CLIQ - ASSA ABLOY Access Control Softwares(4)
With the new CLIQ® Go app, businesses can unlock the power of access control, saving time and unnecessary workload in the process. CLIQ® Go locking technology allows users to manage security and access rights on the move, on the road and from anywhere in the world.Manage your system with the CLIQ® GO appThese days, all you need is an app to help you find a route, choose a restaurant, read a spreadsheet or check your bank balance. Now there’s an app that can help you manage your company locking system, too. Designed for busy managers, CLIQ® Go saves time and puts a digital solution in the palm of their hand. “CLIQ® Go is the ideal security system for small- to medium-sized businesses,” says Kevin Hoare, CLIQ® Business Development Director at ASSA ABLOY. “Managers don’t want to be wasting time changing all their locks because someone lost a key—and with CLIQ® Go they don’t need to. The ability to configure access control is at their fingertips.” Managers can administer their CLIQ® Go system in the cloud and from a mobile phone, tablet or PC, via a brand new, intuitive app. A few taps and swipes of the screen is all it takes to revoke, supervise or amend individual access rights. Keep your business on the move The mechatronic CLIQ® Go system combines the best of mechanical and electronic security to meet the needs of a busy workplace. The electronic lock’s power is provided by a battery inside every programmable key, meaning it works independently of mains power. The system is designed to fit existing doors and lock cases, making it cost-effective and hassle-free to install. Site security can get the CLIQ® Go upgrade with minimal disruption to day-to-day operations. The cylinders and keys are built to withstand the elements, so can be used on interior and exterior openings, and work across multiple types of enclosure – not just doors but cabinets, cupboards and padlocks, too.Add to Compare
It is a wire-free system, and each key can be programmed and updated individually to allow access to specific areas at specific times and dates, accommodating constantly changing access requirements and ensuring maximum flexibility. Power is provided by a battery inside the programmable CLIQ® key. The new CLIQ® Web Manager software is built to serve a wide range of workflows. It allows administrators to create individual schedules for users, doors or audit trails. The revalidation function eliminates the risks of lost or stolen keys: a CLIQ® system can be set to require key revalidation when required, making it safe and easy to issue time-limited access to contractors or visitors. In addition, with different user roles, work can be divided between security administration staff. For example, one user role can be defined as “handing out keys at reception”, while another user can be made responsible for changing access rights on cylinders in the field. The CLIQ® Remote Programming Device is invaluable in assisting companies to manage these often complex workflows. Administrators operate the CLIQ® Web Manager over an Intranet or the Internet, using a standard web browser. No software installation is required, which allows for territorial independence and reduces project IT costs. The CLIQ® Web Manager will benefit large companies with complex CLIQ® installations, in particular. Multinationals with multiple administrators for different territories or organisational units can grant all of them simultaneous system access, for example. Granting tailored access to local staff with local knowledge and local responsibilities is straightforward. The software is also available in several languages, ideal for multinationals with a multilingual staff roster. For easy management, ASSA ABLOY offers software as a service hosting, or network-compatible client/server design. And ASSA ABLOY customer service is available around the clock, every day of the year.Add to Compare
The new CLIQ® Connect solution is a simple and cost-effective way for facility managers to administer mobile workers’ access control rights. Facility managers can update, amend, revoke or renew access rights remotely using the CLIQ® Web Manager software and the latest Bluetooth technology paired with a mobile phone. This enables a mobile worker in any location to access locks. They simply open the CLIQ® Connect app on their mobile phone to transfer updated access permissions instantly to their programmable CLIQ® key via Bluetooth. Flexible access control and key management CLIQ® is a locking system with high-end microelectronics powering programmable keys, cylinders and padlocks. It provides flexible access control and key management solutions for all kinds of locking applications, including those at critical infrastructure sites. With CLIQ®, each employee or contractor has tailored, individual access rights based on the specific time and date needed, all stored in their own programmable CLIQ® key. A lost key no longer threatens site security: system administrators simply remove its access permissions via the user-friendly CLIQ® Web Manager software — anytime and from anywhere. CLIQ® Connect app The new CLIQ® Connect app, part of the trusted CLIQ® ecosystem, makes mobile workflows even smoother. A keyholder no longer needs to update access rights physically in person, carry additional updating devices, or even return to base. CLIQ® Connect supplements — rather than replaces — wall or desktop programming devices (PDs). No additional hardware is needed, so off-site workers can amend their access rights without any need to carry mobile PDs. All they need is a smartphone and the CLIQ® Connect app. Data transfer between system and app is encrypted. The app pairs any programmable CLIQ® Connect key, via a secure cloud connection, with the CLIQ® Web Manager system. To change a keyholder’s access rights, the system administrator simply accesses the CLIQ® Web Manager software — from anywhere — and updates it. The keyholder makes a secure Bluetooth connection between the programmable CLIQ® Connect key and the app to instantly update their access permissions. Audit trails for any CLIQ® Connect key can be generated on demand, or automatically uploaded when a key’s access rights update takes place. The CLIQ® Connect key and companion app bring real-time security into the mobile era. Streamlining complex workflows “We designed CLIQ® to help our customers make their complex workflows more efficient,” says Kevin Hoare, Director Business Development CLIQ® at ASSA ABLOY EMEA. “With CLIQ® Connect, it’s now even easier to amend any time- or location-limited access rights that have been issued to remote workers. CLIQ® Connect significantly boosts site security, because access rights with very short validity are much easier to administer — making it even less likely that any lost key would pose a security threat. It slashes the time wasted on administering access rights, and saves money that would be spent on programming devices and key management systems.”Add to Compare
Browse Access Control Softwares
Access control software products updated recently
Gallagher Command Centre Site Plan Viewer for centralised site management visibility and situational awareness
Gallagher Software Maintenance ensures security system stays up-to-date with latest security innovations
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organisation's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organisations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realising it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyse a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analogue technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organisation open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organisation is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organisations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organisation, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organisation and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviourAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organisations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behaviour and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organisations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerised applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
The industry faces numerous challenges in the coming year. Physical and cyber security threats continue to become more complex, and organisations are struggling to manage both physical and digital credentials as well as a rapidly growing number of connected endpoints in the Internet of Things (IoT). We are witnessing the collision of the enterprise with the IoT, and organisations now must establish trust and validate the identity of people as well as ‘things’ in an environment of increasingly stringent safety and data privacy regulations. Meanwhile, demand grows for smarter and more data-driven workplaces, a risk-based approach to threat protection, improved productivity and seamless, more convenient access to the enterprise and its physical and digital assets and services. Using smartphone apps to open doors Cloud technologies give people access through their mobile phones and other devices to many new, high-value experiencesEnterprise customers increasingly want to create trusted environments within which they can deliver valuable new user experiences. A major driver is growing demand for the ‘digital cohesion’ of being able to use smartphone apps to open doors, authenticate to enterprise data resources or access a building’s applications and services. Cloud technologies are a key piece of the solution. They give people access through their mobile phones and other devices to many new, high-value experiences. At the same time, they help fuel smarter, more data-driven workplace environments. With the arrival of today’s identity- and location-aware building systems that recognise people and use deep learning analytics to customise their office environment, the workplace is undergoing dramatic change. Improved fingerprint solutions Cloud-based platforms and application programming interfaces (APIs) will help bridge biometrics and access control in the enterprise, overcoming previous integration hurdles while providing a trusted platform that meets the concerns of accessibility and data protection in a connected environment. At the same time, the next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance. The next generation of fingerprint solutions will deliver higher matching speed, better image capture quality and improved performance Liveness detection will ensure that captured data is from a living person. Biometrics authentication will also gain traction beyond access control in immigration and border control, law enforcement, military, defence and other public section use cases where higher security is needed. Flexible subscription models Access control solutions based on cloud platforms will also change how solutions are deployed. Siloed security and workplace optimisation solutions will be replaced with mobile apps that can be downloaded anywhere across a global ecosystem of millions of compatible and connected physical access control system endpoints. These connections will also facilitate new, more flexible subscription models for access control services. As an example, users will be able to more easily replenish mobile IDs if their smartphones are lost or must be replaced. Generating valuable insights with machine learning Machine learning analytics will be used to generate valuable insights from today’s access control solutionsEducation, finance, healthcare, enterprise, and other niche markets such as commercial real-estate and enterprises focussed on co-working spaces will benefit from a cloud-connected access control hardware foundation. There will be a faster path from design to deployment since developers will no longer have to create an entire vertically integrated solution. They will simply add an app experience to the existing access control infrastructure. New players will be drawn to the market resulting in a richer, more vibrant development community and accelerated innovation. Data analytics will be a rapidly growing area of interest. Machine learning analytics will be used to generate valuable insights from today’s access control solutions. Devices, access control systems, IoT applications, digital certificates and location services solutions, which are all connected to the cloud, will collectively deliver robust data with which to apply advanced analytics and risk-based intelligence. As organisations incorporate this type of analytics engine into their access control systems, they will improve security and personalise the user experience while driving better business decisions.
A new PIN validation option adds another layer of security to ASSA ABLOY’s CLIQ® Connect programmable key access control solution. Now, when issuing or amending key access rights, administrators can set a PIN which key-holders must enter to update their key. A couple of clicks in the user-friendly CLIQ® Web Manager interface is all it takes to protect new key rights with a unique PIN. Without entering the PIN, users will not be able to revalidate or update their key to open a new lock. This new function further boosts security against unauthorised access to sensitive areas like infrastructure sites, data stores and drug storage rooms. Encrypted cloud connection “CLIQ® Connect combines convenience and high security,” explains Stephan Schulz, CLIQ Product Manager at ASSA ABLOY EMEA. “A key-holder no longer revalidates their key or updates its access rights in person by returning to base or finding the nearest programming device. All they need is a smartphone, the CLIQ® Connect app and a secure Bluetooth connection.” A key-holder makes a secure Bluetooth connection between their CLIQ® Connect key “And now, with the option for administrators to PIN protect any key permissions update or revalidation, it’s even more secure.” The CLIQ® Connect app pairs a user’s programmable key, via an encrypted cloud connection, with the CLIQ® Web Manager. To change a key-holder’s access rights, a security manager accesses their CLIQ® software and updates it. A key-holder makes a secure Bluetooth connection between their CLIQ® Connect key and the app to instantly update access permissions or revalidate. Mobile access management CLIQ® Connect’s secure solution for mobile access management has been recognised several times by industry awards. CLIQ® Connect was a winner at the Detektor International Awards, recognising outstanding innovation in security alarms, access control and CCTV; won the Gold Trophy at France’s APS Awards; and was awarded Protector & Wik’s Golden Protector 2018 for access control. “CLIQ® Connect is simple and agile for even the largest organisation,” adds Stephan Schulz. “It saves you time. And because your mobile workers drive fewer miles collecting and returning physical keys, it’s also a more sustainable access control solution.”
As one recent market report highlights, more and more organisations are switching to wireless access control to secure premises. Their motivations are well rehearsed. Wireless devices offer greater flexibility without sacrificing security. With integrated RFID readers, they are easy to retrofit to existing doors and buildings, giving security managers much more control over a site. And because they are battery powered and use almost no electricity when idle, wireless access control helps companies reduce energy bills. But choosing to cut the cables is only the first of many welcome choices when you switch to wireless. Wireless access control solutions Electromechanical CLIQ and fully electronic eCLIQ cylinders are available for doors, cabinets, lifts, alarm boxes, and entrance gatesWireless access control — including Aperio, SMARTair and CLIQ wireless locking from ASSA ABLOY — gives you the widest possible choice of credentials. You don’t even need to abandon physical keys. In ASSA ABLOY’s CLIQ key-based access control system, programmable keys with batteries power the cylinder or padlock via an encrypted interface. Electromechanical CLIQ and fully electronic eCLIQ cylinders are available for doors, cabinets, lifts, alarm boxes, machines and entrance gates. Users reprogram or revalidate their key access rights at wall devices, with portable programming devices or making a Bluetooth connection between the key and the CLIQ Connect mobile phone app. Compatible with RFID proximity protocols Card-based access control leaves your credential options wide open. Both Aperio wireless locking devices for upgrading access control systems and SMARTair access control systems are compatible with all leading RFID proximity protocols, including MIFARE, DESFire and iCLASS. Users can pick from standard smart-cards, tags, bracelets and other convenient formats, tailored to the site. Wireless escutcheons come with optional PINpads, for doors where multi-factor authentication is needed for upgraded security. In addition, a SMARTair system offers mobile-ready access. With SMARTair, administrators can open electronic door locks remotely. At the user end, the Openow app stores validated virtual keys on a smartphone, so there’s no need for anyone to visit a security office to physically collect or update a credential. SMARTair virtual keys can be sent or revoked over the air — for maximum, time-saving flexibility. Users just tap the SMARTair lock to open up via Bluetooth. Protection for various sectors ASSA ABLOY wireless access control protects single-unit shops and whole shopping mallsWhatever size your premises, and no matter what work you do, a wireless access control system fits. In the healthcare sector, our card-based access systems manage huge hospitals and small doctors’ surgeries — where optional anti-bacterial coatings preserve hygienic environments. ASSA ABLOY wireless access control protects single-unit shops and whole shopping malls; care homes and corporate headquarters. From Helen Oy power stations in Helsinki to ULab, Alicante’s newest co-working space, wireless is the right solution. Key-based access system CLIQ, for example, caters to complex, multi-location businesses with thousands of locks securing hundreds of employees, plus contractors who need access round the clock. Many utilities operate remote sites, miles from reliable mains electricity, and often at the mercy of extreme weather. None of these challenges stops CLIQ cylinders and padlocks delivering the trusted security critical infrastructure demands. CLIQ is not just for the giants. One user-friendly extension of the technology, CLIQ Go enables small business owners to manage an access system from a mobile app. A few taps on the screen is all it takes to cancel, issue or change the door permissions for an employee’s CLIQ key. Software accessibility via PC or smartphone Aperio devices integrate online or offline (or both) with access systems from over 100 different manufacturersWireless access control does not restrict your system management workflows. The backbone of every ASSA ABLOY wireless access system is intuitive software which makes it easy for facility managers to control, identify and update exactly who can open every door. For all ASSA ABLOY wireless access ecosystems, a user-friendly software interface is accessible from almost any standard PC, tablet or smartphone. It gives facility managers an instant overview of their site’s security status from anywhere. With Aperio wireless locks, you manage the new doors from the same interface as your existing access control system. Aperio devices integrate online or offline (or both) with access systems from over 100 different manufacturers. System administrators see only one, familiar admin interface. SMARTair offers a menu of management options from standalone operation through offline and Update on Card control to real-time control via SMARTair Wireless Online functionality. With wireless, the choice is yours.
Making business more sustainable is a growing challenge for us all — and made even tougher for any business with dispersed sites or a mobile workforce. Mileage mounts up when workers return to base to collect keys or update their access rights. Car and van use eat into budgets and produce harmful carbon emissions. Fortunately, there is a solution. Despite advances in car engine efficiency, mobile workers use more fuel and increase your company’s carbon footprint. You will make a business more sustainable quickly if you reduce the mileage they travel. Yet reducing miles while maintaining security is not easy, if you rely on mechanical keys to lock remote sites. CLIQ Connect eliminates the need for workers to return to headquarters to collect or return a mechanical key. Wireless locking system With CLIQ Connect, everyone carries their own programmable CLIQ key and keeps its access rights up-to-date on the move with just a smartphone — meaning fewer miles driven and less money wasted on unnecessary fuel. It’s an easy solution to becoming more sustainable. The app pairs your programmable CLIQ Connect key, via an encrypted connection, with the CLIQ Web Manager Part of the trusted CLIQ access control ecosystem, CLIQ Connect makes an immediate operational impact. The wire-free locking system is based on multiple mechatronic cylinder formats and programmable electronic keys. With CLIQ Connect, a key-holder no longer updates their access rights physically in person by returning to base, nor even moves to the nearest programming device. All they need is the CLIQ Connect app and a Bluetooth connection. Updating access rights from anywhere It’s simple, agile and more sustainable. It saves fuel and cuts emissions instantly. The app pairs your programmable CLIQ Connect key, via an encrypted connection, with the CLIQ Web Manager. To change a key-holder’s access rights or key validity, a system administrator accesses the CLIQ Web Manager — from anywhere — and updates it. The system is managed easily by secure cloud-based software interfaced with the app. A key-holder makes a Bluetooth connection between their CLIQ Connect key and the app to instantly update access permissions or key validity securely. There is no travel involved and zero fuel consumption. A recent Future of Fuels report concludes: “Fuels create many sustainability impacts and addressing them should be a high priority for companies.” CLIQ Connect keeps your business moving in the right direction.
5 steps to finding the right access control system for youDownload
Why outdated access control systems are a big problemDownload
Five things to consider for AI with video technologyDownload
- Traka provides key management solution to keep track of authorised access at the London Clinic
- ASSA ABLOY helps Vejle Friskole staff to reduce key management time with its SMARTair® system
- Matrix COSEC time-attendance and access control solutions enhance IndiaNivesh’s financial services
- IGNIS Fire Protection Services installs Inner Range’s Inception system at a cosmetic surgery clinic in Birmingham