CyberKey Vault key cabinets provide an intelligent way of controlling and dispensing CyberKey smart keys. Key vaults program and dispense electronic keys with customized access privileges based on time, date, and authority level.
Main Benefits
Increase Key Control and Accountability
CyberKey Vault key cabinets are beneficial for users who want to automate the process of checking in and out keys. The management software, CyberAudit, tracks when a CyberKey is dispensed and when it is returned to a vault. Upon return, the vault downloads the key’s audit trail and reverts it to an unprogrammed state making it available for the next user. All vault and key activity is managed by CyberAudit management software and can be viewed by system administrators.
Effectively Manage Access to Outside Vendors
Businesses that need to provide access to sub-contractors, maintenance companies, and vendors will benefit from the vaults’ ability to dispense temporary access or one-time use keys. Automated e-mail reports on vault and key activity facilitate improved visibility into sub-contractor on-site activity.
Securely Store Keys on Site
CyberKey Vault key cabinets are beneficial for high security applications where keys cannot leave the building. Key cabinets are connected to the management software and continuously communicate access activity. Users can view when a key is checked out, returned, or if it is still in the field.
How It Works
The following timeline illustrates how a CyberKey Vault programs, distributes, and manages CyberKey smart keys.
8:00 a.m. Credential Is Presented
CyberKey smart keys are stored securely in a CyberKey Vault, in an unprogrammed state. An authorized PIN or RFID card is presented to the cabinet.
8:00 a.m. CyberKey Is Programmed and Released
The Vault communicates with the CyberAudit software and:
- Programs a CyberKey with specific access permissions
- Unlocks the cabinet door and releases the key
8:01 a.m. to 4:59 p.m. Daily Duties Are Performed
The programmed CyberKey is used to access authorized CyberLock cylinders throughout the organization based upon the permissions loaded in the key.
5:00 p.m. Credential Is Presented and CyberKey Is Returned
The authorized PIN or RFID card is presented again to the cabinet. The door unlocks and the CyberKey is returned to any available slot.
5:00 p.m. Audit Trail Downloaded and CyberKey Unprogrammed
The cabinet downloads the key activity, returns the CyberKey to an unprogrammed state, and reports back to the software all cabinet and key activity.
5:01 p.m. Notifications Are Sent
Designated supervisors and managers receive email notifications on vault and key activity.