Value Added Services
Key Systems takes pride in adapting our GFMS solution to work with your pre-existing human resource and access control systems. Let GFMS adapt to you and systems you rely on daily.
GFMS Database Synchronization Tool
This customized application synchronizes existing customer databases (Human Resources, Access Control, etc.) with the Global Facilities Management System™, eliminating the need to manually repopulate a new database.
Custom Reports
GFMS Software is preloaded with multiple transaction (user events) and table (programming configuration) reports. Reports may also be tailored to match your specific formatting requirements.
Seamless Integration
Your GFMS solution can grant access based on your current access control or biometric/card identification systems. Our cabinets can also relay alarms directly to your existing alarm or facility monitoring systems.
One Screen. Multiple Devices
The GFMS™ Site Map function allows you to view facility maps featuring interactive icons representing the exact locations and real-time status of each Security Asset Manager™. GFMS™ software enables administrators to monitor devices, add users, assign assets, attach privileges and create rules from a single computer screen.
Online Training
Our technical support team (on call 24/7) is available to arrange demonstrations, training sessions and diagnostics and support
GFMS Specifications
User Capacity
Thousands of users (PINs)
Authorized Entry
User ID by PIN, Biometric, Card, Prox, RFID
Alarms
All alarms may activate remote devices and alarm: Keypad tamper, Forced entry, Door left open, No power, Low battery power, User emergency at box
Time Settings
Minutes and hours, days of week, date, holiday and vacation exceptions, daylight savings
Item Removal
User ID & time recorded, programmable to release one item or a group of items, time zone restrictions
Item Return
User PIN & time recorded, item required to be returned to original positions in original cabinet
Audit Reports
All transactions recorded with: Time, Date, Login Type
Alarms Reports List
One or multiple user history, one or multiple item history, transactions according to date, inconsistent returns or removals, alarms, users, SAMs, and SAM programming