Morse Watchmans has been known as an innovator of high-quality
Morse Watchmans is demonstrating its full range of innovative systems at ASIS 2009
Morse Watchmans is currently demonstrating its expertise as the security industry's premier manufacturer of key and asset control solutions  at ASIS 2009. On display is a full range of innovative systems ranging from key and asset control systems to guard tour systems and supporting software.

"The expansive functionality of Morse Watchmans' control products, combined with our ability to custom design a key or asset control solution, is unique in the marketplace," said Fernando Pires, VP Sales and Marketing, Morse Watchmans. "This versatility provides our customers with more choices in selecting the key and asset management solutions that are best suited for their specific application. And because our products are engineered for interactivity with other security systems, these best in breed solutions can be implemented without costly upgrades or overhauls."

Visitors to the Morse Watchmans' ASIS exhibit will have the opportunity to see demonstrations of the newest asset control products, and learn how Morse Watchmans solutions can assist in achieving added security and protection of valuable assets.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...