CyberLock System & Locks

  • Product Overview
  • Keys & Locks
  • System Software
  • System Hardware

Browse Our Products

What is CyberLock?

CyberLock is an innovative lock system that easily converts existing mechanical locks into an access control system. With electronic lock cylinders, programmable CyberKeys, and CyberAudit software, you can create a powerful system to track and control access to every lock in your facility.

How does it work?

CyberLock electronic cylinders replace standard mechanical cylinders.

Each CyberLock cylinder is an electronic version of a standard mechanical lock cylinder. Installing the cylinder into the lock hardware is as simple as removing the existing mechanical cylinder and replacing it with the CyberLock cylinder.

No wiring or battery is required at the lock.

The lock installs without wiring of any kind, and does not contain a battery. The power required to open a lock comes from the battery in the key.

CyberLocks cannot be picked.

CyberLocks have no keyway, and cannot be picked like a mechanical lock. CyberLocks resist forced rotation, and are designed to remain in the locked position if tampered with.

CyberKeys cannot be duplicated.

It’s not possible to create a duplicate CyberKey. Passwords in the software and hardware are unique to each installation, and protect against creation of unauthorized keys. And, although two keys can be programmed alike, each one makes its own unique record in the software.

Both a key with a replaceable battery and a key with a rechargeable battery are available.

CyberLock Cylinders

CyberLock cylinders are electronic versions of standard mechanical lock cores. Because they have no keyway, dirt and moisture cannot interfere with the operation of the lock. Each cylinder has a unique ID and is programmed with access codes that identify it as belonging to a system. CyberLock cylinders have memory for storing the most recent 1100 access events: the keys that have contacted the lock, with the date and time of the contact. The cylinder even stores when an unauthorized key tries to open it.

CyberLock provides access control to much more than just doorways. The wide variety of cylinder designs includes solutions for cabinets, drawers, padlocks, vending machines, and safes, as well as a number of custom cylinders for unique applications. Check our case studies in the Library for an idea of how different customers use CyberLock.

CyberKeys

At the heart of a CyberLock system is the highly intelligent CyberKey, which cannot be duplicated. Each user's CyberKey carries a unique schedule: what locks the user may open, and when are they allowed to open them. Keys can also be programmed with a date to begin working, and a date for the key to expire. CyberKeys each have a unique ID and are programmed with access codes that identify it as belonging to a system. Up to 3900 access events can be stored in the memory of each key, with details on the locks the key has contacted and the date and time of the contact.

It's the battery in the key that powers the CyberLock system. When the key touches the lock, the battery powers the circuitry in the CyberLock so that the key and lock can communicate. Two different keys are available: one with a replaceable 3-volt battery and one with a rechargeable lithium ion polymer battery.

Communicators

Communicators are used for communication between the locks and keys and the software. A variety of communicators are available; the one you use depends on the software system you implement and the requirements of your CyberLock installation.

  • The CyberKey station connects directly to the PC where the Professional system is installed.
  • Authorizer is a fixed key programming station for remote locations, and is used with both Professional and Enterprise.
  • IR Encoders are small USB-to-infrared devices that link CyberKeys to Lite or Enterprise by communicating with the key's infrared port.
  • PDA cell phones can be used with Enterprise to communicate with keys on-demand in the field.

CyberPoints

Sometimes you don't need a lock, you just need a way to verify someone was there. That's what CyberPoints are for. CyberPoints are electronic tags used in checkpoint applications. Identical to a CyberLock in intelligence, CyberPoints store every touch of a key in memory with date and time. They can be used in combination with a CyberLock installation, or on their own for a stand-alone checkpoint application. Applications include guard tours, maintenance checks, and inspections.

Managing Your CyberLocks

Whatever the size and requirements of your CyberLock installation, there is a CyberLock management system for you.

  • EntryPoint™ is ideal for small installations that need high-security locks and keys, but do not need the access control features of scheduling and audit trails. EntryPoint uses standard CyberLocks and CyberKeys, which are programmed with a Grand Master. No software is required.
  • CyberAudit®-Web Lite is a simple software program that adds scheduling and an audit trail to an EntryPoint system. Both a desktop and a server version of the Lite software are available.
  • CyberAudit Professional is a Windows program that installs on your PC. The added features in Professional make it a good match for small- to medium-sized installations.
  • CyberAudit-Web Enterprise is packaged on a server complete with all the hardware and software required to run the system. Enterprise is a feature-rich system that builds on the functionality of CyberAudit Professional, and is ideal for large or geographically widespread customers.

Made in the USA-installed throughout the world.