{"version":"1.0","provider_name":"ACIX","provider_url":"https:\/\/www.acixme.com\/sa","author_name":"Aufait Test","author_url":"https:\/\/www.acixme.com\/sa\/author\/aufaituser\/","title":"Key Locker Security System | ACIX","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"d1NrSni7BH\"><a href=\"https:\/\/www.acixme.com\/sa\/product\/key-locker-security-sytem-saudi\/\">Key Locker Security System<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.acixme.com\/sa\/product\/key-locker-security-sytem-saudi\/embed\/#?secret=d1NrSni7BH\" width=\"600\" height=\"338\" title=\"&#8220;Key Locker Security System&#8221; &#8212; ACIX\" data-secret=\"d1NrSni7BH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.acixme.com\/sa\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.acixme.com\/sa\/wp-content\/uploads\/2022\/02\/Picture12.png","thumbnail_width":600,"thumbnail_height":600,"description":"Key management systems are proving to be a game-changer for many organizations. Keys are crucial for accessing restricted areas in organizations, similar to how individuals use keys to access their homes or cars. The difference is that if an individual loses their keys, they can get another one made without worrying about sensitive information being exposed to prying eyes. Unfortunately, that\u2019s not always the case for organizations. For starters, organizations have hundreds, if not thousands, of employees who require keys to access specific zones or areas. As a result, if a key goes missing, things become complicated. Organizations house sensitive information and often store their physical and Intellectual Property (IP) assets on-premises. They want to protect these at all costs. Hence, they want to restrict unauthorized personnel\u2019s access. However, if a key falls into the wrong hands, an intruder could access these areas and steal sensitive information and assets. Resultantly, many organizations have started investing in key management systems. If you\u2019re looking to prevent re-keying costs and enhance your organization\u2019s security, our standard key management system could be perfect for you."}