Yes, the electronics are sealed, for installation indoors and out. CyberLock cylinders are designed to operate in a variety of environments. Click here for more information on operating CyberLock cylinders in cold weather environments.
No, CyberLock cylinders fit into the lock hardware just the same as the mechanical cylinders they replace. The lock hardware will operate in the same fashion as before the CyberLock cylinder was installed.
No, with CyberLock the need to re-key is eliminated. Locks can be “electronically re-keyed” in the field to provide immediate response to lost/stolen keys. For additional security, keys can be set to expire regularly, limiting exposure of a lost key.
It is very possible that the lock you need is already part of the extensive CyberLock portfolio. To determine which lock is best for you, take a look aound the site for example specifications or contact us today under the menu contact option.
In less than a second, the lock and key synchronize: they exchange unique IDs, compare access codes, validate the list of authorized locks, confirm the current time is within the authorized window, and ensure the key is not on the lock’s list of lost keys. If everything is validated, the lock will open.
There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be set to expire. These expirations are flexible and can be set according to specific security requirements: hourly, daily, weekly, or monthly expirations are common examples. When a key with a near-term expiration is lost, no action may be required. When a key with a long-term expiration is lost, creating unacceptable risk exposure, vulnerable locks can be reprogrammed in order to load the lost key ID into the lock memory and prevent that key from working.
Low battery warnings are provided in the software every time a CyberKey is updated via a communication device and in the key itself, through an audio or visual indicator. Vist our Technical Documents page to learn more about CyberKey low battery indicators.
The key permissions, access schedules, and audit trail are maintained even if the battery dies but the clock inside the key may need to be reset. This can be done by updating the key right after recharging or replacing the key battery.
Keys are updated and programmed via communication devices. When a CyberKey and a communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. Communication devices are linked to CyberAudit software over a local area network or securely over the Internet.
The Door & I/O module is designed to work with any 26-bit Wiegand compatible interface. Since the Wiegand standard has evolved and expanded over time, every Wiegand compatible device may not be out-of-the-box compatible. Please contact us to discuss your specific needs.
An audit trail is a list of activity recorded by locks, keys, and communicators. Typical audit trail records contain information about events that occurred within a lock and/or key. It includes the date and time of the occurrence. Other audit trail data includes information related to communicators, such as when a CyberKey Vault was accessed.
The type of software is dependent upon several factors including the number of locks and keys needed, software features preferred, communication devices desired, and the geographical spread of the installation. To determine which software package is best for you, read more about CyberAudit management software features or contact us today.