Traka provides an intelligent key management solution called iFob that electronically tags keys and monitors their use. The iFob devices contain chips that uniquely identify keys and allow them to only be accessed by authorized employees at designated times according to user profiles stored in the system. This ensures proper control, monitoring and recording of key usage and asset access. Reports can be generated on key usage, users, and idle or missing keys to improve security and efficiency.
1. Panoptes India Pvt. Ltd
Traka – Intelligent Key Management Solution
If you’ve been searching for a way to protect your organisation’s assets
and resources, Traka’s intelligent access management systems could
prove to be that elusive silver bullet - by turning your conventional key
into a 'clever key'
Overcoming most of the difficulties associated with key management, Traka
intelligent key management provides the perfect solution. At its heart is the
Traka iFob™. These bullet-shaped devices contain a chip which provides a
unique electronic ID. Once attached to an iFob, individual keys or keysets are
effectively, electronically tagged. Individual keys or keysets are permanently
attached to an iFob with a robust security seal. Each iFob is then allocated a
specific port within a Traka key cabinet – and locked in place until released by
an authorised user.
Once the appropriate user profiles and key details have been entered into the
system, Traka ensures that only authorised employees are allowed access to
the key cabinet – and then only to designated keys. The system automatically
records when a key is used and by whom on a central database. And this
information is available via the cabinet’s data display or a central PC.
Employees request access to a key cabinet using a PIN code, swipe card or
fingerprint recognition. If a request is valid, the cabinet door will open and the
appropriate key will be released. To return the key, the holder must again
obtain admission to the cabinet, and then replace the iFob in its designated
port. If this is not done, the system will prompt the user to insert the iFob in its
correct position.
Individual keys can be set with a curfew, raising an alarm if not returned on
time, or restricted time access can be set so as to manage usage, perhaps for
cleaners or service staff.
• Systems configurable giving multi-user access to one or more keys,
each with their own parameters
• Unique time access controls for different user groups; for shift patterns,
curfew limits or restrictions
• User license or qualification expiry dates configured to prevent users
gaining unauthorised key access
• Key booking options for scheduling of equipment, access to rooms or
the servicing of vehicles
• Central control for managing key usage, reporting on key usage,
mileage and utilisation statistics.
2. Traka enables you to control, monitor and record the use of almost any physical asset, including:
premises, facilities, secure areas, equipment, machinery and vehicles. Traka provides intelligent
key management and equipment management access control to better protect your important
assets - resulting in improved efficiency, reduced downtime, less damage, fewer losses, lower
operating costs and significantly less administration.
Traka has a range of Electronic Key Management solutions that will control who can gain access
to keys, restrict individual key usage to authorised users, provide a full audit of key activity and
generate numerous easy to use reports based on user information logged at the time of taking or
returning keys.
• Cabinets managing between 10 and 540 keys, in 3 modular sizes
• Multiple cabinets can be networked, locally or remotely, for large sites with more keys
• User profiles and key details configured in a centrally located database on a standard PC
Traka allows long-term records to be held and continuously
updated, the system’s Traka32 software will ensure you’re able
to monitor and record key usage, and compile a comprehensive
range of management information, enabling you, for example:
• To check when a key is taken and returned,
• and by whom
• To identify keys that have not been returned
• once an allocated period of time has elapsed
• To determine how often particular keys are
• used, and for exactly how long.
• To analyse usage and identify faulty equipment
Providing enhanced control and security, the times at which
keys are available to specific personnel can be defined
using Traka’s management software. Entry to particular rooms –
and the use of certain facilities – by cleaners or service staff,
for example, can be restricted to certain times of the day, to fit with shift patterns. Alternatively, a
‘key curfew’ can be applied, setting the time by which a key must be returned to its cabinet.
3. The Traka Solution
• Make Users Accountable
• Give them a method that is easy to use
• Control who has access
• Monitor the access
• Audit how often it was accessed and by whom
• Ensure items are only accessed by authorized staff
• Ensure procedures are followed as you designed them
Traka32 software
The power behind all Traka solutions lies in their Traka32 Software. Running on either a single
PC or in a networked server environment, it offers multi-language use, provides extensive real
time data capture, interfaces with most 3rd party access control
applications, and uses an SQL database to provide extensive access level controls and key
transaction history. Using Crystal Reports a comprehensive range of Management Information
reports can be generated quickly and easily. Where managed keys and assets are subject to
security classification, Traka work with SSG to provide additional protection to meet SEAP
ratings.