Sharp as a Hawkeye

Enhancing security at the University of Iowa through integrated systems and key management

The security engineering services team at the University of Iowa recently underwent a process that many institutions of higher education face – integrating innovative technology with its existing security system, specifically with key management solutions. Understandably, they were hesitant at first and ran into challenges. Still, when they identified the correct technology to communicate with their existing ecosystem, the immediate results necessitated expanded adoption.

Before shifting to intelligent key cabinets, the school was issuing physical keys directly to employees responsible for maintaining and returning them. This system was susceptible to lost keys, and thus led to some doors being rekeyed. In one department, when employees returned their keys to a central key box, they needed to log when they checked out/returned keys manually.

Facing Some Hurdles
University officials faced hurdles in identifying a key cabinet solution that could integrate seamlessly with their access control system. When an employee was issued an access badge for physical entry to buildings, the same badge could be used with an HID reader on the key cabinets. Eventually, the university found a system that could do so, and they began the transition one department at a time.

That process began with Information Technology Services (ITS), which provides technical support, resources, and services to help everyone at UI work smarter, faster and safer. In addition to facilities keys, ITS also used the intelligent key cabinet for fleet management.

They soon could see who had taken out which key/vehicle and when the key was returned. They also could assign access to specific keys, eliminating unauthorized access to sensitive areas. ITS soon populated the cabinet with nearly 200 different individual keys and key rings and was able to remotely monitor the usage of each one. As a result, the ITS team quickly became advocates of this modern technology.

"They were our best salesmen," said Rick Crow, senior engineering associate within Security Engineering Services at the university. Subsequently, three additional cabinets were purchased, which are being used in several areas around campus, including Facilities Management. Plans are also in place for 16 more cabinets to be ordered for campus housing.

Integrating the System
The best example of the cabinets integrating within UI's system is the ability of administrators to grant or deny access to a user. If an employee is promoted and needs access to additional keys or areas within the university, an administrator can grant that immediately from a remote location. Conversely, if a user is terminated or there is a security threat on campus, an administrator can remove access privileges just as quickly. The access badge an employee uses represents a singular credential leveraged for both building entry and key cabinets, and administrators can grant or remove access to both instantly, thanks to the integration of the cabinets within the system.

As Crow's team continues to identify additional departments throughout the university that could potentially use intelligent key cabinets, he quickly acknowledges the benefits of integrating this technology into their overall access control system. "To secure campus, it is necessary to manage keys responsibly and to do that, you have to know where they are. Now, we know that John Doe has the key instead of questioning where a key has been and for how long."

More than 4,300 doors and thousands of keys are in use throughout the University of Iowa's 1,800-acre campus. Like many universities, those keys represent the cornerstone of operational security.

As such, Crow and his staff took measures to secure each key and key ring properly and integrate those cabinets into their existing system, which has ensured not only safer practices and accountability but also streamlined operations and consolidated assets so that the university can serve the needs of staff and students as efficiently as possible.

This article originally appeared in the September / October 2024 issue of Security Today.

About the Author

Dirk Welch is a Regional Sales Manager for Traka Americas, which is a global leader in electronic key and asset management that operates as part of ASSA ABLOY Global Solutions. Welch has more than six years’ experience with the company and has worked in the security industry since 2008. He focuses primarily on the secondary education industry as part of Traka’s global effort to reimagine how people move throughout their world.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.