Frequently Asked Questions

Here is a list of some Frequently asked questions for your reference.
Feel free to write us if you have any query about our product or contact us at +27 83 654 3123.

  • Why is this key safe more secure than others?

Because the keys are in a secure steel cabinet, and are never visible to the user. Only authorised users can only draw an authorised key, which is then dispensed. The user cannot touch the bulk of the keys stored, as is the case with most of the other electronic key control systems.

  • How many keys does the safe keep?

160

  • Can I store more than 160 Keys?

Yes, safes can be added and linked in a "daisy chain" fashion in multiples of 160, eg 320, 480, etc.

  • Does key movement get recorded?

Yes, in fact a whole lot of data gets stored and is backed up. This data is the basis for intelligent reporting and audit trials.

  • Is the user data credible?

Yes, only biometric user data is linked to the key movement and other data. There cannot be any argument.

  • How does management get access to the data?

The Key Safe is networked with the management desktop PC`s using our Key Explorer software. This enables management to monitor the contents of the safe from the convenience of the office. Reports can be viewed or printed.

  • Can you prevent users from taking keys off the keyring?

Yes, our system uses a Tamper Evident keyring which is moulded in such a way that it uniquely fits the hook in the rotating hatch. The user cannot make up a regular ring and enter it into the safe.

  • What other security features are worth mentioning?

The safe can automatically create and send daily emails to a list of managers regarding keys that did not return to the safe.

  • What happens when things go wrong or something breaks?

Each keysafe auto emails certain health details to our office which we monitor and respond to if necessary. For phone in breakdowns our technicians can give phone support, or attend to site for replacement of a part if necessary. The system is designed that we can replace an entire subunit in minimum time to get the client up and running. The faulty subunit can then be repaired and swapped back to ensure very little downtime.