Key Management Takes Flight in Tallahassee

In 2017, after attending a national security conference, Thomas Vergo returned to his Tallahassee International Airport (TLH) office with a profound idea. Placing a significant item on both his boss's and director's desks, he sought to revolutionize their approach to access control.

Little did they anticipate the pivotal role this seemingly innocuous item would play in their everyday operations for years to come.

Sprawling across more than 2,400 acres, the Tallahassee International Airport, in northwest Florida serves nearly 1 million passengers annually. Beyond its impressive terminal lies a sprawling campus, housing an array of structures-from an air traffic control tower and cargo hangars to maintenance facilities and a fire station.

Managing access across this diverse collection of buildings calls for an all-encompassing and streamlined approach to key management. Enter the key fob that Vergo strategically placed on the desktops of his executives — an embodiment of comprehensive and efficient access control solutions.

Emerging as a cornerstone of Vergo's vision for enhanced operational efficiency, the fob served as a crucial component of his consideration for a cutting-edge key management system. Upon arriving at TLH in 2014, he discovered the workflow for key management involved using an archaic paper-based, log-book method to tracking physical key usage. Not only was this a cumbersome task, but hunting down lost keys regularly befell managers. Additionally, manually checking out restricted keys proved to be a time-consuming affair, particularly when managers were busy with more pressing matters across the airport.

Less than a year after it was first introduced by Vergo to his executives, TLH purchased its first system in 2018, paving the way for the realization of reduced employee downtime and lower production costs.

Since purchasing their key management system, TLH has experienced a clear difference in operational efficiency. One of the first things noticed was the reduction of master keys as they realized fewer masters and grand masters were needed when they were managed and stored in central location.

Additionally, if a crew member needed multiple keys throughout a shift, he or she could check out a duty ring with multiple keys attached to a single fob. This method consolidated where keys were stored and reduced the liability of stolen, duplicated or misplaced masters.

With a keen eye for optimization, Vergo has harnessed the power of auditing and monitoring through the strategic implementation of a cutting-edge key management system. By acquiring a comprehensive solution, he now enjoys a bird's-eye view of who has checked out which key and precisely when.

Leveraging this technology, Vergo effectively imposes access restrictions, curfews and alerts, enabling him to swiftly address any key-related anomalies. As a result, not only does he relish the peace of mind that comes from an organized key tracking system, but he also possesses invaluable resources to ensure compliance with stringent industry regulations. Indeed, in the event of any misconduct or mishap, Vergo possesses a crystal-clear audit trail, illuminating the key's journey with utmost clarity.

In a testament to the system's remarkable scalability, Vergo has unearthed yet another advantage of his key management solution. By initially acquiring two strategically positioned key cabinets across airport's expansive campus, he ensured optimal efficiency and heightened security. Recognizing the high demand at these pivotal touchpoints, Vergo's vision on improved security now paves the way for further expansion.

With an eye towards streamlining access to outdoor equipment and tools, he is considering the addition of another cabinet in the external maintenance building. This future-forward approach not only bolsters operational fluidity but also vividly illustrates the system's adaptability, empowering the airport to meet evolving demands with absolute ease.

The airport is gearing up for seven major projects and a new international processing facility, which will expand the Passenger Terminal Building another 40,000 sq feet. As construction ramps up, the airport's key management system is continuing to prove its value. With numerous contractors needing access to secure areas, Vergo and his team efficiently monitor key usage thanks to their streamlined system.

For TLH, gone are the days of creating new keys for each crew, as the comprehensive solution is now in place. Despite the wear and tear on the keys from frequent use, the airport's operations remain unaffected, a demonstration to the system's resilience.

“Since purchasing the cabinets, we haven’t had to replace a single fob,” Vergo said. “Some keys have been run over by equipment or dropped off a jet bridge, but we’ve never had a failure of the key fobs.”

Tallahassee’s airport serves as a reminder of the multifaceted layers of access control within an airport's operational environment. From the terminal to the farthest reaches of its ever-growing infrastructure, operations managers bear the weighty responsibility of maintaining a comprehensive view of all circulating keys and the areas they access, swiftly resolving any instances of loss or misplacement.

With their implementation of a robust key management system, Vergo and his team have not only risen to this challenge of reducing costs and improving processes but have also bolstered the airport's security

This article originally appeared in the March / April 2024 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3