US Edition
Home  |  Settings  |  Marketing Options  |  eNewsletters  |  About Us  |  FAQs    Join on LinkedIn
ASIS 2017

Biometrics - News

Smart security of valuables possible with Morse Watchmans' SmartKey locker module

Published on 2 April, 2010
New addition to security locker portfolio by Morse Watchmans
Smaller size of the security lockers delivers added flexibility in design configurations

Delivering new capabilities for securing, tracking and controlling valuable items, Morse Watchmans introduced the new SmartKey locker module, displayed at ISC West 2010, as an addition to its successful line of SmartKey locker solutions for storing valuable objects. The SmartKey locker module is designed with a smaller footprint - half the depth of the standard locker - and can be used in any of the modular KeyWatcher systems for holding documents, CDs, weapons, cell phones, etc.

"Our success and reputation in the industry is based on the high performance, innovative, and flexible design solutions we offer that are unrivalled in the industry," said Fernando Pires, VP Sales and Marketing, Morse Watchmans. "The new SmartKey locker module and its smaller size illustrate this by providing users the ability to configure a KeyWatcher to their exact needs."

Managing access to valuable objects as efficiently as managing keys, the new single locker module can be set up as a personal storage space for one or multiple users. SmartKey locker systems are also engineered for complete interactivity with other business systems such as access control. This allows managers to monitor the system; for example, e-mail alerts can inform management if someone tries to leave a building without returning an object taken from a SmartKey locker. The system has a built-in RS-232 communications port for direct connectivity to printers or other devices, or networked connectivity via Ethernet.

The new SmartKey locker system can be controlled by a single console and monitored by the Key-Pro software, a PC application that lets system managers establish permission levels for various user codes and monitor data from any desktop connected to a network.

See privacy and cookie policy
Browsing from the Americas? Looking for US Edition?
View this content on US Edition, our dedicated portal for our Americas audience.
Do not show me this again
International EditionUS Edition