Emergency Security

Ambulance company boosts security and reduces costs with key management

Based in Milwaukee, Wisconsin, Bell Ambulance Company has been in operation since 1977, growing into the largest provider of ambulance services in the state. The company responds to around 75,000 calls per year and provides a range of services.

To accommodate its vast fleet of ambulances, the company operates 9 remote stations throughout the greater Milwaukee area. Each of these stations is a hive of activity, with ambulances coming and going 24/7, responding to calls around the city. Given the geographical area Bell Ambulance serves, vehicles often return to a different station from where they were dispatched—making the tracking and managing of keys a major challenge.

Another main issue for Bell Ambulance was accountability. Video surveillance and access control systems are installed at each of its stations, but some are located in high-crime areas of Milwaukee.

While the company had deployed a great deal of security measures externally, anyone who managed to breach that security would have free access to keys, which were stored on hooks out in the open. Ambulance drivers based at these stations usually are on the road, leaving stations unoccupied most of the time. This further underscored the need for a way to distribute keys securely without having a person responsible for that task.

The cost of lost keys had also become a pain point for Bell Ambulance. Whereas in the past, replacing a key may have been relatively inexpensive, the secure key fobs used with today’s newer ignition technologies are much more costly, around $300 each. In addition to this cost, when a key goes missing the ambulance’s ignition system must also be reprogrammed to prevent someone from starting and potentially stealing the vehicle.

All of these factors created greater concern for key management, making it clear that the company needed a better solution for securing keys at all of its locations. Bell Ambulance worked with Hoffman Security Solutions to compare products from a number of manufacturers to find the best solution for their needs, but to Bell, it seemed that the perfect solution hadn’t yet been invented. This was indeed the case – sort of.

Having established a strong relationship with Morse Watchmans, Nick Hoffman, co-owner of Hoffman Security Solutions, knew the company was developing a new solution that would be perfect for Bell Ambulance.

“Their biggest hurdle was finding a system that would be flexible and scalable for the capacity of their fleet across all of their stations throughout Milwaukee, but while some of the products we looked at were close, none were quite right,” Hoffman said. “KeyWatcher Touch, which was in the first stage of beta testing at the time, opened the door to make this application feasible and provide exactly what they were looking for.”

Not surprisingly, flexibility was a key feature that made Key- Watcher Touch the right choice. Keys were rotating constantly throughout the system from location to location. Because the Key- Anywhere feature of KeyWatcher Touch addressed this, Hoffman knew he’d found exactly what Bell Ambulance needed. After an extensive and exhaustive process of qualifying KeyWatcher Touch, Bell Ambulance was so confident the solution was perfect for meeting their goals that they were willing to wait and pull the trigger once the solution hit the market. As a result, Bell ended up being one of the earliest adopters of KeyWatcher Touch.

“We were willing to be the first to implement KeyWatcher Touch when it came out and it’s worked out very well,” said Jason Becker, senior systems administrator for Bell Ambulance. “We’ve had the system for about five years and as we’ve outgrown the initial system size, we’ve been able to add stations very easily.

“We really like the KeyAnywhere feature and the automatic reporting and transaction gathering functions. Not having to go out to each of the nine locations to collect reports and other information is a major benefit,” Becker said.

Two of these latest cabinets are equipped with the new secondgeneration CPU, which will be slowly phased into the remaining seven cabinets moving forward. Hoffman recommended the upgrade based on the growing size of Bell Ambulance’s systems, particularly in its busy maintenance department. With all of the company’s ambulances going in and out of the shop for repairs, oil changes, new tires and other services in a relatively short time, the volume and speed of transactions was going beyond the capabilities of KeyWatcher Touch’s first-generation processor.

“Now the system is lightning fast—about four or five times faster than before,” he said.

Because the KeyWatcher Touch system is networked and sends data in real time, Bell Ambulance has been able to integrate it with additional networked systems for more complete reporting.

Networking the systems this way helps Bell Ambulance monitor the safe driving profile of each of their drivers. As each driver checks in and out, they place a road safety fob into a reader in the ambulance, which logs driving habits to ensure safety. The fobs are stored in the KeyWatcher cabinets along with keys, and the system is programmed to prevent a driver from clocking out until both are returned.

“When they go to check out, KeyWatcher Touch pulls up the key use report and will let the employee know that they need to return the key or safety fob to the cabinet,” Becker says. “By making sure keys and fobs remain on the premises, KeyWatcher Touch has had a huge impact on reducing and even eliminating the problems and high costs we were having with lost keys.”

“Bell Ambulance is at the cutting edge of fleet management. They’ve created a cool integration that ties their time and attendance system and road safety fobs into the key management system,” Hoffman said.

This article originally appeared in the February 2017 issue of Security Today.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.