Skip to main content

CAW Enterprise

Back to Home

Transform complex access management into watertight control. Manage all your keys, authorizations, and reporting from one central platform.

CAW Enterprise

Cyber Audit Web (CAW-Enterprise) is the central management platform within the CyberLock ecosystem. Access control is set up, managed, and made verifiable here.

The platform is the control layer of the system: software and hardware are developed as a single entity. Policy is defined here, execution is managed, and actions are visible through logging, reporting, and real-time notifications.

Who is granted access, under what conditions, and with what authorizations is determined and managed here according to the need-to-be and need-to-know principles. Authorizations are dynamic based on role, location, time window, certifications, or other context-specific conditions.

For organizations where access management is part of good governance and risk management, this is a prerequisite.

Subsystems

Each entity operates within its own delimited environment. There is no visibility or data exchange between subsystems, unless explicitly configured.

No cross-rights

Administrative rights are tied to the own subsystem. An administrator cannot view or modify authorizations in another subsystem.

Object sets

Cylinders, keys, and communicators are grouped by subsystem. This prevents mixing and simplifies audits.

Multiple management domains

Separate environments for tenants and property management, or for operational and facility management, each with its own roles, rules, and reporting.

Licenses and scalability

CAW Enterprise grows with you without a platform switch or migration.

Hosting and deployment

– SaaS (within the EU)
Shared cloud environment with standardized setup and management.

– SaaS Private Pace (within the EU)
Own tenant or dedicated environment.

– On-premise
Installation within your own IT environment.

Access structure

The following is being configured within CAW Enterprise:

– Organizational structure
– Assets and object groups
– Schedules
– Authorization roles and management roles
– Link between access carriers and rights.

All Devices

Access rights and validation

Authorizations are distributed to access carriers and components via the communication layer:

– Electronic keys
– RFID cards or fobs
– Smartphones
– Other supported means of identification

Teamwork

Usage and logging

All events are recorded in real time:

– Access events
– Configurable notifications for anomalous behavior or unauthorized attempts
– Complete audit trails per access device, per cylinder, per time period
– Exportable reports for internal control and external audits

Integrations

Let's start a conversation.
Sellox thinks along with you.

CONTACT CONTACT