Skip to main content

Mobility and Public Transport

Back to Home

Metro, tram, bus, veer, stations en depots.

24/7 availability and predictable management with incident-driven access. Offline opening is a prerequisite. Mobile validation often works well but may be limited by technical or policy. Keyless is possible for specific processes but is not the default.

Policy in brief

  • Mobile validator: often, sometimes limited
  • Keyless to the lock: limited, only with specific requirements
  • Flex (optionally wired): for vital infrastructure objects
  • Default issuance: named
  • Integrations: sometimes
  • Publication: no specific locations or asset names

Context and assets

Access is distributed across lines, stations, depots, and technical rooms. Network limitations occur. Management is layered with team structures and many external parties.

Recommended setup

Rights-based access with a key as the basis.

Mechatronic cylinders and padlocks as standard on exterior assets and technical rooms. Offline opening with central authorization and audit trail.


Mobile validation where appropriate

Deploy where IT policy and operations support it. Otherwise, the process continues to operate via management points.


Keyless selective

Only in the event of concrete process gains, such as temporary access with strict time windows and limited profiles.


Update points and management points

Management points at workshops and depots for periodic synchronization.


Issuance and vault process

The default is key on the person. Key programming safes for frequent temporary access with changing contractors, or chain of custody with mission and PIN code.


Flex (wired)

Flex for wired applications with online I/O, such as signaling or process connections within a location.


Software and hosting

CAW Enterprise as the management base. EU-hosted shared for smaller to medium-sized environments. EU-hosted dedicated for segregation scale or integrations. On-prem if hosting is not permitted or if logging and IT governance must remain within the own domain.

Pitfalls within the sector

Design

Design as if mobile validation is always available

Keyless

Widely deploy keyless without tangible process gains

Governance

Relying governance on ad hoc synchronization instead of management points

Let's start a conversation.
Sellox thinks along with you.

CONTACT CONTACT