Priority Email Alerts The key management systems now offer the capability to send priority email alerts to security managers, keeping them informed of the whereabouts of Smart Keys. |
Key Reservations With Key Reservations, authorized users can even reserve a key in the system for a specified timeframe. It's a convenient and easy way to guarantee access when a key is needed. |
Key Inventory Reports The key management software can run activity reports based on different criteria. View and print reports like: All Keys In Use, All Keys Overdue, Employee Key History Use, and more. Remote Access Reports are accessible by multiple administrators from remote locations via standard Internet connection. |
Manage Accountibility Check the status and location of keys in Real Time to know who has accessed which keys, at which time, and for what purpose. Create Audit Trails Traces each key movement by date, time, and user code. |
Smart Key Locators For quick finding of a key, key holes are individually illuminated for instant visual identifying. Access keys in less than 4 seconds. |
Scalable Design It's easy to expand KeyWatcher as your needs grow. Start with a single key management system or configure KeyWatcher with multiple cabinets to hold hundreds of keys. |
Networked Key Control Systems Allow keys to be returned to any location in any key cabinet in the system, and that location is automatically recorded. An employee or contractor who must temporarily leave the site can return the key to the closest key cabinet for safe keeping and retrieve it when they return. When a company vehicle is moved from one building location to another, either temporarily or permanently, the keys can be returned to the key cabinet in that location. The system will record the location and time so anyone looking for those keys will know where they are currently located. |