Morse Watchmans, a provider of key control and asset management systems, is demonstrating how their KeyWatcher Touch key management solution helps organizations keep data secure. On display at ISC West 2018 (booth #12109), KeyWatcher Touch provides comprehensive key management to a broad range of industries and business types, including server farms and datacenters.

Data and cybersecurity are paramount today. With sensitive information being accessed via internet-connected endpoints throughout facilities, controlling the access to the areas containing these devices is an integral component of a truly comprehensive cybersecurity plan,” said Mr. Pires. “We’re proud to offer this proven technology to ensure the safety and integrity of important data.

KeyWatcher Touch utilizes touch screen technology to control Morse Watchmans’ SmartKey system

Securing Data Via Key Management

KeyWatcher Touch is Morse Watchmans’ proven key control platform, utilizing touch screen technology to control Morse Watchmans’ patented SmartKey system with KeyAnywhere technology that makes it simple to return a key to any key cabinet in a system.

Updates to KeyWatcher Touch being showcased at ISC West include a new database design, a desktop fingerprint reader that allows users to enroll fingerprints through TrueTouch software, and the ability to utilize multiple KeyWatcher Touch server instances with a single SQL database.

With a large portion of cybersecurity and data breaches involving the theft of physical hardware, access control by way of key management has become a vital component in securing sensitive data. Internet-connected devices within an organization with access to internal networks can serve as a digital open door, providing unauthorized data access.

KeyWatcher’s features and capabilities make controlling keys and physical access to data

Effective Access Control

Further, if physical access to server areas where data is stored is allowed, unauthorized users can easily copy or download the data to be used for a plethora of nefarious purposes, from theft of funds to corporate espionage.

By regulating and managing access to keys to the relevant areas within a facility, security teams can grant access only to those with proper clearance, be notified when keys are accessed or overdue to be returned, and create a report showing key access and return times.

They can also see which users have taken keys, enabling security to know which people have accessed a relevant data storage area should an incident occur. KeyWatcher’s expansive list of features and capabilities makes controlling keys and physical access to data easy, convenient and secure.

In case you missed it

What Are Emerging Applications For Physical Security In Transportation?
What Are Emerging Applications For Physical Security In Transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher's Perimeter Solutions With Fortified Partnership
Gallagher's Perimeter Solutions With Fortified Partnership

Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years o...

Genetec's Role In Data Sovereignty For Security
Genetec's Role In Data Sovereignty For Security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...