Keylongest Software
Keylongest WEB is a secure web-based administration suite for managing key systems on almost any device that can run a browser, including cellphone, tablet and PC.
- No software installation is needed.
- Easy to use, and easy to manage.
- Encrypted with SSL Certificate, Encrypted Communication
Real-time status
Full report
alert emails
integration
Features
Software Roles
There are 3 roles by default and customized roles with varying levels of authorization in the web software. These range from simple report readers to admin.
Access Schedules
Apply time restrictions to certain users.
Real-Time Key Status
In the software you can see the instant status of any of your keys in real time, whether they are being used, and who holds them.
Key Curfew
Can be set on any key to enforce its return by a certain time. Will also generate an alert if the key isn’t returned on time. There are two types of time limit: time duration, and time schedules.
Remote Release/Lockdown
It’s allowed to remove keys or return keys remotely by off-site administrators. Will also can lockdown the key remotely.
Events & Explainations
For unplanned visits to some important keys, users should provide a detailed description, including the reason, purpose, or explanation for which the visit occurred
Email Notifications
Can be set up to alert managers if a specific action occurs, such as curfew is overdue or a door is left open.
Key Reservation
This allows users to reserve items for a specific period of time. For example; a company pool car may be booked out for a set day for a specific individual, ensuring that the keys are not able to be accessed or taken by other members of staff.
Multi-Factors Authentication
Multi-factor authentication (MFA) is a security method that requires users to provide at least two authentication factors to prove their identity and gain access to a key.
Mutliple Users Verification
For certain keys or key sets that are highly-sensitive, compliance regulations may require signatures from two or three individuals, one each from three separate departments.
Bidirectional Authorization
The system allows managers to maintain permissions from both employee and key views.
Mutli-Systems Networking
Multiple systems are connected for use, data is shared across multiple ends, achieving maximum scalability