantly when relevant queries are programmed into the reporting software. This highly specific intelligence allows root causes of problems to be identified rather than symptoms, and enables management to enact countermeasures that will help prevent incidents before they occur.

Analyzed key usage data can also point out other pain points in an operation. In a fleet situation for instance, the lack of a vehicle rotation policy may be causing undue wear and tear on a vehicle that is being used significantly more than other vehicles. Analysis of key usage data can pinpoint the issue with information such as the number of times the vehicle is checked out compared to other vehicles in the fleet.

Data-driven information provided by state of the art key management access control is a resource that will continue to gain in perceived and actual value as organizations realize the technology can help improve business operations and achieve a wide range of business objectives. 

KEYWORDS: big data data analytics key cabinets key management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Fernando Pires is vice president, sales and marketing at Morse Watchmans.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

The Lourve

The Lourve Heist: What Was the State of the Museum’s Security?

The 2025 Security Benchmark Report

The 2025 Security Benchmark Report

Office supplies

Security Leaders Share Why 77% Organizations Lose Data Due to Insider Risks

American Airlines

Security Leaders Discuss Cyberattack on American Airlines Subsidiary

Going Down with the Ship

Going Down with the Ship

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Key Control Drives Fleet Management Operations

    See More
  • Combining Key Control and Guard Tours for Effective Asset Management

    See More
  • How to Confront Data Center Security Threats with Key Management

    See More

Related Products

See More Products
  • SSCP.jpg

    SSCP Systems Security Certified Practitioner Practice Exams

  • contemporary.jpg

    Contemporary Security Management, 4th Edition

  • intelligent.jpg

    Intelligent Network Video: Understanding Modern Video Surveillance Systems, Second Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing