ASSA ABLOY

CLIQ Plugin

Integration of CLIQ products inside Security Center where an operator would be able to assign access rules of cardholders granting access to CLIQ locks, and allowing programming of CLIQ keys with proper access rules.

CLIQ® is a security locking system with high-end microelectronics, programmable keys, cylinders and  padlocks. The system offers a variety of combinations of mechanical and electronic systems to match different security and flexible access needs. Available on the global market place, it provides flexible access and key management solutions for all kinds of locking applications. The intuitive software makes it simple to manage access rights, enable and disable keys and customize access schedules, on site or on the go.

A wire-free system, each key can be programmed and updated individually to allow access to specific areas at specific times and dates (Audit Trail), accommodating constantly changing access requirements and ensuring maximum flexibility. The power is provided by a battery inside the programmable CLIQ® key.

Jump to

Industry

  • Energy Utilities

Availability

  • Americas
  • Europe
  • Middle East And Africa
  • Asia Pacific

Product line

  • Security Center

Smart Solutions for Real Issues


CLIQ system eliminates the expense of physically rekeying locks and replacing keys. All rekeying is done electronically through the programming of the keys.

Audit records can identify which employees have accessed sensitive areas and when, often providing enough information to comply with new codes and regulations.

Electronic scheduling gives you the flexibility to control access around the clock, including providing temporary access. With audit records in both the lock and the key, you can easily identify which employees have accessed storage areas for greater inventory control.

Electronic rekeying and remote-access programming lets you respond immediately to personnel changes, even if keys are not returned. Simplify key control by assigning employees a single intelligent key that gives them access to all the locks they need to open.

With electronic scheduling and rekeying, respond immediately when keys go missing. CLIQ intelligent keys cannot be copied like traditional mechanical keys.

Something went wrong!


TypeError: n.map is not a function
at tN (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1622604) at div at https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:877362 at div at https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:877362 at section at PM (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1771800) at div at Mg (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1231639) at div at CF (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1890048) at M8 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2442874) at section at article at J8 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2451477) at div at t9 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2454353) at div at Mg (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1231639) at Ug (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1234107) at n9 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2455425) at nm (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1198709) at vm (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1202847) at ym (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1203594) at bm (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1204159) at div at P9 at div at nm (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1198709) at ym (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1203594) at bm (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1204159) at div at https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2472605 at https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2471726 at O9 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2474448) at UV (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1997902) at qQ (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2165012) at Pl (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1011341) at Em (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1205292) at div at E9 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2470346) at km (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1205069) at T9 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2470880) at nm (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1198709) at ym (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1203594) at im (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1199570) at Mg (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1231639) at M9 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2476537) at t (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:710547) at t (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:697467) at n (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:713084) at Ir (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:907907) at ju (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1070506) at pu (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1063489) at Zc (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1051495) at Sl (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1007968) at H9 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2478482) at Pc (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:1045740) at n (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2477221) at W9 (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:2479083) at Ao (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:111084) at U (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:870898) at n (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:898962) at Component at div at https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:877362 at div at https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:877362 at y (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:867228) at t (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:710547) at O (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:869707) at t (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:705653) at t (https://www.genetec.com/webfiles/latest/build/static/js/main.4ce5cde9.js:2:693081)

Access Control for Remote Utility Locations

Utility executives have long worried that power utilities are vulnerable to sabotage by both physical and cyber attacks. Whether the threats are posed by terrorists, disgruntled former employees, or teenagers performing a prank, the end result of unauthorized access and tampering at a utility facility is the same – a disruption of local and even national electrical power supply and utility generation and transmission.

Many power utility components are often in remote, unattended locations and protected by little more than cameras and chain-link fences. There is a high risk of equipment tampering and destruction due to the ease of accessing facilities.

CLIQ intelligent key systems are ideally suited to help provide auditable access control to remote areas: No wiring is needed and all power to operate the lock comes from the key. All access and attempted access are recorded. Keys can be set to operate only on specific schedules. Access can be granted via mobile phone with CLIQ Connect keys and App.

Access Control for Remote Utility Locations

Features and benefits

 

  • Keys and locks will be imported as entities/credentials in Security Center.
  • Support of the various key modes and blacklisting of keys.
  • Keys activity audits are collected and returned to SC to allow proper reporting.
  • Each keys will support configurable re-validation periods to ensure keys needs to be re-validated by cardholders.
  • Security Center access rules are pushed to CLIQ keys when associated with a cardholder.
  • Configuration of different daily shifts per CLIQ key.
  • Electronic access control without wiring or drilling.
  • Easy installation, since only the cylinder in the lock needs to be replaced.
  • IP57 rate d CLIQ keys, IP68 rated padlocks.
  • Easily replaced standard battery (within the key).

Solution Architecture

Solution Architecture