Property Maintenance Management
The eziKey Key Management Solution provides complete protection of assets entrusted to you by landlords or businesses.
Maintain security of assets in your care and easily setup outside contractors with credentials to access necessary keys. Ideal for routine maintenance contractors, security personal or any other individuals who requires continued access to certain properties under your control.
Keys reside in electronically controlled steel vaults that can only be accessed via sophisticated license recognition and biometrics technology. Our system ensures that all keys are accounted for by creating an audit trail that dictates who has the key to which properties, when and for how long.
VISIBILITY OF KEYS AND CONTRACTOR MOVEMENT
Every time a property key is removed or replaced from the eziKey Vault, the transaction is logged by eziKey and can be viewed through our eziKey Management Tool. You can access a range of reports about key movements, including the contractor accessing the key, the time and date of removal and replacement, and the location of removal and replacement (if you have multiple business sites or locations).
You can now have full visibility of the movement of your staff members and sub-contractors. The reason we can be so accurate with our reporting is due to the unique User Accounts that every user is assigned to access property keys.
Ensure the keys to all of the properties in your care are secured from any key theft.
eziKey's 71 Key Vault is built using the same industry standards as the leaders in Key Safes, providing the strength required to keep the keys secure from unauthorised key users. As such, our 71 Key Vault is an Allianz Insurance Approved Key Safe. If you insure your business through Allianz, you will have the full support of your insurer and you may also be eligible for a reduction in your insurance premium if you use eziKey to secure keys.
UNIQUE USER ACCOUNTS
eziKey uses the latest security technology to ensure only authorised users are accessing your keys.
Every authorised user in your business is set up with their own unique User Account. This comprises of a username, a password, fingerprint recognition, a Drivers Licence scan (for identification purposes), and user role access - to limit user functionality if necessary.
This will assist your business with staff efficiency on quick access to keys, but also ensures you know exactly who is accessing each property and at what time. You will no longer have trouble finding the keys to properties or tracking key loans - remember, a fingerprint is totally unique!
AUTOMATED KEY LOAN FORMS
Keep track of the keys that you loan out through eziKey's automatically generated Key Loan Forms.
If you are loaning property keys to someone who isn't an eziKey Authorised User (for example, a new sub-contractor), eziKey's Identification Scanner can take a photograph of their drivers licence, ID card or other form of identification, store the details of the receiver as well as the details of the property that you are giving them access to (from the eziKey fob) and print out a custom Loan Form with your business branding and unique loan agreement terms.
Learn more about the process of getting eziKey in your business, or simply get in touch with us to ask any more questions you have!
A bit more about eziKey
STATE OF THE ART TECH
eziKey utilises state of the art technology such as biometric fingerprint readers, HD license scanning cameras, touchscreen monitors as well as an intelligent key board inside the vault. This is all engineered and uniquely designed by eziKey to combine innovative technology and security together.
eziKey provides businesses with live reporting on asset location, individual user ID and timeline of key allocation via the eziKey Management Tool. If your assets are mobile, eziKey will change the location of the asset if the key is recorded in a different vault. This ensures accurate reporting on all stock allocation and reconciliation.
REDUCE ADMINISTRATION COSTS & INCREASE STAFF EFFICIENCY
Reduce the costs associated with your administrative process of asset management by having visibility of your assets live. On top of this, all staff members that use eziKey will save time in finding keys and recording their key movements.
SAVE MONEY ON LOST KEY REPLACEMENT
Usage of eziKey offers an audit trail for all users of company assets. Anyone with access to a key is recorded through their usage of eziKey, which is then logged and available for reviewing. Keys can then be found using the audit trail, minimising risk of replacing costly keys.
TRACK KEY USERS
The eziKey system provides instant reporting on key movement and gives clear visibility on who is using the keys. In the instance of vehicle movement, this is ideal for identifying custodians of vehicles for allocation of infringements or insurance purposes. All drivers licence information is stored in the eziKey system for future reference.
FULL REPORTING & ACCOUNTABILITY
Every key movement within your eziKey vault is tracked for reporting and accountability purposes. The system records usage via the authorised user’s fingerprint or PIN code. Members of your Management Team or other relevant team members can then use eziKey’s Management Tool to report on asset movement or usage as required.
NATIONWIDE SERVICE & SUPPORT
eziKey is available for support to our customers, either remotely via internet or phone call, or even on-site. Our eziKey team members who provide support are also the same team members who build the eziKey product. They are knowledgable and often will be the same point of contact throughout your eziKey journey. All service vehicles carry an extensive inventory of spare parts to facilitate the most cost effective means of repair.
HARDWARE & SOFTWARE SPECIFICATIONS
The eziKey hardware is made up of “Control Units” and “Key Vaults”. Each Vault has the capacity of 71 keys, and 1 Control Unit can connect to multiple Vaults at a time. LAN serial server devices are not required for eziKey to operate across a multitude of locations, as all systems are Ethernet / IP based which enables us to integrate them into any operating system without the need for additional servers.