Intelligent Key and Asset Management for Planes, Trains and Automobiles

Intelligent Key and Asset Management for Planes, Trains and Automobiles

Different transportation industries all face similar yet unique challenges when it comes to protecting on-site assets and their facilities.  These include limiting access to buildings, vehicles and/or pooled assets, ensuring only specified employees are using them appropriately, controlling inventory, limiting damage to employee- or contractor-issued equipment and mitigating risk.Intelligent Key and Asset Management for Planes, Trains and Automobiles

Intelligent key and asset management solutions provide superior process control for companies looking to improve in these areas.  A quality program for transportation facilities would include key and fleet management (dockside vehicles), along with protection of ancillary tools, and other assets like pooled radios and tablets. This could include:

  • Keys for equipment, secure areas and facilities;
  • Controlling data rack keys;
  • Vehicle fleets;
  • Tools and specialist equipment;
  • Radio handsets; and
  • Laptops, PDAs and handheld data terminals.

The Air

If you look at a specific airline, for example, controlling access to airside ground vehicles is critically important towards preventing damage, ensuring accountability and making sure the right people are driving the right vehicles. But, what if it could be taken a step further through automation? What if you could log fuel, mileage and faulty issues with vehicles that would notify the maintenance department and integrate into the existing work order system that could automatically generate an email or work order letting someone know “the windshield wipers need replacing?” How much risk is an airline exposed to with keys left inside of the vehicles out of convenience How much would the life of a fleet be extended if you could issue vehicles based on the lowest mileage, balancing out use and thus extending fleet life?

A proper key management program creates accountability and drives process – the system tracks who has been using keys, when they are in use, and when they are returned, all at a glance. You know if the right people have the keys to the luggage vehicle or whether someone took it for a joy ride.

No company wants to question their employee’s integrity, but the reality is that internal theft and damage affects the transportation industry day in and day out. A strong key management program for assets drives accountability and creates inherit process control. No more chasing keys or assets down. No more issuing master keys to employees that shouldn’t have them out of convenience!

The Use of Radios

Transportation facilities often have lockers that hold assets, like high frequency radios, which can cost $1,000-$1,500 apiece. They could personally issue these assets and find them lying around the facilities, maybe charged, maybe not. Imagine losing 3-4 of those a year across 5-6 different locations. Whether theft or carelessness is the culprit, or damage causes the radio to be inoperable, those are significant losses to your bottom line that add up quickly...and that’s just the ones you know about!

Tracking the radios, knowing when and where they are and who is using them is critical to managing those and other assets effectively. How much time is being lost because employees go back and get a new radio because the one they grabbed at 9 a.m. is dead by 11 a.m.? Do you know how many people someone can chat with in the time it takes to walk across a 100,000 sq. ft. facility? Controlling this process allows you to control your costs.

The Wide-open Seas

If you take cruise ships as an example, the number of sensitive keys that need to be protected is more than you might expect. Beyond protection of costly equipment, additional assets (and even customers), things like food and beverage keys and casino keys can be a financial black hole for organizations if not controlled properly.

A pressing issue for the cruise industry is controlling access to keys and master keys outside normal working hours. Some personnel are given 24-7 access to master keys. This lends itself to potential misuse and enormous risk! Controlling access during off-shift hours is critically important to mitigate these risks for the cruise and other similar industries. A properly designed electronic key management system can control access AND make sure those keys are available quickly in case of an emergency.

Robust, Customizable Solutions

Though the challenges are both similar and unique throughout the transportation industry, robust solutions can be customized to each individual airport, train or bus station, for example. This allows for innovative and tailored solutions that solve real world problems.

When you think of any transportation hub, station or facility, most of which are operating 24 hours a day, and all the personnel working the different areas – on the tarmac, out in the field, inside the terminal, luggage handling – there can be thousands and thousands of employees coming and going, checking in, moving from one section to another, or taking a break. Can we truly expect a supervisor or paper key log to mitigate risks at an appropriate level? This presents significant opportunities for breakdowns in security or processes in loss prevention and risk mitigation.

Some food for thought to plug into any P&L and realize real dollars and cents: On average, the implementation of a properly deployed electronic key or asset management systems results in a 30% reduction in fleet vehicles or assets such as pooled radios. How much is that worth?!

You can’t manage what you can’t measure. A quality solution allows you to manage your business, while it manages your processes, sensitive keys and assets. Don’t let your profits jump on the next plane out.

About the Author

Danny Garrido is president of Traka Americas, a global leader in electronic key and asset management that operates as part of ASSA ABLOY Global Solutions. Garrido has more than 22 years of experience in the security industry, ranging from owning his own security company, to the corporate levels of Brinks and ADT. He oversees the overall vision & direction for the business, including strategic partnerships, operational & commercial competences, expansion into emerging markets, and new business development.

Featured

Featured Cybersecurity

Webinars

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3