The risk of sabotage, attacks or thefts for an energy provider is an issue of national security: the consequences of unplanned interruption to supply or total shutdown could have catastrophic, expensive and far-reaching consequences. The challenge is to maintain the security of your critical infrastructure while guaranteeing access to employees, consultants and service crews round the clock to a range of different sites.
Developed with public utilities in mind, CLIQ® locking systems offer robust security to meet the needs of your critical energy infrastructure across multiple sites. A combination of electronic and mechanical security, each key can be programmed individually to allow access to specific areas at specific times, accommodating constantly changing access requirements and helping to control workflows.
CLIQ® has several advantages over old-fashioned locks. It combines highly encrypted electronic identification and mechanical security in a wide range of cylinder-type applications. The lock’s power is provided by a battery inside the programmable CLIQ® key.
Why do so many leading energy providers rely on CLIQ® to deliver a dedicated security solution to manage the security and access of their complex infrastructure across multiple sites?
Because the robust CLIQ® locking system addresses the specific needs and security issues surrounding their critical energy infrastructure, guarding against sabotage, theft and trespass, while guaranteeing access to those who need it.
Developed specifically for public utilities facing major security challenges, CLIQ®:
CLIQ®: The robust and reliable access system tailored to securing critical infrastructure and high security premises.
ASSA ABLOY offers CLIQ® locking systems worldwide under several brands, including ABLOY, Mul-T-Lock, ASSA, IKON, Vachette, Ruko, Trioving, KESO and FAB.
Make | CLIQ - ASSA ABLOY |
---|---|
Manufacturer | ASSA ABLOY - CLIQ |
Model code | CLIQ |
Additional info |
CLIQ® locking systems offer robust security to meet the needs of your critical energy infrastructure across multiple sites. A combination of electronic and mechanical security, each key can be programmed individually to allow access to specific areas at specific times, accommodating constantly changing access requirements and helping to control workflows. |