Exceptional solutions for key and portable item control. electronic lockers and key cabinets

Similar documents
Integrated Security Solutions

Net2 Access Control. Paxton Access

Net2. Total Access Control.

The Security Company. Expert in Security. On demand Solution. Total Security Solution Provider. High level of security. Products

EURO 46 APP. User Manual. Connect to your home or business from anywhere in the world. Software version 2.1 RINS1840-2

ARCHITECTURAL AND ENGINEERING SPECIFICATION

Advisor Advanced Mobile Application User Manual

Galaxy Flex V3. User Guide. Honeywell Security. This user manual is located at

Integrated Security Solutions

CV-350 TCP/IP Access Control System. System Overview

ezone Alert System ezone is a UK designed and manufactured care alerting system unlike any other comparably priced system.

SCR100 User Manual. Version:1.1 Date:Dec 2009

DVTEL DVR Interface. DigiOp DVR Interface

Virtual Boundary System Using Passive Infrared Sensor

Networked Access Control Panel. Installation Guide

Contents. 30 References

PRODUCT CATALOGUE. Cape Town 18 Darter Road Blue Water Estate Kommetjie. Gauteng 245 Louis Botha Avenue Orchards Johannesburg

TD flex is an award-winning tailgate detection solution that prevents unauthorized access at: Doors Mantraps Airlocks E-gates Turnstiles

Application Version: 2.0 and above Date Written: 03/09/2010. Copyrights , Global Security Devices, All Rights Reserved

EURO 46 V10 User Manual

ARCHITECTURAL DOOR HARDWARE KEY PADS & CARD READERS CATALOG

Physical and Environmental Security. CISSP Guide to Security Essentials Chapter 8

MyNice Welcome to your Nice World. The intelligent solution for the integrated management of the alarm system and of the home s automations.

DATA SHEET ESS-ACS WE INDENTIFY SECURE AND INTEGRATE. IRIZ ID TECHNOLOGIES

EasiTag. Access Control System. System Overview. Features & Benefits Ideal for: DDA Features: Benefits of Vandal Resistant Lexan Reader:

SILENCING AN ALARM When the alarm bell or siren is sounding, enter your user code or present your SecuraProx fob to your keypad.

Access Control Solutions

Fike Safety y Technology Ltd

Complete solutions for commercial security. Verex delivers leading intrusion, access and video products to protect today s companies

Access Control (card access)

User Guide. Contents. About this guide. i-on Style Security System

Access CONTROL. MANAGEMENT Software

Affordable wireless monitoring without compromise

IPTS Group A New Breed of Integration

ACCESS CONTROL A SAFE ENVIRONMENT THROUGH SECURED ACCESS

Building Automation Systems from Grantek: Going Beyond Compliance to Improve Operations

intercall innovative care systems

HFR100. HFR Alarm Range HFR100. Fire Alarm. HFR600 Wireless Fire/First Aid Alert System. Fire Call Points. Fire Alarm. Features & benefits

G SERIES: Security INTEGRATION as you want it. Greater expansion, communication, video integration, system resilience, and automation.

UBC Technical Guidelines Section Edition Access Control Page 1 of 5


FIRE SOLUTIONS >> FIRE EXTINGUISHERS DRY POWDER WATER CARBON DIOXIDE FOAM FEATURES

Web Services are based on Apache and Tomcat servers. The html/jsp (tags, beans) are fully customisable and extendable.

SYSTEMS THINKING AND TROUBLESHOOTING

OpenDevice Events Guide

Input Type: 42: Medical: This is a 24 Hr type input it will activate the external sounder and report a CID event 100.

Bewator Entro. The user-friendly, networkable access control system

Affordable wireless monitoring without compromise

In installation with more doors, up to 64 central units can be used together, allowing installations of up to 2,048 doors. RECEPTION CAR PARK

Hi-O Technology. Bringing Network Intelligence to the Door. Hes HID NORTON Sargent Securitron 1

ELT-KLED EliteSuite LED Keypad Installation Manual

Contents. Best Trusted and Rated Quality Products. PX-1 Stand-Alone Smoke Alarm. PX-1C Radiolink Smoke Alarm. PX-AR Alarm Relay

Monitoring Solutions

Contents. Most Trusted and Best Rated Quality Products. PX-1 Stand-Alone Smoke Alarm. PX-1C Radiolink Smoke Alarm.

CONTACT ID REPORT CODES

OJD ITB No Attachment E Duress Alarm Equipment Specifications

Synergis Master Controller 2.2 Integration Guide for Assa Abloy Aperio- Enabled Locks

Security Solutions From The Masters In Electronic Security Systems

STORE FIXTURE HIGHLIGHTS.

SMART LOCKS FOR HOTEL DOORS. Open, Close, Live

It s time to change! Follow me and discover SMARTair for flexible access control

ACCESS THE WORLD OF KNOX Product Catalog

Security Considerations for Secure Workplaces

C2 Compact Range Installation & Programming Manual

ASSA ABLOY Hospitality Mobile Access

Controllers. Centralization of Access Control Devices Made Easy. Installer Guide

BT SECURITY SECURITY: BEST PRACTICE GUIDE FOR NON-BT PEOPLE

Enhanced FOUNDATION Fieldbus Physical Layer Diagnostics with the DeltaV System

Wireless Alarm System Extended User Guide. Alarm Panel Time 10:09 c

Any additional devices linked to the system ET08 (computer, sensors, relays etc.) must be approved by LST EN standard.

F8 Fingerprint &RFID card Access Control system

SMARTair Proximity access control

X.90 Access Control System

Access Control, Code Lock

Version 1.03 January-2002 USER S MANUAL

Instructions manual. By-alarm. By-alarm Manager software

A Beginners Guide to Inner Range Systems

Samsung SDS BMS Ver.2.0. Technical Specification

Patriot Systems Limited

TrueCom. Building Communications Systems 5115-Series , Area of Rescue Communications System. Description

Thank you for choosing the CompX elock refrigerator kit. Quick Programming Guide

ASSA ABLOY Hospitality Mobile Access

IRIS Touch Quick Installation & Maintenance Guide. Version 1.0

Security and Home Control. Your Gateway to a Smarter Home. Life in tune.

Why Should You Invest In An Access Management System?

Aperio Technology Wireless access control - The evolution starts here

HEIGHTS KEY LOCK & SAFE 920 San Mateo NE Albuquerque, NM Contact us for more information

Mine Automation Technologies. know-how performance reliability

It s time to change! Follow me and discover SMARTair for flexible access control

Aviation Solutions. Why Tyco for airports? Our systems help protect over 110 airports. Secures over 80% of UK Airports and more than 60 US Airports

Edited by Foxit PDF Editor Copyright (c) by Foxit Software Comp. Programmable digital room thermostat. NEW software! Operating Instructions

Integration Test Plan

ADPRO. Integrated Security and Surveillance Solutions. Intelligent - Flexible - Reliable

1. Introduction. 2. Product overview

Introduction. deliver benefits. proficient & reliable partner. A Technological Company Netsoft Group.

The system should also be capable of recording events automatically on any compatible DVR and should be able to retrieve recordings based on events.

To activate the Net2 alarm integration software the correct check box must be ticked on the features tab in the Net2 server configuration utility.

Сontrol panel Contact GSM-9N

Messenger Wireless Lock Access Network

Paradox Integration Module Settings Guide

Transcription:

Exceptional solutions for key and portable item control electronic lockers and key cabinets

Key Cabinets C.Q.R.iT Key Cabinets are the ultimate in security and convenience. Completely automate the process of signing keys in and out. Decide exactly who gets access to what, when and for how long. AUTHORISATION The door is secured with a two-point locking system and only authorised users can unlock the door. CONTROL Each set of keys can be specifically controlled. Restrict access based on user, group, time or quantity. ACCESS Once the door is unlocked, users can only access the sets of keys they re allowed all others remain locked in place. ALARMS Alarms can be audible at the cabinet, send a notification to your smartphone and/or relay the signal to an existing alarm panel. INTEGRATION These cabinets manage your existing keys of any size and shape. They can also integrate with your other access control systems or alarm panels. REPORTING Every action is automatically recorded giving you real-time evidence of all activities, and instant access to accurate reports. For more information log on to our website AUTHENTICATION ACCESS ACCOUNTIBILITY ALARMS PIN PROX CARD FINGERPRINT FACIAL RECOGNITION TRANSACTION RECORDED Asset: Vehicle #3 Action: In use User: John Smith Date: 11/10/13 10:34am 5pm --- KEY NOT RETURNED

Lockers Available in any size, the C.Q.R.iT Lockers allow you to securely store and monitor any type of portable item. Control exactly which staff members or contractors can access your valuables. ASSET LOCKERS Asset Lockers are for your onsite items such as electronic devices, expensive tools or sensitive equipment. Only authorised users can open specific lockers, and every transaction is recorded. You can control how long each item is allowed out and install cabling to keep your devices charged. DEPOSIT LOCKERS Deposit Lockers are ideal for temporary use by staff members or contractors. Users are assigned a short-term locker to store their items, for example staff members who cannot enter a secure zone while holding a mobile phone. No one else can access their locker until the user returns. ALARMS Alarms such as door forced, item not returned and more can send email/sms notifications, or even relay the signal to existing an existing alarm panel. INTEGRATION Integrate with your access control system so staff can access lockers with existing prox cards. You can even prevent people from leaving the building if they haven t returned certain items. RFID This system uses RFID tracking to determine if items have been taken or returned. This provides maximum accountability and prevents items from being substituted. CUSTOM SIZES We can construct lockers to house any item - from small mobile phones and radios to larger briefcases and bulky tools. For more information log on to our website USER IDENTIFIED ITEM RESERVED ACTION RECORDED EXIT DENIED PIN PROX CARD FINGERPRINT FACIAL RECOGNITION TRANSACTION RECORDED Item: Laptop #1 Reserved: 9am-12pm Thurs User: Elizabeth Action: Taken - 10:34am RETURN LAPTOP

extreme Hard on the outside, clever on the inside - these cabinets are the strongest on the market. They contain all the great features of the C.Q.R.iT Key Cabinets, housed in a heavy-duty exterior. TAMPER RESISTANT The door is recessed 5mm behind the front face of the cabinet greatly eliminating the risk of unauthorised access. An internal cover plate extends the full height of the door, covering the locking mechanism to reduce tampering even by authorised personnel. Unlike other products, when the door is closed, it cannot be removed by removing hinge pins and all cable ports are covered by an internal baffle. SOLID CONSTRUCTION The door is secured with a three-point locking mechanism, two of which are vertically opposed. The external box formed from 1.6mm steel with a double returns at the edges reduces the risk of willful damage. FLEXIBILITY Not all applications will require security of this level. With the C.Q.R.iT family of products, you have the flexibility to install a C.Q.R.iT extreme in a public area or a high-security zone and use the regular cabinets and lockers in less risky areas. They all run off the same software to provide a streamlined solution for all your keys and items. FULLY INTEGRATED SOLUTION For more information log on to our website For ultimate security, integrate your systems with a High Level Interface (HLI). That means all of your C.Q.R.iT cabinets can be controlled through your existing access control system. REDUCED DATA ENTRY User data gets automatically transferred from your access control system to the cabinets. REDUCED STAFF TRAINING New and existing staff don t need to learn additional software. IMPROVED DATA ACCURACY Changes are automatically copied to all systems eliminating human error. ANTI-TAILGATING FEATURE Prevent users from leaving the site, or zone, without returning certain items first. CENTRALISED REPORTING All transactions from the C.Q.R.iT cabinets can be reviewed directly in the Third Party System giving a broader picture across your entire site.

ACCESSORIES PROX READERS C.Q.R.iT cabinets can integrate with almost any prox reader. FINGERPRINT SCANNERS To protect against PIN or card sharing, all cabinets can integrate with fingerprint scanners BREATHALYSERS Make sure your users are under the legal limit before they can can access vehicle keys. FACIAL RECOGNITION Be certain that the user at the cabinet is who they say they are. COLOURED KEY TAGS Colour code each bunch of keys for easy visual recognition. DYNAMITE BUTTON For use in emergencies, this button will release all keys. TAMPER PROOF CARD HOLDERS These allow you secure and manage prox cards as well as keys. KEY CONCEALER This hides the cut of important keys so they can t be copied. SECURE KEY RINGS These high security rings seal permanently into a continuous loop making it impossible to substitute keys without detection. Each key ring is engraved with a unique serial number for maximum accountability. DIAMETER 3cm 4cm 5cm 7cm 9cm CAPACITY 1-5 keys 5-10 keys 10-15 keys 15-25 keys 25-50 keys RFID Each compartment in the Asset Lockers has an RFID reader which gets paired to a particular device, meaning the system goes far beyond just controlling which doors open and close. It can actually detect if the correct item is in or out. RFID reader device removed RFID tag SPECS C.Q.R.iT offers a range of customised solutions. For weights, dimensions and software requirements, log on to our website and navigate to The Box > Specs

KEYSECURE SOFTWARE The KeySecure software is flexible and intuitive. It makes light work of even the most complex access control and monitoring. ALARMS Customisable alarms include: door forced, tamper detection, AC power out, key timer expired. EMAIL / SMS ALERTS Configure automatic emails or SMS giving you up-to-date information even if you re off site. TIMER Place timers on certain items and receive notifications if they haven t been returned. SAME USER RETURN Ensure that the user who removed an item is the one who returns it. MULTI CUSTODY For sensitive items, demand that more than one user is present to sign it out. MAX KEYS OUT Limit the number of items each user is allowed out at any one time. TIME ZONES Restricted the times that users may access items. E.g., Monday to Friday, 9am - 5pm. ENCRYPTED COMMUNICATION 256-bit AES encryption is used to communicate with the cabinets. FLEXIBLE ALLOCATION Single items or groups of items can be allocated to any number of individuals or groups of users. NETWORK + USB Fully integrated network capabilities (TCP/IP) as well as a USB port inside the door for remote sites. CUSTOMISATION Custom key configurations 1 2 3 8 Locker compartments can be any size and any configuration Cabinets can be any colour Transparent doors CIC TECHNOLOGY www.cictechnology.com sales@cictechnology.com C.Q.R.iT UK www.cqrit.co.uk sales@cqrit.co.uk C.Q.R.iT USA www.cqritusa.com sales@cqritusa.com