{"id":20961,"date":"2022-06-13T06:00:42","date_gmt":"2022-06-13T04:00:42","guid":{"rendered":"https:\/\/blog.speedikonfm.com\/?p=20961"},"modified":"2022-06-13T07:38:59","modified_gmt":"2022-06-13T05:38:59","slug":"the-problem-with-the-keys","status":"publish","type":"post","link":"https:\/\/blog.speedikonfm.com\/en\/the-problem-with-the-keys\/","title":{"rendered":"The problem with the keys"},"content":{"rendered":"<p>Key management consists of lock and key management and controlling the access authorizations for the premises of a building or facility \u2013 it is thus a facility management service. It includes verifying and issuing locking authorizations, including arranging for cylinder installation and replacement for all locking systems in the building or facility. In addition, key management takes care of all initial as well as replacement purchases of keys and locking cylinders \u2013 it is therefore not only a challenging task but also one that carries a great deal of responsibility.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-20976 alignleft\" src=\"https:\/\/blog.speedikonfm.com\/wp-content\/uploads\/speedikon_Blog_key_management.jpg\" alt=\"\" width=\"199\" height=\"183\" \/><\/p>\n<p>For companies that own hundreds of buildings and consequently have to manage thousands of keys, key management poses a particular challenge. In order to manage the large number of keys, arduous, complicated and decentralized means are often used, which are not only highly time-consuming and cost-intensive, but also prone to errors.<\/p>\n<p>For example, one of our clients, who is well-known in the telecommunications industry, carried out the key management of their several thousand buildings manually and with decentral lists for years. Each site had its own lists which were maintained manually by the person responsible for the key management &#8211; if the person responsible was out sick or on vacation, the lists were not updated either. As a result, many lists that were not up to date made communication within as well as between different sites difficult, keys were lost or were assigned to the wrong people. All of this led to significant additional costs in terms of time and money, not to mention the risks involved.<\/p>\n<p>Thanks to the implementation of our key management, all of this is now a thing of the past. Our client\u2019s key management is now done on our browser-based software <strong><em>speedikon<sup>\u00ae<\/sup>\u00a0C<\/em><\/strong> that each site has access to in real time. This means that the key management staff of each individual site can access and view its own current data and, if needed, the data of the other sites. If a data record is updated, it is automatically updated for all users. The key management is now handled by one single software, which makes using countless out-of-date lists obsolete \u2013 saving time and money.<\/p>\n<p>Since the introduction of our software, our client no longer has to wonder which employee has access to which building or room, or who owns which keys because all of this can be effortlessly viewed with the <strong><em>speedikon<sup>\u00ae<\/sup> C\u00a0<\/em><\/strong>key management feature.<\/p>\n<p>In addition, the issuing and returning of keys can be documented via <strong><em>speedikon<sup>\u00ae<\/sup>\u00a0C<\/em><\/strong>. Helpful reminders can also be set if, for example, it is known that an employee should only have access to a building or room for a certain period of time. With <strong><em>speedikon<sup>\u00ae<\/sup> C<\/em><\/strong>, no key will be lost ever\u00a0again.<\/p>\n<p><em>Are you also drowning in a flood of keys? Then send us an e-mail at information@speedikonfm.com or call us at +49 6251 \/ 584 &#8211; 0 \u2013 we will work with you to develop a custom-fit solution for your key problem and help you with its implementation!<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Key management consists of lock and key management and controlling the access authorizations for the premises of a building or facility \u2013 it is thus a facility management service. It includes verifying and issuing locking authorizations, including arranging for cylinder installation and replacement for all locking systems in the building or facility. In addition, key&hellip;<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[709],"tags":[812,813,712],"class_list":["post-20961","post","type-post","status-publish","format-standard","hentry","category-c-plattform-en","tag-key-management","tag-schliesmanagement","tag-speedikon-c-en"],"_links":{"self":[{"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/posts\/20961","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/comments?post=20961"}],"version-history":[{"count":6,"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/posts\/20961\/revisions"}],"predecessor-version":[{"id":20995,"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/posts\/20961\/revisions\/20995"}],"wp:attachment":[{"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/media?parent=20961"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/categories?post=20961"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.speedikonfm.com\/en\/wp-json\/wp\/v2\/tags?post=20961"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}