CyberAudit Software

CyberAudit software is available in two software packages: Enterprise Basic and Enterprise 8.0.


 

Manages both the CyberLock, key-centric solution, and the hardwired Flex system simultaneously. CyberAudit software is available in two software packages: Enterprise Basic and Enterprise 8.0. Both software versions are categorized by the number of key holders and can manage thousands of users and locks.

Basic

Enterprise Basic is an excellent choice for small-to-medium-sized companies that need key control and reporting. It brings a few of the essential features of Enterprise 8.0 in an easily manageable platform. Basic is designed to manage about 500 locks and 500 keys.

Features

  • Set schedules for when authorized locks may be accessed.
  • Download detailed audit trails of lock and key access activity.
  • Expire and/or deactivate keys.
  • Configure automatic email notifications on access activity.
  • Manage multiple key mode and delay capability.
  • Access through a LAN or securely over the Internet.

Enterprise

The full version of Enterprise 8.0 is a feature-rich management software, ideal for large, complex, and geographically widespread installations. Enterprise 8.0 offers all of the features of Enterprise Basic as well as advanced options like Bluetooth and Wifi CyberKeys, and the ability to share locks with other Enterprise 8.0 users. Enterprise is ideal for large, complex, and geographically widespread installations. Enterprise is designed to manage about 15,000 locks and 15,000 keys. CyberAudit software manages both the CyberLock, key-centric solution, and the hard wired Flex System simultaneously. The software enables the user to program access permissions, view audit trails of all locking points, and manage CyberLock hardware.

Features

  • Perform all of the functions found in Professional.
  • Spread responsibility through a hierarchy of administrators across multiple locations and time zones.
  • Grant emergency one-time access or program and download keys in the field for on-demand access.
  • Schedule missions.
  • Share lock access with another Enterprise system.
  • Integrate with other software applications.

FOR MORE INFO CLICK HERE.