SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Electronic access control
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Transportation Authority in Pennsylvania employs KeyWatcher access control

Contact company
Contact Morse Watchmans
icon Add as a preferred source Download PDF version

 Morse Watchmans' KeyWatcher
Morse Watchman's Keywatcher tracks and communicates status of keys at SEPTA
The Southeastern Pennsylvania Transportation Authority (SEPTA) has deployed the KeyWatcher Key Control System from Morse Watchmans to keep track of hundreds of keys used at its various bus garages, maintenance shops, an operations control centre and a money-counting facility in and around Philadelphia. KeyWatcher cabinets installed in the multiple facilities automatically record the access history of each key, including the user, date and time of checkout or return. The system releases assigned keys only to users with the proper authorisation code, and cannot be manipulated or easily tampered with.

"Our reason for having the KeyWatcher system is to minimise our risk and exposure," said Chris Ruhl, Surveillance Systems Specialist for the Southeastern Pennsylvania Transportation Authority (SEPTA). "We need to know who took what key and when, and the KeyWatcher is a very honest employee. It literally lives up to its name as a key watcher."

If a key goes missing at SEPTA, it leaves the authority vulnerable to possible theft of the money derived from passenger receipts. Keys are used throughout the SEPTA system of buses, trolleys, trains and special purpose vans that serve approximately a million passengers every weekday in five counties in and around Philadelphia, including one rail line that serves Trenton, New Jersey.

Before installing the KeyWatcher system, keys were kept loose in desk drawers and issued by management, using multiple copies of paper forms as the only audit trail. One lost key made it necessary to change all the locks and keys, at considerable time and expense. Clearly a better system was needed, and the Authority found it in KeyWatcher.

Morse Watchmans provides a complete key control and management solution in KeyWatcher, a modular, scalable system that gives the user total control over who has permission to remove a key, as well as advanced communications capabilities to enable users always to know who removed any key and when it was taken. Modular KeyWatcher illuminated cabinets accommodate storage of keys, lockers or credit cards, and can be customised in any combination of modules in the various cabinet sizes. The cabinets are secured using

Southeastern Pennsylvania Transportation Authority (SEPTA) has deployed the KeyWatcher Key Control System from Morse Watchmans to keep track of hundreds of keys

a built-in keypad enabling up to 2,000 assignable user codes with PINs (personal identification numbers), with an additional customisable access control point which can be a prox or mag card, fingerprint reader or other solution. Keys are secured to a Smart Key locking mechanism and identification chip for additional security and functionality. When a Smart Key is inserted into a KeyWatcher key slot, identification chip data is stored and then retrieved after a key is properly accessed. An illuminated screen features two 16-character lines to display messages and user prompts for various functions, including removal and replacement of keys.

SEPTA has customised their modular KeyWatcher system to include locker modules that accommodate their oversized "bullet" keys used to open the fare box cash vaults. The bullet-shaped steel enclosure and key weigh approximately one pound and cannot easily fit into a traditional key tracking cabinet.

Each KeyWatcher unit's rugged steel construction and almost indestructible Smart Key fobs are designed for heavy use 24/7 in industrial environments such as SEPTA. Illuminated key slots make accessing and returning keys easier.

Also keeping track of the keys at SEPTA is Morse Watchmans' KeyPro Performance Software, a user-friendly PC application that delivers real-time polling transactions, status, alarm and reporting capabilities for the KeyWatcher system. Activity reports can be customised to trace key movements by time, date and user code or biometric access data. The software enables the KeyWatcher system to be accessed and programmed conveniently and remotely via an IP connection. Priority email alerts can be sent to keep management informed of the whereabouts of high-security keys or if they have been accessed at odd hours. Management at SEPTA also uses the software to perform administrative functions such as accessing and programming the KeyWatcher system.

As a government agency, SEPTA's procurements are subject to competitive bidding, and Morse Watchmans submitted the winning bid in 1997 and again in 2008. SEPTA has 15 Key Watcher cabinets installed at its various facilities, including 10

"Our reason for having the KeyWatcher system is to minimise our risk and exposure," said Chris Ruhl, Surveillance Systems Specialist for SEPTA

cabinets in bus garages, two in maintenance shops, two in the money-counting facility and one in the operations control center. Around the clock, every day of the year, the system completes approximately 480 access/return transactions on an average weekday and about 100 over a weekend. About 100 users have access to the keys. The key cabinets range in size from 16-key capacity to 48-key capacity cabinets, and two of them include custom-designed lockers for securing bullet keys.

"KeyWatcher provides SEPTA with excellent value for the price," said Mr. Ruhl. "The KeyWatcher product is easy to use, reliable and durable, and requires minimal maintenance."

Upgrades are provided as requested by SEPTA, and Morse Watchmans is quick to respond to special needs such as the custom-modified locker for securing the bullet keys. The system has been so successful in addressing vulnerability and exposure to theft that all SEPTA keys are now secured in KeyWatcher cabinets.

Try our KeyWatcher Configurator tool to design your ideal system to meet your requirements (Note: if using a mobile device, please turn the phone to landscape mode.)

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Electronic security systems
  • Electronic door locks
  • Electronic access control
  • Related links
  • Morse Watchmans Access control systems & kits
  • Related categories
  • Access control systems & kits
  • Audio, video or keypad entry
  • Mechanical digital locks
  • Electronic locking devices
  • Access control cards/ tags/ fobs
Related white papers
One system, one card

One system, one card

Download
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Modernizing access control

Modernizing access control

Download
Related articles
TDSi by Hirsch: Reinventing UK access control

TDSi by Hirsch: Reinventing UK access control

HiveWatch boosts board with James Segil appointment

HiveWatch boosts board with James Segil appointment

Securitas Technology acquires Sonitrol Ft. Lauderdale

Securitas Technology acquires Sonitrol Ft. Lauderdale

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Electronic access control
  4. News
  5. Case studies
About this page

"Transportation Authority in Pennsylvania employs KeyWatcher access control" is one of 9201 in-depth security application and installation case studies featured in this section. Visit regularly for the latest updates on use cases, installations and deployments of security products from Morse Watchmans.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec