CyberLock CKV-V20 key cabinet

Technical Specification

Features:
  • Make: CyberLock
  • Model code: CKV-V20
  • Standalone/ Networked/ PC: Networked
  • c/w Cards, Tags or Fobs: Cards
  • Keypad Included: Yes
Additional info:

A key cabinet designed to program and dispense up to 20 keys The keys are stored in the secured vault in an unprogrammed state until an approved PIN and/or RFID card is presented After the presentation of an approved PIN and/or RFID card the vault programs a key with that user’s access permissions and releases the door latch Reads the ID of most unencrypted 13.56 MHz RFID cards and recharges keys while in the vault  The front of the vault contains an RFID reader with an indicator light and keypad, as well as an LCD touchscreen Can be scalable, meaning numerous vaults can communicate within a single CyberAudit Enterprise system Designed and developed to meet security needs of medium to large scale facilities

Read more
Make CyberLock
Manufacturer CyberLock
Category Access Control>Access control systems & kits
Model code CKV-V20
Standalone/ Networked/ PC Networked
c/w Cards, Tags or Fobs Cards
Keypad Included Yes
Environmental Specifications Operating Temperature oC: 0 ~ 50 C (32 ~ 122 F)
Physical Specifications Dimensions mm: 414 x 310 x 117
Weight g: 7,393.6
Additional info
  • A key cabinet designed to program and dispense up to 20 keys
  • The keys are stored in the secured vault in an unprogrammed state until an approved PIN and/or RFID card is presented
  • After the presentation of an approved PIN and/or RFID card the vault programs a key with that user’s access permissions and releases the door latch
  • Reads the ID of most unencrypted 13.56 MHz RFID cards and recharges keys while in the vault 
  • The front of the vault contains an RFID reader with an indicator light and keypad, as well as an LCD touchscreen
  • Can be scalable, meaning numerous vaults can communicate within a single CyberAudit Enterprise system
  • Designed and developed to meet security needs of medium to large scale facilities
Download PDF version Download PDF version

Related Whitepapers

Water utility security: challenges and solutions

Securing America’s Telecommunications Infrastructure

The critical role of access control in K-12 school security

Quick poll
Which AI-powered capability will dominate in the years ahead?