CLIQ - ASSA ABLOY Electronic Locks(8)
You can work smarter and more sustainably when electronic locks and keys power your security. An electronic locking solution minimizes security risks when keys go missing. With an eCLIQ system from ASSA ABLOY, you can manage everyone’s access from anywhere, at any time — electronically, securely and wirelessly. Based on award-winning CLIQ® access control technology, the eCLIQ system is built around precise locking mechanics and high-end microelectronics. A battery inside each programmable key powers the wide range of programmable cylinders and padlocks — and secures every data transfer. An eCLIQ system is also convenient. Thanks to multiple software options, you manage users’ access rights in a way that suits you best. Authorised key-holders carry a single, battery-powered key programmed with only their cleared access permissions. Low maintenance for technical components you can trust Robust and durable, eCLIQ cylinders are available for a wide range of doors, cabinets, lifts, alarm boxes, machines and entrance gates. Looking after your eCLIQ components is easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. eCLIQ keys are durable, compact, and waterproof (IP67). They are easy to reprogram, enabling temporary and time-limited access permissions for every employee or contractor. AES encryption, rapid processing, and efficient energy management is built into the chip. When a key’s battery runs out, it is easily replaced without tools. Mechanical and encrypted electronic elements work together to make an eCLIQ installation highly resistant to both physical and electronic attack. Easy installation — simple, secure management Managing eCLIQ is straightforward. You can program keys with easy-to-use eCLIQ Manager software: choose between a local software installation or our secure web-based software which manages access rights from anywhere, in the cloud. Security managers can host the Web Manager software on their own or use ASSA ABLOY’s Software as a Service solution. Users can also update their own keys with a range of programming devices, including wall-mounted units. With eCLIQ, missing keys are quickly de-authorised, cutting risks associated with key loss or theft. At any time, facility managers can generate a full audit trail to discover who has accessed which locks. Unlike other electronic access control systems, eCLIQ uses no mains electricity. The microelectronics inside an eCLIQ lock are powered by a standard battery inside every key. Energy-efficient and sustainable, battery power also minimizes disruption when you switch to eCLIQ. Because there is no cabling around the door, you don’t need to schedule invasive, expensive electrical wiring. eCLIQ in action “eCLIQ is more durable, more secure and more efficient than conventional locking systems,” says Stephan Schulz, CLIQ® Product Manager at ASSA ABLOY EMEA. “This evolution of our award-winning CLIQ® technology is already protecting businesses and public services across Europe. A range of sectors and building types — from banks and hospitals to shops and warehouses — have learned eCLIQ provides the control and flexibility their premises need.” For an access control overhaul at University Hospital Frankfurt, managers sought a secure locking system for a new building: 1,100 eCLIQ cylinders and keys provided the solution. Now, with eCLIQ installed, nurses update access rights every morning for the day ahead. This new workflow minimizes security vulnerabilities and keeps everyone safer. Retail banking combines high security with complex workflows. Staff need efficient access. Facility managers need the flexibility to design access permissions around individual needs and clearances. Creval’s bank doors across Italy’s Lombardy region are now locked with more than 30 eCLIQ cylinders, putting managers in total control of entrance security. In the unlikely event a key is misplaced, Creval administrators simply delete it from the system. In Germany, eCLIQ locks AMPELMANN GmbH branches and their 2,200 m2 logistics centre, meeting the needs of their decentralized branch organization. Its 8 Berlin branches are staffed by several permanent employees. External service providers like cleaners need access. eCLIQ provides it — safely, securely and without major key-management workload.Add to Compare
The risk of sabotage, attacks or thefts for an energy provider is an issue of national security: the consequences of unplanned interruption to supply or total shutdown could have catastrophic, expensive and far-reaching consequences. The challenge is to maintain the security of your critical infrastructure while guaranteeing access to employees, consultants and service crews round the clock to a range of different sites. Developed with public utilities in mind, CLIQ® locking systems offer robust security to meet the needs of your critical energy infrastructure across multiple sites. A combination of electronic and mechanical security, each key can be programmed individually to allow access to specific areas at specific times, accommodating constantly changing access requirements and helping to control workflows. CLIQ® has several advantages over old-fashioned locks. It combines highly encrypted electronic identification and mechanical security in a wide range of cylinder-type applications. The lock’s power is provided by a battery inside the programmable CLIQ® key. Why do so many leading energy providers rely on CLIQ® to deliver a dedicated security solution to manage the security and access of their complex infrastructure across multiple sites? Because the robust CLIQ® locking system addresses the specific needs and security issues surrounding their critical energy infrastructure, guarding against sabotage, theft and trespass, while guaranteeing access to those who need it. Developed specifically for public utilities facing major security challenges, CLIQ®: Minimises the risks associated with lost keys Provides tailored access rights for employees, consultants and service crews Delivers solid reporting and traceability to support workflows Offers centralised web based security management Combines electronic and mechanical security Is easy to install both indoors and outdoors without cabling Multiple cylinder types for doors, cabinets, cupboards, machines, elevators, padlocks etc. CLIQ®: The robust and reliable access system tailored to securing critical infrastructure and high security premises. ASSA ABLOY offers CLIQ® locking systems worldwide under several brands, including ABLOY, Mul-T-Lock, ASSA, IKON, Vachette, Ruko, Trioving, KESO and FAB. Find out more about CLIQAdd to Compare
Browse Electronic Locks
- Solenoid Bolts
- CLIQ - ASSA ABLOY
- Other CLIQ - ASSA ABLOY products
- CLIQ - ASSA ABLOY Access control software
Electronic lock system products updated recently
There’s no question that the popularity of Do-It-Yourself (DIY) security and home automation products is on the rise. The reasons for the growth in DIY sales are numerous, including increased awareness of home automation products, fast set-up, limited (if any) installation costs, and interoperability with other smart security products. In fact, with the parallel rise of smart home hubs like Alexa and Google Home, many people are opting to attempt the set-up of smart home devices without any professional assistance. According to a 2018 Residential Security Market Report prepared by Parks Associates and Security Sales & Integration magazine, “More than 60% of installing dealers now report that DIY systems are biting into demand for their services.” But the rise in DIY is not entirely bad news for security and home automation installers and dealers. There are a number of ways to view this glass as half-full. Let’s look at a few of them. Increase In Revenue For Dealers With their lower cost and perceived ease of installation, DIY products have broken down barriers for additional purchaseThere are reasons for dealers and installers to be cheerful about the rise of DIY. For one thing, according to that same Residential Security Market Report from Parks Associates, residential security dealers are doing quite well. The report states, “In 2017, revenues were up an average 7.72% for security dealers.” What about installations? The report goes on to say, “For 2017, the average number of installs per dealer was 22 per month, compared to 17 per month in 2016.” So, revenues are up for security dealers, and at least part of the reason can be attributed to the fact that DIY products can raise overall awareness of and spur interest in other home automation and security products. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for the additional purchase, and installation, of complete, professionally installed systems. Wireless, Connected Smart Locks For example, the sale of wireless, connected smart locks (viewed by some consumers as DIY) can lead to opportunities for further home automation product sales and professional installations. Connected smart locks can actually act as an extension of a smart hub or controller. They can be used to wirelessly communicate with and control all the devices that make up a home automation system, including lighting, entertainment, thermostats, air, alarms, shades and more. With their lower cost and perceived ease of installation, DIY products have actually broken down barriers for new security installations And they can do all this from a prime, convenient location – the front door, as well as other points of entry like the side or back doors. Plus, smart lock conversion kits like Kwikset Convert let homeowners easily bring home automation capabilities to their door without altering the aesthetics of the entry. Connected smart locks can allow homeowners to set up their home with custom scenarios, right before they step inside. For example, residents can program their lock so that every time they unlock the door, a foyer light goes on, temperatures begin to rise to a set level – even connected coffee makers can begin to make a cup. Portfolio Of Home Automation Products One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatileSmart locks are just one example of the potential of DIY products to spark a homeowner’s interest in a wide range of other home automation devices, many of which would benefit from professional installation. One of the best ways to mitigate the ‘threat’ of DIY sales is for dealers and installers to become more versatile and offer a complete portfolio of home automation products. The larger the home automation offering, the more devices there are to sell and install, the larger the installation required, the greater the need for professional installation. Many homeowners who feel like they have a certain level of handiness will start by trying to do it themselves with a DIY product. But things don’t always go as planned, especially if they are attempting to set up a robust home automation system. First off, just because a product is DIY doesn’t mean that the old products that are being replaced are going to easily make way for the new. A DIY thermostat or smart lock might require that the old equipment (and possibly wires) get tugged out of the wall. Messy holes might need to be filled. Advantages Of Professional Installation Even after the old system has been removed, homeowners planning on setting up a connected system may soon realize they don’t have the electrical skills or technological know-how to install and connect all devices, get a system programmed correctly, and get everything up and running smoothly. Professional installers have learned from experience; there’s very little that they haven’t seen before. With their years of experience, installers know the best way to automate a home and how to create a custom smart home experience Do-it-yourselfers might be able to solve problems by searching the internet and finding videos. But, then again, they might not. After going the DIY route once, many full-home automation system enthusiasts are beginning to realize that the best way to get things done right the first time is to leave the installation and set-up to a professional. Professional installers can and should bring an extra level of experience and guidance to the process. Their services should go beyond tech installation and also include interface design. With their years of experience, installers know the best way to automate a home – how to create a custom smart home experience that doesn’t make the user feel less than smart. Selling Additional Home Automation Products If a problem arises due to installation error, the DIYer does not have any recourse to correct these mistakesResidential security dealers who offer professional installation should be willing to embrace the DIYer who has attempted to do a self-install but has not been able to complete the process successfully. With an open mind to this scenario, they can save the day for the DIYer, as well as create an opportunity to sell additional home automation equipment that the DIYer may not have known to be available. The disparity between DIY and professional installation also brings to light the fact that there are no ‘satisfaction guarantees’ and no ‘installation/labor warranty’ available when a home automation system is installed by a DIYer. If a problem arises with either the equipment connectivity due to installation error, or if a piece of equipment is installed incorrectly, the DIYer does not have any recourse to correct these mistakes. This may not be as critical if a DIYer installs a minor piece of equipment, but with something as critical as securing and protecting their home with a home automation and security system, most people want full peace of mind that everything has been installed correctly. Reduces Connection Instability According to a 2017 study by the analyst firm, IHS Markit, “The quality of the equipment is usually higher in professionally installed systems, and professional configuration and setup greatly reduces the potential for connection instability…” This is an issue that DIYers may come to realize over time. On the other hand, one issue DIYers may recognize right away, especially if they are attempting to connect multiple devices, is that the connectivity may be inconsistent. Professionally installed devices operating on a wireless protocol might deliver better, consistent, longer-range connectivity IHS Markit explains that, “DIY systems rely on open protocols and Wi-Fi connectivity that can sometimes be unreliable, creating connection issues. Some of the sensors can become unrecognizable to the system, requiring intervention from the user. In contrast, professional wireless systems rely on UL- or EN-certified equipment to operate on the basis of proprietary frequency, enabling them to work with the control panel much more seamlessly.” In other words, professionally installed devices operating on a wireless protocol, even an open-source protocol like Z-Wave, might deliver better, consistent, longer-range connectivity, and fewer headaches. Not Everyone Is A DIY Customer There are customers who want someone to install the devices correctly and help them learn how to use and maintain themThere’s no doubt that there’s a segment of the security and home automation market that loves to spend their free time doing their own home improvement. They are watching videos, reading how-to books and manuals, and enjoying every minute. There’s also a segment of the market whose top goal is to save money up front. For these customers, there’s no getting around the joy of saving money with the lower cost of many DIY products. But there are also a great number of prospective customers out there for whom DIY is of absolutely no interest. These consumers do not want to be their own IT department. They want expert help: they want someone to install the devices correctly and help them learn how to use and maintain them. The IHS Markit study points out what many home automation dealers already know: that the elder and aging-in-place markets are an ideal destination for the security and convenience of home automation products. The study says, “Many senior citizens are not tech savvy enough to install a DIY system by themselves, so they tend to rely on professionally installed systems that are usually maintained by a family member.” Along with the senior citizens market, there are many other market segments out there that still desire worry-free professional installation. Installers should offer a range of products that includes some DIY products, and some leave-it-to-a-pro products Producing Complete And Custom Solutions Perhaps the best way for dealers and installers to stave off that feeling of doom that they might have about DIY is to tackle the problem head on and be creative. Offer a range of products that includes some DIY products, and some leave-it-to-a-pro products – consider the DIY product a great entry point for a more comprehensive system. Play up the peace of mind that comes with professional installations and support that pitch with flexible monitoring contracts and service plans. Share what you do and why; relay your passion for producing complete and custom solutions and communicate how you add value to any and every sale. No one, not even the most tech-savvy consumer, wants to install their own products if the end result is that the product doesn’t work the way it should. That’s where the pros can, should and will always come into play.
The extensive analysis and discussion preceding any decision to implement a new physical security solution – whether it’s hardware, software or a combination of both – often focuses on technology, ROI and effectiveness. When it comes to deciding what type of security entrances to install at your facility, you will almost certainly also consider the aesthetics of the product, along with throughput and, if you’re smart, you’ll also look into service concerns. Each of these factors has its important place within the evaluation process, and none should be overlooked as they all have a significant effect on how well your entrances will perform once they are installed. Culture Influences Door Solution Decisions How significant will the change from current entrances to security entrances be for employees? Still, one additional factor actually trumps everything: if you have not considered your organization’s culture in choosing a security entrance, you may be missing the most important piece of the puzzle. Culture is a part of every other decision factor when selecting an entry solution. Before you make a decision about what type of entrance to deploy, you need to consider and understand the values, environment and personality of your organization and personnel. For example, how significant will the change from current entrances to security entrances be for employees? If people are accustomed to simply walking through a standard swinging door with no access control, this will be a culture change. Beyond this, whether you are considering a type of turnstile, a security revolving door or possibly a mantrap portal, simply walking through it will be a significant change as well. Training Employees On Door Security You’ll want to know whether employees have ever used security entrances before. If these types of entrances are in place in another part of the facility, or in a facility they’ve worked in at an earlier time, the adjustment will not be as great as if they’ve never used them at all. Consider, too, how your personnel typically react to changes like this in the organization or at your facility. They may be quite adaptable, in which case there will be less work to do in advance to prepare them. However, the opposite may also be true, which will require you to take meaningful steps in order to achieve buy-in and train employees to properly use the new entrances. With the increased importance of workplace security, discussing new entrances with workforces will help maintain a safer environment Communicate Through The Decision-Making Process All of this will need to be communicated to your staff, of course. There are a number of ways to disseminate information without it appearing to come down as a dictate. Your personnel are a community, so news about changes should be shared rather than simply decreed. As part of this process, you’ll need to give some thought to the level of involvement you want for your staff in the decision-making process. Finally, do not overlook the special needs among your personnel population. You undoubtedly have older individuals on staff, as well as disabled persons and others who bring service animals to the office. Entrances need to be accessible to all, and you never want to be in the position of having a gap in accessibility pointed out to you by the individual who has been adversely affected. New Security Entrance Installation By communicating early and often with your personnel, you can alleviate a great deal of the anxiety Once you have made the decision about which security entrances to install, training your personnel on how to use the new security entrances – both before and after the installation – will help to smooth the transition. Because workplace security is such a big issue right now, it makes sense to discuss the new entrances in the context of helping to maintain a safer environment. They will prevent violent individuals from entering, decrease theft, and most of all, promote greater peace of mind during the workday. If you can help them take control of their own safety in a responsible way, you have achieved much more than just a compliant workforce. By communicating early and often with your personnel, you can alleviate a great deal of the anxiety and concern that surrounds a significant change in the work environment. Schedule Group Meetings Consider your employees; what type of communications do they respond best to? A few suggestions to educate staff on the benefits of the new entrances include: Typically, you would communicate a general message 2-3 months in advance and then provide more specific information (for example, impacts to fire egress, using certain entrances during construction) in a follow up message closer to the installation date. Schedule group meetings to: announce the rationale for increased security, share statistics on crime, review the new security changes that are coming, show drawings/photos of the new doors/turnstiles, and show the orientation videos available from the manufacturer. These meetings are an excellent way to work through user questions and directly address any concerns. Once the installation of a new security system is complete, it is a good idea to have an "ambassador" on board to help employees use these new systems Ensure You Monitor Public Areas If you are implementing a lot of new changes, such as a new access control system, new guard service and security entrances, you might consider hosting a ‘security fair’ on a given day and have the selected vendors come for a day with tabletop displays to meet employees and answer questions during their lunch. This could be a great way to break the ice in a large organization. Make user orientation videos (provided by the manufacturer) available in several ways, for example: Intranet Site Monitors in public areas—lounges, cafeteria, hallways, etc. Send to all staff as email attachments Immediately after installation, once the doors or turnstiles are operational but before they are put into service, train ‘ambassadors’ on how to use the door/turnstile. Have these people monitor and assist employees during peak traffic times. What Is The Ultimate Success Of The Installation? By communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction If you have thousands of employees, consider dividing them into groups and introduce the new entrance to one group at a time (Group A on Monday, Group B on Tuesday, etc.) to allow a little extra orientation time. Place user education ‘quick steps’ posters next to the door/turnstiles for a few weeks to help employees remember the basic steps and guidelines, e.g., ‘stand in front of the turnstile, swipe badge, wait for green light, proceed.’ Ask your manufacturer to provide these or artwork. While there are always going to be people who are resistant to change, by communicating clearly and openly with your population you can greatly facilitate adoption and satisfaction. Your responsiveness to any issues and complaints that arise during and after the implementation is equally fundamental to the ultimate success of the installation.
It’s not surprising that people are nervous about the security of newer technologies, many of which are part of the Internet of Things (IoT). While they offer greater efficiency and connectivity, some people still hesitate. After all, there seems to be a constant stream of news stories about multinational corporations being breached or hackers taking control of smart home devices. Both of these scenarios can feel personal. No one likes the idea of their data falling into criminal hands. And we especially don’t like the thought that someone can, even virtually, come into our private spaces. The reality, though, is that, when you choose the right technology and undertake the proper procedures, IoT devices are incredibly secure. That said, one of the spaces where we see continued confusion is around access control systems (ACS) that are deployed over networks, particularly in relation to mobile access, smartcards, and electronic locks. These technologies are often perceived as being less secure and therefore more vulnerable to attacks than older ACS systems or devices. In the interest of clearing up any confusion, it is important to provide good, reliable information. With this in mind, there are some myths out there about the security of ACS that need to be debunked. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter Myth #1: Mobile Credentials Are Not Secure The first myth we have to look at exists around mobile credentials. Mobile credentials allow cardholders to access secured doors and areas with their mobile devices. The fact that these devices communicate with an ACS via Bluetooth or Near Field Communication (NFC) leads to one of the main myths we encounter about the security of credentialed information. There is a persistent belief that Bluetooth is not secure. In particular, people seem to be concerned that using mobile credentials makes your organization more vulnerable to skimming attacks. While focusing on the medium of communication is an important consideration when an organization deploys a mobile credentialing system, the concerns about Bluetooth miss the mark. Bluetooth and NFC are simply channels over which information is transmitted. Believing that Bluetooth is not secure would be the same as suggesting that the internet is not secure. In both cases, the security of your communication depends on the technology, protocols, and safeguards we all have in place. So, instead of wondering about Bluetooth or NFC, users should be focused on the security of the devices themselves. Before deploying mobile credentials, ask your vendor (1) how the credential is generated, stored, and secured on the device, (2) how the device communicates with the reader, and (3) how the reader securely accesses the credential information. When you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS Myth #2: All Smartcards Are Equally Secure The question “how secure are my smartcards?” is a serious one. And the answer can depend on the generation of the cards themselves. For example, while older smartcards like MiFARE CLASSIC and HID iCLASS Classic offer better encryption than proxy cards and magstripe credentials, they have been compromised. Using these older technologies can make your organization vulnerable. As a result, when you deploy smartcard technology as part of your ACS, you should choose the latest generation, such as MiFARE DesFIRE EV1 or EV2 and HID iCLASS SEOS. In this way, you will be protecting your system as well as your buildings or facilities. Some traditional readers and controllers can also pose a serious risk to your organization if they use the Wiegand protocol, which offers no security. While you can upgrade to a more secure protocol like OSDP version 2, electronic locks are a very secure alternative worth considering. It is also important to understand that not all smartcard readers are compatible with all smartcard types. When they are not compatible, the built-in security designed to keep your system safe will not match up and you will essentially forego security as your smartcard-reader will not read the credentials at all. Instead, it will simply read the non-secure portion—the Card Serial Number (CSN) —of the smartcard that is accessible to everyone. While some manufacturers suggest that this is an advantage because their readers can work with any smartcard, the truth is that they are not reading from the secure part of the card, which can put your system and premises at risk. Using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication Myth #3: Electronic Locks Are More Vulnerable These days, there are still many who believe that electronic locks, especially wireless locks, are more vulnerable to cybercriminal activity as compared to traditional readers and controllers. The concern here is that electronic locks can allow cybercriminals to both access your network to get data and intercept commands from the gateway or nodes over the air that would allow them access to your buildings or facilities. The reality is that using electronic locks can help protect facilities and networks through various security protocols, including encryption and authentication. Additionally, because many of these locks remain operational regardless of network status, they provide real-time door monitoring. This means that many electronic locks not only prevent unauthorized access but also keep operators informed about their status at all times, even if a network goes down. Outdated technology and old analogue systems are more vulnerable to attacks When it comes to deploying electronic locks, it is important to remember that, like any device on your network, they must have built-in security features that will allow you to keep your information, people, and facilities safe. Be Prepared To Unlock Future Benefits Ultimately, the information in your IP-based ACS is at no greater risk than any other information being transmitted over the network. We just have to be smart about how we connect, transmit, and store our data. In the end, maintaining the status quo and refusing to move away from old technology is not a viable option. Outdated technology and old analogue systems are more vulnerable to attacks. The reason it is so important to debunk myths around ACS and, at the same time, get people thinking about network security in the right way is that network-based systems can offer an ever-increasing number of benefits. When we deploy new technology using industry best practices and purchase devices from trusted vendors, we put ourselves and our networks in the best possible position to take full advantage of all that our increasingly connected world has to offer.
So often, one’s focus in security and access control zeroes in on the hardware. Its latest functionality or compatibility with emerging technologies grabs the headlines. Yet it is the access control software which knits a system together — and the signs are, this is finally getting the attention it deserves in security procurement. Supported integrations “Today, access control software is more accessible to a wider variety of actors,” writes Bryan Montany, a research analyst at IHS Technology, “providing end-users with broader and more comprehensive data relating to patterns in building occupancy.” “Software has also supported integrations with other security systems, enabling security managers to respond in real time to emerging incidents and potential security breaches.” Software solutions In other words, one can escape the limiting functionality of outmoded access management with a new generation of software solutions. They can fix everyday access irritants and below are seven. Freedom from the access management terminal Multi-seat management should be a given. One’s intuitive, customized dashboard could have a personalized login screen configuration for every administrator. Software should offer flexible management options, including secure system administration from anywhere and multi-timezone capability options. An access management “terminal” should be tied to the person — not the other way around. Maximum flexibility, whatever the legacy system Access control software puts in the hard yards when it bends the existing system or setup to new needs. It can integrate across several databases, making workflows easier and less error prone. One may even wish to manage any existing mechanical locks from the same interface as the electronic or electromechanical locks. The right access control software handles that for the person. Tailored access for every site user and visitor Streamlining access rights management for staff, contractors and visitors can boost business efficiency. The access control software should filter access to specific locks according to the precise security needs of the site and users. For any system, one should be able to create individual schedules for key-holders, doors or audit trails. In a few clicks one can require users to revalidate keys regularly, making it safer to issue a contractor with time-limited access. Smarter, more effective building management Smart buildings need intelligent software. Is it known who uses which doors at the site, and when? Is one planning an office expansion and weighing up appropriate security for each type of room use? A properly configured software control panel should accurately track user movement around the site. It feeds back the data needed to make better business decisions. Saving security budgets with a Software as a Service (SaaS) option Ideally, one would want to spend the security budget on actually securing people and assets. In the real world, IT costs and contingency budgeting eat up much of it. When one runs access management software with a reliable SaaS provider, security infrastructure budgeting becomes more predictable. The data enjoys complete redundancy and is therefore more secure. And the company’s software is always, automatically up to date — critical for cyber security resilience. Mobile solutions for the modern mobile workforce Are mobile workers and contractors returning to base — or the nearest credential updater — to redefine or revalidate their access rights? Access control software can (and should) be mobile. So, instead of updaters, workers update credentials on the go, wherever they are, via an app and its encrypted Bluetooth connection. All business process software in one place Multiple systems create double or triple the work. Duplicating data entry increases the chance of errors. With access control powered by the CLIQ Web Manager, for example, one can integrate powerful access management features with the existing business process software. One hub for everything. Thanks to the CLIQ Web Manager’s open architecture, one can build a single interface to control all “live” workflows. Manage HR, support ticketing, financial reporting and more, alongside daily access control tasks like validating and revalidating credentials, cancelling lost keys and ordering automated audit trails for locks or users.
So many business processes are controlled, tracked, measured or monitored by software. So, it’s frustrating when multiple systems create double or triple the work. Unfortunately, not all of a user's software plays nice together. Web-enabled software for a CLIQ key-based access control system is an exception. No matter what the user’s business, the CLIQ Web Manager helps the user manage their access control quickly and efficiently. Now the user can also integrate their powerful access management features with their existing business process software. Thanks to the CLIQ Web Manager’s open architecture, the user can build a single interface to control everything. Key access control system CLIQ Web Manager will help the user streamline everyday operations, while also managing a CLIQ key access control system to its full potential. Integration works in two distinct ways. The user can plug the CLIQ Web Manager directly into an existing platform, making access control one node in their current control panel. There is an SDK, if they wish to add CLIQ Connect remote access control management to a company app. Time- and cost-saving measures are baked into every CLIQ Web Manager integration Alternatively, CLIQ Web Manager can be the hub for multiple business processes. The user manages HR, support ticketing, financial reporting and more alongside daily access control tasks like validating and revalidating credentials, cancelling lost keys and ordering automated audit trails for locks or users. With CLIQ Web Manager web services, the user can build a comprehensive, customized integration with their existing software to help the business operate more efficiently. Access control software Time- and cost-saving measures are baked into every CLIQ Web Manager integration. Cutting back data double-entry reduces database errors and minimizes tedious data entry. The user's internal workflows in security and beyond are streamlined when one interface enables them to answer multiple questions. Plus, they can customize integration functionality to suit their business. How best should the CLIQ Web Manager integrate with the user's existing software? CLIQ lets them choose. The user can save IT costs if they also select a CLIQ Web Manager Software as a Service (SaaS) package. Security infrastructure budgeting becomes more predictable. The user's data enjoys complete redundancy. And their company’s CLIQ software is always, automatically up to date — a bonus for cyber-security resilience. CLIQ Web Manager enables a wide range of controlled security workflows, including real-time access control management. Now it integrates easily with all kinds of business software, helping the user work smarter, too.
The stakes are higher when it comes to hospital security. Patients expect and deserve privacy and safety. Yet a hospital building or complex must remain a welcoming and supportive space, around the clock. Mechanical lock and key technology may be too passive for this modern healthcare environment, but that does not mean users should abandon the familiarity of keys altogether, because not all keys are created equal. Programmable electronic key systems Programmable electronic key systems put sophisticated access control into the form of a traditional key Programmable electronic key systems put the advantages of sophisticated access control into the form of a traditional key. They reinvent the key for the 21st century, making it more flexible, more powerful and better equipped to handle the security demands of a busy place. Lost keys and departed employees are no longer a problem, because their key’s access rights can be canceled with a click. And at multiple secure points around the hospital, the familiarity of a key is welcome to a user group who are not experts — at least, not in access control technology. CLIQ locking system Keys can be as smart as any card-based credential. For example, CLIQ technology from ASSA ABLOY backs up the familiarity and ease of use of key-based locking with the flexible management and real-time security features of an intelligent electronic access system. A CLIQ locking system consists of battery-powered, programmable keys; cable-free padlocks and cylinders that are easy to retrofit to almost any standard opening; and management software that can be run locally or via a secure cloud. For users, CLIQ means carrying a single, programmable key pre-loaded to unlock all authorized openings — not just doors, but also gates, alarm boxes, cabinets and lifts. Say goodbye to huge key rings. Programmable key solution For hospital security managers, a programmable key solution enables users to create personalized access schedules — even for temporary contractors — and collect audit trails for doors or keyholders automatically. Staff travels into, out of and through the hospital based on set rules and programmed into their keys. Many hospitals find CLIQ invaluable in managing access to medicines and other controlled substances. Nursing staff using older mechanical key systems struggle to keep track of who has the right keys. Searching for that person to gain access to drugs wastes precious time. Unauthorized access to drug stores can, of course, bring serious financial and safety implications. Medicine management with key-based access control Lock electronics are powered by the battery inside every key, so the retrofit was cable-free At Queen Elizabeth Hospital, Birmingham, pharmacy managers sought a better solution adapted to nurse-accessed medicine stores. They chose a PROTEC2 CLIQ system which combines mechanical disc cylinders with battery powered, programmable CLIQ keys. Lock electronics are powered by the battery inside every key, so the retrofit was cable-free. CLIQ devices secure doors, cabinets and mobile drug trolleys within the same access system. Security and pharmacy managers can see who opened every lock whenever they want — making medicine audits and incident investigation much easier. “Programmable key solutions can really boost medicine safety in hospitals,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA. “Nurses at Queen Elizabeth, Birmingham, carry their own key with personalized access rights, so they don’t waste time finding out who has the key to every cupboard. Patients benefit. A similar system trialed at Scunthorpe Hospital found the total wasted time eliminated would equate to having an additional 24 nurses on duty across the Trust every day,” Stephan Schulz adds. Key-based access control solution Key-based access solutions are equally comfortable at scale. At University Hospital Frankfurt 1,100 eCLIQ cylinders secure doors in a new building. A fully electronic implementation of CLIQ technology, eCLIQ cylinders and keys are easy for staff to use and for hospital security managers to administer from web-based software. The CLIQ Web Manager makes it easy to program, reprogram and audit every CLIQ key, cylinder or padlock. Because the interface is accessible from anywhere with an internet connection users can manage a CLIQ system whenever and from wherever they choose. Its architecture supports multiple administrators or sites. CLIQ Web Manager The Web Manager also integrates easily with all kinds of business management software, helping users automate tedious operations and processes. They can also make the Web Manager one element within an existing access control system. The Web Manager can run in a self-hosted IT environment or completely free of local software installation with two different Software as a Service (SaaS) solutions, Shared SaaS or Dedicated SaaS with hosting just for users and maintenance schedules set by them. With either option, the security software is always up-to-date — a major benefit in healthcare, where confidentiality makes cyber-attack resistance critical.
Related white papers
Mobile Access- What You Need To Know (Part 1)
The Role Of IT In Physical Access Control
Securing Student Accommodation For The Next Generation
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals
- ASSA ABLOY High Security & Safety Group Named As The Preferred Supplier For Hitachi’s IEP And ECOA Rail Projects
- Luminy Campus Upgrades To Real-Time Access Control With Integrated Aperio Locking Solution
- Aperio Retrofit-Ready Access Control Solution Chosen To Secure Luminy University’s Suburban Campus
- ASSA ABLOY Supplying Security And Safety Solutions To UK’s Railroad Industry