Check out our special report on casino security
CyberLock CK-RXD2 cyberKey
Technical Specification
- Make: CyberLock
- Model code: CK-RXD2
- Series: CyberKey
- Material: fiberglass reinforced nylon, brass tip
- Dimensions mm: 69 x 34.7 x 17.4
The CK-RXD2 is powered by a rechargeable battery and is compatible with all CyberLock cylinders. The key can be recharged via the USB port from a computer, car charger, or any other compatible USB device. Additionally, a variety of stand-alone recharging stations and communication devices with recharging capabilities are available. Programmed with access permissions for each key holder, CyberKey smart keys serve as the gate keeper for the CyberLock system. In addition, they provide the power needed to energise the CyberLocks.
Read more| Make | CyberLock |
|---|---|
| Manufacturer | CyberLock |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | CK-RXD2 |
| Series | CyberKey |
| Material | fiberglass reinforced nylon, brass tip |
| Physical Specifications |
Dimensions mm: 69 x 34.7 x 17.4 Weight g: 31.2 |
| Environmental Specifications | Operating Temp oC: 0 ~ 50C / 32~122F |
| Additional info |
The CK-RXD2 is powered by a rechargeable battery and is compatible with all CyberLock cylinders. The key can be recharged via the USB port from a computer, car charger, or any other compatible USB device. Additionally, a variety of stand-alone recharging stations and communication devices with recharging capabilities are available. Programmed with access permissions for each key holder, CyberKey smart keys serve as the gate keeper for the CyberLock system. In addition, they provide the power needed to energise the CyberLocks. |
Related Whitepapers
Water utility security: challenges and solutions
Securing America’s Telecommunications Infrastructure
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

