Morse Watchmans, a provider of key control and asset management systems, is demonstrating how their KeyWatcher Touch key management solution helps organisations keep data secure. On display at ISC West 2018 (booth #12109), KeyWatcher Touch provides comprehensive key management to a broad range of industries and business types, including server farms and datacentres.

Data and cybersecurity are paramount today. With sensitive information being accessed via internet-connected endpoints throughout facilities, controlling the access to the areas containing these devices is an integral component of a truly comprehensive cybersecurity plan,” said Mr. Pires. “We’re proud to offer this proven technology to ensure the safety and integrity of important data.

KeyWatcher Touch utilises touch screen technology to control Morse Watchmans’ SmartKey system

Securing data via key management

KeyWatcher Touch is Morse Watchmans’ proven key control platform, utilising touch screen technology to control Morse Watchmans’ patented SmartKey system with KeyAnywhere technology that makes it simple to return a key to any key cabinet in a system.

Updates to KeyWatcher Touch being showcased at ISC West include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database.

With a large portion of cybersecurity and data breaches involving the theft of physical hardware, access control by way of key management has become a vital component in securing sensitive data. Internet-connected devices within an organisation with access to internal networks can serve as a digital open door, providing unauthorised data access.

KeyWatcher’s features and capabilities make controlling keys and physical access to data

Effective access control

Further, if physical access to server areas where data is stored is allowed, unauthorised users can easily copy or download the data to be used for a plethora of nefarious purposes, from theft of funds to corporate espionage.

By regulating and managing access to keys to the relevant areas within a facility, security teams can grant access only to those with proper clearance, be notified when keys are accessed or overdue to be returned, and create a report showing key access and return times.

They can also see which users have taken keys, enabling security to know which people have accessed a relevant data storage area should an incident occur. KeyWatcher’s expansive list of features and capabilities makes controlling keys and physical access to data easy, convenient and secure.

In case you missed it

Which vertical markets have the greatest growth potential for security?
Which vertical markets have the greatest growth potential for security?

To serve various vertical markets and industries effectively, security professionals must recognise that each sector has unique assets, risks, compliance requirements, and operatio...

Marin Hospital enhances security with eCLIQ access control
Marin Hospital enhances security with eCLIQ access control

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s behind (perimeter) door #1?
What’s behind (perimeter) door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...