Brains.jpg

Intuitive software to handle all of your item control

Our software - KeySecure® - is the answer for managing all of your portable items. Loaded with features, it makes light work of the most complex allocations and permissions.

Forget about paperwork, KeySecure® automatically records every transaction so you can have real-time tracking of your assets. 


alarms.jpg

Alarms

A range of customisable alarms means you always know what’s going on; from ‘door forced’ to ‘tamper detection’, even ‘AC power out’.

key timer.jpg

Timer

Put a timer or certain items. If they’ve been out for too long, an alarm will be generated to notify the manager and/or the user to return it.

sms email.jpg

SMS / email

Each alarm state can be configured to automatically generate an email or SMS giving you up-to-date information even if you’re off site.

interface.jpg

Interface

With an intuitive user interface, even the most complex key and asset allocations are a breeze.

 

dual sign out.jpg

Dual PIN sign out

For your sensitive items,  demand that more than one user  be present to sign out that asset.

max keys out.jpg

Max keys out

Users or user groups can be limited by the number of items allowed out at any one time, encouraging assets to be returned more diligently. 

same user return.jpg

Same user return

Enforce ‘same user return’ on particular items to make sure the user that removed it is the same one that returns it. 

 

encrypted comms.jpg

Encrypted comms

The software uses 256-bit AES encrypted data to communicate with the cabinets, giving you ultimate peace of mind.

network.jpg

Network

The software communicates using TCP/IP over a standard computer network, giving you instant control of your keys even at remote sites.

 

flexible allocation.jpg

Flexible allocation

Single keys or groups of keys can be allocated to individuals or groups of users making it simple to alter the access profiles as your needs change.

 

timezones.jpg

Timezones 

Users or groups can also be restricted by the times they are allowed to access keys. E.g., Monday to Friday, 9am - 5pm.

 

eXchange.jpg

High Level Integration 

High level integrations are available so KeySecure can talk to your other security systems.

Learn more >

 


KeySecure.jpg