Morse Watchmans Exhibits Innovative Key and Asset Management Technology at GSX 2019

Morse Watchmans, provider of key control and asset management systems, will showcase its KeyWatcher Touch, AssetWatcher, and KeyWatcher fleet key and asset management solutions at GSX 2019 this week (booth #1153).

"We are excited to show GSX 2019 attendees how key management and asset control can help them to create a state-of-the-art security system for their organization," said Fernando Pires, CEO, Morse Watchmans. "We continue to be completely focused on providing innovative solutions for our customers to help them achieve their business goals, reduce costs, and secure their enterprise."

Morse Watchmans' KeyWatcher Touch key management system features a 7" touchscreen with an easy-to-use interface and patented SmartKey system with KeyAnywhere technology to make it simple to remove and return a key to any key cabinet in an enterprise.

New features to KeyWatcher Touch include remote functions added to the TrueTouch Software that supports multiple user logins for key returns and removals. A new "Key Group Associations" feature allows users more specific key access to be configured directly through the access control system. This feature makes it easier for users to cover special situations, such as when an employee is out of the office that day, or if they fit the criteria for a specific profile, but temporarily need some additional keys.

AssetWatcher is a flexible, scalable, and highly capable RFID-enabled locker system. It can support more than 10,000 users on a single system and is configurable in three modes. AssetWatcher's RFID technology allows users to easily track who is removing or replacing an asset, as well as when and where in the system the asset has been taken from or placed. Available in 10, 22, or 34-locker configurations, each system is designed to be freestanding and can be mounted to the wall or the floor.

A number of modes allow AssetWatcher to accommodate a wide variety of uses. Classic Mode allows assets to be returned either to any open locker or to be assigned to a specific locker. Personal Mode allows assets to be added to the system for tracking, with permissions based on lockers rather than assets. Leased Mode allows users to "lease" a locker temporarily. Owner Mode assigns individuals with a specific locker, which may or may not be shared with other users to accommodate shared or specific assets that may be used by one or more persons.

KeyWatcher Fleet is the first key security system that puts users in command of vehicle distribution, comprehensive utilization, right-sizing of a fleet, and more. The software allows fleet managers to create user role-based "Pools", or groups of vehicles, to assign each vehicle accordingly.

A convenient dashboard displays real-time status, bookings summary, vehicle use and many other data points to instantly provide the pulse of the fleet.

Built on the KeyWatcher Touch hardware, KeyWatcher Fleet uses the same 16, 8, and 6-key modules, along with the same card and locker modules. Unique PIN codes ensure only authorized individuals can access keys, or users can add an optional card or fingerprint reader for even stronger key security, allowing users to manage thousands of keys and users with a single system or network.

Featured

  • Freedom of Choice

    In today's security landscape, we are witnessing a fundamental transformation in how organizations manage digital evidence. Law enforcement agencies, campus security teams, and large facility operators face increasingly complex challenges with expanding video data, tightening budget constraints and inflexible systems that limit innovation. Read Now

  • Accelerating a Pathway

    There is a new trend touting the transformational qualities of AI’s ability to deliver actionable data and predictive analysis that in many instances, seems to be a bit of an overpromise. The reality is that very few solutions in the cyber-physical security (CPS) space live up to this high expectation with the one exception being the new generation of Physical Identity and Access Management (PIAM) software – herein recategorized as PIAM+. Read Now

  • Protecting Your Zones

    It is game day. You can feel the crowd’s energy. In the parking lot. At the gate. In the stadium. On the concourse. Fans are eager to party. Food and merchandise vendors ready themselves for the rush. Read Now

  • Street Smarts

    The ongoing acceptance of AI and advanced data analytics has allowed surveillance camera technology to shift from being a tactical tool to a strategic business solution. Combining traditional surveillance technology with AI-based data-driven insights can streamline transportation systems, enhance traffic management, improve situational awareness, optimize resource allocation and streamline emergency response procedures. Read Now

  • Midtown Manhattan Shooting Kills 4, Including NYPD Officer

    Four people were killed, including a NYPD officer, in a midtown Manhattan shooting on Monday. That’s according to CNN. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities