NarcLock Electronic Access Control Cylinder

NarcLock’s electronic wireless access control locks can only be accessed by authorized NarcLock smart keys. Each lock stores access permissions and schedules in its memory and only grants access to keys that have been given access permission. With over 400 different lock options to choose from and no wiring or heavy installation, NarcLock’s electronic cylinders can be retrofitted into almost any existing lock hardware.

  • NarcLock’s cylinders can be used for lock boxes, cabinets, doors, containers, vehicles, closets, gates, and more
  • No wiring or power is needed to operate, so locks will continue to work during power outages
  • Electronic audit trail in lock stores 1,500 unique access events
  • With no traditional keyway, locks cannot be picked using traditional lock-picking methods
  • All locks are manufactured in the United States

Electronic Smart Key

NarcLock’s electronic smart keys are used to access NarcLock’s access control locks. Each key stores stores individual access permissions and schedules. If a NarcLock key attempts to access a NarcLock access control lock it doesn’t have permission for, access will be denied. A key can be programmed to access multiple locks, eliminating the need for large key rings.

  • Keys can be programmed to only access specific locks during specific schedules
  • Electronic audit trail in key stores 3,000 unique access events
  • Each key has a unique ID that cannot be duplicated
  • Rechargeable
  • All keys are manufactured in the United States

Administrative Software

Administrative cloud-based software allows an agency to manage and monitor all aspects of the NarcLock security system. The user-friendly platform is where you will be able to add personnel, assign keys, view access activity, create schedules and much more. With the cloud-based software, you will be able to make changes remotely from any laptop, computer, tablet, and even cell phone.

Yes, the electronics are sealed, for installation indoors and out. NarcLock cylinders are designed to operate in a variety of environments.

No, NarcLock cylinders have no keyway and cannot be picked like a mechanical lock. NarcLock cylinders resist forced rotation and, if tampered with, are designed to remain in the locked position.

No, NarcLock cylinders fit into the lock hardware just the same as the mechanical cylinders they replace. The lock hardware will operate in the same fashion as before the NarcLock cylinder was installed.

In less than a second, the lock and key synchronize: they exchange unique IDs, compare access codes, validate the list of authorized locks, confirm the current time is within the authorized window, and ensure the key is not on the lock’s list of lost keys. If everything is validated, the lock will open.

There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be set to expire. These expirations are flexible and can be set according to specific security requirements: hourly, daily, weekly, or monthly expirations are common examples. When a key with a near-term expiration is lost, no action may be required. When a key with a long-term expiration is lost, creating unacceptable risk exposure, vulnerable locks can be reprogrammed to load the lost key ID into the lock memory and prevent that key from working.

A key can access up to 12,000 locks.

The key permissions, access schedules, and audit trail are maintained even if the battery dies but the clock inside the key may need to be reset. This can be done by updating the key right after recharging or replacing the key battery.

Keys are updated and programmed via communication devices. When a NarcKey and a communicator make contact, the audit trail is downloaded from the key while simultaneously new schedules, permissions, and system information are uploaded to the key. Communication devices are linked to NarcAudit software over a local area network or securely over the Internet.

Yes, several communicators such as the Authorizer System and NarcKey Vault key cabinets include backup power options and built-in memory to store key configurations.

The most common approach is to use a Generation 2 NarcKey which can program, update, and download locks in the field.

An audit trail is a list of activity recorded by locks, keys, and communicators. Typical audit trail records contain information about events that occurred within a lock and/or key. It includes the date and time of the occurrence. Other audit trail data includes information related to communicators, such as when a NarcKey Vault was accessed.

Yes, all versions of the software are accessible through a standard web browser, even on a smart phone or tablet.

Read Our Article In EMS World: