US Edition
Security camera lens, CCTV Camera, Digital Recorder, Telemetric Transmitter and Controller, Intruder Alarm Control Panel, Access Control Reader, Dome Camera
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join on LinkedIn
Unique perspectives

Network / IP - News

Morse Watchmans KeyWatcher improves facility and security management for building occupants and visitors

Morse Watchmans KeyWatcher improves building security for occupants and visitors
KeyWatcher access control system allows only pre-authorised users to access keys

KeyWatcher® from Morse Watchmans, on display at ASIS 2011, With the KeyWatcher system, only pre-authorised users can access keys from the tamper-resistant cabinet and all transactions are recorded so that management has an audit trail of who accessed which key and when.

"Our KeyWatcher systems are deployed in thousands of locations from universities to car dealerships to hotels and even on cruise ships," said Fernando Pires, VP Sales and Marketing, Morse Watchmans. "No matter the application, key control and management systems have proven to be an integral component of a comprehensive security system."

KeyWatcher systems are engineered for complete interactivity with other business systems such as access control, to enable a layered security strategy. For example, e-mail alerts can inform management if someone tries to leave a building without returning a key or object taken from the cabinet. The system has a built-in RS-232 communications port for direct connectivity to printers or other devices, or networked connectivity via Ethernet.

Also delivering an added layer of security is the optional Remote Box, designed to meet special needs of high security environments such as correctional facilities and casinos. Unique in the industry, the Remote Box requires that a second individual's PIN be entered and verified in the system in order for an authorised employee to access a KeyWatcher cabinet.

The fully scalable KeyWatcher system provides maximum storage over minimal wall space, and its modular design allows users to configure each unit to meet the specific needs of their application. A number of different modules are available, including credit card holders and lockers for cellular phones, weapons or other items that need to be accounted for and secured when not in use.

Bookmark and Share
Latest in
Network / IP Security Events

See privacy and cookie policy
Browsing from the Americas? Looking for US Edition?
View this content on US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition