Liability is greatly reduced with real-time reporting of key activity. Every time a user accesses a key, it is logged and recorded in the system, providing you greater security and peace of mind. This feature is invaluable during investigations of theft, or even for simply tracking employees' key transactions.
Extensive reporting capabilities allow you to easily track all activities related to the key machine. You can request predefined reports (e.g. transaction report, checkout report, overdue key report, access level report) or generate custom reports.
Access levels minimize your exposure to risk by never granting more access than is required for each user. Access levels are customizable to each user, so managers can determine which keys employees are authorized to use.
Unfortunately internal thefts exist due to lack of proper key control. With an electronic key control machine, accountability is enforced from the moment you check out a key. There are also alerts to let you know when a key has been checked out for too long, or if an unauthorized user attempts to access a key.
Remote access allows you and other authorized users to access the software from any PC, which allows you greater flexibility when monitoring the system. You are able to add information to key tags, run and view system reports and add users.
For more information on electronic key control, check out some of our resources.