(215) 947-7272
Call Us For More Info
“CYBERKEY®, CYBERLOCK®, and CYBERAUDIT® are registered trademarks of Videx, Inc. in the United States and other countries.”

CyberAudit-Web Software Options

CyberAudit-Web Professional


CyberAudit-Web Professional installs on either a PC or Mac for local control or on a server to support a small number of concurrent software users.  Up to 500 locks and 500 keys can be easily managed using Professional.


Professional is best suited for smaller stand-alone systems.


CyberAudit-Web Enterprise


CyberAudit-Web Enterprise is a comprehensive, feature-rich software ideal for large, widespread businesses and campus settings.  The Enterprise system is specifically designed for installations of over 1,500 locks, keys, and 500 concurrent users with the need for in-field changes.


Enterprise users can easily access the software from any computer on a local network or just by opening a web browser and logging on.  In addition to all of Professional's features, a hierarchy of administrators can also be set, allowing each manager in the organization control over only the locks, keys, and people in their area of responsibility.


CyberLock_Catalog.pdf

CyberKeys.pdf

CyberKeyVault.pdf

CyberVault


Entry On Demand


The CyberVault key vault enhances the CyberLock system by providing the ability to allow people access to specific areas without the need for them to have their own key.


20-Key Vaults add two primary benefits to a standard ​CyberLock system:    

  1. The ability to have "shared keys" while having individual access privileges and tracking.   
  2. Keys are held in a disabled state until needed. If a key is removed it will not open a lock.

Data Transfer


A record of all events is stored in both the locks and the keys.


Each time a key is used at a lock a record of the lock ID, date, and time is stored in the key; and a record of the key ID, date, and time is stored in the lock. The key stores up to 3,900 of the most recent events and the lock stores the most recent 1100 events. Locks and keys can also record when an unauthorized person attempted to open the lock. 

Each key contains a list of locks it can open, with days and times.   


The CyberKey smart keys are programmed with the access privileges for each user. A standard key holds a list of locks the user can open, with the schedule of days and times they are allowed in.


Keys can be assigned a begin date and an expiration date.


This means keys can be issued before they begin working and can be set to expire at a particular time in the future. Setting short-term expiration dates on keys is an excellent way to minimize risk due to lost or misplaced keys.


One key can be programmed to open doorways, padlocks, cabinets, safes, ATM machines, and more!

CyberKey®


CyberKey electronic keys use a 3-volt lithium battery, easily replaceable in the field, or can be recharged depending on the model of key.


Keys cannot be duplicated.


It is not possible to create a duplicate of a CyberKey smart key. Passwords in the software and hardware are unique to each installation, and protect against creation of unauthorized keys. And, although two keys in the system can be programmed alike, each one will make its own unique record of events in the software.         

CyberLock electronic cylinders replace standard mechanical cylinders.


Each CyberLock cylinder is an electronic version of a standard mechanical lock cylinder. Installing the cylinder into the lock hardware is as simple as removing the existing mechanical cylinder and replacing it with the CyberLock cylinder.                 

No wiring or battery is required at the lock.


The lock installs without wiring of any kind, and does not contain a battery. The power required to open a lock comes from the battery in the key. To incorporate hard-wired doors please see our Flex System.


Cylinders cannot be picked.


CyberLock cylinders have no through hole, therefore they cannot be picked like a mechanical lock. The cylinders can resist forced rotation and are designed to remain in the locked position if tampered with.

CyberLock®