Intelligent Key and Asset Management for Planes, Trains and Automobiles

Intelligent Key and Asset Management for Planes, Trains and Automobiles

Different transportation industries all face similar yet unique challenges when it comes to protecting on-site assets and their facilities.  These include limiting access to buildings, vehicles and/or pooled assets, ensuring only specified employees are using them appropriately, controlling inventory, limiting damage to employee- or contractor-issued equipment and mitigating risk.Intelligent Key and Asset Management for Planes, Trains and Automobiles

Intelligent key and asset management solutions provide superior process control for companies looking to improve in these areas.  A quality program for transportation facilities would include key and fleet management (dockside vehicles), along with protection of ancillary tools, and other assets like pooled radios and tablets. This could include:

  • Keys for equipment, secure areas and facilities;
  • Controlling data rack keys;
  • Vehicle fleets;
  • Tools and specialist equipment;
  • Radio handsets; and
  • Laptops, PDAs and handheld data terminals.

The Air

If you look at a specific airline, for example, controlling access to airside ground vehicles is critically important towards preventing damage, ensuring accountability and making sure the right people are driving the right vehicles. But, what if it could be taken a step further through automation? What if you could log fuel, mileage and faulty issues with vehicles that would notify the maintenance department and integrate into the existing work order system that could automatically generate an email or work order letting someone know “the windshield wipers need replacing?” How much risk is an airline exposed to with keys left inside of the vehicles out of convenience How much would the life of a fleet be extended if you could issue vehicles based on the lowest mileage, balancing out use and thus extending fleet life?

A proper key management program creates accountability and drives process – the system tracks who has been using keys, when they are in use, and when they are returned, all at a glance. You know if the right people have the keys to the luggage vehicle or whether someone took it for a joy ride.

No company wants to question their employee’s integrity, but the reality is that internal theft and damage affects the transportation industry day in and day out. A strong key management program for assets drives accountability and creates inherit process control. No more chasing keys or assets down. No more issuing master keys to employees that shouldn’t have them out of convenience!

The Use of Radios

Transportation facilities often have lockers that hold assets, like high frequency radios, which can cost $1,000-$1,500 apiece. They could personally issue these assets and find them lying around the facilities, maybe charged, maybe not. Imagine losing 3-4 of those a year across 5-6 different locations. Whether theft or carelessness is the culprit, or damage causes the radio to be inoperable, those are significant losses to your bottom line that add up quickly...and that’s just the ones you know about!

Tracking the radios, knowing when and where they are and who is using them is critical to managing those and other assets effectively. How much time is being lost because employees go back and get a new radio because the one they grabbed at 9 a.m. is dead by 11 a.m.? Do you know how many people someone can chat with in the time it takes to walk across a 100,000 sq. ft. facility? Controlling this process allows you to control your costs.

The Wide-open Seas

If you take cruise ships as an example, the number of sensitive keys that need to be protected is more than you might expect. Beyond protection of costly equipment, additional assets (and even customers), things like food and beverage keys and casino keys can be a financial black hole for organizations if not controlled properly.

A pressing issue for the cruise industry is controlling access to keys and master keys outside normal working hours. Some personnel are given 24-7 access to master keys. This lends itself to potential misuse and enormous risk! Controlling access during off-shift hours is critically important to mitigate these risks for the cruise and other similar industries. A properly designed electronic key management system can control access AND make sure those keys are available quickly in case of an emergency.

Robust, Customizable Solutions

Though the challenges are both similar and unique throughout the transportation industry, robust solutions can be customized to each individual airport, train or bus station, for example. This allows for innovative and tailored solutions that solve real world problems.

When you think of any transportation hub, station or facility, most of which are operating 24 hours a day, and all the personnel working the different areas – on the tarmac, out in the field, inside the terminal, luggage handling – there can be thousands and thousands of employees coming and going, checking in, moving from one section to another, or taking a break. Can we truly expect a supervisor or paper key log to mitigate risks at an appropriate level? This presents significant opportunities for breakdowns in security or processes in loss prevention and risk mitigation.

Some food for thought to plug into any P&L and realize real dollars and cents: On average, the implementation of a properly deployed electronic key or asset management systems results in a 30% reduction in fleet vehicles or assets such as pooled radios. How much is that worth?!

You can’t manage what you can’t measure. A quality solution allows you to manage your business, while it manages your processes, sensitive keys and assets. Don’t let your profits jump on the next plane out.

About the Author

Danny Garrido is president of Traka Americas, a global leader in electronic key and asset management that operates as part of ASSA ABLOY Global Solutions. Garrido has more than 22 years of experience in the security industry, ranging from owning his own security company, to the corporate levels of Brinks and ADT. He oversees the overall vision & direction for the business, including strategic partnerships, operational & commercial competences, expansion into emerging markets, and new business development.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3