Technicians

Key Systems: eCylinders – The Amazing, The Mundane, and The Considerations

Excerpts from an Expert > Key Systems: eCylinders – The Amazing, The Mundane, and The Considerations

Last week on our key system journey we ventured through the always exciting world of standard and interchangeable cylinders; with the anticipation of eCylinders and basic access control this week.  So what’s different about an eCylinder? A step below what most of us consider “access control,” it is a cylinder that uses electronic keys.  eCylinders come in both standard and interchangeable cylinders and typically fit into existing hardware.  There are a variety of different eCylinders on the market; some of the most popular in the commercial industry are the Medeco Logic and Medeco NexGen cylinders.

 What is so great about eCylinders?

medeco logic, ecylinder, key systemeCylinders are proprietary key systems with a lot of perks.  One of the biggest is an increased level of security.  eCylinder keys cannot be copied anywhere – no ifs, ands, or buts about it.   Even if you were to find an un-programmed key, it would be inoperable; keys must be programmed with the supporting software platform.  With many of the eCylinders on the market, you can program pre-determined keys to operate on specific doors, and can even dictate times that the key is operable.  This brings to mind another advantage – audit trails.  You can easily pinpoint the time a lock was accessed and the key which was used. Another perk is the ability to perform unlimited rekeys without changing the cores – all you have to do is reprogram the keys.

 

Are there any drawbacks?

The biggest consideration for most organizations is cost as they are substantially more expensive than traditional cylinders.  If you are interested in eCylinders but are concerned about cost – consider installing them on locks that require a higher level of security; like a cash office or merchandise case.

Software is an additional consideration to remember; it can be expensive to purchase and maintain.  If you make the leap to eCylinders, be sure to ask a lot of questions about how the software is set up and used throughout the lifecycle of the system.

nexgenLastly, some hardware upgrades may be required.  While many eCylinders are compatible with both standard and interchangeable cylinders, there are instances where hardware changes will be needed.

 

Are you looking for something even more sophisticated?  The next step is traditional access control.  Full-blown access control can use an unlimited variety of credentials to gain access to locked areas such as key fobs, cards, finger prints, and retinal scanners.  There are a host of additional features that access control offers such as tying locks in with fire and security systems, complete audit trails, full customization, knowing if doors are opened or closed, and the ability to deactivate credentials on the spot.  With all of these great benefits comes a hefty price tag to both install and maintain the system, but if you’re looking for the highest level of security for your products, facility, or the people inside; that cost is likely worth it.

It’s easy to be confused by the semantics of the door and hardware industry; if you have questions – leave them in the comment section below. As our key system series starts to slow, I’m onto rekeyable cylinders next Tuesday.

Check out our Key Systems 101 article for more information.

 

[maxbutton id=”1″]

 

Check out the rest of our series:
The Five Critical Components of Key System Management
Key System Types: Restricted, Unrestricted, and Proprietary
Proprietary & Restricted Key Systems
Standard Cylinders versus Interchangeable Cylinders – What’s the Difference?
eCylinders – The Amazing, The Mundane, and The Considerations
Rekeyable Cylinders – Fast, Easy, & Cost Effective
Master Key Systems – Controlled Access With One Key
Key System Policies – Keep Your System In Tact
Key System Procedures – A Roadmap for Maintaining Your System’s Integrity
Rekey Policies & Procedures – Three Elements to Consider
Key System Records Management – 4 Cornerstones