Exceptional solutions for key and portable item control electronic lockers and key cabinets
Key Cabinets C.Q.R.iT Key Cabinets are the ultimate in security and convenience. Completely automate the process of signing keys in and out. Decide exactly who gets access to what, when and for how long. AUTHORISATION The door is secured with a two-point locking system and only authorised users can unlock the door. CONTROL Each set of keys can be specifically controlled. Restrict access based on user, group, time or quantity. ACCESS Once the door is unlocked, users can only access the sets of keys they re allowed all others remain locked in place. ALARMS Alarms can be audible at the cabinet, send a notification to your smartphone and/or relay the signal to an existing alarm panel. INTEGRATION These cabinets manage your existing keys of any size and shape. They can also integrate with your other access control systems or alarm panels. REPORTING Every action is automatically recorded giving you real-time evidence of all activities, and instant access to accurate reports. For more information log on to our website AUTHENTICATION ACCESS ACCOUNTIBILITY ALARMS PIN PROX CARD FINGERPRINT FACIAL RECOGNITION TRANSACTION RECORDED Asset: Vehicle #3 Action: In use User: John Smith Date: 11/10/13 10:34am 5pm --- KEY NOT RETURNED
Lockers Available in any size, the C.Q.R.iT Lockers allow you to securely store and monitor any type of portable item. Control exactly which staff members or contractors can access your valuables. ASSET LOCKERS Asset Lockers are for your onsite items such as electronic devices, expensive tools or sensitive equipment. Only authorised users can open specific lockers, and every transaction is recorded. You can control how long each item is allowed out and install cabling to keep your devices charged. DEPOSIT LOCKERS Deposit Lockers are ideal for temporary use by staff members or contractors. Users are assigned a short-term locker to store their items, for example staff members who cannot enter a secure zone while holding a mobile phone. No one else can access their locker until the user returns. ALARMS Alarms such as door forced, item not returned and more can send email/sms notifications, or even relay the signal to existing an existing alarm panel. INTEGRATION Integrate with your access control system so staff can access lockers with existing prox cards. You can even prevent people from leaving the building if they haven t returned certain items. RFID This system uses RFID tracking to determine if items have been taken or returned. This provides maximum accountability and prevents items from being substituted. CUSTOM SIZES We can construct lockers to house any item - from small mobile phones and radios to larger briefcases and bulky tools. For more information log on to our website USER IDENTIFIED ITEM RESERVED ACTION RECORDED EXIT DENIED PIN PROX CARD FINGERPRINT FACIAL RECOGNITION TRANSACTION RECORDED Item: Laptop #1 Reserved: 9am-12pm Thurs User: Elizabeth Action: Taken - 10:34am RETURN LAPTOP
extreme Hard on the outside, clever on the inside - these cabinets are the strongest on the market. They contain all the great features of the C.Q.R.iT Key Cabinets, housed in a heavy-duty exterior. TAMPER RESISTANT The door is recessed 5mm behind the front face of the cabinet greatly eliminating the risk of unauthorised access. An internal cover plate extends the full height of the door, covering the locking mechanism to reduce tampering even by authorised personnel. Unlike other products, when the door is closed, it cannot be removed by removing hinge pins and all cable ports are covered by an internal baffle. SOLID CONSTRUCTION The door is secured with a three-point locking mechanism, two of which are vertically opposed. The external box formed from 1.6mm steel with a double returns at the edges reduces the risk of willful damage. FLEXIBILITY Not all applications will require security of this level. With the C.Q.R.iT family of products, you have the flexibility to install a C.Q.R.iT extreme in a public area or a high-security zone and use the regular cabinets and lockers in less risky areas. They all run off the same software to provide a streamlined solution for all your keys and items. FULLY INTEGRATED SOLUTION For more information log on to our website For ultimate security, integrate your systems with a High Level Interface (HLI). That means all of your C.Q.R.iT cabinets can be controlled through your existing access control system. REDUCED DATA ENTRY User data gets automatically transferred from your access control system to the cabinets. REDUCED STAFF TRAINING New and existing staff don t need to learn additional software. IMPROVED DATA ACCURACY Changes are automatically copied to all systems eliminating human error. ANTI-TAILGATING FEATURE Prevent users from leaving the site, or zone, without returning certain items first. CENTRALISED REPORTING All transactions from the C.Q.R.iT cabinets can be reviewed directly in the Third Party System giving a broader picture across your entire site.
ACCESSORIES PROX READERS C.Q.R.iT cabinets can integrate with almost any prox reader. FINGERPRINT SCANNERS To protect against PIN or card sharing, all cabinets can integrate with fingerprint scanners BREATHALYSERS Make sure your users are under the legal limit before they can can access vehicle keys. FACIAL RECOGNITION Be certain that the user at the cabinet is who they say they are. COLOURED KEY TAGS Colour code each bunch of keys for easy visual recognition. DYNAMITE BUTTON For use in emergencies, this button will release all keys. TAMPER PROOF CARD HOLDERS These allow you secure and manage prox cards as well as keys. KEY CONCEALER This hides the cut of important keys so they can t be copied. SECURE KEY RINGS These high security rings seal permanently into a continuous loop making it impossible to substitute keys without detection. Each key ring is engraved with a unique serial number for maximum accountability. DIAMETER 3cm 4cm 5cm 7cm 9cm CAPACITY 1-5 keys 5-10 keys 10-15 keys 15-25 keys 25-50 keys RFID Each compartment in the Asset Lockers has an RFID reader which gets paired to a particular device, meaning the system goes far beyond just controlling which doors open and close. It can actually detect if the correct item is in or out. RFID reader device removed RFID tag SPECS C.Q.R.iT offers a range of customised solutions. For weights, dimensions and software requirements, log on to our website and navigate to The Box > Specs
KEYSECURE SOFTWARE The KeySecure software is flexible and intuitive. It makes light work of even the most complex access control and monitoring. ALARMS Customisable alarms include: door forced, tamper detection, AC power out, key timer expired. EMAIL / SMS ALERTS Configure automatic emails or SMS giving you up-to-date information even if you re off site. TIMER Place timers on certain items and receive notifications if they haven t been returned. SAME USER RETURN Ensure that the user who removed an item is the one who returns it. MULTI CUSTODY For sensitive items, demand that more than one user is present to sign it out. MAX KEYS OUT Limit the number of items each user is allowed out at any one time. TIME ZONES Restricted the times that users may access items. E.g., Monday to Friday, 9am - 5pm. ENCRYPTED COMMUNICATION 256-bit AES encryption is used to communicate with the cabinets. FLEXIBLE ALLOCATION Single items or groups of items can be allocated to any number of individuals or groups of users. NETWORK + USB Fully integrated network capabilities (TCP/IP) as well as a USB port inside the door for remote sites. CUSTOMISATION Custom key configurations 1 2 3 8 Locker compartments can be any size and any configuration Cabinets can be any colour Transparent doors CIC TECHNOLOGY www.cictechnology.com sales@cictechnology.com C.Q.R.iT UK www.cqrit.co.uk sales@cqrit.co.uk C.Q.R.iT USA www.cqritusa.com sales@cqritusa.com