|
|
Encrypted comms |
|
Information is transferred between the cabinets and your database using 256-bit AES encryption.
|
|
|
|
|
Tamper-proof construction |
Extreme cabinets contain a three-point locking system on the door, internal baffling for cable entry points, solid welded seams and an internal cover plate to hide mechanisms.
|
|
|
|
|
No plastic |
|
Extreme’s locking mechanisms, holder keys and tamper-proof barrels all have a metal construction – more secure and reliable than plastic.
|
|
|
|
|
Same-user return |
|
Enforce this rule on specific keys to ensure that the user who takes them is the same one to return them. This adds an extra layer of security to your audit trails.
|
|
|
|
|
Multi-custody |
|
You can make sure that certain keys will only release if more than one person is present to sign them out.
|
|
|
|
|
Dual authentication |
|
All cabinets require two points of authentication before the door will open – typically Prox and PIN (or User ID and PIN).
|
|
|