CyberLock FAQ

CyberLock Cylinders

Can CyberLock cylinders be installed outdoors?

Yes, the electronics are sealed, for installation indoors and out. CyberLock cylinders are designed to operate in a variety of environments. Click here for more information on operating CyberLock cylinders in cold weather environments.

Can CyberLock cylinders be picked?

No, CyberLock cylinders have no keyway and cannot be picked like a mechanical lock. CyberLock cylinders resist forced rotation and, if tampered with, are designed to remain in the locked position.

Is lock hardware functionality lost when CyberLock is installed?

No, CyberLock cylinders fit into the lock hardware just the same as the mechanical cylinders they replace. The lock hardware will operate in the same fashion as before the CyberLock cylinder was installed.

How are locks programmed and how do they communicate with the software?

CyberLock cylinders are most commonly programmed with Generation 2 CyberKeys. CyberKey smart keys “carry” lock data back to the software through Communicators.

What happens if I lose a key; do I have to re-key?

No, with CyberLock the need to re-key is eliminated. Locks can be “electronically re-keyed” in the field to provide immediate response to lost/stolen keys. For additional security, keys can be set to expire regularly, limiting exposure of a lost key.

Which lock is right for me?

It is very possible that the lock you need is already part of the CyberLock portfolio. To determine which lock is best for you, click here to view our lock specifications or contact us today.

CyberKey Smart Keys

What happens when a key touches a lock?

In less than a second, the lock and key synchronize: they exchange unique IDs, compare access codes, validate the list of authorized locks, confirm the current time is within the authorized window, and ensure the key is not on the lock’s list of lost keys. If everything is validated, the lock will open.

How are lost keys managed?

There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be set to expire. These expirations are flexible and can be set according to specific security requirements: hourly, daily, weekly, or monthly expirations are common examples. When a key with a near-term expiration is lost, no action may be required. When a key with a long-term expiration is lost, creating unacceptable risk exposure, vulnerable locks can be reprogrammed in order to load the lost key ID into the lock memory and prevent that key from working.

How many locks can one key access?

A key can access up to 12,000 locks with the purchase of the Lock List Filtering Software Enhancement Module.

How do I know when a battery is running low?

Low battery warnings are provided in the software every time a CyberKey is updated via a communication device and in the key itself, through an audio or visual indicator. Vist our Technical Documents page to learn more about CyberKey low battery indicators.

What happens if the key battery dies?

The key permissions, access schedules, and audit trail are maintained even if the battery dies but the clock inside the key may need to be reset. This can be done by updating the key right after recharging or replacing the key battery.

How do keys communicate with the software?

Keys are updated and programmed via communication devices. When a CyberKey and a communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. Communication devices are linked to CyberAudit software over a local area network or securely over the Internet.

Which key is right for me?

To determine which key is best for you, click here to view our key specifications or contact us today.

CyberPoint Checkpoints

How is a CyberPoint different from a CyberLock?

CyberPoint checkpoints and CyberLock cylinders have the same electronics package. CyberPoints are essentially cylinders without the lock pin mechanisms.

Can I install a CyberPoint outdoors?

Yes, the electronics are sealed for installation indoors and out.

How is a CyberPoint programmed and how does it communicate with the software?

CyberPoint checkpoints are most commonly programmed with the Grand Master CyberKey. CyberKey smart keys “carry” CyberPoint (and lock) data back to the software through Communicators.

Communication Devices

How long does it take to update and download a key?

The exact time is dependent on how much data is being transferred; however, the average transfer is about ten seconds.

Can I still communicate with my keys when the network is down and power is out?

Yes, several communicators such as the Authorizer System and CyberKey Vault key cabinets include backup power options and built-in memory to store key configurations.

How do I communicate with my locks?

The most common approach is to use a Generation 2 CyberKey which can program, update, and download locks in the field.

Which communication device is right for me?

To determine which communication device is best for you, click here to view our Communicator specifications or contact us today.

Flex System Input & Output Modules

Where can I install the Flex System modules?

Flex System modules can be installed in off-the-shelf weatherized enclosures. Additionally, they can be mounted directly in a wall near the security element they control (such as a door or gate).

What RFID cards are compatible with the Flex System RFID Reader module?

The RFID Reader module is compatible with 13.56 MHz RFID cards.

Can 3rd party input devices be used to open a CyberKey Vault WR?

Yes, Wiegand compatible 3rd party input devices can open a Vault WR using a Flex System Door & I/O module.

Can Flex System input devices trigger 3rd party outputs?

Yes, they can trigger Wiegand compatible and other 3rd party relay devices such as electric strikes, cameras, alarms, and more using the Flex System Door & I/O module.

Door Controller & I/O Module

What type of Wiegand devices are compatible with the Door & I/O module?

The Door & I/O module is designed to work with any 26-bit Wiegand compatible interface. Since the Wiegand standard has evolved and expanded over time, every Wiegand compatible device may not be out-of-the-box compatible. Please contact us to discuss your specific needs.

How is the Door & I/O module powered?

As with other Flex System modules, the Flex System Hub provides power to the Door & I/O module through the RS-485 network connection.

Where is the Door & I/O module installed?

It can be installed either in the wall near the device it’s driving, or in a central location, typically near where the Flex System Hub is installed.

CyberAudit Management Software

What is an audit trail?

An audit trail is a list of activity recorded by locks, keys, and communicators. Typical audit trail records contain information about events that occurred within a lock and/or key. It includes the date and time of the occurrence. Other audit trail data includes information related to communicators, such as when a CyberKey Vault was accessed.

Can audit trails be archived?

Yes, records can be removed from the database and stored in a separate file.

Which software package is right for me?

The type of software is dependent upon several factors including the number of locks and keys needed, software features preferred, communication devices desired, and the geographical spread of the installation. To determine which software package is best for you, click here to read more about CyberAudit management software features or contact us today.

Can I access CyberAudit on a tablet computer?

Yes, all versions of the software are accessible through a standard web browser, even on a smart phone or tablet.