Communicators
|
|
CyberLock communication devices serve as the interface between CyberLock hardware and CyberAudit management software. |
CyberLock communication devices serve as the interface between CyberLock hardware and CyberAudit management software. Serve as the interface between CyberLock hardware and CyberAudit management software. Communication devices download the audit trail from the key and simultaneously update it with new schedules, permissions, and system information.
Options
Having a variety of communicator options available allows organizations to create the right balance between convenience and security.
- IR Encoders and USB Stations connect directly to an available USB port.
- WebStations and CyberKey Authorizers connect over a network from remote locations without a computer.
- CyberKey Vaults store unprogrammed keys until programmed and released to an authorized user.
- Smartphones enable remote employees to update keys in the field
Access privileges are distributed to key holders via communicators. These devices are linked to the software over a local area network or securely over the Internet. When a CyberKey and communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. To increase security and accountability, access privileges can be programmed to expire at scheduled intervals. This results in users regularly updating and reauthorizing keys at communicators. Several communicators are available to address individual, facility, and personnel needs:
Communicator Features:
- Key activity downloads and key permission updates occur simultaneously.
- Communicator compatibility depends on the version of CyberAudit software installed.
- Several communicators offer multiple functions, such as charging the key battery or storing unprogrammed keys