Sharp as a Hawkeye

Enhancing security at the University of Iowa through integrated systems and key management

The security engineering services team at the University of Iowa recently underwent a process that many institutions of higher education face – integrating innovative technology with its existing security system, specifically with key management solutions. Understandably, they were hesitant at first and ran into challenges. Still, when they identified the correct technology to communicate with their existing ecosystem, the immediate results necessitated expanded adoption.

Before shifting to intelligent key cabinets, the school was issuing physical keys directly to employees responsible for maintaining and returning them. This system was susceptible to lost keys, and thus led to some doors being rekeyed. In one department, when employees returned their keys to a central key box, they needed to log when they checked out/returned keys manually.

Facing Some Hurdles
University officials faced hurdles in identifying a key cabinet solution that could integrate seamlessly with their access control system. When an employee was issued an access badge for physical entry to buildings, the same badge could be used with an HID reader on the key cabinets. Eventually, the university found a system that could do so, and they began the transition one department at a time.

That process began with Information Technology Services (ITS), which provides technical support, resources, and services to help everyone at UI work smarter, faster and safer. In addition to facilities keys, ITS also used the intelligent key cabinet for fleet management.

They soon could see who had taken out which key/vehicle and when the key was returned. They also could assign access to specific keys, eliminating unauthorized access to sensitive areas. ITS soon populated the cabinet with nearly 200 different individual keys and key rings and was able to remotely monitor the usage of each one. As a result, the ITS team quickly became advocates of this modern technology.

"They were our best salesmen," said Rick Crow, senior engineering associate within Security Engineering Services at the university. Subsequently, three additional cabinets were purchased, which are being used in several areas around campus, including Facilities Management. Plans are also in place for 16 more cabinets to be ordered for campus housing.

Integrating the System
The best example of the cabinets integrating within UI's system is the ability of administrators to grant or deny access to a user. If an employee is promoted and needs access to additional keys or areas within the university, an administrator can grant that immediately from a remote location. Conversely, if a user is terminated or there is a security threat on campus, an administrator can remove access privileges just as quickly. The access badge an employee uses represents a singular credential leveraged for both building entry and key cabinets, and administrators can grant or remove access to both instantly, thanks to the integration of the cabinets within the system.

As Crow's team continues to identify additional departments throughout the university that could potentially use intelligent key cabinets, he quickly acknowledges the benefits of integrating this technology into their overall access control system. "To secure campus, it is necessary to manage keys responsibly and to do that, you have to know where they are. Now, we know that John Doe has the key instead of questioning where a key has been and for how long."

More than 4,300 doors and thousands of keys are in use throughout the University of Iowa's 1,800-acre campus. Like many universities, those keys represent the cornerstone of operational security.

As such, Crow and his staff took measures to secure each key and key ring properly and integrate those cabinets into their existing system, which has ensured not only safer practices and accountability but also streamlined operations and consolidated assets so that the university can serve the needs of staff and students as efficiently as possible.

This article originally appeared in the September / October 2024 issue of Security Today.

About the Author

Dirk Welch is a Regional Sales Manager for Traka Americas, which is a global leader in electronic key and asset management that operates as part of ASSA ABLOY Global Solutions. Welch has more than six years’ experience with the company and has worked in the security industry since 2008. He focuses primarily on the secondary education industry as part of Traka’s global effort to reimagine how people move throughout their world.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3