Save time and money in hospitality with effective key management
In the hospitality industry, key management is something you need to do right for everything to run smoothly. How can CIC Technology’s key cabinets help?
In the hospitality industry, key management is something you need to do right for everything to run smoothly. How can CIC Technology’s key cabinets help?
Casinos and gaming venues place a particularly high emphasis on security, especially when it comes to keys. How can electronic key management help?
The Siemens SiPass integration provides two-way data exchange between SiPass and the KeySecure software of the C.Q.R.iT Electronic Key Management System.
Nominated Cardholders and Badges are automatically replicated to KeySecure.
Nominated Transaction Log Events from KeySecure are automatically transferred to SiPass.
The integration Transaction log events from KeySecure® are automatically transferred to SiPass.
INTEGRATION SPEC:
KeySecure v1.3.5.2 is the latest version and is compatible with SiPass.
This integration can be provided exclusively through HILLS. Contact them for more information.
We also offer Key Shields to protect your keys from the eyes of those trusted insiders who may wish to create unauthorized copies of the keys. The product is used in conjunction with a Tamper-Proof Key Ring and hides the cut of any keys hanging in the cabinet.Key Shield
The Lenel OnGaurd sofware integration provides two-way data exchange between OnGuard and the KeySecure software. Nominated Cardholders and Badges from OnGuard are automatically replicated to KeySecure and sync’d with the CQRiT cabinets. Nominated Transaction Log Events from KeySecure are automatically transferred to OnGuard.
Benefits provided include:
Cardholders, including card number and access levels, are automatically imported from Gallagher Command Centre into KeySecure® and the C.Q.R.iT® cabinets.
Cardholders can inherit access based on their Access Group membership and instantly gain access to allocated Keys stored in the key cabinets. All transaction log data including alarms from the keys cabinets are sent back to Gallagher Command Centre to provide a centralised reporting facility and eliminate the need for staff to monitor separate systems.
The interface can also be configured to employ Gallagher Command Centre Anti-Tailgating features to prevent Cardholders from exiting the facility if they have not yet returned their keys to the relevant cabinet. This function can also be used to prevent people entering areas if they don’t have the right equipment.
INTEGRATION SPEC:
As of November 2017, the latest version of KeySecure® is v1.3.5.2 and it is compatible with Gallagher Command Centre v7.01 to v7.80.
The Integriti System – C.Q.R.iT integration boasts an IP-based and bi-directional high-level interface providing two main functions: User synchronisation and Alarm/Event management.
User information within Integriti can be synchronised with CQRiT cabinets to facilitate ease of administration and mitigate against data entry inconsistencies.
Alarms and events can be sent from CQRiT cabinets into Integriti to leverage Integriti’s powerful alarm management and reporting capabilities.
INTEGRATION SPEC:
The Integriti CQRiT key cabinet plugin was built and tested against version 1.3.4.4 of the KeySecure software and version 1.0.0.8 of the CQReXchange software.
Integriti Professional version 4.0.3 or later and the “KeyLocker Integration” license (part number 996934) are required for a KeySecure Integration.
Damstra provides real-time, web-based workforce management solutions to ensure a safe and complaint workforce. By adding an integrated key cabinet, administrators can be certain that no keys can be accessed until the necessary requirements have been met. These may include providing licences, undergoing inductions or training or passing an alcohol test.
INTEGRATION SPEC:
Damstra asset management and equipment tracking software is integrated with KeySecure version 1.3.5.1
We also offer Key Shields to protect your keys from the eyes of those trusted insiders who may wish to create unauthorized copies of the keys. The product is used in conjunction with a Tamper-Proof Key Ring and hides the cut of any keys hanging in the cabinet.
Officially called the Electrical Override device, this is a small button for use in emergencies. It allows an administrator to quickly release all of the keys. For security reasons, it can only be used with the manual override key. Pressing the button will unlock all of the keys so they can be quickly removed from the cabinet.Dynamite button
For ultimate safety and compliance, it is possible to attach a device to test alcohol levels in the breath. Using this solution, users will not be able to log in to the cabinet until it receives a signal that the user is sober. This solution is ideal for fleet management and operations that place a large emphasis on safety, such as mining or constructionBreathalyser
Like all biometric solutions, facial recognition technology measures and matches the unique characteristics for the purposes of identification or authentication. Third party devices are used to process the information and ensure they match an enrolled user. If a match is found, this data is transmitted to the key cabinet to initiate a session (unlock the door and keys). We can use any third party reader device that is capable of outputting a Wiegand signal.Facial recognition
The first step to accessing keys is to identify the user at the cabinet. Typically this is done with a PIN or a prox card. However, because it is possible to share these details between users, biometric identification techniques such as fingerprint scanning are becoming more popular. Fingerprint scanners work by capturing the pattern of ridges and valleys on a finger. The information is then compared against a list of enrolled profiles to find a match. If a match is found, this data is transmitted to the key cabinet to initiate a session (unlock the door and keys). We can use any third party reader device that is capable of outputting a Wiegand signal.Fingerprint scanner
Many customers like to access their keys by presenting a card instead of having to enter a PIN. For more secure sites, it is often a requirement to present a prox card as well as entering a PIN. Our cabinets come standard with a Wiegand input meaning we can accept a signal from most readers on the market. One of the big advantages of prox technology lies in its simplicity. There are no moving parts, no mechanical wear, no slots, and no read heads to maintain.Prox reader
Keep your keys organized with color-coded tags that are added before the key ring is sealed. This makes it easy to identify your keys if you have several sets or need to keep them separate from co-worker’s key sets. Customers with multiple cabinets will often choose a different colored tag for each cabinet. For example, key bunches with a blue tag are for Building A and go into Cabinet 1.Coloured key tags
These brackets extend the functionality of CQRiT cabinets to cards as well as keys. They are “L shaped” or “C shaped” metal brackets that allow a Tamper-Proof Key Ring to be secured to a card. Customers typically use them for prox access cards, fuel cards for vehicles or corporate credit cardsTamper proof card holder
Manufactured with the strictest tolerances, these secure key rings provide you with the highest levels of strength and durability. This must-have accessory adds another dimension to the security of your keys by ensuring your key bunches can’t be compromised. Every key ring is uniquely serialised which further increases security by allowing you to record key ring alterations. Once sealed, the stainless steel, high-security ring cannot be opened or substituted without detection. Available in 5 sizes: Solid or flexible Unique serial number Specialised tools Permanent sealTamper proof key rings
3cm ring: 1-5 keys | 4cm ring: 5-10 keys | 5cm ring: 10-15 keys | 7cm ring: 15-25 keys | 9cm ring: 25-50 keys
Key rings are available in a range of diameters (3cm, 4cm, 5cm, 7cm, 9cm) in both a solid version and a flexible (braided cable) version.
Solid and flexible rings are laser engraved with unique serial numbers so keys cannot be substituted or removed without detection.
Specialised tools are used to close and crimp the join. When sealed, rings form a continuous loop without any weak or bulky plastic joins.
Once closed, the ring is permanently sealed and keys can only be removed by cutting and damaging the ring.
These key rings crimp together to form a permanent seal so keys cannot be substituted without detection. Size Construction Crimping AuditingSecure key rings
Diameter of 4cm when closed
Braided stainless steel cable coated in clear plastic
Key rings are crimped using a generic crimping tool
These key rings do NOT contain any unique serial numbers for auditing. For additional security, see Tamper-Proof Key Rings
Senior Product Manager
Bryce has been with CIC Technology since 2005, initially as our R&D Manager progressing to Operation Manager, then Head of Design & Development and now the Senior Product Manager role.
Bryce is responsible for ensuring that the CIC Technology range of products and solutions continually meet and exceed ever-evolving customer and industry requirements.
He provides direction and support to the Engineering Team and works closely with Partners to manage the ongoing development of our products. This includes Application Software development, Embedded Software development, Electronic Hardware design and Mechanical design.
His years of experience with the company have grown an intimate familiarity with the unique requirements surrounding electronic key and asset management both in Government and the Private Sector.
Combined with a 20-year career developing software systems in various industries including Government and Transport & Logistics, Bryce brings a wealth of experience in shepherding quality solutions from concept to production.
Japan Metha has an overall responsibility to manage operations of CIC technology after being appointed as COO in December 2016. Japan is responsible of managing the Supply Chain, Service & Support, Project Delivery and Production Team for the CIC business. He is a motivating leader with more than 17 years of professional experience and Masters degree in Engineering a long with 6 Sigma and Project Management certifications. He is zealous about change management and team-building, to improve the productivity and efficiency. Japan brings experience of working in Aerospace, Bio-Medical devices, Oil & Gas and Semiconductor industries.
An accomplished sales leader and business development manager, Mr Taylor is skillful in translating the value of technology solutions to new markets and clients. He has extensive experience with all facets of IT technology and solutions and has had a keen interest in technology for over 30 years. Mr Taylor is also heavily networked within the Australian marketplace and is qualified with a master of Business Administration from Charles Stuart university.
Trent was appointed CEO of CIC technology in June 2017.
Trent has overall responsibility for defining and implementing the strategic direction for the business. He is passionate about building a work environment with a strong set of values and positive culture that is focused upon delivering exceptional service. A focus on understanding customer objectives and meeting those objectives has guided our focus under Trent’s leadership. Prior to joining Duncan Solutions, Trent spent eighteen years in the telecommunications, technology hardware & software industries, with roles as Chief Executive Officer and Commercial Manager.