Fernando Pires

Fernando Pires
VP Sales and Marketing, Morse WatchmansFernando Pires is the Vice President of Sales and Marketing for Morse Watchmans in Oxford, Conneticut. He began his career with Morse Watchmans in 1985 and today runs the company as an extended family, maintaining a hands-on management style both in Connecticut and with dealers around the world.
Articles by Fernando Pires
For fleet managers, the control and management of your fleet begins with control and management of the keys that start the vehicles. For some, this critical task is left to a very basic – and incredibly low-tech – solution, such as hooks mounted on a pegboard with a notebook for signing vehicle keys in and out. There are a number of shortcomings with this type of “system,” most notably that employees tend to ignore it altogether. With this type of honour system approach, there is no way to track keys, control who can use which vehicles or know who has a key at any given time. Further, as fleet manager you have no way to know if your mandated key policies are being followed; you are blind to overuse or misuse of certain vehicles, potential liabilities and many other problems. Automated key management solutions The unfortunate reality is that many fleet managers aren’t aware of these potential issues until it is too late. The fact that they haven’t had a problem may prevent them from taking action until they are actually faced with an issue. At that point, they will likely be motivated to investigate an automated key control and management system as an alternative to the very basic system they have in place. Key management solutions offer a number of benefits, including cost savings, which can be achieved using a number of features and functionality to proactively address potential issues in several critical areas while also improving overall operations. It’s important to note thatin fleet management, key control is not actually about the keys themselves; it’s all about the vehicles. Managing vehicle usage Within every fleet, there are newer or nicer vehicles that become favourites among employees and are therefore constantly in use. Meanwhile, other vehicles sit idle. This dwell time is big problem for fleet managers, with mileage and associated wear and tear piling up on some vehicles while other expensive assets gather dust. An automated, networked key control system can eliminate this problem. It’s important to note that in fleet management, key control is not actually about the keys themselves; it’s all about the vehicles. With a key control system, certain users can be authorised to use only certain vehicles, such as late-model units, while others can be authorised to use newer units. Reducing vehicle dwell time For example, a trucking company recently implemented a key control solution for just this purpose. When a driver logs in, the system checks to see if his or her primary vehicle is available and if so, issues that key. If key isn’t available because the truck’s return has been delayed for one reason or another, the system identifies a similar vehicle based on the user’s profile and authorisation and issues the next available key. This ensures that vehicles are properly rotated to reduce dwell time and eliminate excess wear and tear on certain units. Specialised vehicles could include delivery trucks with lift gates, police cars equipped with riot gear, or limousines with certain seating capacity Another challenge around vehicle usage is making sure certain specialised vehicles are available when needed. These could be delivery trucks with lift gates, police cars equipped with riot gear, limousines with certain seating capacity and others. Whether because these vehicles are newer or because drivers aren’t aware of their specialised nature, they are often out in the field when someone needs their specific specialisation. This is not only inconvenient, but in the case of a specially equipped police car, it can significantly impact public safety. Misuse and misappropriation of vehicles Therefore, being able to control who is able to access the key for these specialised units is a primary concern. Key management systems provide this functionality, as well as the ability for users to request and reserve certain units to ensure it will be available when necessary. By more effectively managing their fleet to ensure mileage and wear and tear are evenly distributed, organisations can also lower their operating costs and grow their bottom line. In some cases, a key control system can make fleet management so efficient that fewer vehicles may be needed because of the increased utilisation. Whether intentional or unintentional, employee misuse and misappropriation of fleet vehicles is another major challenge for fleet managers. It can be tempting for an employee to simply take a vehicle home for the weekend – or longer – rather than signing it in on Friday and back out again on Monday. Imagine for a moment that someone takes a company car home and uses it as a personal vehicle over the weekend. Should that person be involved in an accident, DUI or other criminal incident, police could seize the vehicle, forcing the company to put a lot of time and energy into getting their property returned. Automated networked key management So while this may sound very basic, it’s extremely important for fleet managers to be able to know who has – or had – a unit at any given time, and to know in real time if a particular vehicle is not returned when it is supposed to be. Automated networked key management systems make this possible by issuing an alert if a unit is overdue for return. With these solutions, if something happens to a unit an employee kept over a weekend, the organisation will know exactly who should be accountable and can take whatever necessary actions. Using a key management system ensures that no matter whether your vehicles are being managed by a long-time employee or someone you brought on board last week, policies will be followed correctly. Liability and licences Ensuring that drivers have valid licences is crucial for companies because drivers with expired licences are no longer covered by insurance. So if an unlicensed driver were to gets into an accident, the company would be liable for any damage. Users with expired licences can be locked out of the system to prevent them from checking out a vehicle until they have renewed their licence Key management solutions allow fleet managers to input users’ driver’s licence information into the system. When an individual’s expiration date arrives, they can verify that the licence has been renewed and update the information. Users with expired licences can be locked out of the system to prevent them from checking out a vehicle until they have renewed their licence. This may seem like a minor feature, but it is extremely important for a fleet manager to manage that data on a daily basis to determine whether a driver is eligible to check out a vehicle. If that has to be done manually, it can be overwhelming, particularly for large fleets. Therefore, having the system perform that task automatically is a major benefit for fleet managers. Additionally, there are a number of regulations that place caps on how many hours a day truck drivers are permitted to be on the road. With key management solutions, a company can view and track in real time how many hours its drivers have put in each day to ensure compliance with these regulations. These regulations can also be programmed into the system to alert fleet managers if and when a driver exceeds those limits, which can have important legal implications. In these situations, knowing how many hours their drivers are actually logging is critical for fleet managers. Ensuring that drivers have valid licences is crucial for companies because drivers with expired licences are no longer covered by insurance Flexibility of vehicle location Another important function of key management systems is the ability to check out a vehicle key from one location and return it to another. For example, a trucking company may have drivers pick up a vehicle at a central distribution center and drop it off at a remote warehouse for the next driver to use. With a peg-and-notebook system, there is no way for a fleet manager to verify that the key has been returned, but a networked solution will track that automatically. If for some reason the driver forgets to return the key, the system will issue an alert immediately, allowing the fleet manager to proactively ensure that it will be available when needed. Real-time vehicle maintenance Reporting is another main feature of key management systems, but reports only tell a story after the fact. Where these solutions really shine is by providing real-time notifications that allow for immediate action rather than relying on historical data to determine reaction. For example, if a driver experiences an issue with the brakes on a vehicle, he or she can use the key management system to report it immediately. The system will notify the fleet manager and remove the vehicle from service for maintenance. Without this feature, the manager might now be aware of the problem until receiving a report. In the meantime, someone else could sign out the vehicle without knowing about the problem, which may have worsened. In these cases, there are few, if any, positive potential outcomes. Clearly, basic methods of key management do not ensure that fleet vehicles will be properly controlled. Automated solutions, on the other hand, allow fleet managers to control and track vehicle usage to reduce wear and tear while improving accountability and avoiding liability issues. These key management solutions deliver a high level of flexibility and real-time awareness fleet managers need to ensure the most effective and efficient use of their vehicles to streamline operations and, perhaps most importantly, reduce overall costs.
Key control technology and guard tour systems provide a ready-made solution for healthcare organisations to enhance their security & asset management protocols Morse Watchmans, a leading provider of key management solutions explains how to provide top-notch security and manage asset with a combination of key control systems, asset lockers and guard tour systems. The shift from manpower resources to technology as a main line of defence is having a significant impact on an organisation’s physical security strategy, and nowhere is this more true than in the medical/healthcare industry. From video surveillance to access control to video management systems, technology solutions are playing an increasingly important role in keeping our hospitals safe for patients, staff and visitors. Along with these physical security systems, a combination of key control technology and guard tour systems provides a ready-made solution for healthcare organisations to enhance their security and asset management protocols. The following three examples illustrate how this is achieved. Key control and management systems Regardless of the size or type of medical facility, a physical key control and management system is a fundamental security technology for controlling perimeter doors and those throughout the facility. The systems are a custom-tailored solution designed to record the access history of each key, including user, date and time of check-out/return information. By releasing assigned keys only to users with the proper authorisation code, the system helps to ensure adherence to the hospital industry standardised policies and procedures. In addition, by securing keys in a tamper proof key cabinet, the facility can meet the Joint Commission on Accreditation of Healthcare Organisations (JCAHO) standards for performance, which state, “the hospital controls access to and egress from security-sensitive areas.” User-friendly PC application software can complement the system and deliver real-time polling transactions, status, alarm and reporting capabilities. Activity reports can be customised to trace key movements by time, date and user code or biometric access data. Technology developments and new products have also made it possible to integrate key control as part of a facility's networked security system. Open protocols enable connectivity to access control and other systems via RS-232 or networked via Ethernet to enable a comprehensive integrated security system. Asset lockers can be used to store employees’ personal items, medical devices and equipment, medicine, lab results and items deemed a safety risk Asset lockers for storage and safekeeping Medical devices, radios, cell phones, hand-held computers and other equipment used by different personnel through the course of any given day represent potential security breaches if stolen or misplaced. Test material or data from research labs must also be secured when not in use, and accessed by authorised users only. Even weapons that may have been confiscated from ER patients are potential safety risks if not properly secured. To accommodate these everyday situations, asset lockers that are part of a key control system can provide the necessary storage and safekeeping of these items. Access devices, such as magnetic cards or proximity devices, can also be secured in the specially designed asset lockers and used in any combination with standard key or locker modules. Using minimal wall space, the locker cabinets can eliminate outdated lock boxes, unreliable manual logs and messy identification tags. Typically constructed of rugged stainless steel, the systems are designed to resist abuse and are alarm-protected against tampering. Guard tour systems for secure perimeters and incident reports Automated guard tour systems are tools that security personnel can use to do their jobs more efficiently and effectively, while helping to visibly reassure hospital staff that the premises are secure. Stations are set up around the facility and, as the security guard walks by with the handheld device, the system reads and records when it was there. The device can be programmed to prompt either sequential or random tours for the officers, and the officer can enter a standardised code at any station to report an incident or potential risk, such as ice on a walkway or a broken light fixture. In a medical environment, this can be a tremendous benefit to help counter liability issues.
Although 2015 seemed like the year of data breaches, it was also the year that the Internet of Things (IoT) achieved real traction. Key management systems and most other advanced security solutions can now be integrated with the networked security system (i.e. identity management, access control, IP video surveillance, intrusion and other systems) to strengthen risk management strategies. Specifically, Morse Watchmans’ KeyWatcher Touch can now be integrated with Lenel’s OnGuard Access Control System, Honeywell Pro-Watch® and with the Software House C-CURE 9000 Access Control System. The integration allows users to efficiently manage the KeyWatcher Touch system configuration for access, storage, key tracking and other features through the access control systems. IoT-driven innovation The IoT also helped to drive key control system innovation along with improved integration capabilities. For example, management systems can send detailed alerts via email to specific recipients. Emails are pushed to the server and delivered faster and can be sent securely from an external or Web-hosted email service. These notifications can be associated with specific users, keys or other factors, and can be programmed to contain a specified key’s current location, which keys a person may have, which haven’t been returned or when they are due to be returned. SMS notification is also an option. Meeting customer needs and improving the user experience will continue to be a driving force in strengthening our product portfolio in 2016 and beyond. As an example, instead of upgrading or replacing the hardware, end users will be able to upgrade the software of a KeyWatcher system to have any new features. Time-saving features such as the ability to integrate multiple locations, with common usage of databases and programming; real time information; local and remote access; computerised reporting; specialised alert notifications and ease of use are all designed to enhance use. System integration as risk management strategy System integration will remain a prominent risk management strategy. As a strategic component of an overall security plan, the KeyWatcher key management system continues to deliver valuable risk mitigation by maintaining strict accountability for keys and limiting both key duplication and distribution. The key control’s reporting system, together with the audit data from an access control system, provides a strong evidence trail to support incident management and forensic auditing. See the full coverage of 2015/2016 Review and Forecast articles here
A variety of control and usage options are available for automated key management systems in data centres The protection of networks and data centres is a growing concern given the recent spate of high profile security breaches, and it is forcing organisations into taking serious steps to improve protection. For many businesses, this means implementing a combination of passive and active security measures designed to deter, detect and react against threats. Included in these measures are multiple layers and types of safeguards, including physical measures, such as video surveillance or mantraps, and established policies and procedures that limit physical access, such as the use of key management and access control systems. In particular, key systems are designed to securely hold keys and automatically track key usage. To access a stored key, the authorised user simply enters his or her personal identification code on the keypad and when the system verifies the user, the door will open and the location of the requested key will light up. Key control systems can also be configured with card readers or biometric readers and can be networked for centralised control. At any time, security operators can view the status of any key in the system; quickly and then ; determine who currently has which keys out and for what area and when they are scheduled to be returned; or determine who has had keys out, for what areas and when. Keys can be returned to any cabinet in the system, but if a key is not returned when scheduled, e-mail alerts and text messages can be sent to selected individuals to enable quick action. These types of automated key management systems are ideal for use in a data centre facility because, in addition to the security they provide, they offer a variety of control and usage options. Following are a few scenarios that illustrate how implementation of these options can help ensure a more secure facility. Specialised enrollment This application entails enrollment of individuals based on their function. For example, an operations centre engineer can be authorised for 24/7 key access, whereas a technician may be restricted to accessing a particular key at certain times and for specific amounts of time. Similar access restrictions/permissions are easily programmed for personnel such as cleaning staff or security guards, who have reason to be on the premises but are not company employees. System administrators can quickly and easily terminate or revise individuals’ access in the event they leave their job or their shift is changed. Additionally, keys are securely attached to a fob, which prevents switching or duplicating keys. Access control key systems To address security concerns in high risk environments such as data centers, a Remote Box provides an additional layer of protection. The key control cabinet is installed in a secure room where it is protected from any potential vandalism or tampering, and the Remote Box is typically installed outside the secure room. Once an authorised employee inputs his PIN and other information into the Remote Box and it is validated, a second employee inside the secure room inputs her information as well, providing access to the key for which the first employee is authorised. To address security concerns in high risk environments such as data centres, a Remote Box provides an additional layer of protection The versatility of the key control systems also lends itself to more complex applications in larger data center environments, as when multiple pieces of identification are needed to move about the data centre. In this example, a general access badge would allow the employee entrance to the building and a second badge would be used to access internal areas of the data center facility. To maintain tight security, the internal access badge would be secured in a key cabinet when not in use by the authorised employee. Custom tailored configurations Sophisticated key management allows for a wide range of configuration and installation options, including other items found in a data centre to which access also needs to be controlled. These might include radios, cell phones, hand-held computers, specialised test equipment, etc. which are used by different personnel through the course of any given day and are expensive and represent potential security breaches if stolen or misplaced. Additional modules for the system such as lockers can hold and control access to these devices, complete with an audit trail to record when they are removed and by whom. And, as access control systems continue to proliferate, the access devices themselves, such as magnetic cards or proximity devices, need to be secured in the same way as physical keys do. More advanced systems also accommodate these devices with specifically designed modules that can be used in any combination with standard key or locker modules. Given that so much of an organisation’s assets and information are online and accessible, organisations must take a proactive approach to defending against these attacks. Today’s key control systems deliver ample testament to the benefits of reducing security threats with a well implemented key management system
2014 saw more organisations making data-driven decisions with insight or foresight provided by intelligent analysis of the data Morse Watchmans 2014/2015 Review and Forecast: 2014 saw a year of continued change in the security marketplace. A healthier economy triggered growth in new projects and helped loosen the purse strings for capital expenditures. From a technology standpoint, the industry evolution to a more network-centric environment created additional opportunities for manufacturers to partner. This has moved the needle well beyond the basic video surveillance-access control partnership to new levels that provide seamless, end-to-end solutions for customers. A budding trend with great significance and potential is predictive analysis or forensic auditing and its potential for affecting a company’s risk profile. More and more, organisations were making data-driven decisions with insight or foresight provided by intelligent analysis of the data. Going forward, both partnering and data analytics will continue to dominate the security landscape because it will lead to improved system functionality and to a more centralised control of the overall system. And with centralised control, data can be more effectively gathered and analysed. The benefits of this development can also be applied to the small business owner as well as the enterprise organisation and thus provide more opportunity for growth. Morse Watchmans has been steadily refining and adding to their product portfolio with an eye on these changes. Improved inter-operability, increased options for alerts and more sophisticated and comprehensive reports have made key control a vital part of today’s physical security systems. And when key management systems are paired with related industry access and alarm systems, the end result is a more streamlined solution that delivers added operational efficiencies, improved reporting capabilities and potential cost benefits. The ultimate recipient of the benefits of change has also been, and will continue to be, the end user. They are increasingly recognising the benefits of integrated network security solutions in assessing risk and thwarting crime, and as a result looking for a security platform that is flexible and cost effective with minimal requirement for technology management. Manufacturers who understand and act upon these needs will be better positioned to take advantage of the opportunities generated. See the full coverage of 2014/2015 Review and Forecast articles here
It used to be that the word “lockdown” was only ever used in reference to an emergency protocol to restrict movement in a prison environment. Today however, the term is in common usage in educational and other environments to describe measures taken under certain conditions of threat. In this article, Fernando Pires, VP of Sales and Marketing at Morse Watchmans, explains that lockdowns, along with building evacuation and sheltering procedures, are an integral part of a school’s emergency plan that can save lives. These best practices are foundational mechanisms that enable effective, efficient, and collaborative incident management by school staff and first responders. Specialised technologies such as key control and management systems are an additional resource that can further facilitate incident management and help ensure the safety of the building’s occupants. Key control and management systems are used to store and safeguard mechanical and access card keys for a facility. Access to keys is granted only to pre-authorised personnel presenting viable identification such as an approved user code, an access identification card or a pre-registered biometric finger- or hand-print. The system tracks all access activity so school administration or facility management knows who removed a key and when, and if/when the key was returned. Planning and Prevention Key control and management facilitate incident management and help ensure the safety of a building's occupants Preparedness activities in advance of any potential incident are fundamental in a school’s emergency plan. Procedures such as vacating hallways, shelter-in-place and locking doors are particularly important steps and even more so where minors are involved. In the case of a lockdown in an education environment, whether primary schools, secondary schools, or higher education, a robust key control and management system can provide an additional layer of security and information for first responders. For example, badges can be pre-configured and distributed to designated first responders and in the event of an incident, when they reach the scene they simply scan the badge into the system and the critical emergency keys will be released. The key control system makes it easier for school teachers to act in accordance with emergency procedures such as shelter-in-place and locking doors from the inside. The locked doors can only be opened from the outside with a key that is stored in the key cabinet and those keys can only be accessed by authorised individuals with a proper code, badge or biometric identification. Key control systems allow emergency personnel to quickly and easily have access to locked classroom doors, closets and other spaces where children and teachers might be hiding from a gunman – or where a criminal may be hiding. Key control takes on even more relevance in emergency planning and preparedness on college and university campuses. Campuses often cover large geographic areas; student and faculty personnel change from semester to semester; hospitals, research facilities, dormitories and food service areas are additional to academic facilities – and all have keys that need to be cataloged, stored and tracked. In these particular situations, a key control and management system can help address the challenges related to a campus emergency and help facilitate the needs of first responders. Without adequate measures in place for securely storing keys and accurately tracking their use, keys to sensitive areas, private offices and restricted sites can become misplaced, resulting in serious breaches of security and the possibility for valuable time lost when emergency situations arise. A key control system maintains strict accountability for keys and limits both key duplication and distribution. Actionable, Timely Information Elevates Response College and university campuses are never entirely closed and people are coming and going all the time. Buildings are often open 24 hours a day or, if locked, accessible with school badges. Entrance to labs, IT departments and other restricted areas is usually by physical keys or access control cards. In all, key control is a very strategic and integral element within the school’s security platform and actionable, timely information is critical to its functioning. When time is of the essence, the up-to-date and reliable information provided by a key control system can be accessed quickly, allowing personnel to proceed with established procedures regarding secure areas or valuable assets Scheduled email reports of what keys are in or out and who has/had them keeps security management informed and up to date. If an incident occurs, management can query the system for specific details such as listing all transactions between certain times and when doing a follow up investigation, request a report for the hour preceding the incident. Or, immediately following an incident, a report can be generated showing which keys are back in the system and which keys are still outstanding and who last accessed them. Together with the audit data from an access control system, a key control system’s reporting system provides a strong evidence trail. When time is of the essence, the up-to-date and reliable information provided by a key control system can be accessed quickly, allowing personnel to proceed with established procedures regarding secure areas or valuable assets. For example, if school vehicles must be moved out of an area because of potential flooding or fire, doing so quickly and efficiently can depend on how quickly each of the vehicle keys can be located. Immediate confirmation of where the keys are or identifying who has possession of them can make the difference in saving or losing school assets. Key control systems designed with touch screens also provide the user with a convenient interface for querying key activity. If the security guard notices lights on in an office when they shouldn’t be or hears what sounds like a gun shot in a building, the key control system can provide important and immediate information. With just a few touches to the screen, the guard can quickly and easily determine which keys are out, who took them and when. This information can prove vital in determining a response to the immediate situation. Pertinent information regarding access to a restricted area such as a bio-hazard area may also be required. The notes function of a key control system can provide information such as “respirator needed for entrance”, or a key control system can be programmed to provide random, one-time codes that must be entered when using the key. System Features Enhance Efficiency It’s also important to remember that in addition to traditional first responders such as fire, law enforcement and EMS (emergency medical services) personnel, there is a wider circle of school staff and departments who play an integral role in emergency situations. Key control systems that are strategically located, networked and easy to use and manage add to an individual’s ability to efficiently cope with an emergency. Larger sized LCD screens on the front of the key cabinet allows for easier viewing by the user and also permits the addition of more information to be displayed on the screen. Content, directions or other information is displayed with crisp colors and high contrast resolution to help ensure excellent readability. Newer systems even display keys available for access or can provide users with the location of a specific key. Mobile apps enable authorised users to see a wide range of live information and to interact remotely with the key control systems for added security or response time. Educational facilities, staff and first responders face a greater variety and intensity of personal threats than ever before. For these reasons, key control and management should be part of any emergency plan for school buildings and higher education campuses.
With so much money flowing in and out in the form of cash and chips, casinos are a highly regulated world when it comes to security. One of the most critical areas of casino security is key control. Physical keys are used for access to all of the most sensitive and highly secured areas of the casino, including counting rooms and drop boxes, so the rules and regulations that relate to key control are extremely important to maintain tight control and minimise loss and fraud. Casinos that are still using manual logs for key control are at constant risk due to the inaccuracies inherent in this system, including signatures that are missing or illegible. In addition, the manual sign-out process for keys is time consuming and error-prone. Analysis, reporting and investigation are highly labour intensive as they involve digging through piles and boxes of log sheets, making it difficult to keep an accurate account of key use. This also has a negative impact on compliance. The answer to these issues lies in the use of an electronic key control solution. In this article, Fernando Pires, VP of Sales and Marketing at Morse Watchmans, outlines numerous features that should be considered when choosing a key control and management solution that meets the needs of the casino environment. Multiple layers of security Each individual user should face at least two layers of security before accessing any key in the system. It is not enough for biometric identification, a personal pin number or an ID card swipe to identify the user’s credentials. The cabinet door should not open until the system verifies that the user has permission for the specific key requested. Three-man rule For certain keys or key sets that are highly sensitive, compliance regulations require signatures from three individuals, one each from three separate departments. These may include keys to drop boxes and counting rooms. Typically the three individuals would include a drop team member, a cage cashier and security officer. A secure key management system should be programmable to recognise these keys or key sets and only open the cabinet door and release them once the three required logins are complete and the credentials verified. A system designed for user convenience will prompt for the additional logins only once, regardless of how many sets were initially requested. Returning highly sensitive keys may be even more highly regulated, with multiple levels of security required. For example, “Full Secure” would require that the same users who removed a key must return the key, while “Department Secure” would only require the first user’s credentials to match exactly while the two other users would have to match by department. The key control system should be configurable to handle these levels and others as well. Limitation of access Access to drop boxes outside of scheduled hours is another regulated area that requires specific functionality from a key control system. In the case of an event like a machine jam, customer dispute, machine relocation or maintenance, the user would typically be required to include a predefined note and freehand comment with an explanation of the situation before removing keys. In a casino environment, specific keys or key sets should be configurable so that the user is prompted for this. Reports detailing unscheduled access, including the reason why the access occurred, should be available as required by many various gaming agencies. Additionally, emails and/or SMS text messages should automatically be generated any time those sets are accessed for unscheduled drops. Access to table game drop box release keys is limited to the specific employees who are authorised to remove the table game drop boxes from the tables. These same individuals would be precluded from having access to table game drop box contents keys at the same time they have the table game drop box release keys out. Again, this functionality should be easily and conveniently configurable in a key control solution. Key control and management systems must be flexible to accommodate various gaming regulations Reporting Gaming regulations require a number of different types of audits on a regular basis to assure the casino is in full compliance with regulations. For example, for employees signing the table game drop box keys in or out, gaming requirements in Nevada, USA call for maintenance of separate reports indicating the date, time, table game number, reason for access, and signature or electronic signature. An “electronic signature” includes a unique employee PIN or card, or employee biometric identification validated and recorded through a computerised key security system. The key management system should have custom software that enables the user to set up all these and many other types of reports, which can run and be delivered automatically to management on a regular basis. A robust reporting system will also greatly assist the business to track and improve processes, assure employee honesty and minimise security risks. Convenience It is useful for certain keys or key sets to be very quickly available to their authorised users. With an instant key release feature, the user only needs to input their credentials, and the system knows whether they already have their specific keys or not. If not, the system unlocks and their keys are immediately available to them. Returning keys is just as fast and easy. This saves time, reduces training and helps to overcome any language barriers. Personnel like housekeepers and slot floor attendants can be organised into “groups”. For them, the hotel and casino would have multiples of the same respective key sets available; the system releases the next available set to each authorised user from a group, which cycles through the sets so that each gets equal usage. Gaming requirements do vary from one place to another. The key control and management system chosen for deployment in a casino environment should be flexible, so that it can accommodate for any of the above regulations and much more. It should also be modular and scalable, so the number of keys and the scope of features can change and grow along with the business. Finally, it should be easy to use, as training time can be costly and many different employees will need to be able to access the system. By keeping these elements in mind, a casino will be able to choose their key control system wisely.
News mentions
Morse Watchmans, the provider of key control and asset management systems, will showcase its KeyWatcher Touch, AssetWatcher, and KeyWatcher fleet key and asset management solutions at GSX 2019 this week (booth #1153). “We are excited to show GSX 2019 attendees how key management and asset control can help them to create a state-of-the-art security system for their organisation,” said Fernando Pires, CEO, Morse Watchmans. “We continue to be completely focused on providing innovative solutions for our customers to help them achieve their business goals, reduce costs, and secure their enterprise.” Access control system Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to remove and return a key to any key cabinet in an enterprise. Key Group Associations feature makes it easier for users to cover special situations New features to KeyWatcher Touch include remote functions added to the TrueTouch Software that supports multiple user logins for key returns and removals. A new ‘Key Group Associations’ feature allows users more specific key access to be configured directly through the access control system. This feature makes it easier for users to cover special situations, such as when an employee is out of the office that day, or if they fit the criteria for a specific profile, but temporarily need some additional keys. RFID-enabled locker system AssetWatcher is a flexible, scalable, and highly capable RFID-enabled locker system. It can support more than 10,000 users on a single system and is configurable in three modes. AssetWatcher’s RFID technology allows users to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Available in 10, 22, or 34-locker configurations, each system is designed to be freestanding and can be mounted to the wall or the floor. A number of modes allow AssetWatcher to accommodate a wide variety of uses. Classic mode allows assets to be returned either to any open locker or to be assigned to a specific locker. Owner mode assigns individuals with a specific locker, which may or may not be shared with other users Personal mode allows assets to be added to the system for tracking, with permissions based on lockers rather than assets. Leased mode allows users to ‘lease’ a locker temporarily. Owner mode assigns individuals with a specific locker, which may or may not be shared with other users to accommodate shared or specific assets that may be used by one or more persons. Stronger key security KeyWatcher Fleet is the first key security system that puts users in command of vehicle distribution, comprehensive utilisation, right-sizing of a fleet, and more. The software allows fleet managers to create user role-based ‘Pools’, or groups of vehicles, to assign each vehicle accordingly. A convenient dashboard displays real-time status, bookings summary, vehicle use and many other data points to instantly provide the pulse of the fleet. Built on the KeyWatcher Touch hardware, KeyWatcher Fleet uses the same 16, 8, and 6-key modules, along with the same card and locker modules. Unique PIN codes ensure only authorised individuals can access keys, or users can add an optional card or fingerprint reader for even stronger key security, allowing users to manage thousands of keys and users with a single system or network.
Morse Watchmans, the industry pioneer in key control and asset management systems, is showcasing the benefits of their KeyWatcher Touch and AssetWatcher key and asset management solutions at IFSEC International 2019 (stand no. IF620) in London, from June 18-20. The company is also introducing KeyWatcher Fleet, a key control system specifically for fleet management, to IFSEC attendees. “We’re thrilled to once again showcase the exciting features of our AssetWatcher and KeyWatcher Touch solutions,” said Fernando Pires, CEO at Morse Watchmans. “This year, IFSEC attendees can get a demo of our KeyWatcher Fleet, which is purpose-built for fleet managers. We are looking forward to sharing all three key and asset control products with IFSEC 2019 attendees.” Tools to optimise vehicle usage Morse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usageMorse Watchmans’ KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usage while reducing many operational costs. Managers can create user role-based ‘Pools’, or groups of vehicles, to automatically assign each vehicle accordingly. Flexible booking workflows enable customisation to balance usage, ensure vehicle availability and more. A range of service features makes it possible to report problems and automatically initiate new or scheduled work on each vehicle. System alerts notify management to specific issues such as an unauthorised booking attempt or expiring driver’s license, and the system generates a number of useful reports with actionable insights. A convenient dashboard displays real-time status, bookings summary, vehicle use and many other data points to provide the pulse of the fleet in an instant. KeyWatcher Touch key management system The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker systemMorse Watchmans’ KeyWatcher Touch key management system utilises a 7” touchscreen for an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enrol fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile devices and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three usage modes for flexible usage. AssetWatcher’s RFID technology allows you to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Proven features of KeyWatcher, including email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher.
At ISC West 2019 this week in Las Vegas, Morse Watchmans (booth #11109) is showcasing its AssetWatcher and KeyWatcher Touch key and asset management solutions that protect important keys and physical assets, resulting in reduced downtime, fewer losses, and improved accountability. On display alongside AssetWatcher and KeyWatcher is Morse Watchmans’ latest introduction, KeyWatcher Fleet – the first key management platform designed from the ground up with Fleet Managers in mind. “Morse Watchmans has proven experience in delivering tailored key and asset management systems with full audit trail capabilities, for a multitude of applications,” said Fernando Pires, CEO, Morse Watchmans. “AssetWatcher and KeyWatcher Touch make it easier than ever to protect valuable assets and to streamline key management, while KeyWatcher Fleet breaks new ground in optimising fleet usage.” Available in 10, 22, 34-locker configurations, AssetWatcher locker is sized for small laptops, tablets, phones and other objects RFID-enabled locker system AssetWatcher is a flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile electronics, and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three modes for flexible usage. AssetWatcher’s RFID technology allows users to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Available in 10, 22, or 34-locker configurations, each AssetWatcher locker is sized for small laptops, tablets, phones and other objects. Additional systems can be added as needed to expand the solution to support even more lockers. Each system is designed to be freestanding and can be mounted to the wall or the floor for convenience and stability. SmartKey system with KeyAnywhere technology Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. KeyWatcher Touch also offers the convenience of scheduled PDF reports that are emailed KeyWatcher Touch also offers the convenience of scheduled PDF reports that are emailed to authorised recipients. Email delivery of customised or standard reports can be scheduled for any frequency or specific time, or they can be accessed using the Morse Watchmans smartphone app. System administrators have access to view or run reports as needed. The system also enables security management to notify a user via email when a key becomes overdue. Actionable insight on fleet utilisation Built on proven KeyWatcher Touch hardware, KeyWatcher Fleet is the only key control system with software designed specifically for fleet management. A dashboard displays vehicle use, bookings, status, and more. Administrators can generate quick and customisable reports to gain actionable insight on fleet utilisation and operations. Morse Watchmans Smarts lets administrators create policies to enable automatic vehicle allocation. Vehicles can be assigned by lowest mileage, most fuel, priority and more. Drivers can be notified automatically via email or text if a specific vehicle is not available, and unique pin codes or optional card or fingerprint readers provide strong key/vehicle management.
Morse Watchmans, the global provider of key control and asset management systems, is introducing KeyWatcher Fleet this week at ISC West 2019 (booth #11109) in Las Vegas. “We are continually focussed on developing key control solutions that go beyond securing keys to help users improve business operations,” said Fernando Pires, CEO, Morse Watchmans. “That was our charter when we engineered KeyWatcher Fleet. As fleet professionals know, when you control the keys, you control the fleet.” Key security system for fleet management KeyWatcher Fleet puts users in command of vehicle distribution, comprehensive utilisation, right-sizing of a fleet and more.KeyWatcher Fleet is the first key security system with software designed from the ground up for fleet management applications. KeyWatcher Fleet puts users in command of vehicle distribution, comprehensive utilisation, right-sizing of a fleet and more. The software allows fleet managers to create user role-based “Pools”, or groups of vehicles, to assign each vehicle accordingly. Flexible booking workflows enable customisation to balance usage, ensure vehicle availability, and more. Multiple service features make it possible to report problems and automatically initiate new or scheduled work on each vehicle. System alerts notify management to specific issues such as an unauthorised booking attempt or expiring driver’s license, and the system generates a number of useful reports with actionable insights. Unique PIN codes for authorised key access KeyWatcher Fleet is networkable and offers API support for integrationsA convenient dashboard displays real-time status, bookings summary, vehicle use and many other data points to provide the pulse of the fleet in an instant. Built on the robust and proven KeyWatcher Touch hardware, KeyWatcher Fleet uses the same 16, 8, and 6-key modules, along with the same card and locker modules. Unique PIN codes ensure only authorised individuals can access keys, or users can add an optional card or fingerprint reader for even stronger key security, allowing users to manage thousands of keys and users with a single system or network. Like all Morse Watchmans key and asset control solutions, KeyWatcher Fleet is networkable and offers API support for integrations.
Morse Watchmans, the provider of key control and asset management systems, is demonstrating their new KeyWatcher Fleet system along with their KeyWatcher Touch key management system at this week’s Security and Counter Terror Expo (Stand C36) in London. “While KeyWatcher Touch continues to deliver the best in key management for general security operations, we are very excited to launch KeyWatcher Fleet to address the specific needs of fleet operations and management” said Fernando Pires, CEO at Morse Watchmans. Reducing operational costs “When you control the keys, you control the fleet – so this new solution will be a tremendous advantage to fleet managers across all industries.” KeyWatcher Fleet offers fleet managers a wide array of tools to maintain and optimise vehicle usage while reducing many operational costs. Managers can create user role-based ‘Pools’, or groups of vehicles, to automatically assign each vehicle accordingly. A range of service features makes it possible to report problems and automatically initiate new or scheduled work on each vehicle Flexible booking workflows enable customisation to balance usage, ensure vehicle availability and more. A range of service features makes it possible to report problems and automatically initiate new or scheduled work on each vehicle. System alerts notify management to specific issues such as an unauthorised booking attempt or expiring driver’s license, and the system generates a number of useful reports with actionable insights. Desktop fingerprint reader Alongside the KeyWatcher Fleet system, Morse Watchmans is showcasing their flagship KeyWatcher Touch key management system, utilising a touch screen and their patented SmartKey system with KeyAnywhere technology that makes it simple to return a key to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. “We’ve continue to add enhancements to our KeyWatcher Touch system, making it ever more capable,” said Mr. Pires. “We always welcome the opportunity to connect with our community and show them what additional benefits Morse Watchmans can deliver.”
Morse Watchmans, global provider of key control and asset management systems, is showcasing their KeyWatcher Touch key management system at ISC East in New York City. Also, on display is AssetWatcher, their RFID-powered asset management solution for sensitive and valuable assets. KeyWatcher Touch system “We always love the opportunity to get our product in front of new faces,” said Fernando Pires, CEO at Morse Watchmans. “ISC East gives us the chance to show the NY metro area the benefits that KeyWatcher and AssetWatcher can bring their business.” Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface and patented SmartKey system Morse Watchmans’ KeyWatcher Touch key management system features a 7” touchscreen with an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. AssetWatcher RFID solution AssetWatcher is a flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile electronics, and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three modes for flexible usage. AssetWatcher’s RFID technology allows you to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Proven features of KeyWatcher, including email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher. “We’ve taken the features in KeyWatcher that our customers rely on most and applied them to AssetWatcher,” said Mr. Pires. “We also make a point to continually improve our KeyWatcher system based on user feedback, and we’re excited to show these powerful products this week in New York.”
Morse Watchmans, the provider of key control and asset management systems, is demonstrating the benefits of their KeyWatcher Touch key management system at the GSX show (formerly ASIS) in Las Vegas from September 25-27. The company is also showcasing AssetWatcher, their asset management solution which uses RFID along with proven KeyWatcher technology to secure and store valuable assets. “It’s always great to be able to put AssetWatcher and KeyWatcher Touch in front of our security industry community,” said Fernando Pires, CEO at Morse Watchmans. “People really appreciate the opportunity to see our solutions in person and learn more about how they can help improve safety and security.” Desktop fingerprint reader AssetWatcher can easily support more than 10,000 users on a single system and is configurable in three usage modes for flexible usage Morse Watchmans’ KeyWatcher Touch key management system utilises a 7” touchscreen for an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. The AssetWatcher is Morse Watchmans flexible, scalable, and highly capable RFID-enabled locker system. Perfect for tools, mobile devices and other valuable items, it can easily support more than 10,000 users on a single system and is configurable in three usage modes for flexible usage. Key management features AssetWatcher’s RFID technology allows you to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Proven features of KeyWatcher, including email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher. “We’ve identified the key management features our customers rely on most and applied them to asset management for AssetWatcher,” said Mr. Pires. “We’re also continually evolving and enhancing the capabilities of our KeyWatcher system based on our experience and feedback from the industry, and we are excited to show these products here at GSX.”
Morse Watchmans, the industry provider of key control and asset management systems, is showcasing their KeyWatcher Touch key management system at IFSEC International 2018 in London. The company will also be displaying their asset management solution, AssetWatcher, which uses RFID along with their proven KeyWatcher technology in a locker system to secure and store valuable assets. “We’re excited to bring AssetWatcher and KeyWatcher Touch to Europe’s premier physical security event,” said Fernando Pires, CEO at Morse Watchmans. “Morse Watchmans has identified features our customers rely on with KeyWatcher and applied them to asset management. We’ve also developed our technology and higher functionality for our proven KeyWatcher system. We’re looking forward to sharing these new solutions with the attendees at IFSEC 2018.” Desktop fingerprint reader Morse Watchmans’ KeyWatcher Touch key management system utilizes a 7” touchscreen for an easy to use interface and patented SmartKey system with KeyAnywhere technology to make it simple to withdraw and return a key securely to any key cabinet in an enterprise. Updates to KeyWatcher Touch for 2018 include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilize multiple KeyWatcher Touch server instances with a single SQL database. AssetWatcher, Morse Watchmans’ flexible, scalable, and capable RFID-enabled locker system will also be on display at IFSEC 2018. AssetWatcher can easily support more than 10,000 users on a single system and is configurable in three usage modes for the utmost convenience. It is simple to track who is removing or replacing an asset along with when or where in the system the transaction has taken place. The proven features of KeyWatcher, such as email notifications, multi-site operation, and multi-user capability, bring the highest levels of security and capability to AssetWatcher.
Morse Watchmans, a provider of key control solutions, is now bringing their extensive key management expertise to help organisations keep valuable assets secure. At ISC West 2018 Morse Watchmans will be showcasing their RFID-powered asset management system, AssetWatcher, at booth #12109. “AssetWatcher gives our customer control over the management of important assets, including mobile devices, weapons, tools, and many other important items,” said Fernando Pires, CEO at Morse Watchmans. “With smart, flexible and scalable asset management, items can be easily secured, monitored, and tracked.” The AssetWatcher RFID technology allows you to easily track who is removing or replacing an asset Securing and tracking assets AssetWatcher is an RFID-enabled locker system that enables businesses to secure and track valuable assets. Supporting over 10,000 users on a single system, the AssetWatcher RFID technology allows you to easily track who is removing or replacing an asset along with when and where in the system the asset has been taken from or placed into. In addition, AssetWatcher has many features already proven on KeyWatcher, including SMS and email notifications, multi-site operation, multi-user capability, and scheduled reporting. Equipped with three operation modes and offered in 10, 22, and 34-locker variants, AssetWatcher can also be adapted to suit a variety of applications and enterprises. “Our solutions for key management have given us the expertise to craft the newest innovations in asset management,” continued Mr. Pires. “By adapting many of the features that our clients have come to rely on with KeyWatcher, AssetWatcher can provide the highest levels of security and organisation for assets.”
Morse Watchmans, a provider of key control and key management systems, is showcasing their KeyWatcher Touch complete key management system at ISC West 2018 (booth #12109) in Las Vegas. “KeyWatcher Touch continues to prove its value in securing and tracking physical keys,” said Fernando Pires, CEO at Morse Watchmans. “Across all industries and organisations, physical keys are in constant use and must be protected and accounted for in order to mitigate risk.” Multiple KeyWatcher Touch server instances can be utilised with a single SQL database Desktop fingerprint reader KeyWatcher Touch utilises a touch screen and Morse Watchmans’ patented SmartKey system with KeyAnywhere technology, making it simple to return a key to any key cabinet in an enterprise. Recent updates include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. “We are continually updating our key control solutions to provide more convenience and control for users,” said Mr. Pires. “We’re excited for the opportunity to demonstrate why Morse Watchmans continues to be the industry leader in key control solutions.”
Morse Watchmans, a provider of key control and asset management systems, is demonstrating how their KeyWatcher Touch key management solution helps organisations keep data secure. On display at ISC West 2018 (booth #12109), KeyWatcher Touch provides comprehensive key management to a broad range of industries and business types, including server farms and datacentres. “Data and cybersecurity are paramount today. With sensitive information being accessed via internet-connected endpoints throughout facilities, controlling the access to the areas containing these devices is an integral component of a truly comprehensive cybersecurity plan,” said Mr. Pires. “We’re proud to offer this proven technology to ensure the safety and integrity of important data.” KeyWatcher Touch utilises touch screen technology to control Morse Watchmans’ SmartKey system Securing data via key management KeyWatcher Touch is Morse Watchmans’ proven key control platform, utilising touch screen technology to control Morse Watchmans’ patented SmartKey system with KeyAnywhere technology that makes it simple to return a key to any key cabinet in a system. Updates to KeyWatcher Touch being showcased at ISC West include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilise multiple KeyWatcher Touch server instances with a single SQL database. With a large portion of cybersecurity and data breaches involving the theft of physical hardware, access control by way of key management has become a vital component in securing sensitive data. Internet-connected devices within an organisation with access to internal networks can serve as a digital open door, providing unauthorised data access. KeyWatcher’s features and capabilities make controlling keys and physical access to data Effective access control Further, if physical access to server areas where data is stored is allowed, unauthorised users can easily copy or download the data to be used for a plethora of nefarious purposes, from theft of funds to corporate espionage. By regulating and managing access to keys to the relevant areas within a facility, security teams can grant access only to those with proper clearance, be notified when keys are accessed or overdue to be returned, and create a report showing key access and return times. They can also see which users have taken keys, enabling security to know which people have accessed a relevant data storage area should an incident occur. KeyWatcher’s expansive list of features and capabilities makes controlling keys and physical access to data easy, convenient and secure.
Morse Watchmans, a producer of key management systems, announces an expansion of its ever-growing dealer network through the addition of Grinta Iberica of Barcelona, Spain. As the exclusive Morse Watchmans dealer in Spain, Grinta Iberica will carry the full line of Morse Watchmans products, in addition to having full product demos available at its corporate headquarters. The dealer’s parent company Grinta Venezuela has been a Morse Watchmans dealer for many years, and the expansion into Spain will bring with it extensive knowledge of Morse Watchmans products. Ongoing success in sales strategy “Once again, we have been able to partner with a distributor who is dedicated to providing top-notch sales and service to our customers,” said Fernando Pires, VP Sales and Marketing, Morse Watchmans. “Grinta Iberica brings years of industry experience and will provide outstanding customer support to the markets they serve.” "The expansion and quality of Morse Watchman’s global distribution network reflects their successful sales strategies, positioning them for ongoing success,” said Martin Ferrer, Engineer of the Commercial Area of Grinta Iberica. “We have a great deal of admiration for Morse Watchmans and their solutions, and we look forward to working together.”
Morse Watchmans has announced the release of Gallagher’s Command Centre Access Control System integration module for its flagship KeyWatcher® Touch system. The new module enables users to map Command Centre access groups with KeyWatcher Touch profiles, allowing new users to be added to the system from Gallagher’s Command Centre. New business and security advantages “KeyWatcher’s open architecture platform provides new business and security advantages based on enhanced functionality and centralised control,” said Fernando Pires, VP of Sales and Marketing, Morse Watchmans. “With our new module integrating Gallagher’s Command Centre and KeyWatcher Touch, time-consuming tasks are effectively and reliably automated across the enterprise.” Alarms and events Among other efficiency benefits provided by the integration is the ability for users in the Command Centre to be assigned to a specific KeyWatcher Touch access group. This automatically adds both the user and associated profile to sites for access to specified keys. As well, alarms and events from the KeyWatcher Touch system can be configured and sent to the Command Centre for monitoring. “This integrated solution eliminates duplication and provides the end user with a more secure environment,” said Rob Hughes, Security Consultant at Gallagher Security. For more information visit Morse Watchmans’ Booth, No. 1633, at ASIS 2017.
Morse Watchmans will introduce Version 2 of its industry-leading KeyWatcher® Touch key control and asset management solution at ASIS 2017. ASIS demonstrations Hands-on demonstrations will showcase the new features including support for Morse Watchmans’ new AssetWatcher secure physical storage solution; additional enterprise application functionality; and a new easier and faster database design, among other upgrades. “By leveraging our industry experience and technology proficiency, we enhanced KeyWatcher Touch to optimise convenience, system intelligence and security,” said Fernando Pires, VP of Sales and Marketing, Morse Watchmans. “As a result, this next generation software is more than simply an evolution relative to user needs; it is charting a new direction in key control technology.” New and updated features Support for Morse Watchman’s new AssetWatcher which can secure and track multiple RFID tagged items within a locker, including electronics and metal objects. Featuring the same reliable and easy-to-use interface as the company’s popular KeyWatcher Touch, AssetWatcher includes a bright 7” touchscreen and incorporates the state-of-the-art optical fingerprint reader for strong security. AssetWatcher includes a bright 7” touchscreen and incorporates the state-of-the-art optical fingerprint reader for strong security Users can now utilise multiple KeyWatcher Touch Server instances with a single SQL database to more efficiently manage systems. With this, KeyWatcher Touch systems can be managed by a more local instance of the Server for faster syncing and allows for multiple systems to be synchronised at once. Each Server instance permits multiple simultaneous TrueTouch clients to be connected while giving the user access to all permitted data. New Desktop Fingerprint Reader A new Desktop Fingerprint Reader has been added, allowing users to enroll fingerprints through TrueTouch software in addition to doing so at a local KeyWatcher Touch. Templates are automatically downloaded to all user-permitted cabinets. Additional updated features include a new database design to support the multiple functionalities of the KeyWatcher Touch Server Enterprise with a boost in speed and efficiency for storing and retrieving data from the database. An updated version of the Card Format Builder allows for more complex card formats to be easily added to TrueTouch® and various integration modules. For more information visit Morse Watchmans’ Booth, No.1633, at ASIS 2017.
Morse Watchmans has expanded its portfolio of key and asset control products and technologies with the newly available RFID-based AssetWatcher System. Featured this week at ASIS 2017, AssetWatcher’s RFID technology uses non-contact wireless radio links to recognise and track tagged assets placed in or removed from lockers. It is compatible with multiple types of RFID tags as well as different types of assets, and features an audible confirmation when a tag has been read. Taking asset control to a new level “AssetWatcher with RFID takes asset control to a new level and new direction previously unseen in the industry,” said Fernando Pires, VP of Sales and Marketing, Morse Watchmans. “It’s been uniquely designed to allow the user to store and track RFID tagged assets without the complications often seen in RFID tracking solutions.” AssetWatcher can track multiple items within a locker and can track all types of tagged assets, including electronics and metal objects. Featuring the same reliable and easy-to-use interface as the company’s popular KeyWatcher® Touch, AssetWatcher includes a bright 7” touchscreen and incorporates the state-of-the-art optical fingerprint reader to ensure only authorised users have access to specific assets. AssetWatcher includes a bright 7” touchscreen and incorporates a state-of-the-art optical fingerprint reader Standard/Leased/Owner Modes Operating modes allow AssetWatcher to accommodate a wide variety of uses. In Standard Mode, users are assigned permissions for access to assets or groups of assets. In Standard Mode managers can also specify that assets can be returned either to any open locker or assigned to a specific locker. Leased Mode allows users to “lease” a locker temporarily and is ideal for occasional use or use by visitors. If a user has no assets in the system at the time of sign-in, AssetWatcher assigns them a locker to store their assets, whether or not they are RFID tagged. Once the user removes his or her assets, the locker is deemed to be “free”, and can be assigned to someone else. On-demand enrollment allows users to sign up for a locker using the optional fingerprint reader or access card - ideal for environments with high numbers of temporary users. In contrast, Owner Mode assigns each specific locker to one or more individuals to accommodate shared or specific assets that may be used by one person or a specific group of people. AssetWatcher features At 2.25” high, 14” wide and 8.5” deep, each locker is sized for small laptops, tablets, phones and other objects; AssetWatcher is available in 10-, 22- or 34-locker configurations. Additional systems can be easily added as needed to expand the solution to support even more lockers. Each assembled AssetWatcher system is designed to be freestanding, wall-mounted, or floor-mounted for convenience and stability. “Expanding the capability of asset control with our new AssetWatcher was a natural progression for Morse Watchmans,” adds Mr. Pires. “It’s a merger of our unique technology and industry experience with market demands and trends into a purpose-built RFID asset tracking solution.” For more information, visit Morse Watchmans’ Booth, No. 1633, at ASIS 2017.
New security features protect the system from cyber breaches via the network Morse Watchmans introduces enhancements to its KeyWatcher Touch that are designed to make the key management system even more flexible and useful in fulfilling the safety and security needs of resorts and casinos. New features being presented at Security Essen 2016 include security and notification upgrades and ease of use improvements, all driven by real-world customer feedback.“Now KeyWatcher Touch brings more convenience and network security to add to the ways users benefit from their investment in key management,” said Fernando Pires, VP Sales and Marketing, Morse Watchmans. “By listening to our customers and anticipating their needs, we can continue to deliver outstanding key management system quality.”Cyber breach protectionNew security features protect the system from cyber breaches via the network. With the firewall enabled, all incoming traffic is ignored unless it is on the specific ports the system requires for network and server communication. The data between the KeyWatcher Touch and the KeyWatcher Touch Server can now be encrypted with AES256 technology with a pre-shared key that is definable on a site by site basis.The KeyWatcher Touch Key Management System is also now integrated with AMAG Technology’s Symmetry V8.0.2 Access Control System.Additional upgrades “Now KeyWatcher Touch brings more convenience and network security to add to the ways users benefit from their investment in key management” For further operational convenience, a number of additional upgrades have been implemented. Now KeyWatcher Touch Server service can run under a domain user account. Windows authentication is now supported for SQL, while server logins eliminate the need for the IT department to add SQL users to the SQL Server for the purpose of authentication. The KeyPro III software import utility has been revamped to make it easier to use; for example, imports can now be performed as needed rather than having to complete them all up front.Day-to-day user conveniences have also been upgraded including the ability to replace keys from TrueTouch key tracking software using the SmartKey reader. A new notification that allows for users to be notified when an overdue key has been returned is also included, as well as notifications for dual and triple user removals/returns. All reports in TrueTouch now support being saved/viewed as a PDF, or saved as a CSV file.With these updates, KeyWatcher Touch makes key control for the enterprise safer, easier, and more convenient.
USB ports in Gen2 CPU support up to 32GB high speed flash drives Morse Watchmans introduced a new generation CPU for its KeyWatcher Touch system that is faster, stronger, and more adaptable to meet and exceed the needs of current and future applications.Improved performanceAccording to Fernando Pires, VP of Sales and Marketing at Morse Watchmans, KeyWatcher Touch Gen2 is actually four generations improved from its predecessor. The increase in processor speed, coupled with memory, offers vastly improved performance with a much more sensitive touchscreen, faster user interface, and improved sync times that are 7-10 times faster than before.“The ongoing trend toward enterprise-wide security system integration necessitates a faster and more powerful engine for our key management system. Now, users can experience enhanced system operation with the added benefit and confidence that overall physical security is improved,” said Mr. Pires.Upgraded processor and operating system "Users can leverage the benefits to improve safety and security in their facility through full-featured system integration" Driven by a powerful upgraded processor and operating system, the CPU’s faster speeds improve sync time when encrypting and decrypting communication data. Lists of keys or users in selection screens also show much more quickly and key selection by number/name is faster and more responsive. Memory capacity and speed has also been increased, and the number of USB ports has been doubled to 6. USB ports now support up to 32GB high speed flash drives for more efficient data transfer than previous configurations.Gigabit network supportThe new CPU fully supports gigabit networks that are now commonplace as well as a new dedicated remote display video cable with an increased maximum length of 40 feet.Mr. Pires adds, “Our Gen2 CPU represents a new high point in performance and value for KeyWatcher Touch. Users can leverage these benefits to improve safety and security in their facility through full-featured system integration.”
Morse Watchmans KeyWatcher Touch features security and notification upgrades and ease of use improvements Morse Watchmans is introducing enhancements to its KeyWatcher Touch that are designed to make the key management system even more secure and more useful for today’s business needs. New features being presented at ISC West include security and notification upgrades and ease of use improvements, all driven by real-world customer feedback. Better cyber security and convenience “Now KeyWatcher Touch brings more convenience and network security to add to the ways users benefit from their investment in key management,” said Fernando Pires, VP Sales and Marketing, Morse Watchmans. “By listening to our customers and anticipating their needs, we can continue to deliver outstanding key management system quality.” New security features protect the system from cyber breaches via the network. With the firewall enabled, all incoming traffic is ignored unless it is on the specific ports the system requires for network and server communication. The data between the KeyWatcher Touch and the KeyWatcher Touch Server can now be encrypted with AES256 technology with a pre-shared key that is definable on a site by site basis. The KeyWatcher Touch Key Management System is also now integrated with AMAG Technology’s Symmetry V8.0.2 Access Control System. KeyWatcher Touch for enterprise security and easy key management For further operational convenience, a number of additional upgrades have been implemented. Now KeyWatcher Touch Server service can run under a domain user account. Windows authentication is now supported for SQL, while server logins eliminate the need for the IT department to add SQL users to the SQL Server for the purpose of authentication. The KeyPro™ III software import utility has been revamped to make it easier to use; for example, imports can now be performed as needed rather than having to complete them all up front. Day-to-day user conveniences have also been upgraded including the ability to replace keys from TrueTouch™ key tracking software using the SmartKey reader. A new notification that allows for users to be notified when an overdue key has been returned is also included, as well as notifications for dual and triple user removals/returns. All reports in TrueTouch now support being saved/viewed as a PDF, or saved as a CSV file. With these updates, KeyWatcher Touch makes key control for the enterprise safer, easier and more convenient.
Morse Watchmans’ ISC West exhibit demonstrates how its advanced key management systems create an integrated state-of-the-art security system Product enhancements that add convenience and network security, and an expanded list of integrations and connectivity with leading access control solutions are just some of the innovations featured by Morse Watchmans this week at ISC West. Also on display is a new video that captures the essence of the industry-leading key management product lineup. “Physical security is an evolving market with a consistent need for high performance, cost-effective, unified solutions that help ensure a safe and secure environment,” said Fernando Pires, VP Sales and Marketing, Morse Watchmans. “Our ISC West exhibit demonstrates how our advanced key management systems address those needs with a full range of choices and capabilities for creating an integrated and comprehensive state-of-the-art security system.” Key management system upgrades and innovations Upgrades for KeyWatcher® Touch include a firewall and AES256 encryption technology for data exchanged between KeyWatcher Touch and the KeyWatcher Touch Server. Windows authentication is now supported for SQL Server logins and KeyWatcher Touch Server service can be run under a domain user account. The KeyPro™ III software import utility has been revamped to make it easier to use. User enhancements include the ability to replace keys from True Touch™ key tracking software using the SmartKey® reader. A new notification allows for users to be notified when an overdue key has been returned as well as notifications for dual and triple user removals/returns. All reports in True Touch now support being saved/viewed as a PDF, or saved as a CSV file. A strict key return enforcement option has been added to KeyWatcher Illuminated. KeyWatcher Touch integration with other access control systems The Morse Watchmans booth includes a special presentation area to highlight the integration capability of KeyWatcher Touch with a variety of access control systems including AMAG Technology’s Symmetry V8.0.2 Access Control System. The AMAG Symmetry Integration Module allows users to provide access to KeyWatcher Touch assets to card holders from within the Symmetry system. Morse Watchmans key management product lineup Additional product displays include KeyWatcher Mobile App, KeyBank® Key Control System that provides total accountability of large quantities of keys, KeyRings™, PowerCheck® Guard Tour System and TourPro™ Data Sorting Software. The company’s full product lineup is featured in a new video which can be viewed at the Morse Watchmans booth.
Morse Watchmans announces that its KeyWatcher® Touch Key Management System is now integrated with AMAG Technology’s Symmetry V8.0.2 Access Control System. The AMAG Symmetry Integration Module allows users to provide access to KeyWatcher Touch assets to card holders from within the Symmetry system. Both Morse Watchmans and AMAG Technology cooperatively tested and certified the integration. Morse Watchmans now certified member of AMAG Technology's Symmetry Preferred Partner Program “The integration between these two technologies eliminates the time-consuming and potentially error-prone tasks of entering users into two separate systems,” said Fernando Pires, VP Sales and Marketing, Morse Watchmans. “We are very pleased that the KeyWatcher Touch key control system can be updated and managed through Symmetry, increasing the accuracy and effectiveness of both solutions.” "AMAG’s Symmetry System is used by an increasing number of large organizations for their access control, and to link together all aspects of their physical security,” said Dave Ella, Vice President of Product Marketing, AMAG Technology. “Being able to control traditional keys from within Symmetry is a major advantage, since all facility entry can be managed in one place. That provides considerable audit and compliance reporting benefits. We are happy to welcome Morse Watchmans to the Symmetry Preferred Partner Programme." Tamper-proof systems Morse Watchmans’ key control and management systems are an orderly and secure solution for addressing controlled usage and safekeeping of mechanical keys. The tamper-proof systems are designed so that only authorised users, using pre-programed PIN codes, access cards or biometrics, can access keys; on-board advanced technology automatically records all access activity. In addition to the newly added functionality, Morse Watchmans’ AMAG Symmetry Integration Module allows users to: Add/modify/delete cardholders and badge data to/from the appropriate KeyWatcher Touch users from within Symmetry Assign KeyWatcher Touch users to sites based on Symmetry access codes Configure KeyWatcher TrueTouch alarms and transactions that are passed to Symmetry via events and alarms Configure card format used with Symmetry to pass the correct badge data to the KeyWatcher TrueTouch server Allow configuration of an anti-egress feature that keeps users from leaving an area when holding a particular asset, and can also allow access to additional areas when an asset is held
Experts sections
How to ramp up perimeter security with license plate reader technology
DownloadSolve access control challenges in the healthcare sector
DownloadGetting the most value from Software Subscription Agreements
DownloadShifting trends in operation centers and control rooms for 2021
Download