Emergency Security

Ambulance company boosts security and reduces costs with key management

Based in Milwaukee, Wisconsin, Bell Ambulance Company has been in operation since 1977, growing into the largest provider of ambulance services in the state. The company responds to around 75,000 calls per year and provides a range of services.

To accommodate its vast fleet of ambulances, the company operates 9 remote stations throughout the greater Milwaukee area. Each of these stations is a hive of activity, with ambulances coming and going 24/7, responding to calls around the city. Given the geographical area Bell Ambulance serves, vehicles often return to a different station from where they were dispatched—making the tracking and managing of keys a major challenge.

Another main issue for Bell Ambulance was accountability. Video surveillance and access control systems are installed at each of its stations, but some are located in high-crime areas of Milwaukee.

While the company had deployed a great deal of security measures externally, anyone who managed to breach that security would have free access to keys, which were stored on hooks out in the open. Ambulance drivers based at these stations usually are on the road, leaving stations unoccupied most of the time. This further underscored the need for a way to distribute keys securely without having a person responsible for that task.

The cost of lost keys had also become a pain point for Bell Ambulance. Whereas in the past, replacing a key may have been relatively inexpensive, the secure key fobs used with today’s newer ignition technologies are much more costly, around $300 each. In addition to this cost, when a key goes missing the ambulance’s ignition system must also be reprogrammed to prevent someone from starting and potentially stealing the vehicle.

All of these factors created greater concern for key management, making it clear that the company needed a better solution for securing keys at all of its locations. Bell Ambulance worked with Hoffman Security Solutions to compare products from a number of manufacturers to find the best solution for their needs, but to Bell, it seemed that the perfect solution hadn’t yet been invented. This was indeed the case – sort of.

Having established a strong relationship with Morse Watchmans, Nick Hoffman, co-owner of Hoffman Security Solutions, knew the company was developing a new solution that would be perfect for Bell Ambulance.

“Their biggest hurdle was finding a system that would be flexible and scalable for the capacity of their fleet across all of their stations throughout Milwaukee, but while some of the products we looked at were close, none were quite right,” Hoffman said. “KeyWatcher Touch, which was in the first stage of beta testing at the time, opened the door to make this application feasible and provide exactly what they were looking for.”

Not surprisingly, flexibility was a key feature that made Key- Watcher Touch the right choice. Keys were rotating constantly throughout the system from location to location. Because the Key- Anywhere feature of KeyWatcher Touch addressed this, Hoffman knew he’d found exactly what Bell Ambulance needed. After an extensive and exhaustive process of qualifying KeyWatcher Touch, Bell Ambulance was so confident the solution was perfect for meeting their goals that they were willing to wait and pull the trigger once the solution hit the market. As a result, Bell ended up being one of the earliest adopters of KeyWatcher Touch.

“We were willing to be the first to implement KeyWatcher Touch when it came out and it’s worked out very well,” said Jason Becker, senior systems administrator for Bell Ambulance. “We’ve had the system for about five years and as we’ve outgrown the initial system size, we’ve been able to add stations very easily.

“We really like the KeyAnywhere feature and the automatic reporting and transaction gathering functions. Not having to go out to each of the nine locations to collect reports and other information is a major benefit,” Becker said.

Two of these latest cabinets are equipped with the new secondgeneration CPU, which will be slowly phased into the remaining seven cabinets moving forward. Hoffman recommended the upgrade based on the growing size of Bell Ambulance’s systems, particularly in its busy maintenance department. With all of the company’s ambulances going in and out of the shop for repairs, oil changes, new tires and other services in a relatively short time, the volume and speed of transactions was going beyond the capabilities of KeyWatcher Touch’s first-generation processor.

“Now the system is lightning fast—about four or five times faster than before,” he said.

Because the KeyWatcher Touch system is networked and sends data in real time, Bell Ambulance has been able to integrate it with additional networked systems for more complete reporting.

Networking the systems this way helps Bell Ambulance monitor the safe driving profile of each of their drivers. As each driver checks in and out, they place a road safety fob into a reader in the ambulance, which logs driving habits to ensure safety. The fobs are stored in the KeyWatcher cabinets along with keys, and the system is programmed to prevent a driver from clocking out until both are returned.

“When they go to check out, KeyWatcher Touch pulls up the key use report and will let the employee know that they need to return the key or safety fob to the cabinet,” Becker says. “By making sure keys and fobs remain on the premises, KeyWatcher Touch has had a huge impact on reducing and even eliminating the problems and high costs we were having with lost keys.”

“Bell Ambulance is at the cutting edge of fleet management. They’ve created a cool integration that ties their time and attendance system and road safety fobs into the key management system,” Hoffman said.

This article originally appeared in the February 2017 issue of Security Today.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.