CyberLock Catalog
CyberLock Catalog
CyberLock Catalog
CyberLock is an innovative security system that transforms mechanical locks into a feature-rich electronic
access control system.
• CyberLock cylinders fit existing lock hardware.
• Cylinders are powered by the battery in the key, eliminating the need for hardwiring.
• Programmable smart keys carry schedules and access permissions.
• Information downloaded from locks and keys increases accountability.
• A powerful software suite provides superior system management.
Utilities
• Transmission Lines
• Sub-Stations
Education
• Records & Equipment
• Classrooms
Finance
• Cash-in-Transit
• ATMs
4
The Best of Both Worlds
The CyberLock system brings tremendous access control features to every lock within an organization.
There are, however, circumstances where the convenience of a key card system is desired. This can be
achieved with the CyberLock Flex System expansion platform.
CyberLock
CyberLock electronic cylinders are ideal
for securing access to mobile and remote
assets as well as to hard-to-reach locks.
Flex System
The Flex System is ideal for securing
Integrate existing access to high-traffic areas using key Use RFID cards
key card systems cards for authentication. to gain entry
With CyberLock and the Flex System, all access control requirements can
be met and managed using one comprehensive, yet intuitive, software platform.
5
Secure Everywhere with CyberLock & the Flex System
Perimeter Security
Secure, restrict, and monitor access
to perimeter gates and cages containing
high-value assets with CyberLock electronic padlocks.
Server Cabinets
Install CyberLock electronic
cylinders on server cabinets to
control who has access and when.
Existing Systems
Integrate the Flex System with third party security
devices such as RFID readers, biometric scanners,
alarms, and sensors for a comprehensive access
control system.
Key Control
Store electronic keys on-site for increased
key control. CyberKey Vaults connect
directly to the software and communicate
access activity as keys are returned.
6
Utility Closets
Control and monitor access to utility equipment
such as electrical panels, power meters, and other
mission-critical controls.
Key Authorization
Re-authorize and update keys regularly with
Authorizer Keyports, which can be installed
anywhere throughout a facility or campus.
Mobile Assets
Protect goods in transit.
No matter how geographically
widespread operations are,
CyberLock cylinders can
secure containers and cargo
bays anywhere.
Office Doors
Restrict access and track entry to sensitive areas
that house equipment, inventory, or records.
7
How It Works
1. Access permissions are
entered in the software.
System Management
As illustrated above, it all starts and ends with software. The CyberAudit software suite offers the user
feature-rich access control management solutions for installations of any size.
Easy Access:
The software is accessed through web browsers on desktops, laptops, smartphones, or tablets.
Manage Schedules:
Administrators can create customized access schedules for each individual key holder, or batch schedule
entire departments.
Generate Reports:
System administrators can create and view custom audit reports on access activity and create automatic
email notifications on specific events.
8
CyberAudit Software
Professional Lock and Key Access Matrix
Professional is an excellent choice for small- to medium-sized
companies that need key control and reporting. Professional
can manage as many as 500 locks and 500 keys.
Features
• Set schedules for when authorized locks may be accessed.
• Download detailed audit trails of lock and key access activity.
• Expire and/or deactivate keys.
• Configure automatic email notifications on access activity.
• Manage multiple key mode and delay capability.
• Access through a LAN or securely over the Internet.
Enterprise
Enterprise is ideal for large, complex, and geographically widespread installations. Enterprise can manage as
many as 15,000 locks and 15,000 keys.
Features
• Perform all of the functions found in Professional.
• Spread responsibility through a hierarchy of administrators across multiple locations and time zones.
• Grant emergency one-time access or program and download keys in the field for on-demand access.
• Schedule missions.
• Share lock access with another Enterprise system.
• Integrate with other software applications.
Audit Reports
Key Expirations
Replaceable Battery Keys can be assigned a start date and an expiration date. This means keys
Powered by a field-replaceable can be issued before they become active, and can be set to expire at a
3-volt lithium battery. specific time in the future. Key holders must reauthorize keys before access
will be granted again. Setting short-term expiration dates is an excellent way
to minimize risk due to lost or stolen keys.
CyberLock Padlocks
Manage access to cargo bays, trucks, gates, control boxes, and more.
Cylinders include additional protection against the elements for
padlock applications.
Custom Applications
Over 300 CyberLock designs have been created to
date. Contact us to see if we have a cylinder that fits your
application. If not, let’s talk about designing one that does.
11
Communicators
CyberLock communication devices serve as the interface between
CyberLock hardware and CyberAudit management software.
IR Encoder
Access privileges are distributed to key holders via communicators.
These devices are linked to the software over a local area network or
securely over the Internet. When a CyberKey and communicator make
contact, the audit trail is downloaded from the key while simultaneously
new schedules, permissions, and system information are uploaded to the key.
Desktop
• IR Encoders and USB stations plug directly into an available USB port
Authorizer Keyports on a computer. Update keys as needed while at or near a workstation.
Remotely
• Authorizer Keyports can be installed remotely, such as in a warehouse
or at an employee entrance. Needing only a network connection,
the Authorizer Hub stores access permissions in memory for continued
operation even when the network connection is interrupted.
On the Go
• Use the micro USB port on the CyberKey II to directly connect
to a laptop. Update your key anytime and anywhere you have
a network connection.
• Use a CyberKey Blue to make a Bluetooth connection to a smart phone
operating a Blackberry or Android OS. This enables users to update and
download keys using a cellular network.
CyberKey Vaults
Communicator Features:
• Key activity downloads and key permission updates occur simultaneously.
• Communicator compatibility depends on the version of CyberAudit
software installed.
• Several communicators offer multiple functions, such as charging the key
battery or storing unprogrammed keys.
Smart Phone
12
Communicators that Store and Dispense CyberKeys
13
CyberLock Flex System
Adding the Flex System to CyberLock brings the two worlds of access control together. CyberLock secures
hard-to-manage applications where a key card system is not feasible. The Flex System provides the framework to
support a key card system, and more, under the same management as CyberLock cylinders. The result is the best
of both worlds under one system.
Program a lobby door or employee entrance to lock and unlock on a set schedule.
Activate a light when a door is opened. The light can be at the door for safety
or at a security office as an indicator.
Sound an alarm or trigger an alert with a push of a button or when a door is left open
for more than a set amount of time.
15
CyberLock in Action
Finding a “Metro-Proof” Lock System
In the Amsterdam Metro, a lock cylinder has a lot to endure; it must be resistant to burglary attempts,
vandalism, manipulation, corrosion, and rough handling. To increase security and key control, Metro
Amsterdam chose CyberLock. They were pleased with the unique features of the CyberLock system,
and because the locks are installed without wiring, they were able to replace all cylinders, including
padlocks, while staying within budget.
“Within a month, all cylinders had been replaced, including those in doors with very uncommon profiles.”
Frank de Vries, Security Manager
Videx, Inc . has been designing and manufactur ing innovative electronics
since the company was founded in Cor vallis, Oregon in 1979. Ear ly
products included display enhancement modules for Apple computer s.
In 1985, Videx entered the data collection industr y with its fir st por table
bar code scanner. Over the year s, additional data collector s have been
introduced utilizing touch memor y button and RFID tag technologies.
CyberLock, Inc.
1105 N.E. Circle Blvd., Corvallis, OR 97330 CyberLock, the CyberLock Logo, CyberKey, CyberPoint, CyberAudit,
CyberKey Authorizer and other marks are trademarks of Videx, Inc.
541-738-5500 • Fax 541-738-5501 All other trademarks are properties of their respective owners.
www.cyberlock.com • [email protected] Specifications subject to change without notice. GCO3303