CyberLock 101

The world of physical access control is complex and constantly changing, making finding the right system for you a challenging process. This article gives you a bare-bones overview of one possible option, CyberLock.

What exactly is CyberLock?

CyberLock is a key-centric wireless access control system that is completely customizable. If you’re unfamiliar with access control systems, they’re essentially security systems that allow you to monitor and control access to rooms and buildings. The most common system, and one that you’ve probably come across, is a card reader. Most traditional access control systems like the card reader require wiring and power to operate. CyberLock on the other hand can be installed and maintained without either. So in a nutshell, what you’re getting with CyberLock is an access control system with many of the same capabilities of a card reader without having to run wire and disrupt a building’s infrastructure. The CyberLock access control system is made up of 3 main components:

1) Smart CyberKey

Picture a large key ring with dozens of keys, half of which probably never get used. The ones that usually hang heavily on the pants of a custodian or a facilities manager. Now picture a single lightweight key with all of the access capabilities of that large key ring.Key Ring vs CyberKey That’s what a CyberKey gives you. It allows one key to have access to as many access points as you want. Each key has its own unique ID so individual keys can be programmed to have different access permissions. For example, you can program a custodian’s CyberKey to have access to only maintenance closets and tool rooms while a teacher’s key only has access to classrooms and faculty lounges. On top of that, each time a key is used an audit trail is left, even if a key’s access is denied. So you’ll be able to monitor who is going where and when.

2) Electronic Access Control Cylinder

When a CyberKey is inserted into an electronic access control cylinder the two will communicate and verify if the key has access to that particular lock at that particular time.CyberKey Lock Insert Based on the key’s permissions, the lock will either grant or deny access. The verification process takes a fraction of a second. The key advantage of CyberLock’s cylinders is that there is absolutely no wiring or power involved; all of the power comes from the CyberKey. So you won’t have to deal with heavy installation or paying an electrician to run wire. Instead, we can retrofit your existing mechanical lock with our electronic access control cylinders. The process is quick and painless. What does that mean for you? A few things:

  • You can now have full-fledged access control almost anywhere, not just on buildings and doors. Control and monitor access to gates, trucks, shipping containers, vending machines, safe boxes, even padlocks.
  • You can still have access to doors and buildings during power outages. Since there’s no electricity needed at the doorway the locks will continue to operate through an outage.
  • You no longer have to change the locks of your facility if a key is lost. All of the power comes from the CyberKey, so you can remotely disable a key’s permission instead of having to hire a locksmith to re-key the entire facility.

3) CyberLock Software Platform

The CyberLock platform allows you to completely customize your access control system. Think of it as your command center. This is where you assign CyberKeys to employees, remotely disable lost CyberKeys, add new electronic access control cylinders, create individual access permissions and schedules, generate audit reports, and create custom access notifications. The software can be accessed through web browsers on desktops, laptops, smartphones, or tablets. The system settings are interchangeable so you can make updates as needed.

Is CyberLock Right For Me?

Choosing the right access control system comes down to identifying what you’re trying to accomplish. CyberLock is a great solution but it may not be the best fit for your particular setup. Here are some of the pros and cons to consider:

  • Cons
    • Maintenance – Although the system operates much like a typical mechanical key and lock, it’s not. It’s an access control system. If you do not take ownership and perform semi-regular upkeep like cleaning electronic cylinders or keeping up-to-date access permissions, you will not get the most out of the system.
    •  Startup cost  – Although CyberLock is a fraction of the cost of a hard-wired access control system, it is still more expensive than a mechanical key and lock. Implementing a system is definitely an investment, but can pay off in the long run.
    • Real time updates – With the exception of the newly launched CyberKey Air, none of the CyberKeys provides real time updating and tracking. To receive audit trails or update access permissions, a key must be updated at a docking station.
  • Pros
    • No Wire or Power – This is the most appealing feature. You don’t have to deal with the logistical nightmare of running wire and you can now have access control in even the most remote areas.
    • Cost Effective – It’s a fraction of the cost of a standard hard-wired access control system and you do not have to hire an electrician to run wire for the system. You also don’t have to hire a locksmith every time a key is lost.
    • Scalable – Since the system does not require infrastructure, you can expand it as your organization grows.
    • Convenient – With the CyberAudit platform, making changes to the system is a simple process.
    • Compatible – With the CyberLock system you are not forced to use only our system as a security measure.

If you have any specific questions about CyberLock or access control systems in general feel free to email us at:

TEC Solutions is committed to designing access control systems to fit the specific needs of your organization.  Contact us today to learn more about our wide range of security solutions

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s