CyberLock cylinders are high security electronic locks designed to track and control access throughout your facility. Cylinders are designed to the exact dimensions of the mechanical lock cylinders they replace. As the CyberLock cylinder needs no power or wiring for installation, it is ideal for securing remote and mobile assets.
The CyberKey smart keys are programmed with unique access permissions for each user. A single CyberKey can be programmed to access over 1,000 locks, removing the need for a big key ring. CyberKeys will only work during specific hours and can only access authorized locks.
Since CyberLock is a wireless access control system, it can be used for a wide range of applications. With over 400 different electronic locks to choose from, we can retrofit almost any lock. Use CyberLock for doors, cabinets, cash boxes, trucks, gates, narcotic boxes, safes, vending machines, server cabinets, and more.
CyberPoint electronic tags function as data checkpoints for security guard tours and can be installed virtually anywhere Like a traditional guard tour system, security team members confirm their presence at a location by touching a CyberKey smart key to a CyberPoint electronic tag.
A significant advantage over traditional guard tour applications is that the CyberPoint is part of the CyberLock access control system. The same CyberKey smart key a guard uses to verify their location can also be loaded with access permissions to open designated CyberLock cylinders.
Communicators serve as the interface between CyberLock hardware and CyberAudit management software. Through a communicator, key information is downloaded into the software and new schedules and permissions are uploaded into the keys. A variety of communicators are available to address individual facility and personnel needs. Communicators can be installed in locations that are easy and accessible to your key holders such as a desktop or laptop computer, an employee entrance, or even in the field making frequent key expirations and access programming convenient for higher security.
The user-friendly CyberLock software platform acts as the command center for your access control system. The settings are interchangeable, which gives you the ability to completely customize the system to fit your preferences. The platform can be accessed through web browsers on desktops, laptops, smartphones, or tablets.
No, CyberLock cylinders fit into the lock hardware just the same as the mechanical cylinders they replace. The lock hardware will operate in the same fashion as before the CyberLock cylinder was installed.
There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be set to expire. These expirations are flexible and can be set according to specific security requirements: hourly, daily, weekly, or monthly expirations are common examples. When a key with a near-term expiration is lost, no action may be required. When a key with a long-term expiration is lost, creating unacceptable risk exposure, vulnerable locks can be reprogrammed to load the lost key ID into the lock memory and prevent that key from working.
The key permissions, access schedules, and audit trail are maintained even if the battery dies but the clock inside the key may need to be reset. This can be done by updating the key right after recharging or replacing the key battery.
Keys are updated and programmed via communication devices. When a CyberKey and a communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. Communication devices are linked to CyberAudit software over a local area network or securely over the Internet.
An audit trail is a list of activity recorded by locks, keys, and communicators. Typical audit trail records contain information about events that occurred within a lock and/or key. It includes the date and time of the occurrence. Other audit trail data includes information related to communicators, such as when a CyberKey Vault was accessed.
Easykeys.com was created in response to a rising need for Cyber Lock replacement keys and locks that could be obtained in an easy and, more importantly, fast method. Free & Traceable Shipping Starts at $25 on qualified items, you can receive your order as quickly as 10:30AM the following business day, and we promise to take care of you 100%.
Cyber Lock Knowledge Base
This annual exercise, organised by CCDCOE since 2010, enables cyber security experts to enhance their skills in defending national IT systems and critical infrastructure under real-time attacks. The focus is on realistic scenarios, cutting-edge technologies and simulating the entire complexity of a massive cyber incident, including strategic decision-making, legal and communication aspects.
It is a Red team vs. Blue Team exercise, where the latter are formed by member nations of CCDCOE. In 2021 there were 22 Blue Teams participating with an average 40 experts in each team. The Teams take on the role of national cyber Rapid Reaction Teams that are deployed to assist a fictional country in handling a large-scale cyber incident with all its implications. The Exercise in 2021 involved about 5000 virtualised systems that were subject to more than 4000 attacks. The teams must be effective in reporting incidents, executing strategic decisions and solving forensic, legal and media challenges. To keep up with technology developments, Locked Shields focuses on realistic scenarios and cutting-edge technologies, relevant networks and attack methods.
During two days more than 2000 participants from 32 nations practised the protection of national IT systems and critical infrastructure under the pressure of a large-scale cyberattack at the annual live-fire cyber defence exercise Locked Shields. In addition to protecting numerous cyber-physical systems the participating teams practiced tactical and strategic decision making, cooperation and the chain of command in a crisis situation where they also had to tackle forensic and legal issues and respond to information operations challenges.
The annual real-time network defence exercise is a unique opportunity for cyber defenders to practise protection of national IT systems and critical infrastructure under the pressure of a severe cyberattack.
According to the scenario, a fictional island country located in the northern Atlantic Ocean, Berylia, is experiencing a deteriorating security situation as there have been a number of coordinated cyberattacks against Berylian military and civilian IT systems. These attacks have caused severe disruptions to the operation of government and military networks, communications, water purification systems and the electric power grid and eventually lead to public unrest and protests. For the first time the exercise includes the simulation of a reserve management and financial messaging systems of a central bank. Additionally, a 5G Standalone mobile communication platform is deployed as part of a critical infrastructure to give the first experience to cyber defenders about upcoming technology change.
Exercise Locked Shields is a Red Team (RT) vs. Blue Team (BT) exercise with Teams formed by member nations and partners of CCDCOE. In 2022 there were 24 BTs participating with an average of 50 experts in each team. The teams took on the role of national cyber Rapid Reaction Teams that are deployed to assist a fictional country in handling a large-scale cyber incident with all its implications. The Exercise involved about 5500 virtualised systems that are subject to more than 8000 attacks. In addition to securing complex IT systems, the participating teams must had also be effective in reporting incidents and solving forensic, legal, media operations and information warfare challenges.
In total there are were more than 2000 participants from 32 nations to be involved in Locked Shields 2022. The exercise was organised by CCDCOE in cooperation with NATO, Siemens; TalTech; Clarified Security; Arctic Security; CR14. The Centre also acknowledges the unique elements added to Locked Shields 2022 by Microsoft, the Financial Service Information Sharing and Analysis Center (FS ISAC), SpaceIT, Fortinet.
64591212e2