- Australia & New Zealand
- Belgium & Luxemburg
- Czech Republic
- Saudi Arabia
- Singapore & Malaysia
- South Africa
- South Korea
Enabling you to restrict who can access your keys - with full control, monitoring and recording functions - the use of keys for any physical asset, including buildings, facilities, equipment and vehicles can be much better managed with Traka's intelligent, electronic, key management systems. Traka systems also maintain a simple to use, yet effective, fully audited history of all your conventional key transactions which are made available for quick display via the software reporting function.
The problem with conventional keys is that they are hard to manage and track - at best they will be behind a security desk where staff will issue them, making notes and collecting signatures (many quite illegible). But often, in less security minded complexes, they will be in a managers cupboard, left hanging on hooks or even locked in a desk drawer. Who controls who can get access to these keys - and, more importantly, the buildings, facilities, equipment, confidential paperwork or vehicles that they give access to?
Traka's solution is simple. Keys, or keysets, are permanently attached using a tamper proof security seal to a metal iFob. The iFob is an extremely strong nickel plated brass cylinder, which contains an electronic chip, giving it a unique identity. Thus, the keys are effectively electronically tagged. The iFob, with keys attached, locks into a receptor strip within the key cabinet until released by an authorised user.
Two immediate benefits:
Once the appropriate user profiles and key details have been entered into the software, Traka ensures that only authorised staff are allowed access to the key cabinet - and only then, to designated keys. The system automatically records when a key is used and by whom on a central database. This information is available via the cabinet's data display or on an administrators PC.
Employees request access to the key cabinet by using a PIN code, magnetic ID card, proximity token or by biometrics fingerprint recognition. If the request is valid, the cabinet door will open, and the keys permitted for use by that user will be illuminated. By pressing the release button next to a permitted key, it will be released and the transaction written to system memory - who, which key and, at what time.
To return the key, the holder must again secure admission to the cabinet and then replace the iFob in its designated position. If this is not done, the system will prompt the user to move the iFob to its correct position. All information is again logged - and if any key is returned by a user who is different to the person who took it, it is immediately flagged-up as a warning.
Multiple key management cabinets can be controlled from the same administrators PC - you may have several cabinets in one building, or many cabinets networked together from a number of remote sites. Knowing who has a key at any instant in time is easy - either check using the real time Traka32 software or simply go to the cabinet and enquire at the on-line data display.