Locks keys into assigned slots within a secure 18-gauge steel cabinet, multiple sizes available.
2. Illuminated Key Slots:
Identifies the location of the key selected for return or retrieval. Modular, mix’n’match design to accommodate small or large sets of keys, 8, 16 or 32 key slots per panel, individual lock for each keytag.
3. Control Terminal:
Choose from multiple authentication options, including PIN code, access control card, or biometric reader. Integrated RFID reader, integrated card reader to use your existing access control cards, prompts users through key retrieval/removal process.
4. RFID Keytag Identification:
Contactless transfer of data between keytag and control terminal makes for fast, error-free key transactions.
5. Maintenance-free Keytag:
Corrosion resistant, waterproof keytag comes with a LIFETIME warranty. Reusable key ring and keytag, tamper-proof seal.
6. Tamper-proof Key Rings:
Prevents unauthorized key removal.
Key Tracer prevents unauthorized access to keys and provides full accountability of all keys in your facility. It is capable of controlling thousands of keys for an unlimited number of users.
Key Management Systems Product Sheet
Complete Key Control: In One Easy Solution
Key Tracer Commander Software
Commander is always in contact with the connected terminals and continuously synchronizes the central database with the terminal transactions.
New users, modified access rights, actual key movements, etc. are processed within seconds making all changes instantly updated..
Custom reports can be created based on parameters the user selects such as a date range, specific user, specific key tag, alarm event and more.
The software also features an “Email Reporter” that automatically emails reports to specific users or administrators daily, weekly, monthly or as the event occurs
Any report can be delivered via email or SMS in real time based on any specific event, chosen by the administrator, as it occurs
Assign a dual or triple authorization on each high security key of your choice.
Automatic email alerts for alarms or late key return
The software features multiple “user level” access rights within each component of the software from read only, edit only or full access.
Enterprise Level Solution
Web based user interface
Secure SSL Communication
Supports thousands of terminals connected to one database