Software Enhancement Modules (SEMs) unlock advanced features within CyberAudit software that provide specific functionality. Each SEM can be purchased individually, enabling CyberAudit customers to pay for only the features they need.
Compatible software versions:
= Professional | = Basic | = Enterprise
Door & I/O Support Module
The Door & I/O software module adds software features required to manage all the functionality the Door & I/O hardware module brings to a Flex System installation. In addition to managing individual access rights to each door, Request-to-Exit (RTE) events are recorded, doors can be set to automatically unlock and relock at specified times, door sensors are monitored, and alarms can be triggered if a door is forced or left open after a specified amount of time.
Enterprise Location Graphics Module
The Location Graphics module opens a visual interface tool that allows CyberLock cylinders and Communicators to be graphically “placed” on drawings, pictures, or maps (JPEG, PNG, or TIFF compatible). In particular, this module helps large and geographically spread-out CyberLock deployments to improve tracking and locating of locks and communicators.
Enterprise Key Security Enhancement Pack Module
The Key Security Enhancement Pack includes three security features. The first is an option that makes the first key of a multi-key operation the sole key able to open a CyberLock cylinder within an eight-second window. The second adds a Temporary Activation option that enables activating an expired CyberKey smart key for five minutes by touching a selected CyberLock cylinder or CyberPoint electronic tag. The third feature provides an option to limit Temporary Activation and One-Time Use settings to an 8-second window.
Enterprise Lock List Filtering
The Lock List Filtering module enables limiting the number of locks loaded into CyberKey smart keys on a per communicator basis. This is needed when CyberKey smart keys require individual permission to more than the maximum 3300 locks they can now hold. With this enhancement, keys and missions may be granted access to an overall unlimited number of individual CyberLock cylinders and each communicator in the system filters the locks to selected tags.
Enterprise LDAP Authentication
The LDAP Authentication module enables basic LDAP authentication for selected administrator logins. When enabled, CyberAudit can optionally validate the administrator’s login and password against the LDAP server rather than from within CyberAudit. CyberAudit supports the LDAPS method of sending the user name and password to the LDAP server via SSL on port 636. It does not support proxies or port forwarding to establish the LDAP connection.
Advanced Door Features
The Advanced Door Features module adds three features to use with doors:
- A No PIN required schedule – During this time a person with a PIN will not be required to enter their PIN to gain access to the door. This would be useful in a case where a PIN is not required during normal business hours but would be required outside of that time.
- Keep Unlocked Calendar entries – Allows scheduling times in the future where a door will be held unlocked. CyberAudit-Web adds the time frame of the calendar entry to the door’s keep unlocked schedule in the week of the calendar entry. This feature is useful to managers of facilities that schedule events on a calendar basis and want the door to be held unlocked for those events.
- A door monitor window – Shows door activities in a scrollng window as they occur.
Rolling Access Codes
Automates the process of changing lock access codes for some or all CyberLocks in a system. Access codes may be configured to change (roll) occur on a periodic basis. A “grace period” may be designated during which the lock will continue to honor the old access codes to complete the change for all affected locks.
The FlashLock module adds complete support for adding FlashLocks and fobs to a CyberLock system. To grant access, FlashLocks may be added to an access list . Fobs may be assigned to people and given an expiration rule. Flash access may be distributed by email or text message.