PHOTO: AMAZON

Security Companies Partner with Amazon to Introduce Key

Kwikset and Yale Partner with Amazon Key to let services and couriers into your home.

Amazon has been changing the game for a long time. From one-click purchases to two-day free shipping, the company has evolved in ways no one thought possible, including integrating with home security systems to allow services and couriers inside your door - when you are not home.

Amazon Key was announced on Wednesday as a "In-Home Kit" for those of use who are tired of receiving the "You've got a package!" email only to learn it has been swiped off your front porch. It also markets itself as a way to let "people you trust, like your family, friends, dog walker or house cleaner" into your home without having to leave a key under the mat.

Exclusively for Prime members in "select cities and surrounding areas," Amazon Key works by integrating with smart locks from security companies such as Kwikset and Yale as well as the Amazon Cloud Cam.

In order to use the system, Amazon Prime members will select "free in-home delivery" at checkout and on delivery day, the user will receive a notification in the morning and another just before the delivery arrives at the address.

The courier will always knock first, and then request access. Amazon says it verifies with the delivery driver through an authentication process, turns on Cloud Cam to record, then grants access for the driver to deliver the package just inside the front door.

After the package is in place, the door is locked and a notification is sent to the user to inform them the deed is done. If for whatever reason, you don't want the delivery inside your home, you can "Block Access" up until the delivery time and the couriers will follow standard delivery procedures.

For the security industry, the partnership is huge. While smart homes, locks and DIY cameras are on the rise, this can only help companies like Kwikset and Yale expand their businesses.

"We are excited to provide our smart locks as an integral part of the new Amazon Key program," said Keith Brandon, Divisional Vice President - Residential Access Solutions (RAS) Sales and Marketing for Kwikset. "Clearly, the security that the smart locks deliver will play a critical role in the success of this innovative program, and we are confident that our locks will supply the highest level of security possible.  We view Amazon’s choice of Kwikset as an affirmation of our smart locks’ capabilities.”

For Yale, its all about convenience for the customer.

“We’re thrilled to be a part of this new innovation from Amazon,” said Jason Williams, President, ASSA ABLOY U.S. Residential Group, which includes Yale Residential. “Yale’s years of expertise in security and smart lock technology and the new Amazon Key service will give Prime members peace of mind and provide a new level of convenience.”

 

About the Author

Sydny Shepard is the Executive Editor of Campus Security & Life Safety.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3