1. What’s the main advantage of these cabinets?

They completely remove the need to manually sign keys in and out. Staff and contractors can easily retrieve their own keys at any time; while you can be confident that their access is restricted to only the keys they’re allowed. Furthermore, every transaction is recorded electronically so you know exactly who took what and when.

2. How many keys can I put in them?

The cabinets are available in 4 standard sizes: 12 keys, 25 keys, 50 keys and 100 keys. Partial populations and custom panels are also available. For example, a double spaced panel is popular with prisons that tend to have large key bunches.

3. Who uses them?

Anyone who is serious about saving time and money! We have lots of happy clients in government/defence, hotels, hospitals, vehicle fleets, universities, building management, small businesses, mining and security.

4. Do I need to rekey my entire building?

A huge advantage of this system is that you can use all of your existing keys, even if they are all different sizes and types. The cabinet will allow you to organise them into functional bunches and secure them into numbered positions.

5. What if I have strange shaped keys?

No problem, we can attach almost anything to our Tamper-Proof Key Rings, and if you are worried about them fitting into the cabinet, we can design a custom panel for you.

6. Can I secure other items like prox cards, personal alarms or remote controllers?

Absolutely, we have many clients who use the cabinets for items other than keys. It is very common for people to bunch together a functional group, such as a vehicle key, a fuel card and a prox card for the garage door. We have a range of accessories to attach to our holder keys, and could even design a custom solution for you.

7. What happens when someone needs to use a key?

The administrator/s use the KeySecure software to define each of the different users and what they are allowed to access. When a user wishes to access a key, they simply “login” to the cabinet and take the required key. Logging in to the cabinet involves presenting a unique identifier, such as a PIN, a prox card or some biometric data.

8. What happens if someone tries to take a key they’re not allowed?

Keys that are not allowed are physically locked in place. They cannot be removed.

9. Can I use my existing prox cards to access the cabinet?

In most cases, yes. When your staff are already carrying an access card with them, the most convenient method is for them to use the same card to login to the cabinet.

10. Can I use biometric information such as a fingerprint?

Absolutely, we have many clients who use fingerprints to access their cabinets. We even use facial recognition sometimes.

11. What happens if a key isn’t returned on time?

Keys can be configured to have timers on them. For example, when a contractor removes a key to access a confined space, it might have a timer on it for 60 minutes. If the key isn’t returned within that time, the software will display an alarm. Each alarm can also be configured to generate an automatic email or SMS.

12. What if I have part-time staff or contractors?

You can control when the keys are available to your users. For example, a part time staff member may only require access between 9am and 5pm on Monday and Wednesday. At all other times access will not be granted. Furthermore, you can also define beginning and ending dates for your staff.

13. Do I need to be there to oversee the keys changing hands?

Absolutely not, that’s the beauty of this system. A staff member doesn’t need to be present to physically hand out keys anymore. This is great when you have after hours contractors arriving.

14. If I take a key, can anyone return it?

It’s up to you. The cabinet can either allow only the user who took the key to return it, or anyone to return. It can be different for every key as well!

15. What if I have some important or risky keys?

There are a few things that our clients do. The most common is to make sure more than one person is at the cabinet to remove that key. In these cases, when a user logs in, the key will light up in orange instead of green and it will still be locked in place. An authorised second user needs to login in order to access that key.

16. What happens if someone does the wrong thing?

There are a range of alerts and alarms to let you know exactly what’s going on. These include: door forced, door left open, key forced, key timer expired, AC power out and more.

17. How do I manage my different users?

All of the users are entered into the software program called KeySecure®. From here, they can each be assigned different access profiles and be members of different groups. You decide exactly what they can access and when. The system will collect all of your reporting data as well which will show you exactly what user signed our which keys and when.

18. Can this system talk to my access control system?

Yes. More and more, people are looking for a comprehensive solution across their access control and building management. We can almost always implement a low-level interface, and also have high-level interfaces with some software programs. We also have an SDK that we can provide if you’d like to develop your own interface.

19. What happens if the power goes down?

Every cabinet has a backup battery that usually lasts between 24 and 36 hours.

20. How does the cabinet communicate?

The cabinet is attached to your computer network and is assigned a static IP address. Alternatively, cabinets without access to a network can communicate via USB.