CyberLock Catalog

Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Welcome to the World of CyberLock

CyberLock is an innovative security system that transforms mechanical locks into a feature-rich electronic
access control system.
• CyberLock cylinders fit existing lock hardware.
• Cylinders are powered by the battery in the key, eliminating the need for hardwiring.
• Programmable smart keys carry schedules and access permissions.
• Information downloaded from locks and keys increases accountability.
• A powerful software suite provides superior system management.

Access Control in the Real World


With a CyberLock system, it doesn’t matter where the lock is—electronic access control is possible.
By eliminating the wire between the lock and the managing software, CyberLock can be installed
virtually anywhere. The convenience of a mechanical key system plus the access permissions and
tracking capability of an electronic access control system come together with CyberLock.

A Complete Access Control System in Every Lock Core


2
A World of Solutions
CyberLock technology provides accountable access control for any industry or sector that needs to secure,
control, and audit assets at the door and beyond.

Telecommunications & Data Centers


• Cell Phone Towers
• Server Racks

Utilities
• Transmission Lines
• Sub-Stations

Education
• Records & Equipment
• Classrooms

Airports & Seaports


• Perimeters
• Cargo

Mining & Construction


• Tools & Equipment
• Explosives

Transport & Logistics


• Warehouses & Depots
• Trucks & Trains

Finance
• Cash-in-Transit
• ATMs

"CyberLock has done


Healthcare
everything that I was told • Narcotic Cabinets
it could do, and more." • Fire & EMS
Project Manager, Water Treatment Facility
3
A World of Benefits
Versatile: Control Access to Every Asset
CyberLock cylinders are easily deployed on gates, trucks, shipping containers,
and other mobile or remote assets. Full access control is now possible on
assets previously restricted to only mechanical locks and keys.

Cost Effective: Eliminate Expensive Cabling


Electronic cylinders are installed without power or wiring making setup and
installation quick, easy, and affordable. The batteries in the CyberKey smart keys
energize the CyberLock cylinders, bypassing the need for expensive wiring.

Reliable: Maintain Security During Power Outages


Power outages can disrupt everything but your CyberLock security
solution. Independence from the electrical grid allows CyberLock
deployments to remain fully functional during power outages.

Superior Key Control: Re-Key Electronically


Keys are programmed with access permissions for each individual user.
If a key is lost, it can easily be deactivated in the system, eliminating
the need to re-key.

Unifying: View All Access Events


CyberLock cylinders and smart keys keep a record of all access events, including
access granted and access denied attempts. Administrators can view the
downloaded audit report of all lock and key activity via the management software.

Simplifying: Manage All Under One Software Platform


CyberAudit management software capably manages access not only
for the electronic lock cylinders, but also for CyberLock Flex System
modules—bringing remote access control and wired access under
one software platform.

4
The Best of Both Worlds
The CyberLock system brings tremendous access control features to every lock within an organization.
There are, however, circumstances where the convenience of a key card system is desired. This can be
achieved with the CyberLock Flex System expansion platform.

CyberLock
CyberLock electronic cylinders are ideal
for securing access to mobile and remote
assets as well as to hard-to-reach locks.

Secure server racks Track access to


perimeter gates

Flex System
The Flex System is ideal for securing
Integrate existing access to high-traffic areas using key Use RFID cards
key card systems cards for authentication. to gain entry

With CyberLock and the Flex System, all access control requirements can
be met and managed using one comprehensive, yet intuitive, software platform.

5
Secure Everywhere with CyberLock & the Flex System

Perimeter Security
Secure, restrict, and monitor access
to perimeter gates and cages containing
high-value assets with CyberLock electronic padlocks.

Server Cabinets
Install CyberLock electronic
cylinders on server cabinets to
control who has access and when.

Existing Systems
Integrate the Flex System with third party security
devices such as RFID readers, biometric scanners,
alarms, and sensors for a comprehensive access
control system.

Key Control
Store electronic keys on-site for increased
key control. CyberKey Vaults connect
directly to the software and communicate
access activity as keys are returned.

6
Utility Closets
Control and monitor access to utility equipment
such as electrical panels, power meters, and other
mission-critical controls.

Key Authorization
Re-authorize and update keys regularly with
Authorizer Keyports, which can be installed
anywhere throughout a facility or campus.

Mobile Assets
Protect goods in transit.
No matter how geographically
widespread operations are,
CyberLock cylinders can
secure containers and cargo
bays anywhere.

Office Doors
Restrict access and track entry to sensitive areas
that house equipment, inventory, or records.

High Traffic Doors


Deploy Flex System modules
such as RFID readers or PIN
pads on high-traffic entryways.

7
How It Works
1. Access permissions are
entered in the software.

5. Audit trails are viewed 2. Permissions are uploaded


in the software. to CyberKeys.

4. Access activity is 3. Key holders access


downloaded from authorized locks.
CyberKeys.

System Management
As illustrated above, it all starts and ends with software. The CyberAudit software suite offers the user
feature-rich access control management solutions for installations of any size.

Easy Access:
The software is accessed through web browsers on desktops, laptops, smartphones, or tablets.

Maintain Network Security:


Browser-accessed software doesn’t mean it resides in the “cloud.” Install CyberAudit on your own
network following your own security protocols.

Manage Schedules:
Administrators can create customized access schedules for each individual key holder, or batch schedule
entire departments.

Generate Reports:
System administrators can create and view custom audit reports on access activity and create automatic
email notifications on specific events.

8
CyberAudit Software
Professional Lock and Key Access Matrix
Professional is an excellent choice for small- to medium-sized
companies that need key control and reporting. Professional
can manage as many as 500 locks and 500 keys.

Features
• Set schedules for when authorized locks may be accessed.
• Download detailed audit trails of lock and key access activity.
• Expire and/or deactivate keys.
• Configure automatic email notifications on access activity.
• Manage multiple key mode and delay capability.
• Access through a LAN or securely over the Internet.

Enterprise
Enterprise is ideal for large, complex, and geographically widespread installations. Enterprise can manage as
many as 15,000 locks and 15,000 keys.

Features
• Perform all of the functions found in Professional.
• Spread responsibility through a hierarchy of administrators across multiple locations and time zones.
• Grant emergency one-time access or program and download keys in the field for on-demand access.
• Schedule missions.
• Share lock access with another Enterprise system.
• Integrate with other software applications.

Audit Reports

“The audit reports provided by the


management software have been very
beneficial in tracking traffic to our buildings.”
Facility Manager, School District 9
CyberKey Smart Keys
CyberKey smart keys are designed with highly durable fiberglass-reinforced
casings and are programmed with access permissions for each key holder.

Smart Key Features


• Contains a unique ID that cannot be changed or duplicated
• Has the ability to store thousands of access events:
• Lock ID
• Date & Time
Rechargeable Battery • Event Type
Contains an extended-life, • Carries access schedules for the specific key holder
rechargeable lithium-ion • Retains encrypted access codes that bind the key to a specific system
polymer battery. • Includes a battery which energizes both the key and each lock it touches

Permissions and Schedules


Each key contains a specific list of authorized locks and a schedule of when
they may be accessed. For example, a key can be programmed to allow
access to one or several locks from 8 a.m. to 6 p.m. on weekdays and 10
a.m. to 4 p.m. on Saturdays. Keys presented outside of this schedule are
denied access.

Key Expirations
Replaceable Battery Keys can be assigned a start date and an expiration date. This means keys
Powered by a field-replaceable can be issued before they become active, and can be set to expire at a
3-volt lithium battery. specific time in the future. Key holders must reauthorize keys before access
will be granted again. Setting short-term expiration dates is an excellent way
to minimize risk due to lost or stolen keys.

When a CyberKey Meets a CyberLock


When it first makes contact, a key
energizes a lock. A split second
exchange of information determines
if the key is at an approved lock
Bluetooth® Enabled within an authorized time frame.
Facilitates real-time, Access is then either granted or
in-the-field communications denied and that action, along with
via Bluetooth technology. a date and time stamp, is recorded
to the memories of both the key
and the lock.

“CyberLock has literally erased the threat


of all those lost keys in circulation.”
Facility Manager, Community Church
10
CyberLock Electronic Lock Cylinders
CyberLock cylinders are the exact dimensions of the mechanical lock cylinders they replace.The absence
of a conventional keyway means it is not vulnerable to traditional lock picking techniques. As the CyberLock
cylinder needs no power or wiring, it is ideal for everything from an office building to mobile or remote assets.

Electronic Cylinder Features


• Contains a unique ID that cannot be changed or duplicated
• Has the ability to store over a thousand access events:
• Key ID
• Date & Time
• Event Type
• Retains encrypted access codes that bind the lock to a specific system

Cylinders for Doorways


Retrofit knob and lever locks that accept Schlage®
6-pin and Yale® 6- or 7-pin format cylinders. Rim, mortise, and
European profile cylinders are also available.

CyberLock Padlocks
Manage access to cargo bays, trucks, gates, control boxes, and more.
Cylinders include additional protection against the elements for
padlock applications.

Cylinders for Cabinets


The compact size of CyberLock cam locks makes them ideal
for securing desk drawers, fare boxes, jewelry display cases,
medical cabinets, and server racks.

IC Cylinders CyberPoints for Checkpoints


Easy-to-install A CyberPoint is an electronic tag used as a data checkpoint.
interchangeable core Each touch of a CyberKey stores a date and time stamp
cylinders work on door record in both the CyberPoint and the key. CyberPoints are
and cabinet applications. designed for guard tours, maintenance checks, and inspections.

High-Security Drill-Resistant Cylinders


A number of CyberLock cylinders incorporate additional safeguards such as drill- and tamper-resistant
features. These cylinders are ideal for financial applications such as cash-in-transit, vending machines,
parking meters, and ATM machines.

Custom Applications
Over 300 CyberLock designs have been created to
date. Contact us to see if we have a cylinder that fits your
application. If not, let’s talk about designing one that does.
11
Communicators
CyberLock communication devices serve as the interface between
CyberLock hardware and CyberAudit management software.
IR Encoder
Access privileges are distributed to key holders via communicators.
These devices are linked to the software over a local area network or
securely over the Internet. When a CyberKey and communicator make
contact, the audit trail is downloaded from the key while simultaneously
new schedules, permissions, and system information are uploaded to the key.

To increase security and accountability, access privileges can be programmed


USB & Web Stations
to expire at scheduled intervals. This results in users regularly updating and
reauthorizing keys at communicators.

Several communicators are available to address individual, facility,


and personnel needs:

Desktop
• IR Encoders and USB stations plug directly into an available USB port
Authorizer Keyports on a computer. Update keys as needed while at or near a workstation.

Remotely
• Authorizer Keyports can be installed remotely, such as in a warehouse
or at an employee entrance. Needing only a network connection,
the Authorizer Hub stores access permissions in memory for continued
operation even when the network connection is interrupted.

On the Go
• Use the micro USB port on the CyberKey II to directly connect
to a laptop. Update your key anytime and anywhere you have
a network connection.
• Use a CyberKey Blue to make a Bluetooth connection to a smart phone
operating a Blackberry or Android OS. This enables users to update and
download keys using a cellular network.
CyberKey Vaults
Communicator Features:
• Key activity downloads and key permission updates occur simultaneously.
• Communicator compatibility depends on the version of CyberAudit
software installed.
• Several communicators offer multiple functions, such as charging the key
battery or storing unprogrammed keys.
Smart Phone

12
Communicators that Store and Dispense CyberKeys

Increase Key Control and Accountability


CyberKey Vault key cabinets provide an intelligent way of controlling
and dispensing CyberKey smart keys. CyberKey Vaults are beneficial for
users who want to automate the process of checking in and out keys.
CyberAudit management software tracks when a CyberKey is dispensed
and when it is returned to a vault. Upon return, the vault downloads
the audit trail and reverts the key to an unprogrammed state, making
it available for the next user. All vault and key activity is managed by
CyberAudit and can be viewed by system administrators.

Effectively Manage Access to Outside Vendors


Businesses that need to provide access to sub-contractors, maintenance
companies, and vendors will benefit from the vaults’ ability to dispense
temporary access or one-time use keys. Automated email reports on
vault and key activity facilitate improved visibility into sub-contractor
on-site activity.

Securely Store Keys on Site


CyberKey Vaults are beneficial for high security applications where keys
cannot leave the building. Key cabinets are connected to the management
software and continuously communicate access activity. Users can view
when a key is checked out, returned, or if it is still in the field.

13
CyberLock Flex System
Adding the Flex System to CyberLock brings the two worlds of access control together. CyberLock secures
hard-to-manage applications where a key card system is not feasible. The Flex System provides the framework to
support a key card system, and more, under the same management as CyberLock cylinders. The result is the best
of both worlds under one system.

What can Flex do?


The CyberLock Flex System can control a variety of access control and security elements using both Flex System
modules as well as third party security devices:


Open a door with an RFID card, using a PIN pad, or combine them for more security.



Program a lobby door or employee entrance to lock and unlock on a set schedule.


Activate a light when a door is opened. The light can be at the door for safety
or at a security office as an indicator.

Sound an alarm or trigger an alert with a push of a button or when a door is left open
for more than a set amount of time.

Activate a video or still camera when a door is accessed.

How does Flex work?


The Flex System is comprised of a variety of modules that can be mixed and matched to create a custom
access control system. The modules are plugged into a Hub which is directly connected to CyberAudit
management software.

RFID Keypad Display Display & Knob


The RFID input module The Keypad Display The Display and Knob input
reads unencrypted input module provides modules work together for
13.56 MHz RFID cards entry of PIN or job high-security data entry of
to identify a person numbers; can be used PIN or job numbers; can be
and their permissions; with RFID card reader used with RFID card reader
can be used with data for dual identification. for dual identification.
entry modules for dual
14 identification.
The Flex System Hub
The Flex System Hub connects with CyberAudit software
and provides power to the Flex System modules. Embedded
memory in the Hub stores access permissions and saves audit
trail information, enabling continuous operation even when a
network connection to the software is interrupted. Moreover,
power outages can be mitigated by connecting a back up
battery or auxiliary power source directly to the Hub.

The Flex System Modules


There are a variety of Flex System modules available for a customized access control system:
• Input modules such as RFID readers and Keypad Displays can be used individually or combined
for dual-credential door access.
• Weather resistant key vault modules can be installed in the field to securely store CyberKeys
for convenient remote employee access.
• The multi-function Keyport module simultaneously activates electric door strikes
and updates CyberKeys.

The Flex System Door & I/O Module


The Door & I/O module expands the capabilities of the
Flex System even further. As a door controller, it provides
power to an electric door strike and unlocks it when an
approved key card is presented. It has additional inputs
and outputs that can control relay devices such as alarms,
speakers, cameras, or sensors. Finally, it can connect to
compatible third party Wiegand devices such as HID
readers and biometric scanners.

Keyport Vault WR Wiegand


The Keyport module The Vault WR is a Compatible Devices
has two functions: it weatherized key safe 26-bit Wiegand compatible
controls an electric that holds a single, devices can be integrated
strike and updates and unprogrammed key and into the system with the
downloads CyberKeys. recharges the battery of Door & I/O module.
rechargeable CyberKeys.

15
CyberLock in Action
Finding a “Metro-Proof” Lock System
In the Amsterdam Metro, a lock cylinder has a lot to endure; it must be resistant to burglary attempts,
vandalism, manipulation, corrosion, and rough handling. To increase security and key control, Metro
Amsterdam chose CyberLock. They were pleased with the unique features of the CyberLock system,
and because the locks are installed without wiring, they were able to replace all cylinders, including
padlocks, while staying within budget.
“Within a month, all cylinders had been replaced, including those in doors with very uncommon profiles.”
Frank de Vries, Security Manager

Ensuring a Safe School Environment


Over the years, Toppenish School District slowly lost control of their mechanical key system and many
community members had access to the district’s facilities. With the mechanical lock and key system,
they had no effective way to control and audit access to their facilities. Toppenish chose to install
the CyberLock system because it was affordable and no wiring was needed for installation.
“The management piece and knowing who has access has been very beneficial and I look forward
to carrying just one CyberKey instead of 50 different mechanical keys.” Scott Kallenberger, IT Manager

Accounting for the Cash


The transit authority in the greater Cleveland area had a problem with misplaced keys to the fare boxes on
their buses. A review of the collection reports indicated that a significant amount of money was not making
it to the bank. Although there was no way to detect if these missing keys were being used to raid the fare
boxes, their absence provided a wide hole in loss prevention efforts. The CyberLock system was selected
because it addressed their primary concerns of key control.
“The bottom line is that the collected revenue ratio has increased and employee productivity has improved.”
Scott Medlong, Transit Officer

CyberLock, Inc . is the leading supplier of key-centr ic access control


systems. It is par t of the Videx family of companies with roots dating
back to 2000 when the fir st CyberLock br anded electronic locks
and smar t keys were introduced to the mar ket.

Videx, Inc . has been designing and manufactur ing innovative electronics
since the company was founded in Cor vallis, Oregon in 1979. Ear ly
products included display enhancement modules for Apple computer s.
In 1985, Videx entered the data collection industr y with its fir st por table
bar code scanner. Over the year s, additional data collector s have been
introduced utilizing touch memor y button and RFID tag technologies.

In 2013, CyberLock, Inc . was spun off as an independent company


but maintains strong ties to Videx. The two companies continue
to collabor ate on future innovations.

CyberLock, Inc.
1105 N.E. Circle Blvd., Corvallis, OR 97330 CyberLock, the CyberLock Logo, CyberKey, CyberPoint, CyberAudit,
CyberKey Authorizer and other marks are trademarks of Videx, Inc.
541-738-5500 • Fax 541-738-5501 All other trademarks are properties of their respective owners.
www.cyberlock.com • [email protected] Specifications subject to change without notice. GCO3303

You might also like