eka brochure 2013

36
Introducing the next generation in access control that secures, controls and audits all assets, from the front door to assets in remote locations access control system THE ONLY THAT STRETCHES FROM YOUR FRONT DOOR TO A SHIPPING CONTAINER IN THE INDIAN OCEAN WWW.EKASECURITY.COM.AU

Upload: glenn-badenhop

Post on 18-Jan-2017

69 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: EKA BROCHURE 2013

Introducing the next generation in access control that secures, controls and audits all assets, from the front door to assets in remote locations

access control system

The ONLY

ThaT sTreTches frOm YOur frONT dOOr TO a

shippiNg cONTaiNer iN The iNdiaN OceaN

www.ekasecuriTY.cOm.au

Page 2: EKA BROCHURE 2013

page 2

Page 3: EKA BROCHURE 2013

access The NexT geNeraTiON iN

ThaT secures, cONTrOLs aNd audiTs aLL asseTs, frOm The frONT dOOr TO asseTs iN remOTe LOcaTiONs

page 3

Securing the office door with current access control technology is easy. But swipe cards aren’t practical for controlling access to remote assets, like sub-stations, data centres or vending machines. They can’t lock down mobile assets, such as containers or laptops. And if you want to use them to secure unusual but important things like drug safes or gates, forget it.

Either the cost is prohibitive or it’s impossible to run the wiring. Master-key systems offer a lock for just about anything, but no control over access. Auditing who’s been where is nearly impossible. And if you lose a key you either re-key the system (expensive!) or live with compromised security.

EKA finally breaks this either/or choice. EKA couples the master-key ability to put a lock on anything with the tight and trackable access control characteristics of swipe card systems. What’s more, EKA retrofits into any existing cylinder lock and integrates any existing access control system.

That’s why EKA truly is the next generation in access control — able to secure, control and audit any asset from the door, to remote or mobile assets.

control

iNTrOduciNg

Page 4: EKA BROCHURE 2013

page 4

EKA’s next-gen access control technology is the cutting edge

security solution for any industry or sector that needs a sure

way to secure, control and audit assets beyond the door.

for any industry or sector

The preferred access cONTrOL

ThaT Needs TO secure, cONTrOL aNd audiT asseTs beYONd The dOOr

Page 5: EKA BROCHURE 2013

Telcos and data centres. EKA can be used to secure access to communication pits and cages.

Utilities. Large utilities like water boards can secure facilities like power plants, sub-stations, equipment and storage.

Local government. Local government assets ranging from offices and halls, to depots, parking meters, barriers and park toilets can all be easily secured with EKA.

Transport and logistics. Containers, yards, warehouses, depots and even gates can be secured using EKA.

Airports. EKA will secure access to hangers, gates, server rooms and restricted access areas.

Hospitals and pharmaceutical. Drug safes and pharmacy labs are normally hard to lock down. EKA makes securing them a breeze.

Mining and construction. Stop wondering who has access to plant equipment, vehicles and explosives. EKA secures and tracks it all for you.

Education and office. EKA can be used to secure access to utility doors with padlocks, cash tins, access panels, air conditioning or display units, light boxes and even roller doors.

page 5

Page 6: EKA BROCHURE 2013

page 6

wheTher iT’s a cage, a cupbOard,

a case, a cONTaiNer, a cash bag Or

a gaTe, if YOu caN puT a LOck ON iT,

eka caN secure aNd cONTrOL iT.

Page 7: EKA BROCHURE 2013

page 7

uniquewhY eka is The beTTer access cONTrOL

1 One software platform. EKA bridges existing hardwired and key-centric security solutions and can secure, control and audit access to both types.

2 Works beyond the door. Whether it’s a cage, a cupboard, a case, a container, a cash bag or a gate, if you can put a lock on it, EKA can secure and control it.

3 No expensive and disruptive cabling. Traditional access control systems need extensive hardwiring. The only thing EKA replaces is the lock cylinder.

4 Stays up when the power is down. If the power goes down, hardwired access control systems fail. EKA locks are powered-up as required by the CyberLock key your people carry for access.

reasons eighT

5 More cost effective. EKA delivers every advantage of an access control system at a cost per door (lock) that’s comparable with a master key system.

6 Audit access to any asset. You can access audit trails even for mobile and remote assets and see exactly who’s been in and out, as well as who’s tried and been denied.

7 Deploys twice as fast. Current access control technology is slow to install and deploy. Even in large organisations with thousands of assets to secure, EKA can be fully installed and running in just a couple of weeks.

8 A single key opens any lock. As long as they have access privileges, your people can access any asset using just one key.

Page 8: EKA BROCHURE 2013

page 8

Migrating to an EKA access control system is

simple, and can be accomplished in just a matter

of weeks even for the largest and most diverse

government organisation or blue-chip corporation.

What’s more, operation is simple, efficient and

transparent. Here’s how it works.

actioneka iN

Page 9: EKA BROCHURE 2013

page 9

Identify the assets you need to secure. Replace all mechanical locks with EKA CyberLocks.

Expand. The EKA remote access system is easily expandable. New locks can be added quickly and cost-effectively. Moreover the reach of the system is not limited by geography and you can cover locations in separate states or even countries.

Initiate and hand out CyberKeys. Each key is pre-programmed with a unique, updatable list of assets the keyholder may open.

Monitor and report system integrity. Access monitoring occurs through EKA’s software and can generate customised automatic email reports of suspicious activity.

Discard all old keys. Now each staff member, tradie, security staff needs carry only a single CyberKey to open any lock they have privileges for.

Assign CyberKey access privileges as required. Facility managers can activate and deactivate individual keys, and even set up missions that give time-limited access rights to certain facilities or assets.

ideNTifY

expaNd

iNiTiaTe

mONiTOr & repOrT

discard

assigN 6 5

1 2 3

4

Page 10: EKA BROCHURE 2013

page 10

Page 11: EKA BROCHURE 2013

compares hOw eka

TO OTher remOTe access sYsTems

page 11

Feature Mechanical key Access control EKA

Low upfront cost • •

Expand as you grow • •

Secure beyond door • •

Low impact install • •

No power issues • •

No keyway • •

No key duplication • •

Set access permissions • •

Audit trails • •

Secure remote facilities • •

One software platform •

Secure mobile assets • •

Page 12: EKA BROCHURE 2013

page 12

Page 13: EKA BROCHURE 2013

one controlmaNY LOcks;

iNTerface

Until now, if you installed different types of locking systems you had no choice except to operate and manage them independently.

Sitting side-by-side, the result is more expense, more operational work for facility and asset managers, and more opportunities for security breaches.

EKA solves this through a system that can deliver single, unified access control.

Through a hub called Flex, EKA is able to integrate with and manage any other access control system that uses a Weigand — compatible input device-from RFID, to electronic swipe and HID, Maglocks, electronic strikes, and even bio-metric devices.

page 13

Page 14: EKA BROCHURE 2013

1 Initiate access privileges

ONLY eka/fLex is Needed TO:

2 Revoke access privileges 3 Monitor access

and trigger alarms 4 Generate audit reports

One keyfOr maNY LOcks: iNdOOrs, OuTdOOrs, mObiLe aNd remOTe!

perimeTer securiTY1

pOwer meTer bOx LOck15

weaTherised vauLT16

eka cYberkeY auThOriser 4

access cONTrOL securiTY fOr LOcks ON The mOve

3

securiTY fOr pOwer aNd OTher maiN cONTrOLs

5

page 14

Page 15: EKA BROCHURE 2013

rfid LOck aT The frONT dOOr2

pOwer meTer bOx LOck15

weaTherised vauLT

securiTY vauLT LOck9

eka cYberkeY vauLT10

Office dOOr cYLiNder LOck 8

securiTY fOr pOwer aNd OTher maiN cONTrOLs

resTricTed access fOr high-vaLue sTOrage areas

6

wiegaNd-cOmpaTibLe device iNTegraTiON

7

sTOrage dOOr cYLiNder LOck

12

fiLiNg cabiNeT cYLiNder LOcks

11server rOOm dOOr cYLiNder LOck

13

server cabiNeT cYLiNder LOcks

14

page 15

Page 16: EKA BROCHURE 2013

EKA can be installed into any gate lock or padlock in even the most remote facilities.

Restrict and monitor access to small safes used for petty cash or other valuables.

An EKA Flex hub integrates with any Wiegand-compatible devices, such as RFID readers or swipe cards, for a more effective and comprehensive single access control system.

A secure key repository for up to 20 keys. It’s possible to establish rules that some — or all — staff return keys to the vault before leaving for the day.

It doesn’t matter how geographically distributed your operations are, EKA locks any container or truck anywhere, and keeps your goods safe in-transit, even from one side of the world to the other!

Properly secure items previously too expensive or impossible to secure with access control, such as filing cabinets. Use the EKA system to give access to just a few people, one person, or to every member of staff.

Easy install keypad authoriser means staff or contractors can obtain a CyberKey with limited access privileges using a registered and fully-trackable code.

Storage access can be made as open or restricted as you like.

perimeTer securiTY

securiTY vauLT LOck

rfid LOck aT The frONT dOOr

eka cYberkeY vauLT

access cONTrOL securiTY fOr LOcks ON The mOve

fiLiNg cabiNeT cYLiNder LOcks

eka cYberkeY auThOriser

sTOrage dOOr cYLiNder LOck

1

9

2

10

3

11

4

12

eka caN secure everY LOck iN aN eNTire faciLiTY.

Page 17: EKA BROCHURE 2013

Control and monitor access to the lights, power and other important controls.

Restrict access and comprehensively track entry to key business operational facilities such as server rooms.

EKA makes it simple to secure, restrict and monitor access to cages and other restricted areas storing high-value goods.

EKA even enables individual control over who has access to which server cabinets.

The Flex hub also integrates bio-metric fingerprint readers under EKA’s single access control system. In fact, as long as the device is wiegand-compatible, it can be hooked up to the EKA Flex system for a unified access control system.

Restrict and monitor access to power meters, communication pits and the like.

Allow access to certain people (cleaners) during certain times.

Set-up a system for emergency or one-off access. A pin code is needed to obtain the key in the weatherproof vault. Perfect for emergency services or one-off contractors requiring access.

securiTY fOr pOwer aNd OTher maiN cONTrOLs

server rOOm dOOr cYLiNder LOck

resTricTed access fOr high-vaLue sTOrage areas

server cabiNeT cYLiNder LOcks

wiegaNd-cOmpaTibLe device iNTegraTiON

pOwer meTer bOx LOck

eka cYberkeY auThOriser Office dOOr cYLiNder LOck

weaTherised vauLT

5

13

6

14

7

15

4

12

8

16

iNside aNd OuT. here are sOme exampLes.

Page 18: EKA BROCHURE 2013

page 18

At its core, an EKA installation comprises four elements:

the CyberLock cylinders, the CyberKey, key authorisation

communicators and the EKA software itself.

science of EKA

The

Page 19: EKA BROCHURE 2013

When an EKA CyberKey meets an EKA lock, an instant information exchange determines whether the key has access to that specific

lock. Whether access is granted or denied, the time of the event and the unique ID of the key

used is stored in both the lock and the key.

EKA cylinders are the exact dimensions of the normal lock cylinders they replace. The absence of a conventional keyway means it is not vulnerable to being picked. As the EKA cylinder needs no power or wiring it’s ideal for remote and mobile assets.

Each EKA CyberKey contains a battery and the individual’s access privileges. This powers all the electronics and operates the lock. For example the key can be programmed to allow access from 8am to 6pm on weekdays and 10am to 4pm Sundays. It can even be programmed to expire so it cannot function until reactivated.

Access privileges are distributed through communicators linked to your EKA software via network or internet. When validating keys, the system downloads the key’s stored data for audit. It

then uploads any new access privileges. EKA access privileges can be programmed to expire. This forces users to update keys regularly.

Centralised, web based software allows facility managers to assign keys, set access permissions and expiry times. They can also create access groups and schedules, and activate new EKA locks. It also enables auditing and tracking through reports and automatic notification of suspicious activities.

page 19

EKA CyberKey

EKA cylinder

Page 20: EKA BROCHURE 2013

page 20

Page 21: EKA BROCHURE 2013

Advanced mONiTOriNg aNd repOrTiNg

page 21

EKA’s server-based modular software system is capable of handling complex and numerous geographically remote installations of as many as 15,000 keys and 15,000 locks. A hierarchy of administrators allows individual managers responsibility for only the locks and the people in their area. It even manages assets across countries and time zones.

An intuitive point-and-click, browser-based interface that uses drop-down information boxes is all that’s needed to access the modules that drive EKA’s access control, monitoring and reporting capabilities.

Key and custom modules

Location graphics. Create a graphical interface of your office that allows you to place the location of CyberLocks and Communicators for improved tracking and auditing.

Door & Input / Output Support. Through Flex, manage access to Wiegand-compatible third-party systems such as swipe cards, RFID and biometric readers. Doors can also be set to unlock and relock at certain times and alarms can be triggered if a door is forced or left open.

Locks. See all locks and individually set access and reporting characteristics. Options include: delayed access, access only with a number of keys and email notification of denied access.

People and keys. Allocate individual keys to users. Set days and times they have access to certain locks, how soon the key’s access permissions expire and even revoke a lost key.

Schedules. Set schedules of who can go where at what time. This can be as specific as a few minutes at a certain time on one or two days of each week.

Reports. Audit trails can be used to generate tailored reports that tell you who has been where and when. Anything from specific people to user-defined groups such as: contractors, cleaners, security staff, weekend users.

EKA software features

Detailed audit trail

Set two, three or four-way access

Denied access email alerts

Hierarchy of administrators

Remote key initiation via Andriod & Blackberry

Key scheduling and expiry

Set delayed access

Set group access permissions

Multiple time zone management

Monitors and controls third-party systems

Page 22: EKA BROCHURE 2013

page 22

Communicators underpin the flexibility of EKA.

Simple, iNsTaNT keY

acTivaTiON

A network of communicators (each communicator can be given an IP address) allows users to validate their CyberKeys without returning to where the EKA software is hosted, instantly downloading audit trail data and receiving updated access permissions. Communicators are also designed to recharge rechargeable CyberKeys.

Communicators are so versatile that they can be mounted almost anywhere, maximising ability to control access to even the remotest assets.

Page 23: EKA BROCHURE 2013

Mini keyport. This smaller version of the authoriser can be employed when the additional security of keypad and PIN codes are not required.

page 23

seveN cOmmuNicaTOrs fOr aNY siTuaTiON Or faciLiTY

Single-key vault cabinet. Remote locations such as maintenance sheds often have many people areas requiring access. By allocating a PIN access code or swipe card to each user, one key is shared among many users, yet every user’s access history can be individually audited.

20-key vault cabinet. Ideal for large offices, this intelligent key cabinet stores keys in an inactive state. A swipe or PIN code is required to activate a key, and when staff return keys they are deactivated until they are next retrieved.

Authoriser keypad. An authoriser keypad is a durable, weather-proof unit that is fitted to the exterior of a building or facility. Users present their key to the authoriser and enter a PIN code to obtain permission privileges.

USB station. In a smaller office, when your EKA software might only sit on a desktop, a simple USB station port is a cost-effective way to authorise keys.

Web station. Web stations multi-point access and updating via cat-5 are ideal for larger, network server systems.

IR encoder. This compact USB dongle connects to any CyberKeys via infra-red connection. It’s ideal for remote and mobile workers.

Page 24: EKA BROCHURE 2013

page 24

Page 25: EKA BROCHURE 2013

One key fOr everY LOck

page 25

The EKA CyberKey is an electronic, programmable smart key that cannot be duplicated. Via a communicator, each key can be programmed with the permissions for every system lock a key holder is allowed to access: what locks the key can open, as well as the days and times each lock can be opened. In this way, each user only needs one key to access any lock in a system, whether it’s a major entry door, or an obscure and remote cabinet padlock.

Because it’s electronic, permissions can be revoked. Administrators can set key expirations to occur regularly (daily, weekly or more often) and can also do this on an ad-hoc basis when keys are lost.

Each EKA key contains four levels of intelligence: encrypted access codes to ensure the key is from the same installation; the unique ID number of the key; access privileges for the user of the key; and storage of up to the last 3,900 events, both entries and denied entries. The unique exchange of encrypted access codes between the lock and key gives a high degree of key integrity. The encrypted codes ensure keys from other systems cannot work in your system.

Three types of CyberKeys

1 Standard Cyberkey. A standard lithium three-volt battery can provide between 3,000 and 5,000 lock openings.

2 Rechargeable CyberKey. A rechargeable lithium Ion battery can provide around 500 openings before needing to be recharged on a recharging station.

3 Bluetooth CyberKey. A bluetooth-connectable for remote and mobile users.

The EKA CyberKey

Standard, rechargeable and Bluetooth versions available

Permanent memory holds access events, even if battery fails

Made from impact-resistant nylon for high durability

Cannot be duplicated

Can be set to expire

Water-resistant, coated electronics

Sacrificial brass tip prevents wearing of lock

Brass tip easily replaced in the field

Will not function once expired

Can be programmed for one lock, or many locks

Page 26: EKA BROCHURE 2013

page 26

CyberLocks are the exact dimensions of the

mechanical cylinders they replace. They retrofit into

the lock hardware with the ease of a mechanical

cylinder, and do not change how the lock operates.

for any asset

a cYberLOck

Page 27: EKA BROCHURE 2013

page 27

More than 300 existing CyberLock designs enable it to be installed in an enormous variety of interior and exterior doors, padlocks, containers and cabinets.

There’s no wiring and no battery. All power is provided by the CyberKey: when a key comes in contact with the cylinder, it powers up the lock’s circuitry so key and lock communicate. If the key is not on the lost key list and the permissions are correct, the lock will open.

The circuitry stores four types of information: encrypted codes that ensure only keys within the system work with the lock; the unique ID number of the CyberLock; a record of the last 1,100 entries; and a list of lost keys to eliminate access by any key that is missing or lost.

CyberLocks offer superior physical security. They have no conventional keyway that is vulnerable to being picked plus a tamper plug prevents the lock from opening if the front of the cylinder is struck.

Moreover, if torque is applied to cylinder, the front part separates from the back half. The back half of the cylinder expands, causing a brake effect that engages the sides of the cylinder’s case, stopping the rotation and leaving the cylinder in the locked position.

Why the CyberLock is superior

• Retrofits any mechanical lock

• No wiring, no battery

• Potted circuits protected against dust, water, salt & air

• Lost key list prevents unauthorised access

• No keyway to pick

• Torque brake and tamper plug

• Withstands to 300,000 volts and 18,000 gauss

• Records authorised and denied access

Page 28: EKA BROCHURE 2013

cOLLege

chaLLeNge

In 2007, Mary MacKillop College was about to begin new construction. The college already had 60 classrooms in a large open area, each with two individual access points.

Controlling access was already difficult. Different locks meant two separate keys for each classroom. OH&S rules meant both keys were required in case of an emergency. Keen to improve security, MMC investigated several keying systems.

marYmackiLLOp

page 28

“The systems were often more economical, but did not provide the flexibility our site required.”

sOLuTiON

MMC was immediately convinced EKA was the way to go.

“Over the years we have had problems with the misplacement of keys by contractors, staff and teachers. EKA totally resolved this issue, because if a key is misplaced it would now be simply disabled online.”

MMC primarily chose EKA because of its easy installation, and the flexibility to centrally control access to each individual area.

“This keying system allows us to adjust access for teachers to the classroom remotely, utilising their own individual key. Overall we are extremely happy with the ease of installation, the end result, as well as the exceptional service we have received from EKA.”

case sTudY

Page 29: EKA BROCHURE 2013

cOLLege

chaLLeNge

Ave Maria College was using a fairly modern restricted master key system. Yet there were constant key management concerns and challenges. Different users required multiple keys, leading to a situation where it was easiest to just give everyone a master key!

sOLuTiON

College Business Manager, Allan Thompson, researched solutions to provide better key management. They chose EKA.

Ave Maria College decided to roll-out EKA in small, easy-to-manage sections

avemaria

to meet budget requirements and ensure a smooth transition.

The staged installation occurred in three sections: the library as a trial site; all external doors; all internal doors. A remote Key Validation Point was installed at the completion of the second stage in a central location so staff could update their access profile without visiting the Property Manager’s office.

EKA has given Ave Maria the flexibility to design specific access levels for the different users of the college. The tailored access, coupled with the instant ability to delete lost keys, has vastly improved security.

case sTudY

Page 30: EKA BROCHURE 2013

chaLLeNge

Water treatment facilities are uniquely difficult to secure. These facilities have such a diverse array of access control requirements — main entrances, storage areas, office doors, gates, computer cabinets, padlocks and restricted chemical areas — that a very flexible system is needed.

gwmwaTer

page 30

sOLuTiON

GWM chose EKA for its versatility, superior security features and ease of installation.

Now each employee needs only one key to access any GWM lock they’ve been assigned accessprivileges. Security has improved as lost or stolen keys are now easily blocked.

Since GWM installed EKA at their water treatment plants, they’ve gone on to roll-out the system through their entire infrastructure.

EKA locks now secure the entire Wimmera Mallee Pipeline system — facilities that span 250,000 square kilometres — while hundreds of locks are being installed in pump stations, switchboards, wastewater treatment plants and depot facilities.

case sTudY

Page 31: EKA BROCHURE 2013

pOsT

chaLLeNge

Subcontractor clearance agents are required to collect the mail from New Zealand Post’s network of street receiver boxes during scheduled hours, multiple times a week.

New Zealand Post had no way to determine when mail had been collected. Security was also a concern. Each route includes 20 to 30 street boxes and sometimes clearance agents service multiple routes. If a key was lost, all the locks in that series of street boxes had to be re-keyed at great expense. Also, the time required to re-key the boxes put customer mail at serious risk.

NewzeaLaNd

sOLuTiON

New Zealand Post began looking for a system that would allow them to monitor the service performance of the subcontractors in clearing mail from their street receiver boxes.

“We selected CyberLock because it was cost-effective and met our requirements in terms of measurability and auditing”.

New Zealand Post implemented a successful four month trial of the system in Wellington. Following the trial they converted 3,500 of their street receiver boxes to CyberLock electronic locks.

case sTudY

“Enterprise software allows us to perform audits over the network and manage the performance of our subcontractors, even at remote collection sites. Also, we can disable a key relatively quickly, should one be lost. Enterprise provides daily reports of box clearance times and exceptions such as attempted access to a box outside the scheduled collection time.”

“The CyberLock system has greatly enhanced the security of our customer mail and allows us to manage subcontractor service performance.”

Page 32: EKA BROCHURE 2013

chaLLeNge

The Brisbane Airport Corporation needed a government-endorsed, wireless access control system that allowed an audit trail and time-in-attendence function. Plus the software had to integrate with their existing bar-coding system to complete the control of updating contractor’s licences.

page 32

sOLuTiON

BAC implemented EKA — customised to integrate with the bar-coding software — to allow contractors access to the site. After a trial, the first major roll-out occurred in February 2010.

Brisbane Airport Corporation is now installing EKA CyberLocks throughout both its domestic and international terminals.

They’re one of the first companies in Australia to install secure key vaults, and are currently drafting plans to integrate a GUI. This innovative GUI will allow them to use graphical renderings of every terminal level to control doors locks through the EKA system and enable seamless issue of temporary keys.

case sTudY

cOrpOraTiON

brisbaNeairpOrT

Page 33: EKA BROCHURE 2013

grOuNd

chaLLeNge

The MCG is one of the world’s great sporting arenas. During concerts and major events, such as the AFL grand final, as many as 100,000 people fill the stadium.

A venue of this size and calibre has significant security requirements. In 2007, under the guidance of a new security manager, they began

meLbOurNecrickeT

to re-examine their access control systems and needs.

sOLuTiON

The MCG chose EKA as it would work in conjunction with their existing hardwired doors. EKA’s flexibility also came with a significant cost advantage. Hardwiring additional doors would be expensive. EKA eliminated this problem.

case sTudY

Having an audit trail and being able to delete lost keys has proved particularly beneficial. So has the flexibility of individual levels of key access and control.

Since EKA was first installed in 2008, the MCG has put EKA in additional areas like their sports museum and corporate boxes to secure access to some of their most valuable assets.

Page 34: EKA BROCHURE 2013

page 34

chaLLeNge

An Australian government department needed to improve the access control of its extensive underground pipe and pit infrastructure. This department operates more than 600 kilometres of underground conduit and some 2,000 individual in ground access pits that require various requirements for access in order to deliver services and the security levels required.

Until recently, they used a mechanical locking system with six separate key and lock profiles. The cost to re-key the system if one single key was lost

was potentially more than $280,000, a process that would take three months. A pilot project with electronic locks in 2007 showed the advantages of electronic locking although highlighting some additional physical restraints of design.

sOLuTiON

EKA’s physical robustness, ease of use, customisation possibilities and whole-of-life savings convinced the department to roll-out the EKA product to replace the majority of the mechanical locks, as well as the product utilised for R&D in the pilot project. The department has now

replaced more than 95 percent of the previous locking systems.

The earliest installations have now been in some of the department’s dirtiest and most-often-used pits for 18 months. Only one lock has had a complete failure — a 0.0004% rate of failure.

EKA has also eliminated the need to ever re-key. The EKA product has also allowed the department to use the same electronic locking system to secure cabinets, haul or lock boxes in buildings. They’ve even worked with the manufacturer to design and build intruder-resistant components for use inside buildings, complete to the service end point.

ausTraLiaNgOverNmeNT

case sTudY

Page 35: EKA BROCHURE 2013

pTY LTd

chaLLeNge

When Grant Mattiske joined South Australian electricity transmission network service provider ElectraNet as the new Asset Access Administrator he was tasked with auditing their master-key system used to secure access to substations and other key facilities.

Grant’s risk management audit identified a number of issues for resolution, including the system’s expired patent and keys that had been reported as lost.

sOLuTiON

A new master-key system would be expensive and Grant realised new keys

eLecTraNeTwould inevitably be lost, and the same issues would emerge all over again.

In search of an alternative security solution to mitigate risk, Grant trialled EKA in 2006. The proof of concept was a success and he’s been rolling EKA out through ElectraNet’s 100+ substations and communications sites ever since.

Grant says that ElectraNet now has nearly 1000 CyberKeys for approximately 500 EKA locks on gates, doors and padlocks that secure substations anywhere from the edge of the Stuart Desert, as well as a growing number of wall authorisers and infrared portable versions. Even in the extreme heat

case sTudY

of the desert, malfunctions are rare with correct device management.

Grant says that in most instances, all that was needed during the changeover was the replacement of the lock cylinder, making the roll-out faster and particularly cost-effective.

If a key is lost, Grant now simply deactivates its access on the EKA system. He can also set record and report instructions if it’s used on any lock throughout ElectraNet.

What’s more, he uses a timeout policy. If a key doesn’t have its privileges re-authorised within the defined period, it no longer functions. For ElectraNet, it’s an effective security solution.

gOverNmeNT

Page 36: EKA BROCHURE 2013

www.ekasecuriTY.cOm.au

1300 722 311Sydney • Melbourne • briSbane • Perth • adelaide