Sharp as a Hawkeye

Enhancing security at the University of Iowa through integrated systems and key management

The security engineering services team at the University of Iowa recently underwent a process that many institutions of higher education face – integrating innovative technology with its existing security system, specifically with key management solutions. Understandably, they were hesitant at first and ran into challenges. Still, when they identified the correct technology to communicate with their existing ecosystem, the immediate results necessitated expanded adoption.

Before shifting to intelligent key cabinets, the school was issuing physical keys directly to employees responsible for maintaining and returning them. This system was susceptible to lost keys, and thus led to some doors being rekeyed. In one department, when employees returned their keys to a central key box, they needed to log when they checked out/returned keys manually.

Facing Some Hurdles
University officials faced hurdles in identifying a key cabinet solution that could integrate seamlessly with their access control system. When an employee was issued an access badge for physical entry to buildings, the same badge could be used with an HID reader on the key cabinets. Eventually, the university found a system that could do so, and they began the transition one department at a time.

That process began with Information Technology Services (ITS), which provides technical support, resources, and services to help everyone at UI work smarter, faster and safer. In addition to facilities keys, ITS also used the intelligent key cabinet for fleet management.

They soon could see who had taken out which key/vehicle and when the key was returned. They also could assign access to specific keys, eliminating unauthorized access to sensitive areas. ITS soon populated the cabinet with nearly 200 different individual keys and key rings and was able to remotely monitor the usage of each one. As a result, the ITS team quickly became advocates of this modern technology.

"They were our best salesmen," said Rick Crow, senior engineering associate within Security Engineering Services at the university. Subsequently, three additional cabinets were purchased, which are being used in several areas around campus, including Facilities Management. Plans are also in place for 16 more cabinets to be ordered for campus housing.

Integrating the System
The best example of the cabinets integrating within UI's system is the ability of administrators to grant or deny access to a user. If an employee is promoted and needs access to additional keys or areas within the university, an administrator can grant that immediately from a remote location. Conversely, if a user is terminated or there is a security threat on campus, an administrator can remove access privileges just as quickly. The access badge an employee uses represents a singular credential leveraged for both building entry and key cabinets, and administrators can grant or remove access to both instantly, thanks to the integration of the cabinets within the system.

As Crow's team continues to identify additional departments throughout the university that could potentially use intelligent key cabinets, he quickly acknowledges the benefits of integrating this technology into their overall access control system. "To secure campus, it is necessary to manage keys responsibly and to do that, you have to know where they are. Now, we know that John Doe has the key instead of questioning where a key has been and for how long."

More than 4,300 doors and thousands of keys are in use throughout the University of Iowa's 1,800-acre campus. Like many universities, those keys represent the cornerstone of operational security.

As such, Crow and his staff took measures to secure each key and key ring properly and integrate those cabinets into their existing system, which has ensured not only safer practices and accountability but also streamlined operations and consolidated assets so that the university can serve the needs of staff and students as efficiently as possible.

This article originally appeared in the September / October 2024 issue of Security Today.

About the Author

Dirk Welch is a Regional Sales Manager for Traka Americas, which is a global leader in electronic key and asset management that operates as part of ASSA ABLOY Global Solutions. Welch has more than six years’ experience with the company and has worked in the security industry since 2008. He focuses primarily on the secondary education industry as part of Traka’s global effort to reimagine how people move throughout their world.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3