Swipe
The illuminated two line by 16-character screen clearly displays messages and user prompts for a variety of different functions, including removal and replacement of keys.
Of course, you still get our fully scalable modular design. The illuminated key storage system makes finding keys a cinch and provides, while using minimal wall space. The random key return comes standard to allow you to return any key set to any slot, eliminating the confusion and worry of misplaced key sets. feature allows you to return any key set to any slot, eliminating the confusion and worry of misplaced key sets. That’s Morse Watchman’s’ outside the box thinking – right inside the box.
The Morse access control and audit tracking key management systems offers tight security and eliminates manual log errors with an indisputable audit trail. Reduces the number of times you might need to re-key from people unintentionally take-home keys and frees up manpower for other important duties!
Removing key sets from the KeyWatcher is as simple as a user entering their User ID and PIN, or as sophisticated as requiring 1 to 3 users to login in using an access card or fingerprint reader. You have peace of mind in knowing that the door does NOT open until an authorized user(s) login in and the user(s) has access to the pre-selected key set(s). Multiple Sets only require a single login for each authorized user. The KeyWatcher automatically records this information in a database to provide you with a complete and indisputable audit key report trail. Unauthorized access can trigger alarms locally and centrally.
KeyWatcher Illuminated has a built-in RS-232 communications port for direct connectivity to printers or other devices, or networked connectivity via Ethernet.
Be sure to check out KeyWatcher Touch, the next generation key storage cabinet that builds on the success of KeyWatcher Illuminated. KeyWatcher Touch offers expanded software functionality and access-control integration, and features a robust and easy-to-use touch screen interface. And like KeyWatcher Illuminated, this electronic key system provides users with the ability to customize key storage cabinets with different modules for keys, access cards, laptops, and handheld devices.
- Common database for all KeyWatcher systems
- Automatic periodic transaction collection
- Easier key removal – user select from a list of keys that a user has access to
- UserID can be the EmployeeID numbe
- Profiles provide an easy way to assign key and group permissions, access level, and much more to users
- Enter custom notes and information via on-screen QWERTY keyboard
- Reports
- Text/email notifications enable users to create alerts for specific users, keys or events and select who will be alerted
- Text/email notifications enable users to create alerts for specific users, keys or events and select who will be alerted
- Integration interface for 3rd party software
- Rugged, metal keypad and LED display
- Locking locations for increase security
- Random key return allows key sets to be returned to any location (non-random key return is optional)
- Easy to locate any key set with the illuminated key slots
- Accountability by time, date, and user codes
- Time zones can be assigned to each individual key and different for each user
Built into a rugged steel cabinet with highly illuminated key slots, the improved design makes it easier to locate keys and maximize wall space. The exterior design of the cabinet has been enhanced to blend in with today’s office environments, while the key management system seamlessly controls and monitors keys.
Built using stainless steel, the cabinet is designed to resist abuse and is wired to alarm against tampering. Yet, the system has limitless configurations – allowing the ability to scale the key management system as needs expand.
Morse Watchmans makes it simple for you, as the KeyWatcher and KeyBank can hold keys of almost any size, including Folger Adams keys. Plus, the systems are capable of incorporating additional lockers for valuable items.
Each key storage system is powered by AC electricity and is supported by a 24-hour battery backup power supply.
- Each key is individually locked in place.
- Card access and biometric reader compatible
- Random key return eliminates pattern checking (non-Random return is optional)
- Require a “Reason Why” note to be given before removing and/or returning specified key sets, including an optional requirement for a comment
- “Instant Key Release” for users that have access to one key set or group. (Upon login the system knows if the user has the key set or not. If they don’t it opens the door and gives it to them. If they already have it, the door opens to return it.)
- Require up to 3 user logins’s each from a different department
- Medco lock with tamper-proof plate
- See-through doors (optional)
- Tampering with the KeyWatcher or Smartkeys triggers an alarm
- Overdue key alarms configured by time period or duration
- Numerous alarms types
- 24-hour battery backup
- Six Alarm relay contacts for remote notifications
- Door does NOT open until system determines user(s) authorization to requested key set(s)
Call and ask our knowledgeable sales staff about these high security and automation features
- Instant Key Release
- Groups Release
- Dual/Triple User Access
- Departmental Access requirement
- Secure Key Return
- Reason Why for key removal and/or retur
The KeyWatcher and KeyBank systems are identical with exception to one feature. The KeyWatcher has locking locations. The KeyBank has non-locking locations, and therefore is less secure and available for a substantial lessor price. With the KeyWatcher, when the door is open, only the key set(s) that were requested and determined authorized can be removed. All other sets are locked in place. With the KeyBank system none of the key sets are locked in place. Therefore, even users that are not supposed to have access to a key set can still remove it. However, a record of authorized and unauthorized key set removals will be created.
A variety of access control devices to interface with
Like a door to a building or room, the KeyWatcher stands by waiting for a valid signal from your preferred method of access validation. Designed with a built-in keypad with the capability of assigning up to 2,000 User Codes with PINs (Personal Identification Numbers).
4-Digit UserID + PIN Combination Login
The KeyWatcher comes standard with a 2-Line 16-Character each LED and 12-key keypad. Users enter a 4-Digit UserID and a 4-Digit PIN.
Card Reader Login Option
Your choice of magnetic card strike or proximity RFID card readers and be integrated to eliminate entry of UserID. The system can be configured to optionally require a PIN number with the card read
Relay Input Option
The Relay Input Interface will work in conjunction with your card access system. It allows our keypad to only turn on when your card access system creates or closure after it verifies that a valid user is allowed to use the KeyWatcher. valid reply from your access control system.
How it works:
The KeyWatcher has an input connection on the optional Card Reader/Relay board. This normally open input is monitored by the board. When there is a momentary closure between the RLY and GND connections, the system will unlock the touch screen and allow login input.
Login Input methods allowed after unlocking:
- Fingerprint scan
- Secondary card reader directly interfaced with the KeyWatcher
- Single card reader: The weigand wiring can be split to connect to your access control system and directly to the KeyWatcher. The 1st card swipe would unlock the KeyWatcher and allow for a 2nd swipe on the same card and reader to login to the KeyWatcher for key access.
Once the user logs out, the system is automatically relocked.
Note: Once the relay input is activated, the system will be unlocked waiting for a login for 10 seconds. If no activity is detected, then the system will relock waiting for the relay input.
Example of Use:
- If the KeyWatcher is in an active area or has public access where the system could be subject to tampering.
- A card reader connected to an access control system would be placed next to the KWTouch.
- The access control system would need to verify the card swipe, then make a momentary closure across our relay input contacts. This would activate our system.
1 Module Electronic Key Cabinet System
- Single module system accepts all standard KeyWatcher modules.
- 6, 8 & 16 location SmartKey modules, Card/Credit Card module, Single and Dual Locker modules.
- Compact system fits almost anywhere.
- Comes standard with the bottom mounted control box, but can be used with a remotely mounted keypad and display box.
2 Module Electronic Key Cabinet System
- Two module system accepts all standard KeyWatcher modules.
- 6, 8 & 16 location SmartKey modules, Card/Credit Card module, Single and Dual Locker modules.
- Comes standard with the bottom mounted control box, but can be used with a remotely mounted keypad and display box.
3 Module Electronic Key Cabinet System
- Three module system accepts all standard KeyWatcher modules.
- System contains up to 48 SmartKey locations per key organizer cabinet, and supports additional cabinets.
- 6, 8 & 16 location SmartKey modules, Card/Credit Card module, Single and Dual Locker modules.
- Expandable – if future growth demands the need for more keys, modules or add-on cabinets can be added to increase the capacity of the system.
- Comes standard with the bottom mounted control box, but can be used with a remotely mounted keypad and display box.
6 Module Electronic Key Cabinet System
- System contains up to 96 SmartKey locations per cabinet, and supports additional cabinets.
- Six module security key cabinet system accepts all standard KeyWatcher modules.
- 6, 8 & 16 location SmartKey modules, Card/Credit Card module, Single and Dual Locker modules.
- Expandable – if future growth demands the need for more keys, modules or add-on cabinets can be added to increase the capacity of the system.
Modular, Scalable Design Lets You Customize Your KeyWatcher System
The KeyWatcher system is easily expandable. A system of any size can easily be configured by adding pre-built modules, so you can economically build your own system to suit your individual needs. Each module can hold 6, 8 or 16 key set locations; or a module can consist of locker or credit card holders. Manage as few as six key sets or take control over hundreds or even thousands.
From a single key management system to multiple key control cabinets holding hundreds of keys, it’s easy to expand KeyWatcher as your needs grow. Each additional unit can be controlled by a single console and monitored by the advanced KeyPro software.
The KeyWatcher key box cabinet can hold keys of almost any size, including Folger Adam keys. Plus, the systems are capable of incorporating additional lockers for valuable items. Available modules include 16-key, 8-key, 6-key, card, and a variety of locker sizes. These key modules can be customized in a wide range of cabinet sizes.
Key Set and Card Modules
6 Key Set Module
Great to Folder Adam Keys or Key Caddies
8 Key Set Module
16 Key Set Location Module
Credit/Access Card Module
Thin slots are ideal for credit card, gas & access cards
Single Locker Module
Dual Locker Module
Spacious lockers hold large items such as prescriptions, small firearms, cell phones, etc
Optimize Performance Capabilities and ROI with KeyPro Software
Maximize your key management system with user-friendly KeyPro software. A PC application with remote access capabilities, KeyPro lets system managers establish permission levels for each User Code and monitor data from any desktop connected to the network.
The software can run activity reports, sort based on different criteria, view and print reports, and more. System managers can generate practical management reports, which trace key movements by time, date and user code. An audit trail report indicates the time and date of every key accessed by a user for a given time parameter.
A built-in scheduler automatically downloads all data to a secure PC, allowing system managers to sort and analyze information to maintain maximum control of access and security issues.
KeyPro III Features
- User-Friendly Interface - Easy to use graphical interface makes programming and running reports quick and simple to do.
- Real-time Transaction Polling - A built-in scheduler automatically downloads all KeyWatcher data to centralized or remote computers.
- Maximized Network Capabilities - With KeyPro III's networking capabilities, sensitive database files can be kept on a network server. This also allows for any installation of KeyPro III to have the ability to make changes and synchronize the data with the KeyWatcher system.
- Extensive Key Management Reporting - Reports can be generated based on specific key, user or alarm transaction. KeyPro provides comprehensive reporting methods, including the ability to sort by last name, first name, ascending and descending sequential order.
- Local Area Network Access - Accessibility to the key management systems over a LAN enables managers to perform functions on any KeyWatcher via TCP/IP.
- The key management systems offers the capability to send email alerts to security managers, keeping them informed of the whereabouts of Smart Keys.
Another key feature of the software is the built-in scheduler. This tool automatically downloads all data to a centralized DB, allowing system managers to sort and analyze the information so they maintain maximum control of access and security issues.
For high-volume key users requiring efficient, secure key storage and complete, real-time accountability. These systems make tracking large quantities of keys — manageable.
Real-Time Reporting
Detailed, real-time management reports based on specific key, user and alarm transactions.Generate reports by:
- List of keys
- Users
- Keys in use
- Keys removed
- Keys overdue
- ...and Much More
Remote Access
Accessible by multiple administrators from remote locations via standard Internet connection.