A person is using a laptop.

Electronic key management and key control system

At a glance

Inefficient key management often leads to unnecessary time wasting, a lack of transparency and additional organisational commitment. Ill-defined responsibilities and inadequate documentation make tracking difficult, and increase the risk of security breaches.

Our key control system offers you a simple, secure and reliable solution for managing keys and other access media. You can specify which staff have access to which keys and when, thereby protecting the keys from unauthorised access. Automatic documentation of key movements means you always know where each key is, and who last had it.

Features and benefits of electronic key management

24/7 availability

Staff and external contractors can access the necessary resources round the clock.

Key log

Full documentation enables you to prevent tampering, loss and theft.

Always up-to-date key status

You always know where all keys are, so don’t waste time searching for them.

Icon of a puzzle

Specialist modules

Our modules are optimised for various access media. They will help you keep everything tidy and save space.

Access control

Our user and role assignment concept gives you maximum flexibility, while still retaining full control.

High-quality hardware

Robust, high-quality units protect your keys against unauthorised access.

Applications

Not all keys are the same. A wide range of potential access media may be used within a business, each with different storage requirements. Our specialist modules allow you to organise your keys, key rings or key cards optimally, retaining a clear overview and saving space. You can choose between slots for ID cards or single keys and boxes of various sizes for key rings.

Electronic key management system for:

  • Single keys (e.g. office keys, master keys, ...)
  • Key rings, cards/passes
    (e.g. company IDs, visitor passes, etc.)

Tip: With our electronic visitor management system, you can also allow access entirely without use of keys, such as by a QR code on a smartphone!

Solution Components

Electronic compartment system

  • Compartments available in various sizes and combinable
  • Extendable column by column
  • Individual equipment e.g. vision panel, socket or network cable connection
  • Optional compartment monitoring
  • Mechanical emergency release
  • Installable into walls, mountable on walls or to set up as a stand-alone system
  • Reliable, robust and durable
  • Smart locker system with flexible colour design according to your company colours

Modular System

  • Any combination of drawer, compartment module, storebox, etc. based on a modular system
  • Expandable by column
  • Optional compartment monitoring
  • Mechanical emergency release
  • Installation as in-wall solution, wall-mounted, or freestanding system
  • Proven, durable, and robust
  • Flexible color design aligned with your corporate branding

Reservation platform

Easy and time-accurate reservation - exactly when you need the object. And if you do not need it in the end, an overdue booking is automatically cancelled and released again for other employees.

System platform

The software platform KeMas NET ® is the basis for the administration of all system solutions:

Cross-location administration of all authorisations for persons, objects and devices
Definition of roles and rightsAutomatic report generation of your most important key figures
Can be integrated into your existing software

Interfaces

Interfaces avoid media discontinuity and doubled data maintenance.

  • CSV - Import of personnel master data
  • XML - Import / export of master data and authorisations
  • Webservice - Library for master data, authorisations and actions
  • OPC server - Display of alarms and events
  • LDAP - Import of HR master data and system statuses
  • NFC - Alignment of system-specific features, data (person-, action-related)

Identification

For quick and clear identification of persons and objects. If you already use an identification procedure, we may as well integrate this without high additional effort.

  • Personal identification, e.g. pin code, ID card, biometrics, QR
  • Object identification, e.g. RFID tag or label, optical recognition or by weight
There was an error

Please contact us directly via email at [email protected].

Your request was submitted successfully

Thank you for your request. Our KEBA Customer Support will get in touch with you soon.

Contact

You need more information, have any questions or want us to call you back? We will take care of your request!

First Name is a required field
Last Name is a required field
Please enter an email address
Company is a required field
Message is a required field
Your direct contact
Tony Lukaschewitz
Tony Lukaschewitz Key Account Manager Security +49 3723 6944-161 [email protected]
Please select your preferred language
Your browser is out of date
Internet Explorer is no longer supported. Please switch to a current browser to use keba.com to its fullest extent.

Edge

Chrome

Safari

Firefox