Check out our special report on casino security
CyberKey Vaults – Intelligent Key Management
Technical Specification
- Make: CyberLock
- Model code: CyberKey Vault 20 FX
- Kits: Yes
- Reader Type: Card Swipe
- c/w Cards, Tags or Fobs: Cards
CyberLock CyberKey Vault 20 FX are beneficial for users who want to automate the process of checking in and out keys. The management software, CyberAudit-Web, tracks when a CyberKey is dispensed and when it is returned to a vault. Upon return, the vault downloads the key’s audit trail and reverts it to an unprogrammed state making it available for the next user. All vault and key activity is managed by CyberAudit-Web software and can be viewed by system administrators.
Read more| Make | CyberLock |
|---|---|
| Manufacturer | CyberLock |
| Category | Access Control>Access control systems & kits |
| Model code | CyberKey Vault 20 FX |
| Kits | Yes |
| Reader Type | Card Swipe |
| c/w Cards, Tags or Fobs | Cards |
| Accessories | Key Cabinet |
| Additional info |
CyberLock CyberKey Vault 20 FX are beneficial for users who want to automate the process of checking in and out keys. The management software, CyberAudit-Web, tracks when a CyberKey is dispensed and when it is returned to a vault. Upon return, the vault downloads the key’s audit trail and reverts it to an unprogrammed state making it available for the next user. All vault and key activity is managed by CyberAudit-Web software and can be viewed by system administrators. |
Compare CyberLock CyberKey Vault 20 FX with Access control systems & kits from other manufacturers
You might be interested in these products
Related Whitepapers
Water utility security: challenges and solutions
Securing America’s Telecommunications Infrastructure
The critical role of access control in K-12 school security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

