CyberLock communication devices serve as the interface between CyberLock hardware and CyberAudit management software. Access privileges are distributed to key holders via communicators. These devices are linked to the software over a local area network or securely over the Internet. When a CyberKey and communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. To increase security and accountability, access privileges can be programmed to expire at scheduled intervals. This results in users regularly updating and reauthorizing keys at communicators.
ValidiKey 2 Station
The ValidiKey Station offers many more options to program and charge CyberKeys. With both LAN and WiFi connections, it removes the previous contraint of using a PC connection (for the CKB-IR10 or the CKS-020). More significantly, it handles both Generation 1 and Generation 2 Keys with ease, and also allows PIN and Job based control with its integrated touch screen display. With an identical footprint to the ValidiKey Vault (CKV-V02), the Station may be mounted on a desk or fised to a wall.
- Key activity downloads and key permission updates occur simultaneously.
- Communicator compatibility depends on the key type and version of CyberAudit software installed.
- Several communicators offer multiple functions, such as charging the key battery or storing unprogrammed keys.
- Available with Wiegand compatible card readers