Morse Watchmans introduces its new KeyWatcher TrueTouch software, which delivers unparalleled support and functionality for the new KeyWatcher Touch key management system. The new software package comprises the KeyWatcher TrueTouch client interface and the KeyWatcher Server for enhanced administration and control of the KeyWatcher Touch system.

"KeyWatcher TrueTouch software capability is a new benchmark in managing key control systems," said Fernando Pires, VP Sales and Marketing, Morse Watchmans. "It simplifies the key management process for end users while enhancing the security of physical keys and small items."

The KeyWatcher TrueTouch client interface is designed to run all programming, remote functions and reports for your enterprise. The new interface, similar in concept to popular access control systems, helps make day-to-day operations and activities easier and more fluid. For example, users can be added from a global list and all specific settings (added or modified), will be automatically synchronised across the system. Profiles can be assigned for improved user control and administrative access levels are designed to allow reports only or alarms only in addition to the other access levels available for various types of users.

Reports generated by KeyWatcher TrueTouch are available in landscape or portrait format with color interspaced lines for easier reading. Automated/scheduled reports will be available in a future version.

The KeyWatcher TrueTouch Server is designed for installation on a dedicated computer and can be connected to a KeyWatcher via a network connection or via USB. The server is the main interface for the client software and performs all synchronisations of transactions as well as maintaining the SQL database. Both access control systems and customized client control software interface with the server application.

Discover how AI, biometrics, and analytics are transforming casino security

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...