Have Any Questions?
Yes, the electronics are sealed, for installation indoors and out. CyberLock cylinders are designed to operate in a variety of environments. Click here for more information on operating CyberLock cylinders in cold weather environments.
No, CyberLock cylinders have no keyway and cannot be picked like a mechanical lock. CyberLock cylinders resist forced rotation and, if tampered with, are designed to remain in the locked position.
No, CyberLock cylinders fit into the lock hardware just the same as the mechanical cylinders they replace. The lock hardware will operate in the same fashion as before the CyberLock cylinder was installed.
CyberLock cylinders are most commonly programmed with Generation 2 CyberKeys. CyberKey smart keys “carry” lock data back to the software through Communicators.
No, with CyberLock the need to re-key is eliminated. Locks can be “electronically re-keyed” in the field to provide immediate response to lost/stolen keys. For additional security, keys can be set to expire regularly, limiting exposure of a lost key.
It is very possible that the lock you need is already part of the extensive CyberLock portfolio. To determine which lock is best for you, take a look aound the site for example specifications or contact us today under the menu contact option.
In less than a second, the lock and key synchronize: they exchange unique IDs, compare access codes, validate the list of authorized locks, confirm the current time is within the authorized window, and ensure the key is not on the lock’s list of lost keys. If everything is validated, the lock will open.
There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be set to expire. These expirations are flexible and can be set according to specific security requirements: hourly, daily, weekly, or monthly expirations are common examples. When a key with a near-term expiration is lost, no action may be required. When a key with a long-term expiration is lost, creating unacceptable risk exposure, vulnerable locks can be reprogrammed in order to load the lost key ID into the lock memory and prevent that key from working.
A key can access up to 12,000 locks with the purchase of the Lock List Filtering Software Enhancement Module.
Low battery warnings are provided in the software every time a CyberKey is updated via a communication device and in the key itself, through an audio or visual indicator. Vist our Technical Documents page to learn more about CyberKey low battery indicators.
The key permissions, access schedules, and audit trail are maintained even if the battery dies but the clock inside the key may need to be reset. This can be done by updating the key right after recharging or replacing the key battery.
Keys are updated and programmed via communication devices. When a CyberKey and a communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. Communication devices are linked to CyberAudit software over a local area network or securely over the Internet.
To determine which key is best for you, click here to view our key specifications or contact us today.
CyberPoint checkpoints and CyberLock cylinders have the same electronics package. CyberPoints are essentially cylinders without the lock pin mechanisms.
Yes, the electronics are sealed for installation indoors and out.
CyberPoint checkpoints are most commonly programmed with the Grand Master CyberKey. CyberKey smart keys “carry” CyberPoint (and lock) data back to the software through Communicators.
The exact time is dependent on how much data is being transferred; however, the average transfer is about ten seconds.
Yes, several communicators such as the Authorizer System and CyberKey Vault key cabinets include backup power options and built-in memory to store key configurations.
The most common approach is to use a Generation 2 CyberKey which can program, update, and download locks in the field.
To determine which communication device is best for you, click here to view our Communicator specifications or contact us today.
Flex System modules can be installed in off-the-shelf weatherized enclosures. Additionally, they can be mounted directly in a wall near the security element they control (such as a door or gate).
The RFID Reader module is compatible with 13.56 MHz RFID cards.
Yes, Wiegand compatible 3rd party input devices can open a Vault WR using a Flex System Door & I/O module.
Yes, they can trigger Wiegand compatible and other 3rd party relay devices such as electric strikes, cameras, alarms, and more using the Flex System Door & I/O module.
The Door & I/O module is designed to work with any 26-bit Wiegand compatible interface. Since the Wiegand standard has evolved and expanded over time, every Wiegand compatible device may not be out-of-the-box compatible. Please contact us to discuss your specific needs.
As with other Flex System modules, the Flex System Hub provides power to the Door & I/O module through the RS-485 network connection.
It can be installed either in the wall near the device it’s driving, or in a central location, typically near where the Flex System Hub is installed.
An audit trail is a list of activity recorded by locks, keys, and communicators. Typical audit trail records contain information about events that occurred within a lock and/or key. It includes the date and time of the occurrence. Other audit trail data includes information related to communicators, such as when a CyberKey Vault was accessed.
Yes, records can be removed from the database and stored in a separate file.
The type of software is dependent upon several factors including the number of locks and keys needed, software features preferred, communication devices desired, and the geographical spread of the installation. To determine which software package is best for you, read more about CyberAudit management software features or contact us today.
Yes, all versions of the software are accessible through a standard web browser, even on a smart phone or tablet.
CyberLock Cylinders
Yes, the electronics are sealed, for installation indoors and out. CyberLock cylinders are designed to operate in a variety of environments. Click here for more information on operating CyberLock cylinders in cold weather environments.
No, CyberLock cylinders have no keyway and cannot be picked like a mechanical lock. CyberLock cylinders resist forced rotation and, if tampered with, are designed to remain in the locked position.
No, CyberLock cylinders fit into the lock hardware just the same as the mechanical cylinders they replace. The lock hardware will operate in the same fashion as before the CyberLock cylinder was installed.
CyberLock cylinders are most commonly programmed with Generation 2 CyberKeys. CyberKey smart keys “carry” lock data back to the software through Communicators.
No, with CyberLock the need to re-key is eliminated. Locks can be “electronically re-keyed” in the field to provide immediate response to lost/stolen keys. For additional security, keys can be set to expire regularly, limiting exposure of a lost key.
It is very possible that the lock you need is already part of the extensive CyberLock portfolio. To determine which lock is best for you, take a look aound the site for example specifications or contact us today under the menu contact option.
CyberKey Smart Keys
In less than a second, the lock and key synchronize: they exchange unique IDs, compare access codes, validate the list of authorized locks, confirm the current time is within the authorized window, and ensure the key is not on the lock’s list of lost keys. If everything is validated, the lock will open.
There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be set to expire. These expirations are flexible and can be set according to specific security requirements: hourly, daily, weekly, or monthly expirations are common examples. When a key with a near-term expiration is lost, no action may be required. When a key with a long-term expiration is lost, creating unacceptable risk exposure, vulnerable locks can be reprogrammed in order to load the lost key ID into the lock memory and prevent that key from working.
A key can access up to 12,000 locks with the purchase of the Lock List Filtering Software Enhancement Module.
Low battery warnings are provided in the software every time a CyberKey is updated via a communication device and in the key itself, through an audio or visual indicator. Vist our Technical Documents page to learn more about CyberKey low battery indicators.
The key permissions, access schedules, and audit trail are maintained even if the battery dies but the clock inside the key may need to be reset. This can be done by updating the key right after recharging or replacing the key battery.
Keys are updated and programmed via communication devices. When a CyberKey and a communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. Communication devices are linked to CyberAudit software over a local area network or securely over the Internet.
To determine which key is best for you, click here to view our key specifications or contact us today.
CyberPoint Checkpoints
CyberPoint checkpoints and CyberLock cylinders have the same electronics package. CyberPoints are essentially cylinders without the lock pin mechanisms.
Yes, the electronics are sealed for installation indoors and out.
CyberPoint checkpoints are most commonly programmed with the Grand Master CyberKey. CyberKey smart keys “carry” CyberPoint (and lock) data back to the software through Communicators.
Communication Devices
The exact time is dependent on how much data is being transferred; however, the average transfer is about ten seconds.
Yes, several communicators such as the Authorizer System and CyberKey Vault key cabinets include backup power options and built-in memory to store key configurations.
The most common approach is to use a Generation 2 CyberKey which can program, update, and download locks in the field.
To determine which communication device is best for you, click here to view our Communicator specifications or contact us today.
Flex System Input & Output Modules
Flex System modules can be installed in off-the-shelf weatherized enclosures. Additionally, they can be mounted directly in a wall near the security element they control (such as a door or gate).
The RFID Reader module is compatible with 13.56 MHz RFID cards.
Yes, Wiegand compatible 3rd party input devices can open a Vault WR using a Flex System Door & I/O module.
Yes, they can trigger Wiegand compatible and other 3rd party relay devices such as electric strikes, cameras, alarms, and more using the Flex System Door & I/O module.
Door Controller & I/O Module
The Door & I/O module is designed to work with any 26-bit Wiegand compatible interface. Since the Wiegand standard has evolved and expanded over time, every Wiegand compatible device may not be out-of-the-box compatible. Please contact us to discuss your specific needs.
As with other Flex System modules, the Flex System Hub provides power to the Door & I/O module through the RS-485 network connection.
It can be installed either in the wall near the device it’s driving, or in a central location, typically near where the Flex System Hub is installed.
CyberAudit Management Software
An audit trail is a list of activity recorded by locks, keys, and communicators. Typical audit trail records contain information about events that occurred within a lock and/or key. It includes the date and time of the occurrence. Other audit trail data includes information related to communicators, such as when a CyberKey Vault was accessed.
Yes, records can be removed from the database and stored in a separate file.
The type of software is dependent upon several factors including the number of locks and keys needed, software features preferred, communication devices desired, and the geographical spread of the installation. To determine which software package is best for you, read more about CyberAudit management software features or contact us today.
Yes, all versions of the software are accessible through a standard web browser, even on a smart phone or tablet.