Intelligent Key and Asset Management for Planes, Trains and Automobiles

Intelligent Key and Asset Management for Planes, Trains and Automobiles

Different transportation industries all face similar yet unique challenges when it comes to protecting on-site assets and their facilities.  These include limiting access to buildings, vehicles and/or pooled assets, ensuring only specified employees are using them appropriately, controlling inventory, limiting damage to employee- or contractor-issued equipment and mitigating risk.Intelligent Key and Asset Management for Planes, Trains and Automobiles

Intelligent key and asset management solutions provide superior process control for companies looking to improve in these areas.  A quality program for transportation facilities would include key and fleet management (dockside vehicles), along with protection of ancillary tools, and other assets like pooled radios and tablets. This could include:

  • Keys for equipment, secure areas and facilities;
  • Controlling data rack keys;
  • Vehicle fleets;
  • Tools and specialist equipment;
  • Radio handsets; and
  • Laptops, PDAs and handheld data terminals.

The Air

If you look at a specific airline, for example, controlling access to airside ground vehicles is critically important towards preventing damage, ensuring accountability and making sure the right people are driving the right vehicles. But, what if it could be taken a step further through automation? What if you could log fuel, mileage and faulty issues with vehicles that would notify the maintenance department and integrate into the existing work order system that could automatically generate an email or work order letting someone know “the windshield wipers need replacing?” How much risk is an airline exposed to with keys left inside of the vehicles out of convenience How much would the life of a fleet be extended if you could issue vehicles based on the lowest mileage, balancing out use and thus extending fleet life?

A proper key management program creates accountability and drives process – the system tracks who has been using keys, when they are in use, and when they are returned, all at a glance. You know if the right people have the keys to the luggage vehicle or whether someone took it for a joy ride.

No company wants to question their employee’s integrity, but the reality is that internal theft and damage affects the transportation industry day in and day out. A strong key management program for assets drives accountability and creates inherit process control. No more chasing keys or assets down. No more issuing master keys to employees that shouldn’t have them out of convenience!

The Use of Radios

Transportation facilities often have lockers that hold assets, like high frequency radios, which can cost $1,000-$1,500 apiece. They could personally issue these assets and find them lying around the facilities, maybe charged, maybe not. Imagine losing 3-4 of those a year across 5-6 different locations. Whether theft or carelessness is the culprit, or damage causes the radio to be inoperable, those are significant losses to your bottom line that add up quickly...and that’s just the ones you know about!

Tracking the radios, knowing when and where they are and who is using them is critical to managing those and other assets effectively. How much time is being lost because employees go back and get a new radio because the one they grabbed at 9 a.m. is dead by 11 a.m.? Do you know how many people someone can chat with in the time it takes to walk across a 100,000 sq. ft. facility? Controlling this process allows you to control your costs.

The Wide-open Seas

If you take cruise ships as an example, the number of sensitive keys that need to be protected is more than you might expect. Beyond protection of costly equipment, additional assets (and even customers), things like food and beverage keys and casino keys can be a financial black hole for organizations if not controlled properly.

A pressing issue for the cruise industry is controlling access to keys and master keys outside normal working hours. Some personnel are given 24-7 access to master keys. This lends itself to potential misuse and enormous risk! Controlling access during off-shift hours is critically important to mitigate these risks for the cruise and other similar industries. A properly designed electronic key management system can control access AND make sure those keys are available quickly in case of an emergency.

Robust, Customizable Solutions

Though the challenges are both similar and unique throughout the transportation industry, robust solutions can be customized to each individual airport, train or bus station, for example. This allows for innovative and tailored solutions that solve real world problems.

When you think of any transportation hub, station or facility, most of which are operating 24 hours a day, and all the personnel working the different areas – on the tarmac, out in the field, inside the terminal, luggage handling – there can be thousands and thousands of employees coming and going, checking in, moving from one section to another, or taking a break. Can we truly expect a supervisor or paper key log to mitigate risks at an appropriate level? This presents significant opportunities for breakdowns in security or processes in loss prevention and risk mitigation.

Some food for thought to plug into any P&L and realize real dollars and cents: On average, the implementation of a properly deployed electronic key or asset management systems results in a 30% reduction in fleet vehicles or assets such as pooled radios. How much is that worth?!

You can’t manage what you can’t measure. A quality solution allows you to manage your business, while it manages your processes, sensitive keys and assets. Don’t let your profits jump on the next plane out.

About the Author

Danny Garrido is president of Traka Americas, a global leader in electronic key and asset management that operates as part of ASSA ABLOY Global Solutions. Garrido has more than 22 years of experience in the security industry, ranging from owning his own security company, to the corporate levels of Brinks and ADT. He oversees the overall vision & direction for the business, including strategic partnerships, operational & commercial competences, expansion into emerging markets, and new business development.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3