Key control is traditionally managed from a central location such as a security office or reception area, close to an operation of work. Staff and contractors might sign keys out and then bring them back after use. Typically this can involve manual paper records logging who took what keys and when. Administration can be costly and the process is inefficient. For remote workers this may require excessive travel time.
There is a better way. Flex Vaults secure CyberKeys in the location where they are needed whilst being under the total control of the system administrator. The Vaults can be installed outdoors and in harsh environments.
Each Vault retains one unprogrammed, deactivated key. The key is programmed and activated when the keyholder presents their credentials by RFID card or PIN code.