SlideShare a Scribd company logo
1 of 36
Download to read offline
Introducing the next generation
in access control that secures,
controls and audits all assets,
from the front door to assets
in remote locations
access
control
system
The ONLY
that stretches from
your front door to a
shipping container
in the Indian Ocean
www.ekasecurity.com.au
PAGE 2
access
the next generation in
that secures, controls and audits
all assets, from the front door to
assets in remote locations
PAGE 3
Securing the office door with current access control technology is easy.
But swipe cards aren’t practical for controlling access to remote assets,
like sub-stations, data centres or vending machines. They can’t lock down
mobile assets, such as containers or laptops. And if you want to use them
to secure unusual but important things like drug safes or gates, forget it.
Either the cost is prohibitive or it’s impossible to run the wiring. Master-key
systems offer a lock for just about anything, but no control over access.
Auditing who’s been where is nearly impossible. And if you lose a key you
either re-key the system (expensive!) or live with compromised security.
EKA finally breaks this either/or choice. EKA couples the master-key
ability to put a lock on anything with the tight and trackable access control
characteristics of swipe card systems. What’s more, EKA retrofits into any
existing cylinder lock and integrates any existing access control system.
That’s why EKA truly is the next generation in access control — able to
secure, control and audit any asset from the door, to remote or mobile assets.
control
Introducing
PAGE 4
EKA’s next-gen access control technology is the cutting edge
security solution for any industry or sector that needs a sure
way to secure, control and audit assets beyond the door.
for any
industry
or sector
The preferred access control
that needs to secure, control
and audit assets beyond the door
Telcos and data centres.
EKA can be used to secure
access to communication
pits and cages.
Utilities.
Large utilities like water boards
can secure facilities like power
plants, sub-stations, equipment
and storage.
Local government.
Local government assets
ranging from offices and halls,
to depots, parking meters,
barriers and park toilets can
all be easily secured with EKA.
Transport and logistics.
Containers, yards,
warehouses, depots
and even gates can be
secured using EKA.
Airports.
EKA will secure access to
hangers, gates, server rooms
and restricted access areas.
Hospitals and pharmaceutical.
Drug safes and pharmacy
labs are normally hard to lock
down. EKA makes securing
them a breeze.
Mining and construction.
Stop wondering who has
access to plant equipment,
vehicles and explosives. EKA
secures and tracks it all for you.
Education and office.
EKA can be used to secure
access to utility doors with
padlocks, cash tins, access
panels, air conditioning or
display units, light boxes
and even roller doors.
PAGE 5
PAGE 6
Whether it’s a cage, a cupboard,
a case, a container, a cash bag or
a gate, if you can put a lock on it,
EKA can secure and control it.
PAGE 7
unique
why EKA is the better access control
1	 One software platform. EKA
bridges existing hardwired and
key-centric security solutions and
can secure, control and audit
access to both types.
2	 Works beyond the door. Whether
it’s a cage, a cupboard, a case, a
container, a cash bag or a gate, if
you can put a lock on it, EKA can
secure and control it.
3	 No expensive and disruptive
cabling. Traditional access control
systems need extensive hardwiring.
The only thing EKA replaces is the
lock cylinder.
4	 Stays up when the power is down.
If the power goes down, hardwired
access control systems fail. EKA
locks are powered-up as required
by the CyberLock key your people
carry for access.
reasons
eight
5	 More cost effective. EKA
delivers every advantage of an
access control system at a cost
per door (lock) that’s comparable
with a master key system.
6	 Audit access to any asset. You can
access audit trails even for mobile
and remote assets and see exactly
who’s been in and out, as well as
who’s tried and been denied.
7	 Deploys twice as fast. Current
access control technology is
slow to install and deploy. Even
in large organisations with
thousands of assets to secure,
EKA can be fully installed and
running in just a couple of weeks.
8	 A single key opens any lock.
As long as they have access
privileges, your people can access
any asset using just one key.
PAGE 8
Migrating to an EKA access control system is
simple, and can be accomplished in just a matter
of weeks even for the largest and most diverse
government organisation or blue-chip corporation.
What’s more, operation is simple, efficient and
transparent. Here’s how it works.
action
EKA IN
PAGE 9
Identify the assets you need to
secure. Replace all mechanical
locks with EKA CyberLocks.
Expand. The EKA remote access
system is easily expandable. New
locks can be added quickly and cost-
effectively. Moreover the reach of the
system is not limited by geography
and you can cover locations in
separate states or even countries.
Initiate and hand out
CyberKeys. Each key is pre-
programmed with a unique,
updatable list of assets the
keyholder may open.
Monitor and report system
integrity. Access monitoring
occurs through EKA’s software
and can generate customised
automatic email reports of
suspicious activity.
Discard all old keys. Now each staff
member, tradie, security staff needs
carry only a single CyberKey to open
any lock they have privileges for.
Assign CyberKey access
privileges as required. Facility
managers can activate and
deactivate individual keys, and
even set up missions that give
time-limited access rights to
certain facilities or assets.
Identify
expand
Initiate
Monitor & Report
Discard
Assign6 5
1 2 3
4
PAGE 10
compares
How EKA
to other remote
access systems
PAGE 11
Feature Mechanical key Access control EKA
Low upfront cost • •
Expand as you grow • •
Secure beyond door • •
Low impact install • •
No power issues • •
No keyway • •
No key duplication • •
Set access permissions • •
Audit trails • •
Secure remote facilities • •
One software platform •
Secure mobile assets • •
PAGE 12
one
control
Many locks;
interface
Until now, if you installed different
types of locking systems you had
no choice except to operate and
manage them independently.
Sitting side-by-side, the result is more
expense, more operational work for
facility and asset managers, and more
opportunities for security breaches.
EKA solves this through a system that
can deliver single, unified access control.
Through a hub called Flex, EKA is able
to integrate with and manage any other
access control system that uses a
Weigand — compatible input device-from
RFID, to electronic swipe and HID, Maglocks,
electronic strikes, and even bio-metric devices.
PAGE 13
1	 Initiate access
privileges
Only EKA/Flex is needed to:
2	 Revoke access
privileges 3	 Monitor access
and trigger alarms 4	Generate
audit reports
One keyfor many locks:
indoors, outdoors,
mobile and remote!
Perimeter security1
Power meter box lock15
Weatherised v16
EKA CyberKey authoriser4
Access Control security
for locks on the move
3
Security for Po
other main cont
5
PAGE 14
RFID lock at the front door2
Power meter box lock15
vault
Security vault lock9
EKA CyberKey vault10
Office door cylinder lock8
Power and
ontrols
Restricted access
for high-value
storage areas
6
wiegand-compatible
device integration
7
Storage door
cylinder lock
12
Filing cabinet
cylinder locks
11
Server room door
cylinder lock
13
Server cabinet
cylinder locks
14
PAGE 15
EKA can be installed into any
gate lock or padlock in even
the most remote facilities.
Restrict and monitor access
to small safes used for petty
cash or other valuables.
An EKA Flex hub integrates
with any Wiegand-compatible
devices, such as RFID readers
or swipe cards, for a more
effective and comprehensive
single access control system.
A secure key repository for
up to 20 keys. It’s possible to
establish rules that some — or
all — staff return keys to the
vault before leaving for the day.
It doesn’t matter how
geographically distributed your
operations are, EKA locks any
container or truck anywhere, and
keeps your goods safe in-transit,
even from one side of the world
to the other!
Properly secure items previously
too expensive or impossible to
secure with access control, such
as filing cabinets. Use the EKA
system to give access to just a
few people, one person, or to
every member of staff.
Easy install keypad authoriser
means staff or contractors
can obtain a CyberKey with
limited access privileges
using a registered and fully-
trackable code.
Storage access can be
made as open or restricted
as you like.
Perimeter security
Security vault lock
RFID lock at the
front door
EKA CyberKey vault
Access Control security
for locks on the move
Filing cabinet
cylinder locks
EKA CyberKey authoriser
Storage door
cylinder lock
1
9
2
10
3
11
4
12
EKA can secure every lock in an entire facility.
Control and monitor access
to the lights, power and other
important controls.
Restrict access and
comprehensively track entry
to key business operational
facilities such as server rooms.
EKA makes it simple to
secure, restrict and monitor
access to cages and other
restricted areas storing high-
value goods.
EKA even enables individual
control over who has access
to which server cabinets.
The Flex hub also integrates bio-
metric fingerprint readers under
EKA’s single access control system.
In fact, as long as the device is
wiegand-compatible, it can be
hooked up to the EKA Flex system
for a unified access control system.
Restrict and monitor access to
power meters, communication
pits and the like.
Allow access to certain people
(cleaners) during certain times.
Set-up a system for emergency
or one-off access. A pin code is
needed to obtain the key in the
weatherproof vault. Perfect for
emergency services or one-off
contractors requiring access.
Security for Power and
other main controls
Server room door
cylinder lock
Restricted access for
high-value storage areas
Server cabinet
cylinder locks
wiegand-compatible
device integration
Power meter box lock
Office door cylinder lock
Weatherised vault
5
13
6
14
7
15
8
16
inside and out. Here are some examples.
PAGE 18
At its core, an EKA installation comprises four elements:
the CyberLock cylinders, the CyberKey, key authorisation
communicators and the EKA software itself.
science
of EKA
the
When an EKA CyberKey meets an EKA lock,
an instant information exchange determines
whether the key has access to that specific
lock. Whether access is granted or denied, the
time of the event and the unique ID of the key
used is stored in both the lock and the key.
EKA cylinders are the exact dimensions of the
normal lock cylinders they replace. The absence of
a conventional keyway means it is not vulnerable to
being picked. As the EKA cylinder needs no power
or wiring it’s ideal for remote and mobile assets.
Each EKA CyberKey contains a battery and the
individual’s access privileges. This powers all the
electronics and operates the lock.
For example the key can be
programmed to allow access
from 8am to 6pm on weekdays
and 10am to 4pm Sundays. It
can even be programmed
to expire so it cannot
function until reactivated.
Access privileges are distributed through
communicators linked to your EKA software via
network or internet. When validating keys, the
system downloads the key’s stored data for audit. It
then uploads any new
access privileges. EKA
access privileges can be
programmed to expire.
This forces users to
update keys regularly.
Centralised, web based software allows facility managers
to assign keys, set access permissions and expiry times.
They can also create access groups and schedules, and
activate new EKA locks. It also enables auditing and
tracking through reports and automatic notification of
suspicious activities.
PAGE 19
EKA CyberKey
EKA cylinder
PAGE 20
Advancedmonitoring and reporting
PAGE 21
EKA’s server-based modular software
system is capable of handling complex
and numerous geographically remote
installations of as many as 15,000
keys and 15,000 locks. A hierarchy of
administrators allows individual managers
responsibility for only the locks and the
people in their area. It even manages
assets across countries and time zones.
An intuitive point-and-click, browser-based
interface that uses drop-down information
boxes is all that’s needed to access the
modules that drive EKA’s access control,
monitoring and reporting capabilities.
Key and custom modules
Location graphics. Create a graphical interface
of your office that allows you to place the
location of CyberLocks and Communicators for
improved tracking and auditing.
Door & Input / Output Support. Through Flex,
manage access to Wiegand-compatible third-
party systems such as swipe cards, RFID and
biometric readers. Doors can also be set to
unlock and relock at certain times and alarms
can be triggered if a door is forced or left open.
Locks. See all locks and individually set access
and reporting characteristics. Options include:
delayed access, access only with a number of
keys and email notification of denied access.
People and keys. Allocate individual keys to
users. Set days and times they have access
to certain locks, how soon the key’s access
permissions expire and even revoke a lost key.
Schedules. Set schedules of who can go where
at what time. This can be as specific as a few
minutes at a certain time on one or two days of
each week.
Reports. Audit trails can be used to generate
tailored reports that tell you who has been
where and when. Anything from specific people
to user-defined groups such as: contractors,
cleaners, security staff, weekend users.
EKA software features
Detailed audit trail
Set two, three or four-way access
Denied access email alerts
Hierarchy of administrators
Remote key initiation
via Andriod & Blackberry
Key scheduling and expiry
Set delayed access
Set group access permissions
Multiple time zone management
Monitors and controls third-party systems
PAGE 22
Communicators underpin the flexibility of EKA.
Simple,instant key
activation
A network of communicators (each
communicator can be given an IP
address) allows users to validate their
CyberKeys without returning to where
the EKA software is hosted, instantly
downloading audit trail data and
receiving updated access permissions.
Communicators are also designed to
recharge rechargeable CyberKeys.
Communicators are so versatile
that they can be mounted almost
anywhere, maximising ability to control
access to even the remotest assets.
Mini keyport. This smaller
version of the authoriser
can be employed when
the additional security
of keypad and PIN
codes are not required.
PAGE 23
Seven communicators for any situation or facility
Single-key vault cabinet. Remote locations
such as maintenance sheds often have
many people areas requiring access. By
allocating a PIN access code or swipe
card to each user, one key is shared
among many users, yet every user’s
access history can be individually audited.
20-key vault cabinet. Ideal for large
offices, this intelligent key cabinet
stores keys in an inactive state.
A swipe or PIN code is required
to activate a key, and when staff
return keys they are deactivated
until they are next retrieved.
Authoriser keypad. An authoriser
keypad is a durable, weather-proof
unit that is fitted to the exterior
of a building or facility. Users
present their key to the authoriser
and enter a PIN code to obtain
permission privileges.
USB station. In a smaller
office, when your EKA
software might only sit on
a desktop, a simple USB
station port is a cost-effective
way to authorise keys.
Web station. Web
stations multi-point
access and updating via
cat-5 are ideal for larger,
network server systems.
IR encoder. This compact
USB dongle connects to
any CyberKeys via infra-red
connection. It’s ideal for
remote and mobile workers.
PAGE 24
One keyfor every lock
PAGE 25
The EKA CyberKey is an electronic, programmable smart
key that cannot be duplicated. Via a communicator, each
key can be programmed with the permissions for every
system lock a key holder is allowed to access: what locks
the key can open, as well as the days and times each lock
can be opened. In this way, each user only needs one key
to access any lock in a system, whether it’s a major entry
door, or an obscure and remote cabinet padlock.
Because it’s electronic, permissions can be revoked.
Administrators can set key expirations to occur regularly
(daily, weekly or more often) and can also do this on an
ad-hoc basis when keys are lost.
Each EKA key contains four levels of intelligence:
encrypted access codes to ensure the key is from the
same installation; the unique ID number of the key; access
privileges for the user of the key; and storage of up to
the last 3,900 events, both entries and denied entries.
The unique exchange of encrypted access codes between
the lock and key gives a high degree of key integrity. The
encrypted codes ensure keys from other systems cannot
work in your system.
Three types of CyberKeys
1	 Standard Cyberkey. A standard lithium
three-volt battery can provide between 3,000
and 5,000 lock openings.
2	 Rechargeable CyberKey. A rechargeable lithium Ion
battery can provide around 500 openings before
needing to be recharged on a recharging station.
3	 Bluetooth CyberKey. A bluetooth-connectable
for remote and mobile users.
The EKA CyberKey
Standard, rechargeable and
Bluetooth versions available
Permanent memory holds access
events, even if battery fails
Made from impact-resistant
nylon for high durability
Cannot be duplicated
Can be set to expire
Water-resistant, coated electronics
Sacrificial brass tip prevents
wearing of lock
Brass tip easily replaced in the field
Will not function once expired
Can be programmed for one
lock, or many locks
PAGE 26
CyberLocks are the exact dimensions of the
mechanical cylinders they replace. They retrofit into
the lock hardware with the ease of a mechanical
cylinder, and do not change how the lock operates.
for any
asset
A CyberLock
PAGE 27
More than 300 existing CyberLock designs enable it to be installed in an
enormous variety of interior and exterior doors, padlocks, containers and cabinets.
There’s no wiring and no battery. All power is provided by the CyberKey: when a
key comes in contact with the cylinder, it powers up the lock’s circuitry so key and
lock communicate. If the key is not on the lost key list and the permissions are
correct, the lock will open.
The circuitry stores four types of information: encrypted codes that ensure
only keys within the system work with the lock; the unique ID number of the
CyberLock; a record of the last 1,100 entries; and a list of lost keys to eliminate
access by any key that is missing or lost.
CyberLocks offer superior physical security. They have no conventional keyway
that is vulnerable to being picked plus a tamper plug prevents the lock from
opening if the front of the cylinder is struck.
Moreover, if torque is applied to cylinder, the front part separates from the back
half. The back half of the cylinder expands, causing a brake effect that engages
the sides of the cylinder’s case, stopping the rotation and leaving the cylinder in
the locked position.
Why the CyberLock is superior
•	 Retrofits any mechanical lock
•	 No wiring, no battery
•	 Potted circuits protected
against dust, water, salt & air
•	 Lost key list prevents
unauthorised access
•	 No keyway to pick
•	 Torque brake and tamper plug
•	 Withstands to 300,000
volts and 18,000 gauss
•	 Records authorised
and denied access
College
Challenge
In 2007, Mary MacKillop College was
about to begin new construction. The
college already had 60 classrooms
in a large open area, each with two
individual access points.
Controlling access was already
difficult. Different locks meant two
separate keys for each classroom.
OH&S rules meant both keys
were required in case of an emergency.
Keen to improve security, MMC
investigated several keying systems.
mary
mackillop
PAGE 28
“The systems were often more
economical, but did not provide
the flexibility our site required.”
Solution
MMC was immediately convinced
EKA was the way to go.
“Over the years we have had
problems with the misplacement
of keys by contractors, staff and
teachers. EKA totally resolved this
issue, because if a key is misplaced it
would now be simply disabled online.”
MMC primarily chose EKA
because of its easy installation,
and the flexibility to centrally
control access to each
individual area.
“This keying system allows us
to adjust access for teachers
to the classroom remotely,
utilising their own individual
key. Overall we are extremely
happy with the ease of
installation, the end result, as
well as the exceptional service
we have received from EKA.”
case study
College
Challenge
Ave Maria College was using a fairly modern
restricted master key system. Yet there were
constant key management concerns and
challenges. Different users required multiple
keys, leading to a situation where it was
easiest to just give everyone a master key!
Solution
College Business Manager, Allan
Thompson, researched solutions to provide
better key management. They chose EKA.
Ave Maria College decided to roll-out
EKA in small, easy-to-manage sections
Ave
Maria
to meet budget requirements and ensure
a smooth transition.
The staged installation occurred in three
sections: the library as a trial site; all
external doors; all internal doors. A
remote Key Validation Point was installed
at the completion of the second stage in a
central location so staff could update their
access profile without visiting the Property
Manager’s office.
EKA has given Ave Maria the flexibility to
design specific access levels for the different
users of the college. The tailored access,
coupled with the instant ability to delete lost
keys, has vastly improved security.
case study
Challenge
Water treatment facilities are
uniquely difficult to secure. These
facilities have such a diverse array
of access control requirements
— main entrances, storage areas,
office doors, gates, computer
cabinets, padlocks and restricted
chemical areas — that a very
flexible system is needed.
GWM
Water
PAGE 30
Solution
GWM chose EKA for its versatility,
superior security features and ease
of installation.
Now each employee needs only one key
to access any GWM lock they’ve been
assigned accessprivileges. Security has
improved as lost or stolen keys are now
easily blocked.
Since GWM installed EKA at their water
treatment plants, they’ve gone on to
roll-out the system through their entire
infrastructure.
EKA locks now secure the entire Wimmera
Mallee Pipeline system — facilities that
span 250,000 square kilometres — while
hundreds of locks are being installed in
pump stations, switchboards, wastewater
treatment plants and depot facilities.
case study
post
Challenge
Subcontractor clearance agents are
required to collect the mail from New
Zealand Post’s network of street
receiver boxes during scheduled
hours, multiple times a week.
New Zealand Post had no way to
determine when mail had been
collected. Security was also a
concern. Each route includes 20
to 30 street boxes and sometimes
clearance agents service multiple
routes. If a key was lost, all the locks
in that series of street boxes had to be
re-keyed at great expense. Also, the
time required to re-key the boxes put
customer mail at serious risk.
new
zealand
Solution
New Zealand Post began looking for
a system that would allow them to
monitor the service performance of
the subcontractors in clearing mail
from their street receiver boxes.
“We selected CyberLock because
it was cost-effective and met
our requirements in terms of
measurability and auditing”.
New Zealand Post implemented a
successful four month trial of the
system in Wellington. Following the
trial they converted 3,500 of their
street receiver boxes to CyberLock
electronic locks.
case study
“Enterprise software allows us to
perform audits over the network
and manage the performance of
our subcontractors, even at remote
collection sites. Also, we can disable
a key relatively quickly, should one be
lost. Enterprise provides daily reports
of box clearance times and exceptions
such as attempted access to a box
outside the scheduled collection time.”
“The CyberLock system has
greatly enhanced the security of
our customer mail and allows us
to manage subcontractor service
performance.”
Challenge
The Brisbane Airport Corporation
needed a government-endorsed,
wireless access control system
that allowed an audit trail and
time-in-attendence function. Plus
the software had to integrate with
their existing bar-coding system to
complete the control of updating
contractor’s licences.
PAGE 32
Solution
BAC implemented EKA — customised
to integrate with the bar-coding software
— to allow contractors access to the
site. After a trial, the first major roll-out
occurred in February 2010.
Brisbane Airport Corporation is now
installing EKA CyberLocks throughout both
its domestic and international terminals.
They’re one of the first companies in
Australia to install secure key vaults,
and are currently drafting plans to
integrate a GUI. This innovative GUI
will allow them to use graphical
renderings of every terminal level to
control doors locks through the EKA
system and enable seamless issue
of temporary keys.
case study
corporation
brisbane
airport
ground
Challenge
The MCG is one of the world’s great
sporting arenas. During concerts and
major events, such as the AFL grand
final, as many as 100,000 people fill
the stadium.
A venue of this size and calibre has
significant security requirements.
In 2007, under the guidance of a
new security manager, they began
melbourne
cricket
to re-examine their access control
systems and needs.
Solution
The MCG chose EKA as it would
work in conjunction with their
existing hardwired doors. EKA’s
flexibility also came with a significant
cost advantage. Hardwiring
additional doors would be expensive.
EKA eliminated this problem.
case study
Having an audit trail and being
able to delete lost keys has
proved particularly beneficial.
So has the flexibility of individual
levels of key access and control.
Since EKA was first installed in
2008, the MCG has put EKA in
additional areas like their sports
museum and corporate boxes to
secure access to some of their
most valuable assets.
PAGE 34
Challenge
An Australian government department
needed to improve the access control of
its extensive underground pipe and pit
infrastructure. This department operates
more than 600 kilometres of underground
conduit and some 2,000 individual in
ground access pits that require various
requirements for access in order to deliver
services and the security levels required.
Until recently, they used a mechanical
locking system with six separate key
and lock profiles. The cost to re-key
the system if one single key was lost
was potentially more than $280,000, a
process that would take three months. A
pilot project with electronic locks in 2007
showed the advantages of electronic
locking although highlighting some
additional physical restraints of design.
Solution
EKA’s physical robustness, ease of use,
customisation possibilities and whole-
of-life savings convinced the department
to roll-out the EKA product to replace
the majority of the mechanical locks, as
well as the product utilised for R&D in the
pilot project. The department has now
replaced more than 95 percent
of the previous locking systems.
The earliest installations have now
been in some of the department’s dirtiest
and most-often-used pits for 18 months.
Only one lock has had a complete failure
— a 0.0004% rate of failure.
EKA has also eliminated the need to ever
re-key. The EKA product has also allowed
the department to use the same electronic
locking system to secure cabinets, haul or
lock boxes in buildings. They’ve even worked
with the manufacturer to design and build
intruder-resistant components for use inside
buildings, complete to the service end point.
australian
government
case study
PTY LTD
Challenge
When Grant Mattiske joined South
Australian electricity transmission
network service provider ElectraNet as
the new Asset Access Administrator he
was tasked with auditing their master-
key system used to secure access to
substations and other key facilities.
Grant’s risk management audit
identified a number of issues for
resolution, including the system’s
expired patent and keys that had
been reported as lost.
Solution
A new master-key system would be
expensive and Grant realised new keys
ELECTRANET
would inevitably be lost, and the same
issues would emerge all over again.
In search of an alternative security
solution to mitigate risk, Grant
trialled EKA in 2006. The proof
of concept was a success and
he’s been rolling EKA out through
ElectraNet’s 100+ substations and
communications sites ever since.
Grant says that ElectraNet now
has nearly 1000 CyberKeys for
approximately 500 EKA locks on
gates, doors and padlocks that
secure substations anywhere from
the edge of the Stuart Desert, as
well as a growing number of wall
authorisers and infrared portable
versions. Even in the extreme heat
case study
of the desert, malfunctions are rare
with correct device management.
Grant says that in most instances,
all that was needed during the
changeover was the replacement of
the lock cylinder, making the roll-out
faster and particularly cost-effective.
If a key is lost, Grant now simply
deactivates its access on the EKA
system. He can also set record and
report instructions if it’s used on
any lock throughout ElectraNet.
What’s more, he uses a timeout policy.
If a key doesn’t have its privileges re-
authorised within the defined period,
it no longer functions. For ElectraNet,
it’s an effective security solution.
www.ekasecurity.com.au
1300 722 311
Sydney • Melbourne • Brisbane • Perth • Adelaide

More Related Content

What's hot

IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
Khoa van-tay-kaba-u10-fingerprint-doorlock-signed
Khoa van-tay-kaba-u10-fingerprint-doorlock-signedKhoa van-tay-kaba-u10-fingerprint-doorlock-signed
Khoa van-tay-kaba-u10-fingerprint-doorlock-signedProtocol Corporation
 
NewDVR(S)- The Worldwide IOT Based Security System Merchant
NewDVR(S)- The Worldwide IOT Based Security System  MerchantNewDVR(S)- The Worldwide IOT Based Security System  Merchant
NewDVR(S)- The Worldwide IOT Based Security System MerchantNewDVR(S) Pte Ltd
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of ThingsAlexandru Radovici
 
2015 06-api days-sf-apis-dbridge2iot-asanka
2015 06-api days-sf-apis-dbridge2iot-asanka2015 06-api days-sf-apis-dbridge2iot-asanka
2015 06-api days-sf-apis-dbridge2iot-asankaAsanka Abeysinghe
 
Combining safety and conventional interfaces for interlock PLCs v1 IPZ
Combining safety and conventional interfaces for interlock PLCs v1 IPZCombining safety and conventional interfaces for interlock PLCs v1 IPZ
Combining safety and conventional interfaces for interlock PLCs v1 IPZRiccardo Pedica
 
Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...iRidiumMobile365
 
Maipu smart lock solution for industrial business
Maipu smart lock solution for industrial businessMaipu smart lock solution for industrial business
Maipu smart lock solution for industrial businessling fu
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.sayed78
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsPaul Fremantle
 
Company profile aeu-2011_q2
Company profile aeu-2011_q2Company profile aeu-2011_q2
Company profile aeu-2011_q2Advantech Europe
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101Wavestone
 
NuSet Inc. Pitch Deck
NuSet Inc. Pitch DeckNuSet Inc. Pitch Deck
NuSet Inc. Pitch Deckcraignuset
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecturePaul Fremantle
 
Smart Home technologies
Smart Home technologiesSmart Home technologies
Smart Home technologiesloggcity
 

What's hot (20)

IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
Smart door lock system
Smart door lock system Smart door lock system
Smart door lock system
 
Khoa van-tay-kaba-u10-fingerprint-doorlock-signed
Khoa van-tay-kaba-u10-fingerprint-doorlock-signedKhoa van-tay-kaba-u10-fingerprint-doorlock-signed
Khoa van-tay-kaba-u10-fingerprint-doorlock-signed
 
NewDVR(S)- The Worldwide IOT Based Security System Merchant
NewDVR(S)- The Worldwide IOT Based Security System  MerchantNewDVR(S)- The Worldwide IOT Based Security System  Merchant
NewDVR(S)- The Worldwide IOT Based Security System Merchant
 
Introduction to the Internet of Things
Introduction to the Internet of ThingsIntroduction to the Internet of Things
Introduction to the Internet of Things
 
2015 06-api days-sf-apis-dbridge2iot-asanka
2015 06-api days-sf-apis-dbridge2iot-asanka2015 06-api days-sf-apis-dbridge2iot-asanka
2015 06-api days-sf-apis-dbridge2iot-asanka
 
Combining safety and conventional interfaces for interlock PLCs v1 IPZ
Combining safety and conventional interfaces for interlock PLCs v1 IPZCombining safety and conventional interfaces for interlock PLCs v1 IPZ
Combining safety and conventional interfaces for interlock PLCs v1 IPZ
 
Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...Smart home and internet of things transformation of the existing concept of a...
Smart home and internet of things transformation of the existing concept of a...
 
Maipu smart lock solution for industrial business
Maipu smart lock solution for industrial businessMaipu smart lock solution for industrial business
Maipu smart lock solution for industrial business
 
Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.Internet of Things (IoT) Based Smart Security & Home Automation System.
Internet of Things (IoT) Based Smart Security & Home Automation System.
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Company profile aeu-2011_q2
Company profile aeu-2011_q2Company profile aeu-2011_q2
Company profile aeu-2011_q2
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
Waterfall Wonderware Joint Offering
Waterfall Wonderware Joint OfferingWaterfall Wonderware Joint Offering
Waterfall Wonderware Joint Offering
 
Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016Security analysis of emerging smart home applications 11.2016
Security analysis of emerging smart home applications 11.2016
 
Logitor new-11-10-2010
Logitor new-11-10-2010Logitor new-11-10-2010
Logitor new-11-10-2010
 
NuSet Inc. Pitch Deck
NuSet Inc. Pitch DeckNuSet Inc. Pitch Deck
NuSet Inc. Pitch Deck
 
IoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architectureIoT World - creating a secure robust IoT reference architecture
IoT World - creating a secure robust IoT reference architecture
 
Smart Home technologies
Smart Home technologiesSmart Home technologies
Smart Home technologies
 

Viewers also liked

Secuencia didáctica 3
Secuencia didáctica 3Secuencia didáctica 3
Secuencia didáctica 3Luisa Arias
 
Chicago Sun-Times Education Guide
Chicago Sun-Times Education GuideChicago Sun-Times Education Guide
Chicago Sun-Times Education GuideRexford Robinson
 
Ficha.maquina de nutrientes
Ficha.maquina de nutrientesFicha.maquina de nutrientes
Ficha.maquina de nutrientesnat_18
 
Call For Abstracts Lci 2 May2012
Call For Abstracts  Lci 2 May2012Call For Abstracts  Lci 2 May2012
Call For Abstracts Lci 2 May2012Mark_Pope
 
Sd (4) desarrollo fisico y salud- alimentacion
Sd (4) desarrollo fisico y salud- alimentacionSd (4) desarrollo fisico y salud- alimentacion
Sd (4) desarrollo fisico y salud- alimentaciongabiprincess
 
Planificador de proyecto
Planificador de proyectoPlanificador de proyecto
Planificador de proyectoLuisa Meza
 
BI congres 2016-3: Insurance comparison engine - Miloud Belkacem - Business &...
BI congres 2016-3: Insurance comparison engine - Miloud Belkacem - Business &...BI congres 2016-3: Insurance comparison engine - Miloud Belkacem - Business &...
BI congres 2016-3: Insurance comparison engine - Miloud Belkacem - Business &...BICC Thomas More
 
From Information to Insight: Data Storytelling for Organizations
From Information to Insight: Data Storytelling for OrganizationsFrom Information to Insight: Data Storytelling for Organizations
From Information to Insight: Data Storytelling for OrganizationsThinking Machines
 
The Open Course in Technology Enhanced Learning (ocTEL): Your time, your place
The Open Course in Technology Enhanced Learning (ocTEL): Your time, your placeThe Open Course in Technology Enhanced Learning (ocTEL): Your time, your place
The Open Course in Technology Enhanced Learning (ocTEL): Your time, your placeAssociation for Learning Technology
 

Viewers also liked (14)

EA KIT PROFILE_2016
EA KIT PROFILE_2016EA KIT PROFILE_2016
EA KIT PROFILE_2016
 
Community manager
Community managerCommunity manager
Community manager
 
Secuencia didáctica 3
Secuencia didáctica 3Secuencia didáctica 3
Secuencia didáctica 3
 
Chicago Sun-Times Education Guide
Chicago Sun-Times Education GuideChicago Sun-Times Education Guide
Chicago Sun-Times Education Guide
 
Automoviles
AutomovilesAutomoviles
Automoviles
 
diploma cert
diploma certdiploma cert
diploma cert
 
Ficha.maquina de nutrientes
Ficha.maquina de nutrientesFicha.maquina de nutrientes
Ficha.maquina de nutrientes
 
Call For Abstracts Lci 2 May2012
Call For Abstracts  Lci 2 May2012Call For Abstracts  Lci 2 May2012
Call For Abstracts Lci 2 May2012
 
Sd (4) desarrollo fisico y salud- alimentacion
Sd (4) desarrollo fisico y salud- alimentacionSd (4) desarrollo fisico y salud- alimentacion
Sd (4) desarrollo fisico y salud- alimentacion
 
Planificador de proyecto
Planificador de proyectoPlanificador de proyecto
Planificador de proyecto
 
Rajesh Kumar Bharathan
Rajesh Kumar BharathanRajesh Kumar Bharathan
Rajesh Kumar Bharathan
 
BI congres 2016-3: Insurance comparison engine - Miloud Belkacem - Business &...
BI congres 2016-3: Insurance comparison engine - Miloud Belkacem - Business &...BI congres 2016-3: Insurance comparison engine - Miloud Belkacem - Business &...
BI congres 2016-3: Insurance comparison engine - Miloud Belkacem - Business &...
 
From Information to Insight: Data Storytelling for Organizations
From Information to Insight: Data Storytelling for OrganizationsFrom Information to Insight: Data Storytelling for Organizations
From Information to Insight: Data Storytelling for Organizations
 
The Open Course in Technology Enhanced Learning (ocTEL): Your time, your place
The Open Course in Technology Enhanced Learning (ocTEL): Your time, your placeThe Open Course in Technology Enhanced Learning (ocTEL): Your time, your place
The Open Course in Technology Enhanced Learning (ocTEL): Your time, your place
 

Similar to EKA BROCHURE 2013

intelligent-buildings-ppt
intelligent-buildings-pptintelligent-buildings-ppt
intelligent-buildings-pptSyedAyanGame
 
Next-Gen Access Control in the time of COVID-19
Next-Gen Access Control in the time of COVID-19Next-Gen Access Control in the time of COVID-19
Next-Gen Access Control in the time of COVID-19Fordly
 
Best Salto Access Control in Melbourne.pdf
Best Salto Access Control  in Melbourne.pdfBest Salto Access Control  in Melbourne.pdf
Best Salto Access Control in Melbourne.pdfGable Patios Perth
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Visionmarshallbutler
 
Abloy PROTEC2 CLIQ Technical Brochure
Abloy PROTEC2 CLIQ Technical BrochureAbloy PROTEC2 CLIQ Technical Brochure
Abloy PROTEC2 CLIQ Technical BrochureAnthony Irungu
 
Häfele - Catalogus Dialock
Häfele - Catalogus DialockHäfele - Catalogus Dialock
Häfele - Catalogus DialockArchitectura
 
Telepost - unique parcel terminal
Telepost - unique parcel terminalTelepost - unique parcel terminal
Telepost - unique parcel terminalAviatehnologie S.A.
 
Locksmith in Dublin
Locksmith in DublinLocksmith in Dublin
Locksmith in Dublinpriyaanu2505
 
Kaba paxos compact-sales-brochure_en_01
Kaba paxos compact-sales-brochure_en_01Kaba paxos compact-sales-brochure_en_01
Kaba paxos compact-sales-brochure_en_01Mail Box Production
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric PresentationDarrell Smith
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMIRJET Journal
 

Similar to EKA BROCHURE 2013 (20)

intelligent-buildings-ppt
intelligent-buildings-pptintelligent-buildings-ppt
intelligent-buildings-ppt
 
Next-Gen Access Control in the time of COVID-19
Next-Gen Access Control in the time of COVID-19Next-Gen Access Control in the time of COVID-19
Next-Gen Access Control in the time of COVID-19
 
Abloy Smart Disc
Abloy Smart DiscAbloy Smart Disc
Abloy Smart Disc
 
Best Salto Access Control in Melbourne.pdf
Best Salto Access Control  in Melbourne.pdfBest Salto Access Control  in Melbourne.pdf
Best Salto Access Control in Melbourne.pdf
 
Effective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine VisionEffective Human Detection & Tracking Security Using Machine Vision
Effective Human Detection & Tracking Security Using Machine Vision
 
Abloy PROTEC2 CLIQ Technical Brochure
Abloy PROTEC2 CLIQ Technical BrochureAbloy PROTEC2 CLIQ Technical Brochure
Abloy PROTEC2 CLIQ Technical Brochure
 
Linkwise Technology Inc
Linkwise Technology IncLinkwise Technology Inc
Linkwise Technology Inc
 
Company curriculum
Company curriculumCompany curriculum
Company curriculum
 
Häfele - Catalogus Dialock
Häfele - Catalogus DialockHäfele - Catalogus Dialock
Häfele - Catalogus Dialock
 
Synergy Integrations Brochure
Synergy Integrations Brochure Synergy Integrations Brochure
Synergy Integrations Brochure
 
Telepost - unique parcel terminal
Telepost - unique parcel terminalTelepost - unique parcel terminal
Telepost - unique parcel terminal
 
Telepost Parcel Terminal
Telepost Parcel TerminalTelepost Parcel Terminal
Telepost Parcel Terminal
 
Locksmith in Dublin
Locksmith in DublinLocksmith in Dublin
Locksmith in Dublin
 
Dublin locksmith
Dublin locksmithDublin locksmith
Dublin locksmith
 
Kaba paxos compact-sales-brochure_en_01
Kaba paxos compact-sales-brochure_en_01Kaba paxos compact-sales-brochure_en_01
Kaba paxos compact-sales-brochure_en_01
 
DVCOM
DVCOMDVCOM
DVCOM
 
EMKA-Biometric Presentation
EMKA-Biometric PresentationEMKA-Biometric Presentation
EMKA-Biometric Presentation
 
Smart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSMSmart Security Lock for Access Control Applications based on GSM
Smart Security Lock for Access Control Applications based on GSM
 
DVCOM
DVCOMDVCOM
DVCOM
 
DVCOM
DVCOMDVCOM
DVCOM
 

EKA BROCHURE 2013

  • 1. Introducing the next generation in access control that secures, controls and audits all assets, from the front door to assets in remote locations access control system The ONLY that stretches from your front door to a shipping container in the Indian Ocean www.ekasecurity.com.au
  • 3. access the next generation in that secures, controls and audits all assets, from the front door to assets in remote locations PAGE 3 Securing the office door with current access control technology is easy. But swipe cards aren’t practical for controlling access to remote assets, like sub-stations, data centres or vending machines. They can’t lock down mobile assets, such as containers or laptops. And if you want to use them to secure unusual but important things like drug safes or gates, forget it. Either the cost is prohibitive or it’s impossible to run the wiring. Master-key systems offer a lock for just about anything, but no control over access. Auditing who’s been where is nearly impossible. And if you lose a key you either re-key the system (expensive!) or live with compromised security. EKA finally breaks this either/or choice. EKA couples the master-key ability to put a lock on anything with the tight and trackable access control characteristics of swipe card systems. What’s more, EKA retrofits into any existing cylinder lock and integrates any existing access control system. That’s why EKA truly is the next generation in access control — able to secure, control and audit any asset from the door, to remote or mobile assets. control Introducing
  • 4. PAGE 4 EKA’s next-gen access control technology is the cutting edge security solution for any industry or sector that needs a sure way to secure, control and audit assets beyond the door. for any industry or sector The preferred access control that needs to secure, control and audit assets beyond the door
  • 5. Telcos and data centres. EKA can be used to secure access to communication pits and cages. Utilities. Large utilities like water boards can secure facilities like power plants, sub-stations, equipment and storage. Local government. Local government assets ranging from offices and halls, to depots, parking meters, barriers and park toilets can all be easily secured with EKA. Transport and logistics. Containers, yards, warehouses, depots and even gates can be secured using EKA. Airports. EKA will secure access to hangers, gates, server rooms and restricted access areas. Hospitals and pharmaceutical. Drug safes and pharmacy labs are normally hard to lock down. EKA makes securing them a breeze. Mining and construction. Stop wondering who has access to plant equipment, vehicles and explosives. EKA secures and tracks it all for you. Education and office. EKA can be used to secure access to utility doors with padlocks, cash tins, access panels, air conditioning or display units, light boxes and even roller doors. PAGE 5
  • 6. PAGE 6 Whether it’s a cage, a cupboard, a case, a container, a cash bag or a gate, if you can put a lock on it, EKA can secure and control it.
  • 7. PAGE 7 unique why EKA is the better access control 1 One software platform. EKA bridges existing hardwired and key-centric security solutions and can secure, control and audit access to both types. 2 Works beyond the door. Whether it’s a cage, a cupboard, a case, a container, a cash bag or a gate, if you can put a lock on it, EKA can secure and control it. 3 No expensive and disruptive cabling. Traditional access control systems need extensive hardwiring. The only thing EKA replaces is the lock cylinder. 4 Stays up when the power is down. If the power goes down, hardwired access control systems fail. EKA locks are powered-up as required by the CyberLock key your people carry for access. reasons eight 5 More cost effective. EKA delivers every advantage of an access control system at a cost per door (lock) that’s comparable with a master key system. 6 Audit access to any asset. You can access audit trails even for mobile and remote assets and see exactly who’s been in and out, as well as who’s tried and been denied. 7 Deploys twice as fast. Current access control technology is slow to install and deploy. Even in large organisations with thousands of assets to secure, EKA can be fully installed and running in just a couple of weeks. 8 A single key opens any lock. As long as they have access privileges, your people can access any asset using just one key.
  • 8. PAGE 8 Migrating to an EKA access control system is simple, and can be accomplished in just a matter of weeks even for the largest and most diverse government organisation or blue-chip corporation. What’s more, operation is simple, efficient and transparent. Here’s how it works. action EKA IN
  • 9. PAGE 9 Identify the assets you need to secure. Replace all mechanical locks with EKA CyberLocks. Expand. The EKA remote access system is easily expandable. New locks can be added quickly and cost- effectively. Moreover the reach of the system is not limited by geography and you can cover locations in separate states or even countries. Initiate and hand out CyberKeys. Each key is pre- programmed with a unique, updatable list of assets the keyholder may open. Monitor and report system integrity. Access monitoring occurs through EKA’s software and can generate customised automatic email reports of suspicious activity. Discard all old keys. Now each staff member, tradie, security staff needs carry only a single CyberKey to open any lock they have privileges for. Assign CyberKey access privileges as required. Facility managers can activate and deactivate individual keys, and even set up missions that give time-limited access rights to certain facilities or assets. Identify expand Initiate Monitor & Report Discard Assign6 5 1 2 3 4
  • 11. compares How EKA to other remote access systems PAGE 11 Feature Mechanical key Access control EKA Low upfront cost • • Expand as you grow • • Secure beyond door • • Low impact install • • No power issues • • No keyway • • No key duplication • • Set access permissions • • Audit trails • • Secure remote facilities • • One software platform • Secure mobile assets • •
  • 13. one control Many locks; interface Until now, if you installed different types of locking systems you had no choice except to operate and manage them independently. Sitting side-by-side, the result is more expense, more operational work for facility and asset managers, and more opportunities for security breaches. EKA solves this through a system that can deliver single, unified access control. Through a hub called Flex, EKA is able to integrate with and manage any other access control system that uses a Weigand — compatible input device-from RFID, to electronic swipe and HID, Maglocks, electronic strikes, and even bio-metric devices. PAGE 13
  • 14. 1 Initiate access privileges Only EKA/Flex is needed to: 2 Revoke access privileges 3 Monitor access and trigger alarms 4 Generate audit reports One keyfor many locks: indoors, outdoors, mobile and remote! Perimeter security1 Power meter box lock15 Weatherised v16 EKA CyberKey authoriser4 Access Control security for locks on the move 3 Security for Po other main cont 5 PAGE 14
  • 15. RFID lock at the front door2 Power meter box lock15 vault Security vault lock9 EKA CyberKey vault10 Office door cylinder lock8 Power and ontrols Restricted access for high-value storage areas 6 wiegand-compatible device integration 7 Storage door cylinder lock 12 Filing cabinet cylinder locks 11 Server room door cylinder lock 13 Server cabinet cylinder locks 14 PAGE 15
  • 16. EKA can be installed into any gate lock or padlock in even the most remote facilities. Restrict and monitor access to small safes used for petty cash or other valuables. An EKA Flex hub integrates with any Wiegand-compatible devices, such as RFID readers or swipe cards, for a more effective and comprehensive single access control system. A secure key repository for up to 20 keys. It’s possible to establish rules that some — or all — staff return keys to the vault before leaving for the day. It doesn’t matter how geographically distributed your operations are, EKA locks any container or truck anywhere, and keeps your goods safe in-transit, even from one side of the world to the other! Properly secure items previously too expensive or impossible to secure with access control, such as filing cabinets. Use the EKA system to give access to just a few people, one person, or to every member of staff. Easy install keypad authoriser means staff or contractors can obtain a CyberKey with limited access privileges using a registered and fully- trackable code. Storage access can be made as open or restricted as you like. Perimeter security Security vault lock RFID lock at the front door EKA CyberKey vault Access Control security for locks on the move Filing cabinet cylinder locks EKA CyberKey authoriser Storage door cylinder lock 1 9 2 10 3 11 4 12 EKA can secure every lock in an entire facility.
  • 17. Control and monitor access to the lights, power and other important controls. Restrict access and comprehensively track entry to key business operational facilities such as server rooms. EKA makes it simple to secure, restrict and monitor access to cages and other restricted areas storing high- value goods. EKA even enables individual control over who has access to which server cabinets. The Flex hub also integrates bio- metric fingerprint readers under EKA’s single access control system. In fact, as long as the device is wiegand-compatible, it can be hooked up to the EKA Flex system for a unified access control system. Restrict and monitor access to power meters, communication pits and the like. Allow access to certain people (cleaners) during certain times. Set-up a system for emergency or one-off access. A pin code is needed to obtain the key in the weatherproof vault. Perfect for emergency services or one-off contractors requiring access. Security for Power and other main controls Server room door cylinder lock Restricted access for high-value storage areas Server cabinet cylinder locks wiegand-compatible device integration Power meter box lock Office door cylinder lock Weatherised vault 5 13 6 14 7 15 8 16 inside and out. Here are some examples.
  • 18. PAGE 18 At its core, an EKA installation comprises four elements: the CyberLock cylinders, the CyberKey, key authorisation communicators and the EKA software itself. science of EKA the
  • 19. When an EKA CyberKey meets an EKA lock, an instant information exchange determines whether the key has access to that specific lock. Whether access is granted or denied, the time of the event and the unique ID of the key used is stored in both the lock and the key. EKA cylinders are the exact dimensions of the normal lock cylinders they replace. The absence of a conventional keyway means it is not vulnerable to being picked. As the EKA cylinder needs no power or wiring it’s ideal for remote and mobile assets. Each EKA CyberKey contains a battery and the individual’s access privileges. This powers all the electronics and operates the lock. For example the key can be programmed to allow access from 8am to 6pm on weekdays and 10am to 4pm Sundays. It can even be programmed to expire so it cannot function until reactivated. Access privileges are distributed through communicators linked to your EKA software via network or internet. When validating keys, the system downloads the key’s stored data for audit. It then uploads any new access privileges. EKA access privileges can be programmed to expire. This forces users to update keys regularly. Centralised, web based software allows facility managers to assign keys, set access permissions and expiry times. They can also create access groups and schedules, and activate new EKA locks. It also enables auditing and tracking through reports and automatic notification of suspicious activities. PAGE 19 EKA CyberKey EKA cylinder
  • 21. Advancedmonitoring and reporting PAGE 21 EKA’s server-based modular software system is capable of handling complex and numerous geographically remote installations of as many as 15,000 keys and 15,000 locks. A hierarchy of administrators allows individual managers responsibility for only the locks and the people in their area. It even manages assets across countries and time zones. An intuitive point-and-click, browser-based interface that uses drop-down information boxes is all that’s needed to access the modules that drive EKA’s access control, monitoring and reporting capabilities. Key and custom modules Location graphics. Create a graphical interface of your office that allows you to place the location of CyberLocks and Communicators for improved tracking and auditing. Door & Input / Output Support. Through Flex, manage access to Wiegand-compatible third- party systems such as swipe cards, RFID and biometric readers. Doors can also be set to unlock and relock at certain times and alarms can be triggered if a door is forced or left open. Locks. See all locks and individually set access and reporting characteristics. Options include: delayed access, access only with a number of keys and email notification of denied access. People and keys. Allocate individual keys to users. Set days and times they have access to certain locks, how soon the key’s access permissions expire and even revoke a lost key. Schedules. Set schedules of who can go where at what time. This can be as specific as a few minutes at a certain time on one or two days of each week. Reports. Audit trails can be used to generate tailored reports that tell you who has been where and when. Anything from specific people to user-defined groups such as: contractors, cleaners, security staff, weekend users. EKA software features Detailed audit trail Set two, three or four-way access Denied access email alerts Hierarchy of administrators Remote key initiation via Andriod & Blackberry Key scheduling and expiry Set delayed access Set group access permissions Multiple time zone management Monitors and controls third-party systems
  • 22. PAGE 22 Communicators underpin the flexibility of EKA. Simple,instant key activation A network of communicators (each communicator can be given an IP address) allows users to validate their CyberKeys without returning to where the EKA software is hosted, instantly downloading audit trail data and receiving updated access permissions. Communicators are also designed to recharge rechargeable CyberKeys. Communicators are so versatile that they can be mounted almost anywhere, maximising ability to control access to even the remotest assets.
  • 23. Mini keyport. This smaller version of the authoriser can be employed when the additional security of keypad and PIN codes are not required. PAGE 23 Seven communicators for any situation or facility Single-key vault cabinet. Remote locations such as maintenance sheds often have many people areas requiring access. By allocating a PIN access code or swipe card to each user, one key is shared among many users, yet every user’s access history can be individually audited. 20-key vault cabinet. Ideal for large offices, this intelligent key cabinet stores keys in an inactive state. A swipe or PIN code is required to activate a key, and when staff return keys they are deactivated until they are next retrieved. Authoriser keypad. An authoriser keypad is a durable, weather-proof unit that is fitted to the exterior of a building or facility. Users present their key to the authoriser and enter a PIN code to obtain permission privileges. USB station. In a smaller office, when your EKA software might only sit on a desktop, a simple USB station port is a cost-effective way to authorise keys. Web station. Web stations multi-point access and updating via cat-5 are ideal for larger, network server systems. IR encoder. This compact USB dongle connects to any CyberKeys via infra-red connection. It’s ideal for remote and mobile workers.
  • 25. One keyfor every lock PAGE 25 The EKA CyberKey is an electronic, programmable smart key that cannot be duplicated. Via a communicator, each key can be programmed with the permissions for every system lock a key holder is allowed to access: what locks the key can open, as well as the days and times each lock can be opened. In this way, each user only needs one key to access any lock in a system, whether it’s a major entry door, or an obscure and remote cabinet padlock. Because it’s electronic, permissions can be revoked. Administrators can set key expirations to occur regularly (daily, weekly or more often) and can also do this on an ad-hoc basis when keys are lost. Each EKA key contains four levels of intelligence: encrypted access codes to ensure the key is from the same installation; the unique ID number of the key; access privileges for the user of the key; and storage of up to the last 3,900 events, both entries and denied entries. The unique exchange of encrypted access codes between the lock and key gives a high degree of key integrity. The encrypted codes ensure keys from other systems cannot work in your system. Three types of CyberKeys 1 Standard Cyberkey. A standard lithium three-volt battery can provide between 3,000 and 5,000 lock openings. 2 Rechargeable CyberKey. A rechargeable lithium Ion battery can provide around 500 openings before needing to be recharged on a recharging station. 3 Bluetooth CyberKey. A bluetooth-connectable for remote and mobile users. The EKA CyberKey Standard, rechargeable and Bluetooth versions available Permanent memory holds access events, even if battery fails Made from impact-resistant nylon for high durability Cannot be duplicated Can be set to expire Water-resistant, coated electronics Sacrificial brass tip prevents wearing of lock Brass tip easily replaced in the field Will not function once expired Can be programmed for one lock, or many locks
  • 26. PAGE 26 CyberLocks are the exact dimensions of the mechanical cylinders they replace. They retrofit into the lock hardware with the ease of a mechanical cylinder, and do not change how the lock operates. for any asset A CyberLock
  • 27. PAGE 27 More than 300 existing CyberLock designs enable it to be installed in an enormous variety of interior and exterior doors, padlocks, containers and cabinets. There’s no wiring and no battery. All power is provided by the CyberKey: when a key comes in contact with the cylinder, it powers up the lock’s circuitry so key and lock communicate. If the key is not on the lost key list and the permissions are correct, the lock will open. The circuitry stores four types of information: encrypted codes that ensure only keys within the system work with the lock; the unique ID number of the CyberLock; a record of the last 1,100 entries; and a list of lost keys to eliminate access by any key that is missing or lost. CyberLocks offer superior physical security. They have no conventional keyway that is vulnerable to being picked plus a tamper plug prevents the lock from opening if the front of the cylinder is struck. Moreover, if torque is applied to cylinder, the front part separates from the back half. The back half of the cylinder expands, causing a brake effect that engages the sides of the cylinder’s case, stopping the rotation and leaving the cylinder in the locked position. Why the CyberLock is superior • Retrofits any mechanical lock • No wiring, no battery • Potted circuits protected against dust, water, salt & air • Lost key list prevents unauthorised access • No keyway to pick • Torque brake and tamper plug • Withstands to 300,000 volts and 18,000 gauss • Records authorised and denied access
  • 28. College Challenge In 2007, Mary MacKillop College was about to begin new construction. The college already had 60 classrooms in a large open area, each with two individual access points. Controlling access was already difficult. Different locks meant two separate keys for each classroom. OH&S rules meant both keys were required in case of an emergency. Keen to improve security, MMC investigated several keying systems. mary mackillop PAGE 28 “The systems were often more economical, but did not provide the flexibility our site required.” Solution MMC was immediately convinced EKA was the way to go. “Over the years we have had problems with the misplacement of keys by contractors, staff and teachers. EKA totally resolved this issue, because if a key is misplaced it would now be simply disabled online.” MMC primarily chose EKA because of its easy installation, and the flexibility to centrally control access to each individual area. “This keying system allows us to adjust access for teachers to the classroom remotely, utilising their own individual key. Overall we are extremely happy with the ease of installation, the end result, as well as the exceptional service we have received from EKA.” case study
  • 29. College Challenge Ave Maria College was using a fairly modern restricted master key system. Yet there were constant key management concerns and challenges. Different users required multiple keys, leading to a situation where it was easiest to just give everyone a master key! Solution College Business Manager, Allan Thompson, researched solutions to provide better key management. They chose EKA. Ave Maria College decided to roll-out EKA in small, easy-to-manage sections Ave Maria to meet budget requirements and ensure a smooth transition. The staged installation occurred in three sections: the library as a trial site; all external doors; all internal doors. A remote Key Validation Point was installed at the completion of the second stage in a central location so staff could update their access profile without visiting the Property Manager’s office. EKA has given Ave Maria the flexibility to design specific access levels for the different users of the college. The tailored access, coupled with the instant ability to delete lost keys, has vastly improved security. case study
  • 30. Challenge Water treatment facilities are uniquely difficult to secure. These facilities have such a diverse array of access control requirements — main entrances, storage areas, office doors, gates, computer cabinets, padlocks and restricted chemical areas — that a very flexible system is needed. GWM Water PAGE 30 Solution GWM chose EKA for its versatility, superior security features and ease of installation. Now each employee needs only one key to access any GWM lock they’ve been assigned accessprivileges. Security has improved as lost or stolen keys are now easily blocked. Since GWM installed EKA at their water treatment plants, they’ve gone on to roll-out the system through their entire infrastructure. EKA locks now secure the entire Wimmera Mallee Pipeline system — facilities that span 250,000 square kilometres — while hundreds of locks are being installed in pump stations, switchboards, wastewater treatment plants and depot facilities. case study
  • 31. post Challenge Subcontractor clearance agents are required to collect the mail from New Zealand Post’s network of street receiver boxes during scheduled hours, multiple times a week. New Zealand Post had no way to determine when mail had been collected. Security was also a concern. Each route includes 20 to 30 street boxes and sometimes clearance agents service multiple routes. If a key was lost, all the locks in that series of street boxes had to be re-keyed at great expense. Also, the time required to re-key the boxes put customer mail at serious risk. new zealand Solution New Zealand Post began looking for a system that would allow them to monitor the service performance of the subcontractors in clearing mail from their street receiver boxes. “We selected CyberLock because it was cost-effective and met our requirements in terms of measurability and auditing”. New Zealand Post implemented a successful four month trial of the system in Wellington. Following the trial they converted 3,500 of their street receiver boxes to CyberLock electronic locks. case study “Enterprise software allows us to perform audits over the network and manage the performance of our subcontractors, even at remote collection sites. Also, we can disable a key relatively quickly, should one be lost. Enterprise provides daily reports of box clearance times and exceptions such as attempted access to a box outside the scheduled collection time.” “The CyberLock system has greatly enhanced the security of our customer mail and allows us to manage subcontractor service performance.”
  • 32. Challenge The Brisbane Airport Corporation needed a government-endorsed, wireless access control system that allowed an audit trail and time-in-attendence function. Plus the software had to integrate with their existing bar-coding system to complete the control of updating contractor’s licences. PAGE 32 Solution BAC implemented EKA — customised to integrate with the bar-coding software — to allow contractors access to the site. After a trial, the first major roll-out occurred in February 2010. Brisbane Airport Corporation is now installing EKA CyberLocks throughout both its domestic and international terminals. They’re one of the first companies in Australia to install secure key vaults, and are currently drafting plans to integrate a GUI. This innovative GUI will allow them to use graphical renderings of every terminal level to control doors locks through the EKA system and enable seamless issue of temporary keys. case study corporation brisbane airport
  • 33. ground Challenge The MCG is one of the world’s great sporting arenas. During concerts and major events, such as the AFL grand final, as many as 100,000 people fill the stadium. A venue of this size and calibre has significant security requirements. In 2007, under the guidance of a new security manager, they began melbourne cricket to re-examine their access control systems and needs. Solution The MCG chose EKA as it would work in conjunction with their existing hardwired doors. EKA’s flexibility also came with a significant cost advantage. Hardwiring additional doors would be expensive. EKA eliminated this problem. case study Having an audit trail and being able to delete lost keys has proved particularly beneficial. So has the flexibility of individual levels of key access and control. Since EKA was first installed in 2008, the MCG has put EKA in additional areas like their sports museum and corporate boxes to secure access to some of their most valuable assets.
  • 34. PAGE 34 Challenge An Australian government department needed to improve the access control of its extensive underground pipe and pit infrastructure. This department operates more than 600 kilometres of underground conduit and some 2,000 individual in ground access pits that require various requirements for access in order to deliver services and the security levels required. Until recently, they used a mechanical locking system with six separate key and lock profiles. The cost to re-key the system if one single key was lost was potentially more than $280,000, a process that would take three months. A pilot project with electronic locks in 2007 showed the advantages of electronic locking although highlighting some additional physical restraints of design. Solution EKA’s physical robustness, ease of use, customisation possibilities and whole- of-life savings convinced the department to roll-out the EKA product to replace the majority of the mechanical locks, as well as the product utilised for R&D in the pilot project. The department has now replaced more than 95 percent of the previous locking systems. The earliest installations have now been in some of the department’s dirtiest and most-often-used pits for 18 months. Only one lock has had a complete failure — a 0.0004% rate of failure. EKA has also eliminated the need to ever re-key. The EKA product has also allowed the department to use the same electronic locking system to secure cabinets, haul or lock boxes in buildings. They’ve even worked with the manufacturer to design and build intruder-resistant components for use inside buildings, complete to the service end point. australian government case study
  • 35. PTY LTD Challenge When Grant Mattiske joined South Australian electricity transmission network service provider ElectraNet as the new Asset Access Administrator he was tasked with auditing their master- key system used to secure access to substations and other key facilities. Grant’s risk management audit identified a number of issues for resolution, including the system’s expired patent and keys that had been reported as lost. Solution A new master-key system would be expensive and Grant realised new keys ELECTRANET would inevitably be lost, and the same issues would emerge all over again. In search of an alternative security solution to mitigate risk, Grant trialled EKA in 2006. The proof of concept was a success and he’s been rolling EKA out through ElectraNet’s 100+ substations and communications sites ever since. Grant says that ElectraNet now has nearly 1000 CyberKeys for approximately 500 EKA locks on gates, doors and padlocks that secure substations anywhere from the edge of the Stuart Desert, as well as a growing number of wall authorisers and infrared portable versions. Even in the extreme heat case study of the desert, malfunctions are rare with correct device management. Grant says that in most instances, all that was needed during the changeover was the replacement of the lock cylinder, making the roll-out faster and particularly cost-effective. If a key is lost, Grant now simply deactivates its access on the EKA system. He can also set record and report instructions if it’s used on any lock throughout ElectraNet. What’s more, he uses a timeout policy. If a key doesn’t have its privileges re- authorised within the defined period, it no longer functions. For ElectraNet, it’s an effective security solution.
  • 36. www.ekasecurity.com.au 1300 722 311 Sydney • Melbourne • Brisbane • Perth • Adelaide