Sharp as a Hawkeye

Enhancing security at the University of Iowa through integrated systems and key management

The security engineering services team at the University of Iowa recently underwent a process that many institutions of higher education face – integrating innovative technology with its existing security system, specifically with key management solutions. Understandably, they were hesitant at first and ran into challenges. Still, when they identified the correct technology to communicate with their existing ecosystem, the immediate results necessitated expanded adoption.

Before shifting to intelligent key cabinets, the school was issuing physical keys directly to employees responsible for maintaining and returning them. This system was susceptible to lost keys, and thus led to some doors being rekeyed. In one department, when employees returned their keys to a central key box, they needed to log when they checked out/returned keys manually.

Facing Some Hurdles
University officials faced hurdles in identifying a key cabinet solution that could integrate seamlessly with their access control system. When an employee was issued an access badge for physical entry to buildings, the same badge could be used with an HID reader on the key cabinets. Eventually, the university found a system that could do so, and they began the transition one department at a time.

That process began with Information Technology Services (ITS), which provides technical support, resources, and services to help everyone at UI work smarter, faster and safer. In addition to facilities keys, ITS also used the intelligent key cabinet for fleet management.

They soon could see who had taken out which key/vehicle and when the key was returned. They also could assign access to specific keys, eliminating unauthorized access to sensitive areas. ITS soon populated the cabinet with nearly 200 different individual keys and key rings and was able to remotely monitor the usage of each one. As a result, the ITS team quickly became advocates of this modern technology.

"They were our best salesmen," said Rick Crow, senior engineering associate within Security Engineering Services at the university. Subsequently, three additional cabinets were purchased, which are being used in several areas around campus, including Facilities Management. Plans are also in place for 16 more cabinets to be ordered for campus housing.

Integrating the System
The best example of the cabinets integrating within UI's system is the ability of administrators to grant or deny access to a user. If an employee is promoted and needs access to additional keys or areas within the university, an administrator can grant that immediately from a remote location. Conversely, if a user is terminated or there is a security threat on campus, an administrator can remove access privileges just as quickly. The access badge an employee uses represents a singular credential leveraged for both building entry and key cabinets, and administrators can grant or remove access to both instantly, thanks to the integration of the cabinets within the system.

As Crow's team continues to identify additional departments throughout the university that could potentially use intelligent key cabinets, he quickly acknowledges the benefits of integrating this technology into their overall access control system. "To secure campus, it is necessary to manage keys responsibly and to do that, you have to know where they are. Now, we know that John Doe has the key instead of questioning where a key has been and for how long."

More than 4,300 doors and thousands of keys are in use throughout the University of Iowa's 1,800-acre campus. Like many universities, those keys represent the cornerstone of operational security.

As such, Crow and his staff took measures to secure each key and key ring properly and integrate those cabinets into their existing system, which has ensured not only safer practices and accountability but also streamlined operations and consolidated assets so that the university can serve the needs of staff and students as efficiently as possible.

This article originally appeared in the September / October 2024 issue of Security Today.

About the Author

Dirk Welch is a Regional Sales Manager for Traka Americas, which is a global leader in electronic key and asset management that operates as part of ASSA ABLOY Global Solutions. Welch has more than six years’ experience with the company and has worked in the security industry since 2008. He focuses primarily on the secondary education industry as part of Traka’s global effort to reimagine how people move throughout their world.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities