The ONLY
access control system that stretches from your front door to a shipping container in the Indian Ocean Introducing the next generation in access control that secures, controls and audits all assets, from the front door to assets in remote locations www.ekasecurity.com.au
PAGE 2
Introducing
access control the next generation in
that secures, controls and audits all assets, from the front door to assets in remote locations Securing the office door with current access control technology is easy. But swipe cards aren’t practical for controlling access to remote assets, like sub-stations, data centres or vending machines. They can’t lock down mobile assets, such as containers or laptops. And if you want to use them to secure unusual but important things like drug safes or gates, forget it. Either the cost is prohibitive or it’s impossible to run the wiring. Master-key systems offer a lock for just about anything, but no control over access. Auditing who’s been where is nearly impossible. And if you lose a key you either re-key the system (expensive!) or live with compromised security. EKA finally breaks this either/or choice. EKA couples the master-key ability to put a lock on anything with the tight and trackable access control characteristics of swipe card systems. What’s more, EKA retrofits into any existing cylinder lock and integrates any existing access control system. That’s why EKA truly is the next generation in access control — able to secure, control and audit any asset from the door, to remote or mobile assets.
PAGE 3
for any industry or sector
The preferred access control
that needs to secure, control and audit assets beyond the door
EKA’s next-gen access control technology is the cutting edge security solution for any industry or sector that needs a sure way to secure, control and audit assets beyond the door.
PAGE 4
Telcos and data centres. EKA can be used to secure access to communication pits and cages.
Utilities. Large utilities like water boards can secure facilities like power plants, sub-stations, equipment and storage.
Local government. Local government assets ranging from offices and halls, to depots, parking meters, barriers and park toilets can all be easily secured with EKA.
Transport and logistics. Containers, yards, warehouses, depots and even gates can be secured using EKA.
Airports. EKA will secure access to hangers, gates, server rooms and restricted access areas.
Hospitals and pharmaceutical. Drug safes and pharmacy labs are normally hard to lock down. EKA makes securing them a breeze.
Mining and construction. Stop wondering who has access to plant equipment, vehicles and explosives. EKA secures and tracks it all for you.
Education and office. EKA can be used to secure access to utility doors with padlocks, cash tins, access panels, air conditioning or display units, light boxes and even roller doors.
PAGE 5
Whether it’s a cage, a cupboard, a case, a container, a cash bag or a gate, if you can put a lock on it, EKA can secure and control it.
PAGE 6
eight
unique reasons why EKA is the better access control
1
2
One software platform. EKA bridges existing hardwired and key-centric security solutions and can secure, control and audit access to both types.
Works beyond the door. Whether it’s a cage, a cupboard, a case, a container, a cash bag or a gate, if you can put a lock on it, EKA can secure and control it.
3
No expensive and disruptive cabling. Traditional access control systems need extensive hardwiring. The only thing EKA replaces is the lock cylinder.
4
Stays up when the power is down. If the power goes down, hardwired access control systems fail. EKA locks are powered-up as required by the CyberLock key your people carry for access.
5
More cost effective. EKA delivers every advantage of an access control system at a cost per door (lock) that’s comparable with a master key system.
6
Audit access to any asset. You can access audit trails even for mobile and remote assets and see exactly who’s been in and out, as well as who’s tried and been denied.
7
Deploys twice as fast. Current access control technology is slow to install and deploy. Even in large organisations with thousands of assets to secure, EKA can be fully installed and running in just a couple of weeks.
8
A single key opens any lock. As long as they have access privileges, your people can access any asset using just one key. PAGE 7
action EKA IN
Migrating to an EKA access control system is simple, and can be accomplished in just a matter of weeks even for the largest and most diverse government organisation or blue-chip corporation. What’s more, operation is simple, efficient and transparent. Here’s how it works.
PAGE 8
1
Identify
Identify the assets you need to secure. Replace all mechanical locks with EKA CyberLocks.
6
expand
Expand. The EKA remote access system is easily expandable. New locks can be added quickly and costeffectively. Moreover the reach of the system is not limited by geography and you can cover locations in separate states or even countries.
2
Initiate
Initiate and hand out CyberKeys. Each key is preprogrammed with a unique, updatable list of assets the keyholder may open.
5
Monitor & Report
Monitor and report system integrity. Access monitoring occurs through EKA’s software and can generate customised automatic email reports of suspicious activity.
3
Discard
Discard all old keys. Now each staff member, tradie, security staff needs carry only a single CyberKey to open any lock they have privileges for.
4
Assign
Assign CyberKey access privileges as required. Facility managers can activate and deactivate individual keys, and even set up missions that give time-limited access rights to certain facilities or assets.
PAGE 9
PAGE 10
compares How EKA
to other remote access systems
Feature
Mechanical key
Access control
EKA
Low upfront cost
•
•
Expand as you grow
•
•
Secure beyond door
•
•
Low impact install
•
•
No power issues
•
•
No keyway
•
•
No key duplication
•
•
Set access permissions
•
•
Audit trails
•
•
Secure remote facilities
•
One software platform Secure mobile assets
• •
•
•
PAGE 11
PAGE 12
one control Many locks;
interface Until now, if you installed different types of locking systems you had no choice except to operate and manage them independently. Sitting side-by-side, the result is more expense, more operational work for facility and asset managers, and more opportunities for security breaches.
EKA solves this through a system that can deliver single, unified access control. Through a hub called Flex, EKA is able to integrate with and manage any other access control system that uses a Weigand — compatible input device-from RFID, to electronic swipe and HID, Maglocks, electronic strikes, and even bio-metric devices.
PAGE 13
5 Security for Power and other main controls
3 Access Control security for locks on the move 4 EKA CyberKey authoriser
One key for many locks: indoors, outdoors, mobile and remote! Only EKA/Flex is needed to:
1
Initiate access privileges
2
Revoke access privileges
3
Monitor access and trigger alarms
1 Perimeter security PAGE 14
4
Generate audit reports
15 Power meter box lock
16 Weatherised vault
10 EKA CyberKey vault 6 Restricted access for high-value storage areas
11 Filing cabinet cylinder locks
13 Server room door cylinder lock
14 Server cabinet cylinder locks
9 Security vault lock
8 Office door cylinder lock
7 wiegand-compatible device integration 12 Storage door cylinder lock 15 Power meter box lock
2 RFID lock at the front door
PAGE 15
EKA can secure every lock in an entire facility. 1
2
3
4
Perimeter security
RFID lock at the front door
Access Control security for locks on the move
EKA CyberKey authoriser
EKA can be installed into any gate lock or padlock in even the most remote facilities.
An EKA Flex hub integrates with any Wiegand-compatible devices, such as RFID readers or swipe cards, for a more effective and comprehensive single access control system.
It doesn’t matter how geographically distributed your operations are, EKA locks any container or truck anywhere, and keeps your goods safe in-transit, even from one side of the world to the other!
Easy install keypad authoriser means staff or contractors can obtain a CyberKey with limited access privileges using a registered and fullytrackable code.
9
10
11
12
Security vault lock
EKA CyberKey vault
Filing cabinet cylinder locks
Storage door cylinder lock
Restrict and monitor access to small safes used for petty cash or other valuables.
A secure key repository for up to 20 keys. It’s possible to establish rules that some — or all — staff return keys to the vault before leaving for the day.
Properly secure items previously too expensive or impossible to secure with access control, such as filing cabinets. Use the EKA system to give access to just a few people, one person, or to every member of staff.
Storage access can be made as open or restricted as you like.
inside and out. Here are some examples. 5
6
7
8
Security for Power and other main controls
Restricted access for high-value storage areas
wiegand-compatible device integration
Office door cylinder lock
Control and monitor access to the lights, power and other important controls.
EKA makes it simple to secure, restrict and monitor access to cages and other restricted areas storing highvalue goods.
The Flex hub also integrates biometric fingerprint readers under EKA’s single access control system. In fact, as long as the device is wiegand-compatible, it can be hooked up to the EKA Flex system for a unified access control system.
Allow access to certain people (cleaners) during certain times.
13
14
15
16
Server room door cylinder lock
Server cabinet cylinder locks
Power meter box lock
Weatherised vault
Restrict access and comprehensively track entry to key business operational facilities such as server rooms.
EKA even enables individual control over who has access to which server cabinets.
Restrict and monitor access to power meters, communication pits and the like.
Set-up a system for emergency or one-off access. A pin code is needed to obtain the key in the weatherproof vault. Perfect for emergency services or one-off contractors requiring access.
science of EKA the
At its core, an EKA installation comprises four elements: the CyberLock cylinders, the CyberKey, key authorisation communicators and the EKA software itself.
PAGE 18
EKA cylinder
EKA CyberKey
EKA cylinders are the exact dimensions of the normal lock cylinders they replace. The absence of a conventional keyway means it is not vulnerable to being picked. As the EKA cylinder needs no power or wiring it’s ideal for remote and mobile assets.
Each EKA CyberKey contains a battery and the individual’s access privileges. This powers all the electronics and operates the lock. For example the key can be programmed to allow access from 8am to 6pm on weekdays and 10am to 4pm Sundays. It can even be programmed to expire so it cannot function until reactivated.
Access privileges are distributed through communicators linked to your EKA software via network or internet. When validating keys, the system downloads the key’s stored data for audit. It then uploads any new access privileges. EKA access privileges can be programmed to expire. This forces users to update keys regularly.
When an EKA CyberKey meets an EKA lock, an instant information exchange determines whether the key has access to that specific lock. Whether access is granted or denied, the time of the event and the unique ID of the key used is stored in both the lock and the key.
Centralised, web based software allows facility managers to assign keys, set access permissions and expiry times. They can also create access groups and schedules, and activate new EKA locks. It also enables auditing and tracking through reports and automatic notification of suspicious activities. PAGE 19
PAGE 20
Advanced monitoring and reporting
EKA’s server-based modular software system is capable of handling complex and numerous geographically remote installations of as many as 15,000 keys and 15,000 locks. A hierarchy of administrators allows individual managers responsibility for only the locks and the people in their area. It even manages assets across countries and time zones. An intuitive point-and-click, browser-based interface that uses drop-down information boxes is all that’s needed to access the modules that drive EKA’s access control, monitoring and reporting capabilities. EKA software features Detailed audit trail Set two, three or four-way access Denied access email alerts Hierarchy of administrators Remote key initiation via Android & Blackberry Key scheduling and expiry Set delayed access Set group access permissions Multiple time zone management Monitors and controls third-party systems
Key and custom modules Location graphics. Create a graphical interface of your office that allows you to place the location of CyberLocks and Communicators for improved tracking and auditing. Door & Input / Output Support. Through Flex, manage access to Wiegand-compatible thirdparty systems such as swipe cards, RFID and biometric readers. Doors can also be set to unlock and relock at certain times and alarms can be triggered if a door is forced or left open. Locks. See all locks and individually set access and reporting characteristics. Options include: delayed access, access only with a number of keys and email notification of denied access. People and keys. Allocate individual keys to users. Set days and times they have access to certain locks, how soon the key’s access permissions expire and even revoke a lost key. Schedules. Set schedules of who can go where at what time. This can be as specific as a few minutes at a certain time on one or two days of each week. Reports. Audit trails can be used to generate tailored reports that tell you who has been where and when. Anything from specific people to user-defined groups such as: contractors, cleaners, security staff, weekend users. PAGE 21
Simple, instant key activation
Communicators underpin the flexibility of EKA. A network of communicators (each communicator can be given an IP address) allows users to validate their CyberKeys without returning to where the EKA software is hosted, instantly downloading audit trail data and receiving updated access permissions. Communicators are also designed to recharge rechargeable CyberKeys. Communicators are so versatile that they can be mounted almost anywhere, maximising ability to control access to even the remotest assets.
PAGE 22
Seven communicators for any situation or facility
Single-key vault cabinet. Remote locations such as maintenance sheds often have many people areas requiring access. By allocating a PIN access code or swipe card to each user, one key is shared among many users, yet every user’s access history can be individually audited.
Mini keyport. This smaller version of the authoriser can be employed when the additional security of keypad and PIN codes are not required.
20-key vault cabinet. Ideal for large offices, this intelligent key cabinet stores keys in an inactive state. A swipe or PIN code is required to activate a key, and when staff return keys they are deactivated until they are next retrieved.
USB station. In a smaller office, when your EKA software might only sit on a desktop, a simple USB station port is a cost-effective way to authorise keys.
Authoriser keypad. An authoriser keypad is a durable, weather-proof unit that is fitted to the exterior of a building or facility. Users present their key to the authoriser and enter a PIN code to obtain permission privileges.
Web station. Web stations multi-point access and updating via cat-5 are ideal for larger, network server systems.
IR encoder. This compact USB dongle connects to any CyberKeys via infra-red connection. It’s ideal for remote and mobile workers.
PAGE 23
PAGE 24
One key for every lock
The EKA CyberKey is an electronic, programmable smart key that cannot be duplicated. Via a communicator, each key can be programmed with the permissions for every system lock a key holder is allowed to access: what locks the key can open, as well as the days and times each lock can be opened. In this way, each user only needs one key to access any lock in a system, whether it’s a major entry door, or an obscure and remote cabinet padlock. Because it’s electronic, permissions can be revoked. Administrators can set key expirations to occur regularly (daily, weekly or more often) and can also do this on an ad-hoc basis when keys are lost. The EKA CyberKey Standard, rechargeable and Bluetooth versions available Permanent memory holds access events, even if battery fails Made from impact-resistant nylon for high durability Cannot be duplicated Can be set to expire Water-resistant, coated electronics Sacrificial brass tip prevents wearing of lock Brass tip easily replaced in the field Will not function once expired Can be programmed for one lock, or many locks
Each EKA key contains four levels of intelligence: encrypted access codes to ensure the key is from the same installation; the unique ID number of the key; access privileges for the user of the key; and storage of up to the last 3,900 events, both entries and denied entries. The unique exchange of encrypted access codes between the lock and key gives a high degree of key integrity. The encrypted codes ensure keys from other systems cannot work in your system.
Three types of CyberKeys
1
Standard Cyberkey. A standard lithium three-volt battery can provide between 3,000 and 5,000 lock openings.
2
Rechargeable CyberKey. A rechargeable lithium-ion battery can provide around 500 openings before needing to be recharged on a recharging station.
3
Bluetooth CyberKey. A bluetooth-connectable for remote and mobile users. PAGE 25
for any asset
A CyberLock
CyberLocks are the exact dimensions of the mechanical cylinders they replace. They retrofit into the lock hardware with the ease of a mechanical cylinder, and do not change how the lock operates.
PAGE 26
More than 300 existing CyberLock designs enable it to be installed in an enormous variety of interior and exterior doors, padlocks, containers and cabinets. There’s no wiring and no battery. All power is provided by the CyberKey: when a key comes in contact with the cylinder, it powers up the lock’s circuitry so key and lock communicate. If the key is not on the lost key list and the permissions are correct, the lock will open. The circuitry stores four types of information: encrypted codes that ensure only keys within the system work with the lock; the unique ID number of the CyberLock; a record of the last 1,100 entries; and a list of lost keys to eliminate access by any key that is missing or lost. CyberLocks offer superior physical security. They have no conventional keyway that is vulnerable to being picked plus a tamper plug prevents the lock from opening if the front of the cylinder is struck. Moreover, if torque is applied to cylinder, the front part separates from the back half. The back half of the cylinder expands, causing a brake effect that engages the sides of the cylinder’s case, stopping the rotation and leaving the cylinder in the locked position.
Why the CyberLock is superior • Retrofits any mechanical lock
• No keyway to pick
• No wiring, no battery
• Torque brake and tamper plug
• Potted circuits protected against dust, water, salt & air
• Withstands to 300,000 volts and 18,000 gauss
• Lost key list prevents unauthorised access
• Records authorised and denied access
PAGE 27
case study
mary mackillop College Challenge In 2007, Mary MacKillop College was about to begin new construction. The college already had 60 classrooms in a large open area, each with two individual access points. Controlling access was already difficult. Different locks meant two separate keys for each classroom. OH&S rules meant both keys were required in case of an emergency. Keen to improve security, MMC investigated several keying systems.
PAGE 28
“The systems were often more economical, but did not provide the flexibility our site required.”
Solution MMC was immediately convinced EKA was the way to go. “Over the years we have had problems with the misplacement of keys by contractors, staff and teachers. EKA totally resolved this issue, because if a key is misplaced it would now be simply disabled online.”
MMC primarily chose EKA because of its easy installation, and the flexibility to centrally control access to each individual area. “This keying system allows us to adjust access for teachers to the classroom remotely, utilising their own individual key. Overall we are extremely happy with the ease of installation, the end result, as well as the exceptional service we have received from EKA.”
Ave Maria College Challenge Ave Maria College was using a fairly modern restricted master key system. Yet there were constant key management concerns and challenges. Different users required multiple keys, leading to a situation where it was easiest to just give everyone a master key!
Solution College Business Manager, Allan Thompson, researched solutions
to provide better key management. They chose EKA. Ave Maria College decided to roll-out EKA in small, easy-tomanage sections to meet budget requirements and ensure a smooth transition. The staged installation occurred in three sections: the library as a trial site; all external doors; all internal doors. A remote Key Validation Point was installed at
the completion of the second stage in a central location so staff could update their access profile without visiting the Property Manager’s office. EKA has given Ave Maria the flexibility to design specific access levels for the different users of the college. The tailored access, coupled with the instant ability to delete lost keys, has vastly improved security.
case study
case study
GWM Water PAGE 30
Challenge
Solution
Water treatment facilities are uniquely difficult to secure. These facilities have such a diverse array of access control requirements — main entrances, storage areas, office doors, gates, computer cabinets, padlocks and restricted chemical areas — that a very flexible system is needed.
GWM chose EKA for its versatility, superior security features and ease of installation. Now each employee needs only one key to access any GWM lock they’ve been assigned access privileges. Security has improved as lost or stolen keys are now easily blocked.
Since GWM installed EKA at their water treatment plants, they’ve gone on to roll-out the system through their entire infrastructure. EKA locks now secure the entire Wimmera Mallee Pipeline system — facilities that span 250,000 square kilometres — while hundreds of locks are being installed in pump stations, switchboards, wastewater treatment plants and depot facilities.
new zealand post Challenge
Solution
Subcontractor clearance agents are required to collect the mail from New Zealand Post’s network of street receiver boxes during scheduled hours, multiple times a week.
New Zealand Post began looking for a system that would allow them to monitor the service performance of the subcontractors in clearing mail from their street receiver boxes.
New Zealand Post had no way to determine when mail had been collected. Security was also a concern. Each route includes 20 to 30 street boxes and sometimes clearance agents service multiple routes. If a key was lost, all the locks in that series of street boxes had to be re-keyed at great expense. Also, the time required to re-key the boxes put customer mail at serious risk.
“We selected CyberLock because it was cost-effective and met our requirements in terms of measurability and auditing”. New Zealand Post implemented a successful four month trial of the system in Wellington. Following the trial they converted 3,500 of their street receiver boxes to CyberLock electronic locks.
“Enterprise software allows us to perform audits over the network and manage the performance of our subcontractors, even at remote collection sites. Also, we can disable a key relatively quickly, should one be lost. Enterprise provides daily reports of box clearance times and exceptions such as attempted access to a box outside the scheduled collection time.” “The CyberLock system has greatly enhanced the security of our customer mail and allows us to manage subcontractor service performance.”
case study
case study
brisbane airport
corporation
PAGE 32
Challenge
Solution
The Brisbane Airport Corporation needed a government-endorsed, wireless access control system that allowed an audit trail and time-in-attendence function. Plus the software had to integrate with their existing bar-coding system to complete the control of updating contractor’s licences.
BAC implemented EKA — customised to integrate with the bar-coding software — to allow contractors access to the site. After a trial, the first major roll-out occurred in February 2010. Brisbane Airport Corporation is now installing EKA CyberLocks throughout both its domestic and international terminals.
They’re one of the first companies in Australia to install secure key vaults, and are currently drafting plans to integrate a GUI. This innovative GUI will allow them to use graphical renderings of every terminal level to control doors locks through the EKA system and enable seamless issue of temporary keys.
melbourne cricket ground Challenge The MCG is one of the world’s great sporting arenas. During concerts and major events, such as the AFL grand final, as many as 100,000 people fill the stadium. A venue of this size and calibre has significant security requirements. In 2007, under the guidance of a new security manager, they began
to re-examine their access control systems and needs.
Solution The MCG chose EKA as it would work in conjunction with their existing hardwired doors. EKA’s flexibility also came with a significant cost advantage. Hardwiring additional doors would be expensive. EKA eliminated this problem.
Having an audit trail and being able to delete lost keys has proved particularly beneficial. So has the flexibility of individual levels of key access and control. Since EKA was first installed in 2008, the MCG has put EKA in additional areas like their sports museum and corporate boxes to secure access to some of their most valuable assets.
case study
case study
australian government Challenge An Australian government department needed to improve the access control of its extensive underground pipe and pit infrastructure. This department operates more than 600 kilometres of underground conduit and some 2,000 individual in ground access pits that require various requirements for access in order to deliver services and the security levels required. Until recently, they used a mechanical locking system with six separate key and lock profiles. The cost to re-key the system if one single key was lost
PAGE 34
was potentially more than $280,000, a process that would take three months. A pilot project with electronic locks in 2007 showed the advantages of electronic locking although highlighting some additional physical restraints of design.
Solution EKA’s physical robustness, ease of use, customisation possibilities and wholeof-life savings convinced the department to roll-out the EKA product to replace the majority of the mechanical locks, as well as the product utilised for R&D in the pilot project. The department has now
replaced more than 95 percent of the previous locking systems. The earliest installations have now been in some of the department’s dirtiest and most-often-used pits for 18 months. Only one lock has had a complete failure — a 0.0004% rate of failure. EKA has also eliminated the need to ever re-key. The EKA product has also allowed the department to use the same electronic locking system to secure cabinets, haul or lock boxes in buildings. They’ve even worked with the manufacturer to design and build intruder-resistant components for use inside buildings, complete to the service end point.
ELECTRANET PTY LTD Challenge When Grant Mattiske joined South Australian electricity transmission network service provider ElectraNet as the new Asset Access Administrator he was tasked with auditing their masterkey system used to secure access to substations and other key facilities. Grant’s risk management audit identified a number of issues for resolution, including the system’s expired patent and keys that had been reported as lost.
Solution A new master-key system would be expensive and Grant realised new keys
would inevitably be lost, and the same issues would emerge all over again.
of the desert, malfunctions are rare with correct device management.
In search of an alternative security solution to mitigate risk, Grant trialled EKA in 2006. The proof of concept was a success and he’s been rolling EKA out through ElectraNet’s 100+ substations and communications sites ever since.
Grant says that in most instances, all that was needed during the changeover was the replacement of the lock cylinder, making the roll-out faster and particularly cost-effective.
Grant says that ElectraNet now has nearly 1000 CyberKeys for approximately 500 EKA locks on gates, doors and padlocks that secure substations anywhere from the edge of the Stuart Desert, as well as a growing number of wall authorisers and infrared portable versions. Even in the extreme heat
If a key is lost, Grant now simply deactivates its access on the EKA system. He can also set record and report instructions if it’s used on any lock throughout ElectraNet. What’s more, he uses a timeout policy. If a key doesn’t have its privileges reauthorised within the defined period, it no longer functions. For ElectraNet, it’s an effective security solution.
case study
1300 722 311 Sydney • Melbourne • Brisbane • Perth • Adelaide
www.ekasecurity.com.au