As part of the requirement for the safety and security of people, assets and facilities, the management of keys is a fundamental tactic in controlling access. In fact, key management is a prerequisite for any access control strategy because of unavoidable vulnerabilities when humans are involved.
Having to abide by and work with technology and/or product choices made remotely by a head office can sometimes be a challenge for branch locations. The local situation or circumstances may be slightly different than corporate or the feature set of the product may not exactly meet everyone’s requirements, leading to a less than satisfactory solution.
When Steven Shaker wants to know who last took a car on his lot out for a demo or wants to see the demo history of a specific vehicle, all he has to do is go to his computer and check the Morse Watchmans KeyPro software for the answer. Shaker is one of the owners at Shaker Family Ford in Watertown, CT, but according to him, it was not always this easy to get the information he needed, nor was it always accurate or current.
With so much money flowing in and out in the form of cash and chips, casinos are a highly regulated world when it comes to security. One of the most critical areas of casino security is key control. Physical keys are used for access to all of the most sensitive and highly secured areas of the casino, including counting rooms and drop boxes, so the rules and regulations that relate to key control are extremely important to maintain tight control and minimize loss and fraud.
It used to be that the word “lockdown” was only ever used in reference to an emergency protocol to restrict movement in a prison environment. Today however, the term is in common usage in educational and other environments to describe measures taken under certain conditions of threat. In this article, Fernando Pires, VP of Sales and Marketing at Morse Watchmans, explains that lockdowns, along with building evacuation and sheltering procedures, are an integral part of a school’s emergency plan that can save lives.
Security technology for school campuses comes in a variety of solutions. Video surveillance cameras capture images of people and activities while guard patrols and alarm systems help maintain building security. Access control is another popular security solution and many schools have gone to an automated system using cards which may be scanned or swiped to gain access to a building or room.
Located in Florham Park, NJ, and offering convenient access to Newark Liberty International Airport, Wyndham Hamilton Park Hotel and Conference Center services guests in 219 rooms and 40 conference rooms. The hotel features more than 27,000 square feet of property and can support up to 400 people for conference, events, and special occasions.
Protecting data centers from hackers, unauthorized access by employees or other treats demands constant attention, proactive thinking and implementation of today’s best technology. While definitive precautions are usually taken to secure the network, basic physical security procedures for securing the data center itself are often not as well thought out.
The overall development and availability of a wide range of operational tools for the fleet management market provides organizations with more convenience – and savings – in managing vehicles. For most every aspect of fleet management between acquisition and disposal, including profiling, dispatch, diagnostics, tracking, security and remote control, there is now an application available to help improve efficiencies.
At correctional facilities, the environment is highly structured to ensure that security, safety and order can be maintained. Security procedures are clearly defined and include among others, head counts, inmate movement tracking, visitor logs and cell inspections. Among the most closely guarded and stringent policies and procedures is key control. In fact, many states have implemented policies stating that each facility shall have a system for key control that includes (1) the absolute control of keys by staff; (2) key issuance records; and (3) a system which ensures that missing keys are immediately identified.