ASSA ABLOY showcases latest digital access solutions

May 2019 Editor's Choice, Access Control & Identity Management, News & Events

ASSA ABLOY hosted a breakfast at the Country Club Johannesburg in Woodmead on 2 April, to showcase the company’s latest and greatest digital access solutions. By exploring the use-case of a retail shopping environment, local and overseas ASSA ABLOY specialists highlighted the various features and benefits the company’s range of technologies can offer.

eCLIQ padlock, key and cylinder.
eCLIQ padlock, key and cylinder.

In particular, the event was an opportunity to introduce eCLIQ to the local security market. Based on ASSA ABLOY’s group-wide CLIQ technology, eCLIQ allows the user to set up flexible access rights and schedules through the use of programmable keys and cylinders. Rather than requiring multiple keys for multiple locks, it allows a person’s various access rights to be programmed into a single electronic key, which also acts as storage for audit trails (see https://www.securitysa.com/62052n).

A wide range of locking cylinders is available, which can be installed in a matter of minutes. It can be installed in doors as well as anything else where a lock would typically be required, such as cabinets and server doors. Programming and management can be performed with the use of either a desktop or web-based software platform. Key programmers are available in desktop, wall-mounted and mobile versions, and a mobile phone app provides an additional programming method.

“We are really excited to be launching the new eCLIQ system, and it was great to have so many industry professionals join us for the event,” commented Hayley Elwen, ASSA ABLOY’s business development director for Africa.

For more information contact Hayley Elwen, ASSA ABLOY, +27 11 761 5000, [email protected], www.assaabloy.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

AI-enabled tools reducing time to value and enhancing application security
Editor's Choice
Next-generation AI tools are adding new layers of intelligent testing, audit, security, and assurance to the application development lifecycle, reducing risk, and improving time to value while augmenting the overall security posture.

Read more...
Perspectives on personal care monitoring and smart surveillance
Leaderware Editor's Choice Surveillance Smart Home Automation IoT & Automation
Dr Craig Donald believes smart surveillance offers a range of options for monitoring loved ones, but making the right choice is not always as simple as selecting the latest technology.

Read more...
AI enables security solutions to define business strategies
Regal Distributors SA Editor's Choice
While allowing technologies to do exactly what they should do with even more efficiency and precision, AI is also empowering these same technologies to break through their traditional boundaries and create an ecosystem where one interface delivers outcomes across highly segmented verticals.

Read more...
Putting cyber into surveillance
Dallmeier Electronic Southern Africa Cathexis Technologies Technews Publishing Editor's Choice
Cybersecurity has become an essential part of the physical security industry. However, unlike other IoT technologies, of which security products are a part, surveillance technologies have more to protect.

Read more...
2024 State of Security Report
Editor's Choice
Mobile IDs, MFA and sustainability emerge as top trends in HID Global’s 2024 State of Security Report, with artificial intelligence appearing in the conversation for the first time.

Read more...
Cyberthreats facing SMBs
Editor's Choice
Data and credential theft malware were the top two threats against SMBs in 2023, accounting for nearly 50% of all malware targeting this market segment. Ransomware is still the biggest threat.

Read more...
Are we our own worst enemy?
Editor's Choice
Sonja de Klerk believes the day-to-day issues we face can serve as opportunities for personal growth and empowerment, enabling us to contribute to creating a better and safer environment for ourselves and South Africa.

Read more...
How to spot a cyberattack if you are not a security pro
Editor's Choice
Cybersecurity awareness is straightforward if you know what to look for; vigilance and knowledge are our most potent weapons and the good news is that anyone can grasp the basics and spot suspicious activities.

Read more...
Protecting IP and secret data in the age of AI
Editor's Choice
The promise of artificial intelligence (AI) is a source of near-continuous hype for South Africans. However, for enterprises implementing AI solutions, there are some important considerations regarding their intellectual property (IP) and secret data.

Read more...
Super election year increases risks of political violence
Editor's Choice
Widening polarisation is expected in many elections, with terrorism, civil unrest, and environmental activism risks intensifying in a volatile geopolitical environment. Multinational businesses show an increasing interest in political violence insurance coverage in mitigation.

Read more...