Keys & Locks
Do you want the knowledge and control of who is coming and going in your busy workplace?
Imagine if the keys & locks in your company could talk to you! If you could control who went where and at what time, received regular information updates and changed the access privileges at the click of a button.
You Need It Most
With a fully supported software integration for audit trail and adding or deleting of keys remotely, CyberLock is an easy to use custom-designed electronic key system that can suit any application cost-effectively.
No Wires, No Power, replace the existing cylinder and in an instant, you now have Access Control to a single door or 1,000’s of doors or even padlocks, which can stand alone or be software-driven.
When a CyberKey meets a CyberLock
an instant information exchange determines whether the key has access to that specific lock. Whether access is granted or denied, the time of the event and the unique ID of the key used is stored in both the lock and the key.
CyberLock cylinders are the exact dimensions
of the normal lock cylinders they replace. The absence of a conventional keyway means it is not vulnerable to being picked. As the CyberLock cylinder needs no power or wiring it’s ideal for remote and mobile assets.
Centralised, web-based software
allows facility managers to assign keys, set access permissions and expiry times. They can also create access groups and schedules, and activate new EKA locks. It also enables auditing and tracking through reports and automatic notification of suspicious activities.
Each CyberKey contains a battery
and the individual’s access privileges. This powers all the electronics and operates the lock. For example, the key can be programmed to allow access from 8 am to 6 pm on weekdays and 10 am to 4 pm Sundays. It can even be programmed to expire so it cannot function until reactivated.
Access privileges are distributed
through communicators linked to your EKA software via network or internet. When validating keys, the system downloads the key’s stored data for audit. It then uploads any new access privileges. EKA access privileges can be programmed to expire. This forces users to update keys regularly.
Through a hub called Flex
EKA is able to integrate with and manage any other access control system that uses a Weigand — compatible input device-from RFID, to electronic swipe and HID, Maglocks electronic strikes, and even bio-metric devices.
Over 300 existing
CyberLocks are the exact dimensions of the mechanical cylinders they replace. They retrofit into the lock hardware with the ease of a mechanical cylinder and do not change how the lock operates.
More than 300 existing CyberLock designs enable it to be installed in an enormous variety of interior and exterior doors, padlocks, containers and cabinets. There’s no wiring and no battery. All power is provided by the CyberKey: when a key comes in contact with the cylinder, it powers up the lock’s circuitry so key and lock communicate. If the key is not on the lost key list and the permissions are correct, the lock will open.
The circuitry stores four types of information: encrypted codes that ensure only keys within the system work with the lock; the unique ID number of the CyberLock; a record of the last 1,100 entries; and a list of lost keys to eliminating access by any key that is missing or lost.
CyberLocks offer superior physical security. They have no conventional keyway that is vulnerable to being picked plus a tamper plug prevents the lock from opening if the front of the cylinder is struck.
Moreover, if torque is applied to the cylinder, the front part separates from the back half. The back half of the cylinder expands, causing a braking effect that engages the sides of the cylinder’s case, stopping the rotation and leaving the cylinder in the locked position.