Products

WHS PROMASTER KM : Key Manager Software

HPC_PROMASTER_KM_500f1f1fba5b7.jpgHPC_PROMASTER_KM_500f1f1fba5b7.jpg

Description

alt

 

ProMaster Key Manager software allows you to fully control key issue and return to staff and key holders. The importance and security significance of this task is often overlooked in many organizations, who despite having complex and expensive master key systems, have poor record keeping of who has which keys.


  • Ideal for use by :
  • Schools
  • Manufacturing Companies
  • Real Estate Agents
  • Local Councils
  • Corporations
  • Hospitals
  • Sports Clubs
  • Utility Companies (such as power, water, gas, phone companies etc.)

  • Features

  • Easily manage key issues and returns
  • Control overdue keys
  • Print detailed reports of the who, what, where and when of keys, doors and key-holders
  • Easy to install, configure and use
  • Multi-user
  • Full history reporting
  • Comprehensive step-by-step instructions
  • Unlimited master-key system size
  • Locksmith supported systems
  • Stand alone systems

 

Why Do You Need ProMaster Key Manager ?

Designed both as a complimentary product for ProMaster and also as a stand alone product, it is a premium quality program, developed in accordance with industry standards and requirements for this type of software. It features the latest in programming and development technology which provides ease of use and program reliability and stability. ProMaster Key Manager solves this problem by providing a comprehensive key management mechanism for all keys within the organization,  both those that belong to a master key system and those that are separate such as vehicle keys.

The other unique feature with the ProMaster Key Manager is that is allows for management of multiple systems, and even multiple sites from the one location. Better still, it allows the locksmith to export all relevant system details from ProMaster into the ProMaster Key Manager, thereby providing a highly professional service which is extremely convenient for the client.

Whether the master key system or systems are imported from a locksmith or entered into the program directly, the database in the program records all relevant system details including keys, doors, key-to-door assignments (which keys open which doors), signatories, key holders, system address details and more. The highly innovative database links these core pieces of information together in such a way that once set up, the process of managing the keys is extremely simple.

The cross-referencing function in the database allows the program to produce highly detailed reports listing who has what keys, and which areas of the building that person could access with those keys. This is a critical element of security audit reporting, and one which ProMaster Key Manager tackles with absolute ease.

The day-to-day operation of the program centers on the issuing and returning of keys to staff members and temporary persons such as maintenance contractors, builders, cleaners and so on who may need keys to your premises temporarily. The program allows you to make key issues on a permanent or timed basis, and will warn you automatically as soon as any unreturned keys are overdue. This process has been greatly simplified, and allows you to select keys and key holders from a drop-down menu, which also shows key issue numbers (allowing you to securely track individual keys, and not just multiple keys of the same number), and issue them to employees using a unique pop-up system. The employees can be classified into groups for simplicity of reporting. The program includes a feature to print out a Key Issue Responsibility Acceptance form for use by the new key holder. The idea is to obtain this persons signature on this document to provide a record of key issue acceptance. This makes the chance of this person saying I was never issued with that key. . . .  a thing of the past, and for organizations wishing to implement a totally foolproof mechanism for management of keys this is an important and useful feature. The program also allows you to customize the text on this report to suit your needs.

When keys are returned, the process is similar, and the relevant key and issue record is simply selected from a list and the return process is complete. Highly detailed reports are another great feature of this program, and these make security audits and key reconciliation's a simple process. The report printing function in the program can be configured with many options to suit the type of report you require, allowing you to print out as much or as little detail as you need. This saves paper where necessary, or provides maximum detail when this is required.

The program also supports a wide range of internal security features such as a multi-user capability with password control. The program's own internal security module allows you (as the 'administrator' within the program) to create user names and passwords for other users of the program, and to grant or deny them access to certain features in the program, further providing for a completely secure key management system in organizations where a number of different persons may be involved in the task of security/key management. The program can also be installed on networks, and even supports multi-user simultaneous access to the database. It is also possible to set up a 'training' database so that your staff can become familiar with the program in a 'test' environment, thus eliminating the risk of accidental data deletion during staff training. The program is supplied on CD, and includes highly comprehensive instructions, which will allow almost anyone to become totally familiar with the program in only a few hours.