Videx offers a wide variety of high security locks and padlocks for the water utility industry. CyberLock electromechanical lock cylinders and smart keys record access details, of who opened, or attempted to open, every lock, providing critical information when investigating a security breach. In addition, CyberLock enables users to instantly add or delete electronic keys. This eliminates exposure due to lost or stolen keys, and also allows users to assign customized access privileges based on time, date, and authority level.

“CyberLock cylinders and padlocks perform extremely well in wet, corrosive environments; this allows our customers in the distribution industry to secure critical infrastructure at all times,” says James McGowan, V.P. of Sales & Marketing at Videx. “And best of all, with the auditing features provided by both the lock and the key, our customers know who accessed what lock and when.”

CyberLock cylinders are designed to operate in a wide variety of applications where high security is required, such as entry gates, chemical feed areas, watersheds, water wells, and other water sources. The system’s electronic keys cannot be duplicated or copied, and can be deactivated if lost or stolen, reducing the risk of unauthorized entry.

Download PDF version Download PDF version

In case you missed it

How Can The Security Industry Contribute To Protecting The Environment?
How Can The Security Industry Contribute To Protecting The Environment?

When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security sy...

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...