lock, cyberkey, cyber, key, lock, access control, audit trail, videx, stand alone, schlage, cam lock, rim cylinder, cyberlock, safe,

Presents Stand Alone Access Control

For Ordering Information.
Click here for retail pricing information

Click here for a Cyberlock Movie in MP4 format 

This movie provides a brief overview of CyberLocks, CyberKeys, and software options.

QuickTime is required to view the movie.

You can download and install QuickTime by clicking on the QuickTime link below 


Brochures and printable information about Videx CyberLock



Step 1

Replace existing mechanical cylinders with CyberLock cylinders. Each CyberLock is an electronic version of a standard mechanical lock cylinder. Installation is as simple as removing the original cylinder and replacing it with a CyberLock cylinder. Installation requires no wiring nor batteries, making installation quick and easy


Step 2

Assign a CyberKey to a user. Keys are programmed with access privileges for each user. A standard key holds a list of locks the user may open, with a schedule of days and times when access is allowed. For instance, the key can be programmed to allow access from 8 a.m. to 6 p.m. on weekdays and 10 a.m. to 4 p.m. on Saturdays. It can also be programmed to expire on a specific date at a specific time for increased security.


Step 3

Access locks. When a CyberKey meets a CyberLock, the cylinder is energized and an information exchange occurs to determine if the key has access to that specific cylinder. The event and time is stored in both the lock and key. Lock cylinders and keys also record when an unauthorized attempt to open a lock occured.


Step 4

Download audit trails and update keys via Communicator devices. Expiring keys regularly ensures users frequently update their keys. When validating keys, the system downloads the audit trail and uploads new access privileges to the key. An expired key will not work until it is updated.


Step 5

View audit trail.The CyberLock system is managed centrally through CyberAudit software. Customized audit reports and automatic notifications on suspicious activities can be automatically generated via email.





CyberLock is an innovative lock system that seamlessly converts existing mechanical locks into a full-featured access control system consisting of:

• CyberLock cylinders 

• CyberKey smart keys 

• Communication devices 

• CyberAudit management software


CyberLock Electromechanical Cylinders – High security electronic lock cylinders provide beyond-the-door capabilities.


Over 280 electromechanical cylinders have been designed for doors, cabinets, padlocks, containers, equipment, safes, and more.

• Cylinders retrofit into existing mechanical hardware. 

• No wiring or battery required at the lock. 

• Controlled access with audit trails provided even during power outages. 

•The most recent 1100 access events are saved to cylinder memory.


Unlike mechanical pin-based locks, CyberLock cylinders have a unique design that negates standard lock picking tools.

• Encrypted access codes bind cylinder to one system. 

• Unchangeable unique ID within each cylinder cannot be duplicated. 

• Multiple high-security options are available.



CyberKey Programmable Smart Keys – Electronic keys store individual key holder access permissions.


Efficiently packaged in highly durable fiberglass-reinforced cases.

• Power from key energizes cylinders. 

• Rechargeable or replaceable battery options are available. 

• Saves thousands of access events to key memory.


Administrators may set expirations to minimize risk due to lost or stolen keys.

• Keys contain encrypted access codes that bind key to one system. 

• Scheduling capabilities can range from master key operation to one time use. 

• Keys cannot be duplicated.


Communicators – Serve as the interface between CyberLock hardware and CyberAudit management software. Communication devices download the audit trail from the key and simultaneously update it with new schedules, permissions, and system information.


Having a variety of communicator options available allows organizations to create the right balance between convenience and security.

• IR Encoders and USB Stations connect directly to an available USB port. • WebStations and CyberKey Authorizers connect over a network from remote locations without a computer.

• CyberKey Vaults store unprogrammed keys until programmed and released to an authorized user.

• Smartphones enable remote employees to update keys in the field


CyberAudit Software -The industry's longest running key-centric software suite offers feature-rich access control management solutions for installations of any size.

• Professional is the software of choice for small- to medium-sized deployments that require key control, reporting, and additional communicator options; ideal for installations in the 500 lock and 500 key range.

• Enterprise is a full-featured system that supports large and/or geographically widespread installations; proficiently manages up to 15,000 locks and 15,000 keys.



The Flex System enhances the CyberLock product line by adding the capability to control a variety of access control and security elements using both Flex System modules as well as third party access devices:
  • Open a door 
  • Activate a light
  • Sound an alarm
  • Activate a camera
How does Flex work?

The Flex System is comprised of a variety of modules that can be mixed and matched to create a custom access control system.  The modules are plugged into a Hub which is directly connected to CyberAudit management software.


The Flex System Hub

The Flex System Hub connects with Cyber Audit software and provides power to the Flex System modules.  Embedded memory in the Hub stores access permissions and  saves audit trail information, enabling continuous operation even when a network connection to the software is interrupted.  Moreover, power outages can be mitigated by connecting a back up battery or auxiliary power source directly to the hub.  


The Flex System Modules

There are a variety of Flex  System modules available for a customized access control system:

• Input modules such as RFID readers and Keypad Displays can be used individually or combined for dual-credential door access.

•Weather resistant key vault modules can be installed in the field to securely store CyberKeys for convenient remote employee access.

•The multi-function Keyport module simultaneously activates electric door strikes and updates CyberKeys.


The Flex system Door & I/O Module

The Door & I/O module expands the capabilities of the Flex  System even further. As a door controller, it provides power to an electric door strike and unlocks it when an approved key card is presented. It has additional inputs and outputs that can control relay devices such as alarms, speakers, cameras, or sensors. Finally, it can connect to compatible third party Wiegand devices such as HID readers and biometric scanners.


Increasing Service, Efficiency, and Quality

New Zealand Post uses subcontractors to collect mail from 5000 receiver boxes throughout the country. Collections are to be done on and when the mail was being collected. In addition, any lost key required that all locks in that series of street boxes had to be replaced, at great expense. CyberLock was chosen as a cost-effective way to provide the accountability and key control they needed.

"The CyberLock system has greatly enhanced the security of our customer mail and allows us to manage subcontractor service performance." Ian Bekhuis


Protecting Critical Infrastructures

Water treatment facilities have diverse access control requirements that include main entrances, storage areas, office doors, gates, computer cabinets, and restricted chemical areas.  To meet EPA water security guidelines and increase facility security, Collier County Water Department selected CyberLock for its versatility, increased security features, and ease of installation.

"With CyberLock, we can provide substantial proof to the Health Department and EPA that we are diligent in our efforts to secure our facilities and keep the public water supply safe." James Price


Accounting for the Cash

The transit authority in the greater Cleveland area had a problem with misplaced keys to the fare boxes on their buses. A review of the collection  reports indicated that a significant amount of money was not making it to the bank.  Although there was no way to detect if these missing keys were being used to raid the fare boxes, their absence provided a wide hole in loss prevention efforts.  The CyberLock system was selected because it  addressed their primary concerns of key control.

"The bottom line is that the collected revenue ratio has increased and employee productivity has improved." Scott Medlong









Retail Pricing -- Please call


or email


a pdf file will be emailed to you


Click here for Cyber Audit Web Installation guide pdf


Click here for Cyber Audit Web Professional Reference Manual pdf




For more information regarding the CyberLock & Cyber Key System
please contact :

Wade Landrum Wade@elockmail.com 1-877-929-2370

2620 Walnut Ave #C
Tustin, CA 92780
Fax: 1-877-929-2370
(as soon as you hear the message you may start the fax)


CyberLock, the CyberLock logo, CyberKey, CyberAudit, Authorizer and other marks are trademarks of Videx, Inc. All other trademarks, service marks, and product or service names are trademarks of their respective owners.