1. Introducing the next generation
in access control that secures,
controls and audits all assets,
from the front door to assets
in remote locations
access
control
system
The ONLY
that stretches from
your front door to a
shipping container
in the Indian Ocean
www.ekasecurity.com.au
3. access
the next generation in
that secures, controls and audits
all assets, from the front door to
assets in remote locations
PAGE 3
Securing the office door with current access control technology is easy.
But swipe cards aren’t practical for controlling access to remote assets,
like sub-stations, data centres or vending machines. They can’t lock down
mobile assets, such as containers or laptops. And if you want to use them
to secure unusual but important things like drug safes or gates, forget it.
Either the cost is prohibitive or it’s impossible to run the wiring. Master-key
systems offer a lock for just about anything, but no control over access.
Auditing who’s been where is nearly impossible. And if you lose a key you
either re-key the system (expensive!) or live with compromised security.
EKA finally breaks this either/or choice. EKA couples the master-key
ability to put a lock on anything with the tight and trackable access control
characteristics of swipe card systems. What’s more, EKA retrofits into any
existing cylinder lock and integrates any existing access control system.
That’s why EKA truly is the next generation in access control — able to
secure, control and audit any asset from the door, to remote or mobile assets.
control
Introducing
4. PAGE 4
EKA’s next-gen access control technology is the cutting edge
security solution for any industry or sector that needs a sure
way to secure, control and audit assets beyond the door.
for any
industry
or sector
The preferred access control
that needs to secure, control
and audit assets beyond the door
5. Telcos and data centres.
EKA can be used to secure
access to communication
pits and cages.
Utilities.
Large utilities like water boards
can secure facilities like power
plants, sub-stations, equipment
and storage.
Local government.
Local government assets
ranging from offices and halls,
to depots, parking meters,
barriers and park toilets can
all be easily secured with EKA.
Transport and logistics.
Containers, yards,
warehouses, depots
and even gates can be
secured using EKA.
Airports.
EKA will secure access to
hangers, gates, server rooms
and restricted access areas.
Hospitals and pharmaceutical.
Drug safes and pharmacy
labs are normally hard to lock
down. EKA makes securing
them a breeze.
Mining and construction.
Stop wondering who has
access to plant equipment,
vehicles and explosives. EKA
secures and tracks it all for you.
Education and office.
EKA can be used to secure
access to utility doors with
padlocks, cash tins, access
panels, air conditioning or
display units, light boxes
and even roller doors.
PAGE 5
6. PAGE 6
Whether it’s a cage, a cupboard,
a case, a container, a cash bag or
a gate, if you can put a lock on it,
EKA can secure and control it.
7. PAGE 7
unique
why EKA is the better access control
1 One software platform. EKA
bridges existing hardwired and
key-centric security solutions and
can secure, control and audit
access to both types.
2 Works beyond the door. Whether
it’s a cage, a cupboard, a case, a
container, a cash bag or a gate, if
you can put a lock on it, EKA can
secure and control it.
3 No expensive and disruptive
cabling. Traditional access control
systems need extensive hardwiring.
The only thing EKA replaces is the
lock cylinder.
4 Stays up when the power is down.
If the power goes down, hardwired
access control systems fail. EKA
locks are powered-up as required
by the CyberLock key your people
carry for access.
reasons
eight
5 More cost effective. EKA
delivers every advantage of an
access control system at a cost
per door (lock) that’s comparable
with a master key system.
6 Audit access to any asset. You can
access audit trails even for mobile
and remote assets and see exactly
who’s been in and out, as well as
who’s tried and been denied.
7 Deploys twice as fast. Current
access control technology is
slow to install and deploy. Even
in large organisations with
thousands of assets to secure,
EKA can be fully installed and
running in just a couple of weeks.
8 A single key opens any lock.
As long as they have access
privileges, your people can access
any asset using just one key.
8. PAGE 8
Migrating to an EKA access control system is
simple, and can be accomplished in just a matter
of weeks even for the largest and most diverse
government organisation or blue-chip corporation.
What’s more, operation is simple, efficient and
transparent. Here’s how it works.
action
EKA IN
9. PAGE 9
Identify the assets you need to
secure. Replace all mechanical
locks with EKA CyberLocks.
Expand. The EKA remote access
system is easily expandable. New
locks can be added quickly and cost-
effectively. Moreover the reach of the
system is not limited by geography
and you can cover locations in
separate states or even countries.
Initiate and hand out
CyberKeys. Each key is pre-
programmed with a unique,
updatable list of assets the
keyholder may open.
Monitor and report system
integrity. Access monitoring
occurs through EKA’s software
and can generate customised
automatic email reports of
suspicious activity.
Discard all old keys. Now each staff
member, tradie, security staff needs
carry only a single CyberKey to open
any lock they have privileges for.
Assign CyberKey access
privileges as required. Facility
managers can activate and
deactivate individual keys, and
even set up missions that give
time-limited access rights to
certain facilities or assets.
Identify
expand
Initiate
Monitor & Report
Discard
Assign6 5
1 2 3
4
11. compares
How EKA
to other remote
access systems
PAGE 11
Feature Mechanical key Access control EKA
Low upfront cost • •
Expand as you grow • •
Secure beyond door • •
Low impact install • •
No power issues • •
No keyway • •
No key duplication • •
Set access permissions • •
Audit trails • •
Secure remote facilities • •
One software platform •
Secure mobile assets • •
13. one
control
Many locks;
interface
Until now, if you installed different
types of locking systems you had
no choice except to operate and
manage them independently.
Sitting side-by-side, the result is more
expense, more operational work for
facility and asset managers, and more
opportunities for security breaches.
EKA solves this through a system that
can deliver single, unified access control.
Through a hub called Flex, EKA is able
to integrate with and manage any other
access control system that uses a
Weigand — compatible input device-from
RFID, to electronic swipe and HID, Maglocks,
electronic strikes, and even bio-metric devices.
PAGE 13
14. 1 Initiate access
privileges
Only EKA/Flex is needed to:
2 Revoke access
privileges 3 Monitor access
and trigger alarms 4 Generate
audit reports
One keyfor many locks:
indoors, outdoors,
mobile and remote!
Perimeter security1
Power meter box lock15
Weatherised v16
EKA CyberKey authoriser4
Access Control security
for locks on the move
3
Security for Po
other main cont
5
PAGE 14
15. RFID lock at the front door2
Power meter box lock15
vault
Security vault lock9
EKA CyberKey vault10
Office door cylinder lock8
Power and
ontrols
Restricted access
for high-value
storage areas
6
wiegand-compatible
device integration
7
Storage door
cylinder lock
12
Filing cabinet
cylinder locks
11
Server room door
cylinder lock
13
Server cabinet
cylinder locks
14
PAGE 15
16. EKA can be installed into any
gate lock or padlock in even
the most remote facilities.
Restrict and monitor access
to small safes used for petty
cash or other valuables.
An EKA Flex hub integrates
with any Wiegand-compatible
devices, such as RFID readers
or swipe cards, for a more
effective and comprehensive
single access control system.
A secure key repository for
up to 20 keys. It’s possible to
establish rules that some — or
all — staff return keys to the
vault before leaving for the day.
It doesn’t matter how
geographically distributed your
operations are, EKA locks any
container or truck anywhere, and
keeps your goods safe in-transit,
even from one side of the world
to the other!
Properly secure items previously
too expensive or impossible to
secure with access control, such
as filing cabinets. Use the EKA
system to give access to just a
few people, one person, or to
every member of staff.
Easy install keypad authoriser
means staff or contractors
can obtain a CyberKey with
limited access privileges
using a registered and fully-
trackable code.
Storage access can be
made as open or restricted
as you like.
Perimeter security
Security vault lock
RFID lock at the
front door
EKA CyberKey vault
Access Control security
for locks on the move
Filing cabinet
cylinder locks
EKA CyberKey authoriser
Storage door
cylinder lock
1
9
2
10
3
11
4
12
EKA can secure every lock in an entire facility.
17. Control and monitor access
to the lights, power and other
important controls.
Restrict access and
comprehensively track entry
to key business operational
facilities such as server rooms.
EKA makes it simple to
secure, restrict and monitor
access to cages and other
restricted areas storing high-
value goods.
EKA even enables individual
control over who has access
to which server cabinets.
The Flex hub also integrates bio-
metric fingerprint readers under
EKA’s single access control system.
In fact, as long as the device is
wiegand-compatible, it can be
hooked up to the EKA Flex system
for a unified access control system.
Restrict and monitor access to
power meters, communication
pits and the like.
Allow access to certain people
(cleaners) during certain times.
Set-up a system for emergency
or one-off access. A pin code is
needed to obtain the key in the
weatherproof vault. Perfect for
emergency services or one-off
contractors requiring access.
Security for Power and
other main controls
Server room door
cylinder lock
Restricted access for
high-value storage areas
Server cabinet
cylinder locks
wiegand-compatible
device integration
Power meter box lock
Office door cylinder lock
Weatherised vault
5
13
6
14
7
15
8
16
inside and out. Here are some examples.
18. PAGE 18
At its core, an EKA installation comprises four elements:
the CyberLock cylinders, the CyberKey, key authorisation
communicators and the EKA software itself.
science
of EKA
the
19. When an EKA CyberKey meets an EKA lock,
an instant information exchange determines
whether the key has access to that specific
lock. Whether access is granted or denied, the
time of the event and the unique ID of the key
used is stored in both the lock and the key.
EKA cylinders are the exact dimensions of the
normal lock cylinders they replace. The absence of
a conventional keyway means it is not vulnerable to
being picked. As the EKA cylinder needs no power
or wiring it’s ideal for remote and mobile assets.
Each EKA CyberKey contains a battery and the
individual’s access privileges. This powers all the
electronics and operates the lock.
For example the key can be
programmed to allow access
from 8am to 6pm on weekdays
and 10am to 4pm Sundays. It
can even be programmed
to expire so it cannot
function until reactivated.
Access privileges are distributed through
communicators linked to your EKA software via
network or internet. When validating keys, the
system downloads the key’s stored data for audit. It
then uploads any new
access privileges. EKA
access privileges can be
programmed to expire.
This forces users to
update keys regularly.
Centralised, web based software allows facility managers
to assign keys, set access permissions and expiry times.
They can also create access groups and schedules, and
activate new EKA locks. It also enables auditing and
tracking through reports and automatic notification of
suspicious activities.
PAGE 19
EKA CyberKey
EKA cylinder
21. Advancedmonitoring and reporting
PAGE 21
EKA’s server-based modular software
system is capable of handling complex
and numerous geographically remote
installations of as many as 15,000
keys and 15,000 locks. A hierarchy of
administrators allows individual managers
responsibility for only the locks and the
people in their area. It even manages
assets across countries and time zones.
An intuitive point-and-click, browser-based
interface that uses drop-down information
boxes is all that’s needed to access the
modules that drive EKA’s access control,
monitoring and reporting capabilities.
Key and custom modules
Location graphics. Create a graphical interface
of your office that allows you to place the
location of CyberLocks and Communicators for
improved tracking and auditing.
Door & Input / Output Support. Through Flex,
manage access to Wiegand-compatible third-
party systems such as swipe cards, RFID and
biometric readers. Doors can also be set to
unlock and relock at certain times and alarms
can be triggered if a door is forced or left open.
Locks. See all locks and individually set access
and reporting characteristics. Options include:
delayed access, access only with a number of
keys and email notification of denied access.
People and keys. Allocate individual keys to
users. Set days and times they have access
to certain locks, how soon the key’s access
permissions expire and even revoke a lost key.
Schedules. Set schedules of who can go where
at what time. This can be as specific as a few
minutes at a certain time on one or two days of
each week.
Reports. Audit trails can be used to generate
tailored reports that tell you who has been
where and when. Anything from specific people
to user-defined groups such as: contractors,
cleaners, security staff, weekend users.
EKA software features
Detailed audit trail
Set two, three or four-way access
Denied access email alerts
Hierarchy of administrators
Remote key initiation
via Andriod & Blackberry
Key scheduling and expiry
Set delayed access
Set group access permissions
Multiple time zone management
Monitors and controls third-party systems
22. PAGE 22
Communicators underpin the flexibility of EKA.
Simple,instant key
activation
A network of communicators (each
communicator can be given an IP
address) allows users to validate their
CyberKeys without returning to where
the EKA software is hosted, instantly
downloading audit trail data and
receiving updated access permissions.
Communicators are also designed to
recharge rechargeable CyberKeys.
Communicators are so versatile
that they can be mounted almost
anywhere, maximising ability to control
access to even the remotest assets.
23. Mini keyport. This smaller
version of the authoriser
can be employed when
the additional security
of keypad and PIN
codes are not required.
PAGE 23
Seven communicators for any situation or facility
Single-key vault cabinet. Remote locations
such as maintenance sheds often have
many people areas requiring access. By
allocating a PIN access code or swipe
card to each user, one key is shared
among many users, yet every user’s
access history can be individually audited.
20-key vault cabinet. Ideal for large
offices, this intelligent key cabinet
stores keys in an inactive state.
A swipe or PIN code is required
to activate a key, and when staff
return keys they are deactivated
until they are next retrieved.
Authoriser keypad. An authoriser
keypad is a durable, weather-proof
unit that is fitted to the exterior
of a building or facility. Users
present their key to the authoriser
and enter a PIN code to obtain
permission privileges.
USB station. In a smaller
office, when your EKA
software might only sit on
a desktop, a simple USB
station port is a cost-effective
way to authorise keys.
Web station. Web
stations multi-point
access and updating via
cat-5 are ideal for larger,
network server systems.
IR encoder. This compact
USB dongle connects to
any CyberKeys via infra-red
connection. It’s ideal for
remote and mobile workers.
25. One keyfor every lock
PAGE 25
The EKA CyberKey is an electronic, programmable smart
key that cannot be duplicated. Via a communicator, each
key can be programmed with the permissions for every
system lock a key holder is allowed to access: what locks
the key can open, as well as the days and times each lock
can be opened. In this way, each user only needs one key
to access any lock in a system, whether it’s a major entry
door, or an obscure and remote cabinet padlock.
Because it’s electronic, permissions can be revoked.
Administrators can set key expirations to occur regularly
(daily, weekly or more often) and can also do this on an
ad-hoc basis when keys are lost.
Each EKA key contains four levels of intelligence:
encrypted access codes to ensure the key is from the
same installation; the unique ID number of the key; access
privileges for the user of the key; and storage of up to
the last 3,900 events, both entries and denied entries.
The unique exchange of encrypted access codes between
the lock and key gives a high degree of key integrity. The
encrypted codes ensure keys from other systems cannot
work in your system.
Three types of CyberKeys
1 Standard Cyberkey. A standard lithium
three-volt battery can provide between 3,000
and 5,000 lock openings.
2 Rechargeable CyberKey. A rechargeable lithium Ion
battery can provide around 500 openings before
needing to be recharged on a recharging station.
3 Bluetooth CyberKey. A bluetooth-connectable
for remote and mobile users.
The EKA CyberKey
Standard, rechargeable and
Bluetooth versions available
Permanent memory holds access
events, even if battery fails
Made from impact-resistant
nylon for high durability
Cannot be duplicated
Can be set to expire
Water-resistant, coated electronics
Sacrificial brass tip prevents
wearing of lock
Brass tip easily replaced in the field
Will not function once expired
Can be programmed for one
lock, or many locks
26. PAGE 26
CyberLocks are the exact dimensions of the
mechanical cylinders they replace. They retrofit into
the lock hardware with the ease of a mechanical
cylinder, and do not change how the lock operates.
for any
asset
A CyberLock
27. PAGE 27
More than 300 existing CyberLock designs enable it to be installed in an
enormous variety of interior and exterior doors, padlocks, containers and cabinets.
There’s no wiring and no battery. All power is provided by the CyberKey: when a
key comes in contact with the cylinder, it powers up the lock’s circuitry so key and
lock communicate. If the key is not on the lost key list and the permissions are
correct, the lock will open.
The circuitry stores four types of information: encrypted codes that ensure
only keys within the system work with the lock; the unique ID number of the
CyberLock; a record of the last 1,100 entries; and a list of lost keys to eliminate
access by any key that is missing or lost.
CyberLocks offer superior physical security. They have no conventional keyway
that is vulnerable to being picked plus a tamper plug prevents the lock from
opening if the front of the cylinder is struck.
Moreover, if torque is applied to cylinder, the front part separates from the back
half. The back half of the cylinder expands, causing a brake effect that engages
the sides of the cylinder’s case, stopping the rotation and leaving the cylinder in
the locked position.
Why the CyberLock is superior
• Retrofits any mechanical lock
• No wiring, no battery
• Potted circuits protected
against dust, water, salt & air
• Lost key list prevents
unauthorised access
• No keyway to pick
• Torque brake and tamper plug
• Withstands to 300,000
volts and 18,000 gauss
• Records authorised
and denied access
28. College
Challenge
In 2007, Mary MacKillop College was
about to begin new construction. The
college already had 60 classrooms
in a large open area, each with two
individual access points.
Controlling access was already
difficult. Different locks meant two
separate keys for each classroom.
OH&S rules meant both keys
were required in case of an emergency.
Keen to improve security, MMC
investigated several keying systems.
mary
mackillop
PAGE 28
“The systems were often more
economical, but did not provide
the flexibility our site required.”
Solution
MMC was immediately convinced
EKA was the way to go.
“Over the years we have had
problems with the misplacement
of keys by contractors, staff and
teachers. EKA totally resolved this
issue, because if a key is misplaced it
would now be simply disabled online.”
MMC primarily chose EKA
because of its easy installation,
and the flexibility to centrally
control access to each
individual area.
“This keying system allows us
to adjust access for teachers
to the classroom remotely,
utilising their own individual
key. Overall we are extremely
happy with the ease of
installation, the end result, as
well as the exceptional service
we have received from EKA.”
case study
29. College
Challenge
Ave Maria College was using a fairly modern
restricted master key system. Yet there were
constant key management concerns and
challenges. Different users required multiple
keys, leading to a situation where it was
easiest to just give everyone a master key!
Solution
College Business Manager, Allan
Thompson, researched solutions to provide
better key management. They chose EKA.
Ave Maria College decided to roll-out
EKA in small, easy-to-manage sections
Ave
Maria
to meet budget requirements and ensure
a smooth transition.
The staged installation occurred in three
sections: the library as a trial site; all
external doors; all internal doors. A
remote Key Validation Point was installed
at the completion of the second stage in a
central location so staff could update their
access profile without visiting the Property
Manager’s office.
EKA has given Ave Maria the flexibility to
design specific access levels for the different
users of the college. The tailored access,
coupled with the instant ability to delete lost
keys, has vastly improved security.
case study
30. Challenge
Water treatment facilities are
uniquely difficult to secure. These
facilities have such a diverse array
of access control requirements
— main entrances, storage areas,
office doors, gates, computer
cabinets, padlocks and restricted
chemical areas — that a very
flexible system is needed.
GWM
Water
PAGE 30
Solution
GWM chose EKA for its versatility,
superior security features and ease
of installation.
Now each employee needs only one key
to access any GWM lock they’ve been
assigned accessprivileges. Security has
improved as lost or stolen keys are now
easily blocked.
Since GWM installed EKA at their water
treatment plants, they’ve gone on to
roll-out the system through their entire
infrastructure.
EKA locks now secure the entire Wimmera
Mallee Pipeline system — facilities that
span 250,000 square kilometres — while
hundreds of locks are being installed in
pump stations, switchboards, wastewater
treatment plants and depot facilities.
case study
31. post
Challenge
Subcontractor clearance agents are
required to collect the mail from New
Zealand Post’s network of street
receiver boxes during scheduled
hours, multiple times a week.
New Zealand Post had no way to
determine when mail had been
collected. Security was also a
concern. Each route includes 20
to 30 street boxes and sometimes
clearance agents service multiple
routes. If a key was lost, all the locks
in that series of street boxes had to be
re-keyed at great expense. Also, the
time required to re-key the boxes put
customer mail at serious risk.
new
zealand
Solution
New Zealand Post began looking for
a system that would allow them to
monitor the service performance of
the subcontractors in clearing mail
from their street receiver boxes.
“We selected CyberLock because
it was cost-effective and met
our requirements in terms of
measurability and auditing”.
New Zealand Post implemented a
successful four month trial of the
system in Wellington. Following the
trial they converted 3,500 of their
street receiver boxes to CyberLock
electronic locks.
case study
“Enterprise software allows us to
perform audits over the network
and manage the performance of
our subcontractors, even at remote
collection sites. Also, we can disable
a key relatively quickly, should one be
lost. Enterprise provides daily reports
of box clearance times and exceptions
such as attempted access to a box
outside the scheduled collection time.”
“The CyberLock system has
greatly enhanced the security of
our customer mail and allows us
to manage subcontractor service
performance.”
32. Challenge
The Brisbane Airport Corporation
needed a government-endorsed,
wireless access control system
that allowed an audit trail and
time-in-attendence function. Plus
the software had to integrate with
their existing bar-coding system to
complete the control of updating
contractor’s licences.
PAGE 32
Solution
BAC implemented EKA — customised
to integrate with the bar-coding software
— to allow contractors access to the
site. After a trial, the first major roll-out
occurred in February 2010.
Brisbane Airport Corporation is now
installing EKA CyberLocks throughout both
its domestic and international terminals.
They’re one of the first companies in
Australia to install secure key vaults,
and are currently drafting plans to
integrate a GUI. This innovative GUI
will allow them to use graphical
renderings of every terminal level to
control doors locks through the EKA
system and enable seamless issue
of temporary keys.
case study
corporation
brisbane
airport
33. ground
Challenge
The MCG is one of the world’s great
sporting arenas. During concerts and
major events, such as the AFL grand
final, as many as 100,000 people fill
the stadium.
A venue of this size and calibre has
significant security requirements.
In 2007, under the guidance of a
new security manager, they began
melbourne
cricket
to re-examine their access control
systems and needs.
Solution
The MCG chose EKA as it would
work in conjunction with their
existing hardwired doors. EKA’s
flexibility also came with a significant
cost advantage. Hardwiring
additional doors would be expensive.
EKA eliminated this problem.
case study
Having an audit trail and being
able to delete lost keys has
proved particularly beneficial.
So has the flexibility of individual
levels of key access and control.
Since EKA was first installed in
2008, the MCG has put EKA in
additional areas like their sports
museum and corporate boxes to
secure access to some of their
most valuable assets.
34. PAGE 34
Challenge
An Australian government department
needed to improve the access control of
its extensive underground pipe and pit
infrastructure. This department operates
more than 600 kilometres of underground
conduit and some 2,000 individual in
ground access pits that require various
requirements for access in order to deliver
services and the security levels required.
Until recently, they used a mechanical
locking system with six separate key
and lock profiles. The cost to re-key
the system if one single key was lost
was potentially more than $280,000, a
process that would take three months. A
pilot project with electronic locks in 2007
showed the advantages of electronic
locking although highlighting some
additional physical restraints of design.
Solution
EKA’s physical robustness, ease of use,
customisation possibilities and whole-
of-life savings convinced the department
to roll-out the EKA product to replace
the majority of the mechanical locks, as
well as the product utilised for R&D in the
pilot project. The department has now
replaced more than 95 percent
of the previous locking systems.
The earliest installations have now
been in some of the department’s dirtiest
and most-often-used pits for 18 months.
Only one lock has had a complete failure
— a 0.0004% rate of failure.
EKA has also eliminated the need to ever
re-key. The EKA product has also allowed
the department to use the same electronic
locking system to secure cabinets, haul or
lock boxes in buildings. They’ve even worked
with the manufacturer to design and build
intruder-resistant components for use inside
buildings, complete to the service end point.
australian
government
case study
35. PTY LTD
Challenge
When Grant Mattiske joined South
Australian electricity transmission
network service provider ElectraNet as
the new Asset Access Administrator he
was tasked with auditing their master-
key system used to secure access to
substations and other key facilities.
Grant’s risk management audit
identified a number of issues for
resolution, including the system’s
expired patent and keys that had
been reported as lost.
Solution
A new master-key system would be
expensive and Grant realised new keys
ELECTRANET
would inevitably be lost, and the same
issues would emerge all over again.
In search of an alternative security
solution to mitigate risk, Grant
trialled EKA in 2006. The proof
of concept was a success and
he’s been rolling EKA out through
ElectraNet’s 100+ substations and
communications sites ever since.
Grant says that ElectraNet now
has nearly 1000 CyberKeys for
approximately 500 EKA locks on
gates, doors and padlocks that
secure substations anywhere from
the edge of the Stuart Desert, as
well as a growing number of wall
authorisers and infrared portable
versions. Even in the extreme heat
case study
of the desert, malfunctions are rare
with correct device management.
Grant says that in most instances,
all that was needed during the
changeover was the replacement of
the lock cylinder, making the roll-out
faster and particularly cost-effective.
If a key is lost, Grant now simply
deactivates its access on the EKA
system. He can also set record and
report instructions if it’s used on
any lock throughout ElectraNet.
What’s more, he uses a timeout policy.
If a key doesn’t have its privileges re-
authorised within the defined period,
it no longer functions. For ElectraNet,
it’s an effective security solution.