• Collect regular audit trails

    Transparent event logs ensure fast, effective investigation of any incidents

  • Encrypted data transfer

    Communication between keys and system benefits from AES128 encryption

  • Compatible with all keys

    When users carry one programmable key, access management is more flexible