Download PDF version Contact company
 KeyWatcher line of key management and asset control solutions provides control over who can remove a key or stored property
The KeyWatcher is configured with 6, 8 and 16 location SmartKey® modules along with card and locker modules

Morse Watchmans, the security industry's premier manufacturer of key control and asset management solutions, featured a six-module KeyWatcher cabinet at this year's ISC West. Selected to show its flexibility and the breadth of options possible in designing a system, the KeyWatcher cabinet on display was configured with 6, 8 and 16 location SmartKey® modules, along with card and locker modules.

The KeyWatcher line of key management and asset control solutions provides control over who can remove a key or stored property. The modular, scalable system is interoperable with access control and other systems. Advanced communications capabilities enable users to know who removed any key or item and when it was taken.

"Our goal is to provide end users with technology that can improve the overall physical security operation, while affording them the flexibility to design a key control system that exactly meets their needs," said Fernando Pires, VP Sales and Marketing, Morse Watchmans. "The flexibility in design makes the benefits more tangible."

The six-module system is designed with complete flexibility to integrate with all standard KeyWatcher modules including 6, 8 and 16 location SmartKey modules, card/credit card modules, dual locker modules and single locker modules. If the user's needs change, the system can be expanded to accommodate additional cabinets. The system comes standard with a bottom-mounted control box and, for added versatility, it can also be used with a remotely mounted keypad and display box.

In addition to the six-module KeyWatcher illuminated cabinet, other sizes available include the one, two, three and nine module cabinets. Users can customise their own cabinet system online using the KeyWatcher configurator.

The KeyWatcher cabinets, rugged enough to resist abuse and wired with a tamper-proof mechanism, are secured using a built-in keypad and up to 2,000 assignable user codes with PINs. Security managers can assign one of five levels of access to each employee. An illuminated screen features two 16-character lines to display messages and user prompts for various functions, including removal and replacement of keys.

Download PDF version Download PDF version

In case you missed it

Global regulations of AI: the role and impact on the physical security industry
Global regulations of AI: the role and impact on the physical security industry

The artificial intelligence revolution in physical security has arrived, transforming how we protect people, assets, and infrastructure. From smart buildings that automatically ad...

How does security innovation impact the skillsets operators need?
How does security innovation impact the skillsets operators need?

Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depe...

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

Quick poll
What's the primary benefit of integrating access control with video surveillance?