Sharp as a Hawkeye

Enhancing security at the University of Iowa through integrated systems and key management

The security engineering services team at the University of Iowa recently underwent a process that many institutions of higher education face – integrating innovative technology with its existing security system, specifically with key management solutions. Understandably, they were hesitant at first and ran into challenges. Still, when they identified the correct technology to communicate with their existing ecosystem, the immediate results necessitated expanded adoption.

Before shifting to intelligent key cabinets, the school was issuing physical keys directly to employees responsible for maintaining and returning them. This system was susceptible to lost keys, and thus led to some doors being rekeyed. In one department, when employees returned their keys to a central key box, they needed to log when they checked out/returned keys manually.

Facing Some Hurdles
University officials faced hurdles in identifying a key cabinet solution that could integrate seamlessly with their access control system. When an employee was issued an access badge for physical entry to buildings, the same badge could be used with an HID reader on the key cabinets. Eventually, the university found a system that could do so, and they began the transition one department at a time.

That process began with Information Technology Services (ITS), which provides technical support, resources, and services to help everyone at UI work smarter, faster and safer. In addition to facilities keys, ITS also used the intelligent key cabinet for fleet management.

They soon could see who had taken out which key/vehicle and when the key was returned. They also could assign access to specific keys, eliminating unauthorized access to sensitive areas. ITS soon populated the cabinet with nearly 200 different individual keys and key rings and was able to remotely monitor the usage of each one. As a result, the ITS team quickly became advocates of this modern technology.

"They were our best salesmen," said Rick Crow, senior engineering associate within Security Engineering Services at the university. Subsequently, three additional cabinets were purchased, which are being used in several areas around campus, including Facilities Management. Plans are also in place for 16 more cabinets to be ordered for campus housing.

Integrating the System
The best example of the cabinets integrating within UI's system is the ability of administrators to grant or deny access to a user. If an employee is promoted and needs access to additional keys or areas within the university, an administrator can grant that immediately from a remote location. Conversely, if a user is terminated or there is a security threat on campus, an administrator can remove access privileges just as quickly. The access badge an employee uses represents a singular credential leveraged for both building entry and key cabinets, and administrators can grant or remove access to both instantly, thanks to the integration of the cabinets within the system.

As Crow's team continues to identify additional departments throughout the university that could potentially use intelligent key cabinets, he quickly acknowledges the benefits of integrating this technology into their overall access control system. "To secure campus, it is necessary to manage keys responsibly and to do that, you have to know where they are. Now, we know that John Doe has the key instead of questioning where a key has been and for how long."

More than 4,300 doors and thousands of keys are in use throughout the University of Iowa's 1,800-acre campus. Like many universities, those keys represent the cornerstone of operational security.

As such, Crow and his staff took measures to secure each key and key ring properly and integrate those cabinets into their existing system, which has ensured not only safer practices and accountability but also streamlined operations and consolidated assets so that the university can serve the needs of staff and students as efficiently as possible.

This article originally appeared in the September / October 2024 issue of Security Today.

About the Author

Dirk Welch is a Regional Sales Manager for Traka Americas, which is a global leader in electronic key and asset management that operates as part of ASSA ABLOY Global Solutions. Welch has more than six years’ experience with the company and has worked in the security industry since 2008. He focuses primarily on the secondary education industry as part of Traka’s global effort to reimagine how people move throughout their world.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3