Easy to copy Unauthorized copies of keys are quite common and pretty easy to do. But as long as you are using traditional locks and keys to secure your premise(s), the area is vulnerable to theft and break-ins. And there is no way to know how many unauthorized copies have been made - or who are holding them. |
Changing locks is compulsory when keys are lost By using traditional key, you have to change the locks every time you lost a key because the only way to f_14 Graytain security is to change all the locks that it can access. Losing a key might not be as impactful as losing an entire ring of keys. Replacing multiple locks are not only cumbersome, it’s also costly and pose security risks at the affected premises because when a key is lost, you have to assume the worst-case scenario. |
Heavy key rings is a burden With traditional keys, you almost always end up carrying large, heavy key rings to access multiple sites. If you lose a full ring of keys, the cost to change the locks can quickly become astronomic |
Forgetting a Key is a Major Hassle Every time an employee forgets to take relevant keys on his duty roll, time and expense become doubles. The same situation can occur if an employee picks up the wrong key, as large organizations will have many similar looking keys |
There’s no way to log or keys Physical keys make it impossible to log entries to any sites. It all depends on trust and manual check in log by the responsible party. |
There’s no user-level and time restriction in keys Keys always work, even when it’s not supposed to like at 4a.m. on a Sunday but nothing can be done about it because there’s no user-level and time restriction can be imposed on keys. |
Remote access is not possible with physical locks If an unexpected event comes up and you want to allow access to a site immediately, you can’t if you use traditional, physical locks. |
Difficult to Duplicate It’s a known fact that physical keys can be copied very easily; however duplicating electronic keys needs a certain sets of skills and sophistication, which the average Joe couldn’t do. Therefore, electronic access system is proven to improve security than the conventional locks and keys. |
Changing locks is the last thing you should do. You never have to change locks at your sites when using an electronic user database. If a keycard is ever lost, it can be immediately removed from the database and a new one can be issued. If an employee leaves your company, his or her access rights can be deleted within seconds. This greatly lowers your overall exposure to risk. |
You Only Have to Remember One Key With electronic access, your single key or access code grants you access to every door you need to access, so there’s no chance of forgetting the key for a particular door. If you get to a site where you need access and you are not recognized by the system, a network operator can add you or your supervisor to the list instantly. |
Electronic Keys Reduce Travel and Repair Time If an employee needs additional access to handle an emergency in the field, his or her access rights can be updated immediately. Manipulating user database, the personnel is not requiring to pick up a key so he can travel straight to the emergency site(s). |
Complete History Logging With an electronic access system, every entry to your sites is logged for later review. This can be an invaluable tool when investigating vandalism or theft, or for tracking response times or technical activities internally. In break-in cases, you can set electronic access control system to notify you if doors are propped open illegally. Hence, action can easily be sent to remedy the situation. |
Electronic Access Control is Completely Customizable for Every User Electronic access control gives you the ability to set user-level access rights all the way down to individual doors and times. This minimizes your exposure to risk by granting no more site access than is necessary. |
Electronic Locks Permit Remote Access If a tech or outside contractor needs access to a locked site, you can open that door remotely from your central terminal. This gives you an extra degree of flexibility while making sure that you know about entries into your sites. |