Although 2015 seemed like the year of data breaches, it was also the year that the Internet of Things (IoT) achieved real traction. Key management systems and most other advanced security solutions can now be integrated with the networked security system (i.e. identity management, access control, IP video surveillance, intrusion and other systems) to strengthen risk management strategies.

Specifically, Morse Watchmans’ KeyWatcher Touch can now be integrated with Lenel’s OnGuard Access Control System, Honeywell Pro-Watch® and with the Software House C-CURE 9000 Access Control System. The integration allows users to efficiently manage the KeyWatcher Touch system configuration for access, storage, key tracking and other features through the access control systems.

IoT-Driven Innovation

The IoT also helped to drive key control system innovation along with improved integration capabilities. For example, management systems can send detailed alerts via email to specific recipients. Emails are pushed to the server and delivered faster and can be sent securely from an external or Web-hosted email service. These notifications can be associated with specific users, keys or other factors, and can be programmed to contain a specified key’s current location, which keys a person may have, which haven’t been returned or when they are due to be returned. SMS notification is also an option.

Meeting customer needs and improving the user experience will continue to be a driving force in strengthening our product portfolio in 2016 and beyond. As an example, instead of upgrading or replacing the hardware, end users will be able to upgrade the software of a KeyWatcher system to have any new features. Time-saving features such as the ability to integrate multiple locations, with common usage of databases and programming; real time information; local and remote access; computerised reporting; specialized alert notifications and ease of use are all designed to enhance use.

System Integration As Risk Management Strategy

System integration will remain a prominent risk management strategy. As a strategic component of an overall security plan, the KeyWatcher key management system continues to deliver valuable risk mitigation by maintaining strict accountability for keys and limiting both key duplication and distribution. The key control’s reporting system, together with the audit data from an access control system, provides a strong evidence trail to support incident management and forensic auditing.

See the full coverage of 2015/2016 Review and Forecast articles here

Download PDF version Download PDF version

Author profile

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...