Why Use High Security Electronic Key Management Solution?
The first choice for security managers in high security electronic Key control:
- Hard on the outside
- Clever on the inside
- Monitor usage remotely
- All the great features of our regular keys cabinet, fortified!!
Now you can enjoy 'round the clock:
- 24-hour monitoring
Specialists In High Key Security & Key Management Solutions.
Asia Global Technology provides a range of high security quality key cabinets as well as other key management products aimed at increasing the security of your facilities and physical asset management by providing secure key storage, total key control and full key auditing capabilities.
CQRiT® eXtreme Key Management System
- Wasting time looking for keys? e.g. vehicles
- Spending money re-keying?
- Don’t have accountability of your assets?
- Unable to track access to sites?
- Too many resources tied up managing keys?
- Still using a paper system?
- Know who has accessed company asset
- Identify those responsible for misuse of your asset
- Reduce theft and stock losses
- Reduce the cost of replacing keys
- Stop unauthorised access to restricted areas
- Know when keys are accessed and returned
How It Works?
The eXtreme key cabinets give you all the great features of C.Q.R.iT®, only tougher!
The cabinet will only unlock with correct authentication. Only the allowed assets can be removed, all the others are locked in place. The external cabinet is so strong, it's virtually intruder proof.
Decide exactly who can access which keys, when, and for how long. Perfect for high-risk or extremely important keys.
CIC holder keys are unique to their position in the cabinet. This means key #1 can only be removed and returned to position #1 first time, every time.
Decide how you want your staff to access the cabinet - PINs, prox cards, fingerprints, even facial recognition. Because the box is so tough, it can even be used outside or in public areas.
Say goodbye to inaccurate and time-consuming manual sign-out sheets. This system records detailed transaction logs automatically.
Receive alarms (computer, email or SMS) for a range of violations meaning you're always in control of your keys, even when you're offsite.
Locking mechanism has three points, two of which are vertically opposed greatly reducing the risk of unauthorised access. Manual override key provides access in an emergency.
Solid door is recessed 5mm behind the front face of the container the door providing a 12mm rebate at the top, bottom and opening side.
Tamper resistant - formed from 1.6mm steel sheet with a double return at the top and bottom edges reducing the risk of willful damage.
An internal cover plate extends the full height of the door, covering the locking mechanism to reduce tampering even by authorised personnel.
Unlike competitors, when the door is closed, it cannot be removed by removing hinge pins.
Cable ports have an internal baffle plate covering them to provide additional tamper resistance.
Insist on encrypted communications between the cabinet and the computer/network.
These cabinets use 256-bit AES encryption for secure communications.
Be confident that your keys cannot be compromised - physically and electronically.
Gain access to the cabinet by badging a card, or entering a PIN, or both. We even integrate with fingerprint readers and other biometric scanners.
Integrate seamlessly: use the same ID cards that your staff already carry
Biometric security: use fingerprint scanners or facial recognition to protect against PIN sharing
Two identifiers: request two identifiers such as a prox card and a PIN for additional security
Software integration: migrate your users and their card data electronically without the need to manually enter data.
Network & Communications
TCP/IP: The cabinet communicates directly over your computer network. The IP address is programmed right on the box without the need for additional and confusing TCP/IP converters.
USB: Unreliable network? Remote locations? No problems! These cabinets have a built-in USB port just inside the cabinet door. Complete a full upload and download of your data using a thumb drive.
Alarm states that are triggered at the cabinet include: tamper, door forced, mains power out, key forced, key timer expired and more...
Each of these states can be configured to send an automatic email or SMS giving you ultimate peace of mind even if you're offsite.
The cabinet has two in-built relays, which can be expanded to eight. Any alarm triggered at the box can be configured to send a signal to your existing alarm system.
The cabinet automatically records every transaction with a time and date stamp.
Get up-to-date audit trails from all your cabinets without leaving your office.
Track a user, track groups, track a particular key. Investigate certain timeframes or different locations.
Non-editable Crystal Reports provide robust evidence of all key and asset movements.
One of the greatest features of our hardware is the software that controls it. Easy to use and packed full of features, it makes light work of the most complex key management.
Its simple interface means there's less of a learning curve.
We maintain a full-time R&D team who are constantly making upgrades and improvements to the entire system. An investment in a C.Q.R.iT® system is an investment into the future.
Tamper - Proof Key Rings
The C.Q.R.iT® cabinets easily integrate with all of your existing keys and locks so there's no need to waste money on re-keying.
Simply attach your desired keys of any kind to a CIC holder key. For the highest security, we recommend Tamper-Proof Key Rings®.
Compatible with the entire C.Q.R.iT® range
C.Q.R.iT® eXtreme runs off of the same KeySecure software as the standard key cabinets and our lockers. Whatever items or keys you need to control, we can help!
This means you have the flexibility to consider the best product for many of your different applications while staying inside the easy-to-use and reliable CQRiT ecosystem.
Use our key cabinets at various locations on your site - the loading dock, the warehouse and the server room. Without having to introduce new software, install a high-security cabinet in the public areas and be satisfied that they can't be opened without authorization. You can then install lockers to manage staff and personal assets and continue to run only the one software package.