Cyberlock

About CyberLock | White Pages | Product Information

Customize Your Access! Never Rekey Again!

Audit Trails, Schedules & Electronic Keys. The Most Cost Effective Access Management System on the Market Today!

Not sure what Cyberlock System or Product you need? Contact us at 901-363-6396 or email to [email protected]


What is Cyberlock?


CyberLock is a key-centric access control system designed to increase security, accountability, and key control throughout your organization. Based on a unique design of electronic lock cylinders and programmable smart keys, CyberLock solves security problems that no other system can.


Why Cyberlock?


Versatility: Control Access to Every Asset

CyberLock cylinders can be easily deployed not only on doors, but also on gates, trucks, shipping containers, and other mobile and remote assets. With Cyberlock, Access Control is now possible on assets that were previously restricted to only mechanical locks and keys.

Cost Effective: Eliminate Costly Cabling

Cyberlock electronic cylinders are installed without power or wiring making setup and installation a quick, easy, and affordable task. The batteries in the CyberKey smart keys energize the CyberLock cylinders, bypassing the need to install and maintain expensive wiring.

Superior Key Control: Re-Key Electronically

Keys are programmed with access permissions for each individual user. If a key is lost, it can easily be deactivated in the system, eliminating the need for costly re-keys.


How does it work?


Step 1. Install High Security E-Cylinders

Existing mechanical cylinders are replaced with Cyberlock electronic cylinders. A Cyberlock cylinder is and electronic version of a standard mechanical lock cylinder. The installation will require no wiring and the cylinder does not contain a battery.

Step 2. Programming Your Keys

Assign Cyberkeys to users. Cyberkeys are programmed with the specified access privileges for each user and contain a list of locks the user may open with a if so defined schedule of days and times they are allowed access. For example, a key can be programmed to allow access from 8 a.m. to 6 p.m. on weekdays and 10 a.m. to 4 p.m. on Saturdays. It can also be programmed to expire on a specific date and at a specific time for increased security.

Step 3. Try Your High Security Locks

When a Cyberkey meets a Cyberlock, the cylinder is energized and an information exchange occurs to determine if the key has access to that specific lock cylinder. If authorized, the lock will open. Both the lock and key record all access events, including access granted and unauthorized access attempts.

Step 4. Retrieve Your Audit Trail

When a Cyberkey meets a communication device, the key’s audit trail and logs are downloaded and new access privileges are uploaded to the key. Expiring keys frequently is recommended because it ensures users regularly update their keys which makes informative audit trails. An expired Cyberkey will not work until it has been updated with a communication device.

Step 5. Review Your Audit Trail

The CyberLock system is managed through CyberAudit management software. Customized audit reports and periodic notifications on suspicious activities can be automatically generated via email.