CyberLock’s Wireless Access Control Solution

 

CyberLock is the world’s first key-centric wireless access control system. You are now able to control and track access to every locking point in a facility, without running wire! Receive audit trails and access reports on personnel to increase accountability. Secure almost anything with over 400 different lock options. Set permissions and schedules for each key holder to restrict access. Disable lost or stolen keys to reduce the risk of a security breach. With CyberLock, organizations are able to increase security, accountability, and key control.

  • Versatile – With no wiring or power needed to operate, CyberLock’s wireless access control cylinders can be used to secure doors, padlocks, cabinets, gates, vehicles, lock boxes, and more.
  • Scalable – Since it is a completely wireless access control system, you can grow the system over time without having to disrupt infrastructure.
  • Cost Effective – System is installed without power or wiring so you no longer have to spend money on wiring and conduit.
  • Convenient – With user-friendly cloud based software, making updates to the system is seamless and can be done from anywhere.

How Cyber Lock Works

CyberKey Smart Keys

Access Multiple Locks with One Key.

 

The CyberKey smart keys are programmed with unique access permissions for each user. A single CyberKey can be programmed to access over 1,000 locks, removing the need for a big key ring. CyberKeys will only work during specific hours and can only access authorized locks.

 

  • Each CyberKey is manufactured with a unique ID that cannot be changed or duplicated.
  • CyberKeys contain encrypted access codes to identify the system to which they belong.
  • Up to 4,000 unique access events including both authorized openings and denied attempts are stored in a CyberKey’s memory.
  • Battery operated and USB rechargeable models available.

Electronic Cylinders

Never Re-key Again.

 

Since CyberLock is a wireless access control system, it can be used for a wide range of applications. With over 400 different electronic locks to choose from, we can retrofit almost any lock. Use CyberLock for doors, cabinets, cash boxes, trucks, gates, narcotic boxes, safes, vending machines, server cabinets, and more.

 

  • CyberLock cylinders retrofit into existing lock hardware.
  • Each cylinder is manufactured with a unique ID which cannot be changed or duplicated.
  • Up to 2,500 access events including both authorized openings and denied attempts can be stored in memory.
  • With no wiring or power needed to operate, CyberLock’s electronic cylinders will continue to work during power outages.

CyberPoint

Checkpoints for Guard tours

CyberPoint electronic tags function as data checkpoints for security guard tours and can be installed virtually anywhere Like a traditional guard tour system, security team members confirm their presence at a location by touching a CyberKey smart key to a CyberPoint electronic tag.

When a CyberKey smart key is presented to a communication device, a complete record of the guard tour is uploaded into the management software. Reports can then be generated, e-mailed and analyzed.

A significant advantage over traditional guard tour applications is that the CyberPoint is part of the CyberLock access control system. The same CyberKey smart key a guard uses to verify their location can also be loaded with access permissions to open designated CyberLock cylinders.

Communicators

 
Communicators serve as the interface between CyberLock hardware and CyberAudit management software. Through a communicator, key information is downloaded into the software and new schedules and permissions are uploaded into the keys. A variety of communicators are available to address individual facility and personnel needs. Communicators can be installed in locations that are easy and accessible to your key holders such as a desktop or laptop computer, an employee entrance, or even in the field making frequent key expirations and access programming convenient for higher security.

CyberAudit Platorm

Customize and Edit Access Control System.

 

The user-friendly CyberLock software platform acts as the command center for your access control system. The settings are interchangeable, which gives you the ability to completely customize the system to fit your preferences. The platform can be accessed through web browsers on desktops, laptops, smartphones, or tablets.

 

  • Assign CyberKeys to employees.
  • Create individual access permissions and schedules.
  • Add new electronic access control cylinders.
  • Generate audit reports.
  • Remotely disable CyberKey’s access.

Yes, the electronics are sealed, for installation indoors and out. CyberLock cylinders are designed to operate in a variety of environments.

No, CyberLock cylinders have no keyway and cannot be picked like a mechanical lock. CyberLock cylinders resist forced rotation and, if tampered with, are designed to remain in the locked position.

No, CyberLock cylinders fit into the lock hardware just the same as the mechanical cylinders they replace. The lock hardware will operate in the same fashion as before the CyberLock cylinder was installed.

In less than a second, the lock and key synchronize: they exchange unique IDs, compare access codes, validate the list of authorized locks, confirm the current time is within the authorized window, and ensure the key is not on the lock’s list of lost keys. If everything is validated, the lock will open.

There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be set to expire. These expirations are flexible and can be set according to specific security requirements: hourly, daily, weekly, or monthly expirations are common examples. When a key with a near-term expiration is lost, no action may be required. When a key with a long-term expiration is lost, creating unacceptable risk exposure, vulnerable locks can be reprogrammed to load the lost key ID into the lock memory and prevent that key from working.

A key can access up to 12,000 locks.

The key permissions, access schedules, and audit trail are maintained even if the battery dies but the clock inside the key may need to be reset. This can be done by updating the key right after recharging or replacing the key battery.

Keys are updated and programmed via communication devices. When a CyberKey and a communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. Communication devices are linked to CyberAudit software over a local area network or securely over the Internet.

Yes, several communicators such as the Authorizer System and CyberKey Vault key cabinets include backup power options and built-in memory to store key configurations.

The most common approach is to use a Generation 2 CyberKey which can program, update, and download locks in the field.

An audit trail is a list of activity recorded by locks, keys, and communicators. Typical audit trail records contain information about events that occurred within a lock and/or key. It includes the date and time of the occurrence. Other audit trail data includes information related to communicators, such as when a CyberKey Vault was accessed.

Yes, all versions of the software are accessible through a standard web browser, even on a smart phone or tablet.