Morse Watchmans Integration with Software House Streamlines Key Control and Management

Morse Watchmans KeyWatcher Touch key control system now integrates with C•CURE 9000 security and event management system from Software House, part of Tyco Security Products, to provide users with more effective and efficient management of personnel, credentials and assets.

“With our collaboration with Software House, we are allowing users of both KeyWatcher Touch and C•CURE 9000 to deepen their security infrastructure while also reducing costs at their sites,” said Fernando Pires, VP sales and marketing, Morse Watchmans. “The combination of these two leading-edge technologies is indicative of our strategy to provide the advanced capabilities end users expect from a comprehensive key control and management solution.”

The integration allows administrators to streamline the process of securing, controlling and tracking keys for their facility. The ability to work from either the C•CURE Administration Station or KeyWatcher Touch itself using the intuitive, easy-to-use touchscreen eliminates the need to make time-consuming updates from within a particular system. Among the features this integration offers are the ability to easily add, modify and delete personnel from the KeyWatcher Touch, link changes in personnel credential data to the appropriate KeyWatcher user, assign KeyWatcher users to KeyWatcher sites according to their C•CURE 9000 clearances, associate KeyWatcher site profiles with C•CURE 9000 clearances, and configure card formats used with C•CURE 9000 to pass credential data to the KeyWatcher TrueTouch Server.

Administrators can also customize access based on specific items in specific areas. Through the integration, users can be either allowed to enter or be prevented from leaving an area while holding an asset. Further customization capabilities include assigned time restriction groups in profiles based on C•CURE 9000 schedules. To ensure timely notification when keys become overdue for return, KeyWatcher TrueTouch alarms and events are transmitted via C•CURE 9000 alarms.

“By integrating with KeyWatcher Touch, we are offering customers a robust, effective and efficient security solution they can quickly and easily be customized to meet their specific requirements,” said Cheryl Shea, Sr. product manager, Strategic Integrations, Tyco Security Products. “This integration is the latest example of our commitment to increasing value for our customers by pairing with industry-leading technologies.”

Morse Watchmans’ KeyWatcher Touch offers the convenience of scheduled PDF reports that are automatically emailed to authorized recipients. Email delivery of customized or standard reports can be scheduled for any frequency or specific time, or they can be accessed using the Morse Watchmans smartphone app. System administrators have access to view or run reports as needed. The system also enables security management to easily notify a user via email when a key becomes overdue.

C•CURE 9000 allows facilities to monitor events, manage personnel, create reports, display dynamic views, and more anywhere in the world directly from a PC using the full C•CURE 9000 client, the web client, or on the move with C•CURE Go mobile app. A single server and database provide an option to seamlessly unify access, video, intrusion, fire, and other supported security products in one intuitive interface.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Cloud and Hybrid Adoption on the Rise

    The physical security industry is experiencing a time of great transformation. Cloud connectivity is accelerating, and more organizations are choosing to blend on-premises and cloud-based solutions. This transformation is affecting all aspects of security, including access control. In the Genetec annual State of Physical Security Survey, it was access control that topped the list of new technologies end-users planned to focus on in 2024. Read Now

  • Texas City Replaces Locks on Intelligent Traffic Cabinets With More Secure Option

    The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. Read Now

  • New Report Says Vulnerability Exploitation Boom Threatens Cybersecurity

    Verizon Business recently released the findings of its 17th-annual Data Breach Investigations Report (DBIR), which analyzed a record-high 30,458 security incidents and 10,626 confirmed breaches in 2023—a two-fold increase over 2022. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3