For fleet managers, the control and management of your fleet begins with control and management of the keys that start the vehicles. For some, this critical task is left to a very basic – and incredibly low-tech – solution, such as hooks mounted on a pegboard with a notebook for signing vehicle keys in and out.

There are a number of shortcomings with this type of “system,” most notably that employees tend to ignore it altogether. With this type of honor system approach, there is no way to track keys, control who can use which vehicles or know who has a key at any given time. Further, as fleet manager you have no way to know if your mandated key policies are being followed; you are blind to overuse or misuse of certain vehicles, potential liabilities and many other problems.

Automated Key Management Solutions

The unfortunate reality is that many fleet managers aren’t aware of these potential issues until it is too late. The fact that they haven’t had a problem may prevent them from taking action until they are actually faced with an issue. At that point, they will likely be motivated to investigate an automated key control and management system as an alternative to the very basic system they have in place.

Key management solutions offer a number of benefits, including cost savings, which can be achieved using a number of features and functionality to proactively address potential issues in several critical areas while also improving overall operations.

Managing Vehicle Usage

Within every fleet, there are newer or nicer vehicles that become favorites among employees and are therefore constantly in use. Meanwhile, other vehicles sit idle. This dwell time is big problem for fleet managers, with mileage and associated wear and tear piling up on some vehicles while other expensive assets gather dust.

An automated, networked key control system can eliminate this problem. It’s important to note that in fleet management, key control is not actually about the keys themselves; it’s all about the vehicles. With a key control system, certain users can be authorized to use only certain vehicles, such as late-model units, while others can be authorized to use newer units.

Reducing Vehicle Dwell Time

For example, a trucking company recently implemented a key control solution for just this purpose. When a driver logs in, the system checks to see if his or her primary vehicle is available and if so, issues that key. If key isn’t available because the truck’s return has been delayed for one reason or another, the system identifies a similar vehicle based on the user’s profile and authorization and issues the next available key. This ensures that vehicles are properly rotated to reduce dwell time and eliminate excess wear and tear on certain units.

A challenge around vehicle usage is making sure certain specialised vehicles are available when needed
Specialized vehicles could include delivery trucks with lift gates, police cars equipped with riot gear, or limousines with certain seating capacity

Another challenge around vehicle usage is making sure certain specialized vehicles are available when needed. These could be delivery trucks with lift gates, police cars equipped with riot gear, limousines with certain seating capacity and others.

Whether because these vehicles are newer or because drivers aren’t aware of their specialized nature, they are often out in the field when someone needs their specific specialization. This is not only inconvenient, but in the case of a specially equipped police car, it can significantly impact public safety.

Misuse And Misappropriation Of Vehicles

Therefore, being able to control who is able to access the key for these specialized units is a primary concern. Key management systems provide this functionality, as well as the ability for users to request and reserve certain units to ensure it will be available when necessary. By more effectively managing their fleet to ensure mileage and wear and tear are evenly distributed, organizations can also lower their operating costs and grow their bottom line. In some cases, a key control system can make fleet management so efficient that fewer vehicles may be needed because of the increased utilization.

Whether intentional or unintentional, employee misuse and misappropriation of fleet vehicles is another major challenge for fleet managers. It can be tempting for an employee to simply take a vehicle home for the weekend – or longer – rather than signing it in on Friday and back out again on Monday.

Imagine for a moment that someone takes a company car home and uses it as a personal vehicle over the weekend. Should that person be involved in an accident, DUI or other criminal incident, police could seize the vehicle, forcing the company to put a lot of time and energy into getting their property returned.

Automated Networked Key Management

So while this may sound very basic, it’s extremely important for fleet managers to be able to know who has – or had – a unit at any given time, and to know in real time if a particular vehicle is not returned when it is supposed to be. Automated networked key management systems make this possible by issuing an alert if a unit is overdue for return. With these solutions, if something happens to a unit an employee kept over a weekend, the organization will know exactly who should be accountable and can take whatever necessary actions.

Using a key management system ensures that no matter whether your vehicles are being managed by a long-time employee or someone you brought on board last week, policies will be followed correctly.

Liability And Licenses

Ensuring that drivers have valid licenses is crucial for companies because drivers with expired licenses are no longer covered by insurance. So if an unlicensed driver were to gets into an accident, the company would be liable for any damage.

Key management solutions allow fleet managers to input users’ driver’s licence information into the system
Users with expired licences can be locked out of the system to prevent them from checking out a vehicle until they have renewed their license

Key management solutions allow fleet managers to input users’ driver’s license information into the system. When an individual’s expiration date arrives, they can verify that the license has been renewed and update the information. Users with expired licences can be locked out of the system to prevent them from checking out a vehicle until they have renewed their license.

This may seem like a minor feature, but it is extremely important for a fleet manager to manage that data on a daily basis to determine whether a driver is eligible to check out a vehicle. If that has to be done manually, it can be overwhelming, particularly for large fleets. Therefore, having the system perform that task automatically is a major benefit for fleet managers.

Additionally, there are a number of regulations that place caps on how many hours a day truck drivers are permitted to be on the road. With key management solutions, a company can view and track in real time how many hours its drivers have put in each day to ensure compliance with these regulations. These regulations can also be programmed into the system to alert fleet managers if and when a driver exceeds those limits, which can have important legal implications. In these situations, knowing how many hours their drivers are actually logging is critical for fleet managers.

Ensuring that drivers have valid licences is crucial for companies because drivers with expired licences are no longer covered by insurance

Flexibility Of Vehicle Location

Another important function of key management systems is the ability to check out a vehicle key from one location and return it to another. For example, a trucking company may have drivers pick up a vehicle at a central distribution center and drop it off at a remote warehouse for the next driver to use. With a peg-and-notebook system, there is no way for a fleet manager to verify that the key has been returned, but a networked solution will track that automatically. If for some reason the driver forgets to return the key, the system will issue an alert immediately, allowing the fleet manager to proactively ensure that it will be available when needed.

Real-time Vehicle Maintenance

Reporting is another main feature of key management systems, but reports only tell a story after the fact. Where these solutions really shine is by providing real-time notifications that allow for immediate action rather than relying on historical data to determine reaction.

For example, if a driver experiences an issue with the brakes on a vehicle, he or she can use the key management system to report it immediately. The system will notify the fleet manager and remove the vehicle from service for maintenance. Without this feature, the manager might now be aware of the problem until receiving a report. In the meantime, someone else could sign out the vehicle without knowing about the problem, which may have worsened. In these cases, there are few, if any, positive potential outcomes.

Clearly, basic methods of key management do not ensure that fleet vehicles will be properly controlled. Automated solutions, on the other hand, allow fleet managers to control and track vehicle usage to reduce wear and tear while improving accountability and avoiding liability issues. These key management solutions deliver a high level of flexibility and real-time awareness fleet managers need to ensure the most effective and efficient use of their vehicles to streamline operations and, perhaps most importantly, reduce overall costs.

Download PDF version

Author Profile

In case you missed it

Top 10: What Were Security Professionals Reading About In 2017?
Top 10: What Were Security Professionals Reading About In 2017?

Our most popular articles in 2017 reflected changing trends in the U.S. security market, from deep learning to protection of mobile workers, from building automation to robotics. Again in 2017, the most read articles tended to be those that addressed timely and important issues in the security marketplace. In the world of digital publishing, it’s easy to know what content resonates with the market: Our readers tell us with their actions; i.e., where they click.   Let’s look back at the Top 10 most-clicked articles we posted in 2017. They are listed in order here with the author’s name and a brief excerpt.  1. Las Vegas Massacre Demands Reevaluation of Hospitality Sector Security The Oct. 1, 2017, sniper attack from a 32nd-floor room at Mandalay Bay, overlooking 22,000 people attending a country music festival, has been compared to “shooting fish in a barrel.” When the bullets rained down, there was nowhere to hide. The attack came from outside the “perimeter” of the event, so any additional screening of attendees would not have prevented it. There are also implications of the Las Vegas massacre for the hospitality industry. Hotels and resorts such as Mandalay Bay have not generally embraced technologies like the explosives scanners or X-ray machines used at airport terminals, at least not in the United States. 2. Deep Learning Algorithms Broaden the Scope of Video Analytics [Zvika Ashani] Until recently there have been minimal applications of Machine Learning used in video analytics products, largely due to high complexity and high resource usage, which made such products too costly for mainstream deployment. However, the last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning. The recent increased interest in Deep Learning is largely due to the availability of graphical processing units (GPUs). GPUs can efficiently train and run Deep Learning algorithms The last couple of years have seen a tremendous surge in research and advances surrounding a branch of Machine Learning called Deep Learning 3. Home Security Systems: Why You Need to Upgrade From 3G to 4G Technology [Missy Dalby] The current communication method for most home security systems is via CDMA and 3G (GSM) technologies. With the emergence of faster, better, and stronger 4G LTE technology, carriers are migrating away from old technology standards and methods towards new, more efficient ones. As such, the older technology is going dark, and soon. Manufacturers of cellular modules have stopped making them. At the end of 2018 they will stop letting customers add systems utilizing 3G radios to their channels. 4. Diving into AI and Deep Learning at NVIDIA’s San Jose Conference [Larry Anderson] Video analytics applications fall under NVIDIA's “AI City” initiative, which they describe as a combination of "safe cities" (video surveillance, law enforcement, forensics) and "smart cities" (traffic management, retail analytics, resource optimization). Depending on the application, AI City technology must function in the cloud, on premises and/or at the edge. NVIDIA’s new Metropolis initiative offers AI at every system level, from the Jetson TX2 "embedded supercomputer" available at the edge, to on-premises servers (using NVIDIA’s Tesla and Quadro) to cloud systems (using NVIDIA’s DGX). 5. Physical Security Evolves to Protect Mobile Workers [Annie Asrari] With an increasing number of employees traveling and working remotely, the days of a dedicated worker who commutes to and from a single location every day of the week are just about over. Security professionals must take a second look at their policies and procedures for employee safety. To protect employees in this new mobile world, where people, assets and brand reputation threats may face higher than normal levels of safety and security risks, businesses must focus less on securing physical, four-wall perimeters and instead take a global approach to security that focuses on protecting traveling, remote and lone workers. Businesses must take a global approach to security that focuses on protecting traveling, remote and lone workers 6. New Security Technologies Driving Excitement on Busy ISC West Day One [Larry Anderson] ISC West in Las Vegas kicked off April 5 with an expanding focus on new technologies and new applications, including some that go beyond any narrow definition of security. “Technology is disrupting the market and executives are taking our solutions beyond security,” says Moti Shabtai, CEO and President of Qognify. “They are starting with security and quickly moving to other risk and business continuity issues in the organizations. They want a clear return on investment (ROI), which we can deliver if we move from covering a limited island of ‘security’ issues and give them the value of also managing risk, safety, and operations.” 7. Optimizing Building Automation for Good Return on Investment [Minu Youngkin] Smart buildings are on the rise around the world, not only because a growing number of companies are considering their environmental impact, but also because of the dramatic cost savings that can be realized through integration. In every building that has an integrated security and access control system, an opportunity awaits to also integrate the building’s energy use, water use, ventilation and more. The key is to effectively convey the tremendous potential of this new technology to the end user. 8. ISC West 2017: How Will IT and Consumer Electronics Influence the Secuirty Industry? [Fredrik Nilsson] A good way to predict trends [at the upcoming ISC West show] is to look at what’s happening in some larger, adjacent technology industries, such as IT and consumer electronics. Major trends on these fronts are the most likely to influence what new products will be launched in the electronic security industry. Proof in point is H.264, an advanced compression technology ratified in 2003 and adopted as the new standard by the consumer industry a few years later. By 2009, it became the new compression standard for the video surveillance industry as well. Violence will continue to challenge the healthcare sector in the future 9. The Future of Healthcare Security: Violence Response and Emergency Preparedness [Ben Scaglione and David LaRose] Violence will continue to challenge the healthcare sector in the future. Domestic violence, child abuse, behavioral health, drug and alcohol abuse will all continue to challenge hospital staff in the Emergency Department, Women’s Health, and behavioral health areas. The Hazard Vulnerability Assessments (HVA) along with facility wide risk assessments helps in defining risk severity and identifying historical patterns of violence. 10. Robot Revolution: Uncovering the Real Value of Security Robots [Steve Reinharz] The security coverage that a robot offers in the case of a shopping mall can be easily overshadowed by the fact that the machines seem to serve to entertain the population. Instead, security robots can best be utilized for more high-level roles, such as in critical infrastructure sites, corporate campuses and educational facilities, where wide, expansive spaces require continuous protection. In these locales, security can be difficult to achieve, as cost, location and lack of resources make the logistics of deployment difficult.

How To Prepare For Active Shooter Incidents | Infographic
How To Prepare For Active Shooter Incidents | Infographic

This Active Shooter infographic summarises information about trends among active shooter incidents, and outlines how an organization can develop a plan before tragedy occurs, including:   Statistics on the numbers and types of recent active shooter incidents. A profile of common traits among active shooters. How to prepare beforehand, and what to do when the police arrive. How organizational planning ensures maximum preparedness. Pre-attack indicators to look for. Be sure to share this information with coworkers and managers. Awareness is key to preventing active shooter incidents, and to minimising their tragic consequences. When sharing this infographic on your website, please include attribution to  SecurityInformed.com More resources for active shooter preparedness: How hospitals can prepare for active shooter attacks Six steps to survive a mass shooting Technologies to manage emergency lockdowns  How robots can check for active shooters  Background checks to minimise insider threats Gunfire detection technologies for hospitals, retail and office buildings 21 ways to prevent workplace violence in your organisation Non-invasive security strategies for public spaces    

Intelligent Surveillance: AI For Police Body-worn Cameras
Intelligent Surveillance: AI For Police Body-worn Cameras

Working together to develop an intelligent body-worn camera for public safety users, Motorola Solutions and artificial intelligence (AI) company Neurala are demonstrating how AI can be added to everyday devices such as smart phones using existing hardware platforms.  AI software, working at the “edge,” provides the capability to add AI functionality to existing cameras, such as Motorola’s Si500 body-worn camera. An agreement to develop the products follows Motorola’s strategic investment in Neurala in January 2017. “The technology is real, as our prototypes have demonstrated,” says Massimiliano “Max” Versace, Neurala CEO. “The technology will mature dramatically by the end of the year.” A final, marketable product from Motorola might be a year or more away, and the timing will depend on extensive testing in the meantime, he says. The goal is to enable police officers to more efficiently search for objects or persons of interest, such as missing children or suspects. Adapting Hardware For Artificial Intelligence Neurala’s learning capabilities “at the edge” are hardware-agnostic; its software-only focus enables the principles of artificial intelligence to be applied to a variety of hardware platforms, including low-cost platforms used inside smart phones. Typically, cost and the need for speed are limitations that determine what hardware can be leveraged using the software. The goal is to enable police officers to more efficiently search for objects or persons of interest, such as missing children or suspects In the case of the Motorola body-worn camera, AI functionality is being added to existing hardware in the device, which is much like a smart phone encased in the form factor of a body-cam. Today’s smart phones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software adapts existing hardware to transform them into AI devices capable of continuous learning in the field. Finding Missing People In Crowds Neurala and Motorola are promoting the new agreement with a use case of how a policeman’s body-worn camera could help find a missing child in a crowd. A network “pushes” a photo of a missing child to a network of 1,000 body-worn and/or dashboard cameras in the field, which employ AI to search for the child within each camera’s field of view and then provide an alert when a match is found. The cameras operate passively, without involving police officers, in effect automating the process without police officers having to look at every face in a crowd. AI’s contribution is to eliminate the need for humans to do repetitive or boring work, such as look at hours of video footage. Neurala began working in AI 11 years ago, long before the current buzz in the market. In a sense, awareness has caught up with the company, which has been developing its technologies ahead of the curve. “The same technology could be applied to closed circuit cameras to detect other objects,” says Versace. “The Neurala Brain is neural network software that can be trained to find a variety of objects, such as backpacks or vehicles, in the air or on the ground.” AI’s contribution is to eliminate the need for humans to do repetitive or boring work, such as look at hours of video footage   Adding AI To Existing Security Devices Other applications are also being developed. For example, Neurala has applied its technology to help the Lindbergh Foundation fight poaching of elephants and rhinos in southern Africa using video from drones as part of its Air Shepherd Program. Neurala’s software helps human analysts by searching through terabytes of video, including infrared, in real time as the drone is flying, pinpointing animals, vehicles and poachers during the day and at night. Versace expects the first applications of AI on existing products, including cameras and drones, before it is applied to robotics and other new applications. In effect, Neurala provides a “brain plug-in” that can add AI to change an existing solution from a passive sensor to a device that is “active in its thinking,” he adds. AI is here to stay, says Versace. “The market should know that AI has reached a point of no return. Companies that don’t use AI will be left behind. It’s the way to go to amplify your output.” Does Artificial Intelligence Threaten Humans? However, the technology isn’t perfect and shouldn’t be expected to be. “It’s still a growing technology, so you can’t expect 100 percent correct performance, especially if you deploy it in a constrained environment such as a cell phone,” says Versace. “AI can approximate 90 percent of a human’s ability to detect an object, and it’s tireless and can work 24 hours a day. It’s a liberating technology that takes on jobs that are not interesting, such as looking for a backpack on a computer screen.” AI tends to engender anxiety among some, with people like Elon Musk warning of an existential threat of the technology and a coming AI apocalypse. We should all relax, says Versace. “It’s a liberating technology,” he says. “Anyone who talks about AI as dangerous is not an AI expert. The less you know about AI, the more alarmist you are.” He suggests the physical security market should “learn more about it so they won’t be so scared.”