One lock to rule them all?

Issue 3 2021 Financial (Industry)

It is hard to think of somewhere with more critical security needs than a bank. While cybersecurity grabs the headlines, in the day-to-day business of banking, physical security of people and assets is paramount.

We’ve all seen the heist movies. Of course, in the real world, bank security is more complex than fitting the biggest titanium door you can find. Buildings, ATM housings and cash-in-transit delivery services all have totally different workflows, but each demands high-security locking they can trust, just like a vault.

Could a single locking technology accommodate such a diverse range of needs?

Trusted security and a safety net

eCLIQ is a multi-layered locking system which combines key-operated mechanical and electronic protection. A range of high-security cylinders and padlocks for applications beyond doors maximise physical security and attack resistance. CLIQ technology then layers encrypted, user-friendly electronic security on top – adding control and convenience without the need for wires: all eCLIQ locks for doors, padlocks, cabinets, lifts, gates and any relevant machines are wireless. Power to the lock’s microelectronics comes from a standard battery inside every programmable eCLIQ key.

These layers of physical and electronic security work together to give banks a safety net should a key go missing. Any lost eCLIQ key’s access rights are simply removed, instantly, using the system software and it no longer opens any door, vault or ATM.

Easy installation, easy management

Because it’s a key-based solution, eCLIQ offers a simple step up from mechanical security to powerful access control, with no change to existing hardware like doors. Retrofitting is hassle-free.

The secure CLIQ Web Manager software interface works on any standard browser, or on an intranet with multi-factor log-in authentication for administrators. Facility managers can control workflows by tailoring every user’s access permissions, without bulging key-chains or having to design a complicated, expensive key management system. One programmable (and reprogrammable) key covers all their needs.

Areas requiring special clearance are easily defined and access to them restricted to specific staff. If multiple system administrators are required, CLIQ handles it – even across different sites or time-zones.

Facility managers can place programming devices at strategic points – near the staff entrance, say – for employees or contractors to revalidate their permissions regularly. Shorter access rights validity instantly upgrades security in a banking hall or back-office.

Equally, the CLIQ system can generate an audit trail for any lock or user on demand, thereby streamlining incident investigation. Programming devices collect audit trails at the time of reprogramming. CLIQ functionality saves you time and money.

CLIQ can secure more than just doors. Cylinders are ideal for ATM housings and bank staff or third-party vendors don’t even need to carry another key to unlock the ATM. Their single key is programmed to open just the right ATM at the right time – a secure and controlled workflow. Every opening is tracked and audited within the same Web Manager software.

Protecting cash on the move

Running a cash transit department or business adds another variable to the security mix: staff and cash are always on the move and the entire workflow must be secured. If you are back at HQ to collect a key, you are wasting time and fuel. An extension of the same system – CLIQ Connect technology – has it covered.

With CLIQ Connect, a key-holder no longer needs to update access rights physically in person by returning to base or even by moving to the nearest location with a programming device. All they need is a smartphone, the CLIQ Connect app and a secure Bluetooth connection.

If you need to redirect a cash collection team while they are on the road, you just set new access permissions for a building or ATM within the Web Manager. The key-holder makes a secure Bluetooth connection between their programmable CLIQ Connect key and the app to instantly update their permissions. They can now open the necessary locks at their new destination.

The online opening function of CLIQ Connect can even contribute to secure sequence unlocking for cash collections. For example, locks can require key-operated unlocking within 60 seconds of access also being authorised by a system administrator.


Credit(s)





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...
SMARTpod talks about HomeSec Expo 2026
SMART Security Solutions Technews Publishing News & Events Residential Estate (Industry) Videos
SMARTpod, the podcast from SMART Security Solutions, finds out more about the upcoming HomeSec Expo happening at Gallagher Estate on 4 & 5 March 2026.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.