CyberKey Vault Key Control Cabinets

March 26, 2010

CyberLock offers three robust key vaults; the CyberKey Vault 1, CyberKey Vault 20 FX, and CyberKey Vault WR. Smart keys stored in the vaults are unprogrammed until an authorized user presents the proper credentials (either an RFID card or PIN). When the authorized access is granted, a key is then programmed with the user’s access permissions and released from the vault.

CyberKey Vault key control cabinets offer a whole new level of accountability and key control. Unlike other key cabinets, electronic keys that are stored in the Vault contain no permissions to open any locks in a facility. When an employee needs a key, their RFID card or PIN must be entered to open the Vault and request a key to be programmed and released. The key that is released contains the access permissions specific only to that person so they can do their job: what locks they may open and when.

The Vault keeps management informed through the audit reports and alerts that are automatically sent to them. At the end of the work day, when the employee returns their electronic key to the Vault, an audit report of their entire key activity, lock openings, and exceptions such as unauthorized attempts to enter is automatically sent to management. As soon as the Vault reports back to management, the key’s memory is cleared. It remains in an un-programmed state until another authorized employee presents the required RFID card or PIN identification.

The economics of the CyberKey Vault are very attractive. Inexpensive RFID cards are used to access the Vault and the electronic key. An electronic key can be shared by any number of employees, shift-to-shift. This sharing of keys and dispensing them automatically is an efficient, cost-saving way to manage a company’s resources while at the same time increasing security. In addition, a ring of mechanical keys can be attached to an electronic key for safekeeping in the Vault.

CyberKey Vault communicates with CyberLock access management software and installs in any location that has a network connection so a key can be quickly updated with an individual’s access schedule. A company can manage their electronic keys and access to locks at multiple on- and off-site locations from one central office. 

Request More Information

By clicking above, I acknowledge and agree to Endeavor Business Media’s Terms of Service and to Endeavor Business Media's use of my contact information to communicate with me about offerings by Endeavor, its brands, affiliates and/or third-party partners, consistent with Endeavor's Privacy Policy. In addition, I understand that my personal information will be shared with any sponsor(s) of the resource, so they can contact me directly about their products or services. Please refer to the privacy policies of such sponsor(s) for more details on how your information will be used by them. You may unsubscribe at any time.