Morse Watchmans Solutions Go Beyond Basic Key Control

Morse Watchmans Solutions Go Beyond Basic Key Control

Morse Watchmans Solutions Go Beyond Basic Key ControlInnovative design and network flexibility engineered into the Morse Watchmans product portfolio are driving integration of key control and asset management systems within the overall physical security systems platform. At ISC West, Morse Watchmans is highlighting integrated functionality in a display that demonstrates the company’s technology leadership in delivering solutions that go beyond basic key control.

Morse Watchmans Solutions Go Beyond Basic Key Control“Integration enables management to take key control to the next level, as a fundamental element within the security platform,” said Fernando Pires, VP sales and marketing, Morse Watchmans. “Morse Watchmans key control solutions, whether integrated or stand-alone, local or mobile, are reliable and secure and increase the strategic value of a security system.”

Features such as Ethernet and mobile connectivity, open protocols, integration of multiple locations, common usage of databases and programming, reporting and specialized alert notifications provide state-of-the-art functionality for organizations of all sizes and types. This functionality is found in the following products on display at the Morse Watchmans booth:

The KeyWatcher Touch system, upgraded with an attractive and durable dark grey finish, features several innovative technologies including the time-saving KeyAnywhere capability that allows the return of a key to any KeyWatcher Touch cabinet in the enterprise. The KeyFind feature quickly enables administrators to locate which KeyWatcher Touch a specific key is in, or determine who has it out. The KeyWatcher Touch is capable of integrating multiple locations with a common usage of database and programming.

A new smartphone app, launched here at ISC West, offers users an efficient way to manage control of keys while on the go. It enables authorized users to see a wide range of live information and to interact remotely with the KeyWatcher Touch key control and asset management system.

Complementing KeyWatcher Touch is the KeyWatcher TrueTouch software package. The managing software runs all programming, remote functions and reports while the server performs all synchronizations of transactions as well as maintaining the SQL database. Both access control systems and customized client control software interface with the server application.

Additional featured products include the KeyWatcher Illuminated key control system that can be configured with a variety of modules and customized to specific user needs. In addition to several differently configured key modules, available modules include the credit/access card module and single and dual locker modules which can be used in any KeyWatcher system for holding small valuable items.

Also on display are the KeyBank Key Control System that provides total accountability of large quantities of keys; KeyPro Software, KeyRings, PowerCheck Guard Tour System and TourPro Data Sorting Software.

Featured

  • Making the Grade with Locks and Door Hardware

    Managing and maintaining locks and door hardware across a school district or university campus is a big responsibility. A building’s security needs to change over time as occupancy and use demands evolve, which can make it even more challenging. Knowing the basics of common door hardware, including locks, panic devices and door closers, can make a difference in daily operations and emergency situations. Read Now

  • Choosing the Right Solution

    Today, there is a strong shift from on-prem installations to cloud or hybrid-cloud deployments. As reported in the 2024 Genetec State of Physical Security report, 66% of end users said they will move to managing or storing more physical security in the cloud over the next two years. Read Now

  • New Report Reveals Top Security Risks for U.S. Retail Chains

    Interface Systems, a provider of security, actionable insights, and purpose-built networks for multi-location businesses, has released its 2024 State of Remote Video Monitoring in Retail Chains report. The detailed study analyzed over 2 million monitoring requests across 4,156 retail locations in the United States from September 2023 to August 2024. Read Now

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

Featured Cybersecurity

Webinars

New Products

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3