Key administration

The main tasks of any organization include ensuring the safety of the company's material assets and cash. This raises the question of allocating areas of responsibility between employees - who has the right to take keys to offices, workshops and safes and when.

How do you simplify the key administration process, especially for large enterprises?

Key administration in Ecos systems

A modern and reliable way to store keys is to use Ecos automatic key systems. The algorithm of work with our systems is simple and clear:

  1. All employees authorized to access the keypad are entered into the system database;
  2. Each employee, depending on the type of system pre-installed, either leaves his or her authentication data (in the case of biometrics), receives a magnetic card assigned to him or her, or comes up with his or her own pin code;
  3. Each employee is assigned the ability to take only certain keys.

All user actions in the system are recorded, making it easy to track who used which keys and when.

Advantages of Ecos automatic key systems

  • The body of key systems is made of high quality steel, which provides a high level of burglary resistance. That is why our key systems are suitable for any object - they can be installed in standard offices, museums, medical institutions, car dealerships, government structures.
  • Ecos electronic key systems due to the fully automated system are able to keep track of working hours of employees, as well as to issue and receive keys at a strictly defined time. Automation of the process eliminates the possibility of key swapping by unscrupulous employees.
  • All data is stored on special servers that can be accessed at any time. This facilitates quick entry of new employee data and deletion of irrelevant data, as well as prompt verification of recorded actions in the system.
  • All key systems are equipped with a built-in rechargeable battery that can last several hours in case of power outages. 
  • Each keypad is equipped with a simple and easy-to-use touch screen, making it quick and easy to train staff on how to use the system. 
  • Standard key systems are floor or wall mounted and can have from 10-20 slots, depending on the company's application. The Ecos Key 960 double-sided key system has up to 960 slots, is floor-mounted and has a large 10-inch touch screen.
  • The plugs are able to be fixed in the system slots if required by the security conditions of the company. Each system can also have a combination of slots in the same system - with and without locking.
  • The capacity of the systems can be easily varied depending on the needs of the company - the excess can be removed over time and the missing can be added.
Working time
High security
of control
Integration with

Keyhole doors are made on request and can be of several types:

  • Steel. The hinges of such doors are installed inside the body, so that it will be impossible to hook the door. The doors open automatically;
  • Transparent. Made of polycarbonate. Convenient for checking the presence of keys in the key box;
  • Rollout. Excellent for narrow corridors and rooms with small meters, as they do not require space to open the door;
  • Doorless version. Usually such key boxes are installed for storage and administration of emergency keys.

Authentication options

PIN code
Face ID
QR code

Key placement options

Without case
With case
In the cell

When installing additional video surveillance above the keypad, it will be impossible to bypass the system. In addition, all camera recordings are stored on common system servers, so you can view them at any time.

The use of Ecos intelligent systems is a safe and reliable way to store and distribute keys among personnel, the ability to track employee actions in the system and minimize the risk of loss of material assets of the company.

Any system can be supplemented with additional cells for storing securities, documents, cash, flash drives, hard disks and other valuable items. They can also be used to store keys.

Video of Ecos key management system:

Receiving a key in the system

  1. Authentication of a user in the system
  2. Opening the door
  3. Selecting a key to which a user has the access rights (LED backlighting)
  4. Receiving the key
  5. Closing the door

Return a key in the system

  1. Authentication of a user in the system
  2. Opening the door
  3. Returning the key (LED backlighting)
  4. Closing the door

Contact us

    To calculate the price of the project, please fill out the form and our manager will contact you. 8 800 5555-108