Help and Support

Choose your location and language settings

Hong Kong

|

English

Global

Germany

Switzerland

United Kingdom

Ireland

France

Netherlands

Belgium

Spain

Portugal

Italy

Russia

Poland

Czech Republic

Denmark

Sweden

Norway

Finland

USA

Canada

Mexico

Colombia

Chile

China

Korean

Singapore

Hong Kong

Vietnam

Japan

Australia / New Zealand

UAE

South Africa

India

Electronic Cylinders

Any building. Any function. Any model or door standard – Salto offers the perfect electronic cylinder lock.

The electronic door lock cylinder from Salto is the perfect solution for doors where fitting an electronic lock is either not possible or not required. Compact and wire-free, it can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors, and more. This electronic cylinder is available in an extensive range of models to suit almost any kind of door – from Europe, Scandinavian to Australia or the Americas ANSI standards.

Salto leads the market in innovative, high-tech solutions. With greater connectivity between doors, users, and system operations, our hardware and software solutions deliver cutting-edge access control and security for any scenario.

  • An electronic cylinder lock integrates with smart cards or mobile access systems to provide secure yet convenient user authentication and access control.

    Users are issued smart keycards or mobile credentials with unique IDs that contain customised access levels and rights. To open doors, a user holds their keycard or smartphone close to a reader, which is attached to the electronic cylinder knob. The smart cylinder then verifies the smart card data against authorised user information, calendars, and access rights. If that authentication is successful, the door unlocks.

  • Electronic door cylinders offer enhanced security, flexibility, and convenience compared to traditional mechanical locks:

    • Allow for easier access rights management
    • Provide remote access
    • Offer features such as audit trails, allowing operators to track movement through every door
  • Electronic cylinders come in various types. Each model delivers different features and is compatible with different door types. Levels of security may also vary. So, no matter the access need or preference, there’s a smart cylinder solution for every use case.

    Smart cylinders are designed for doors where fitting an electronic lock is impossible or not wanted. They can be installed on standard doors, server racks, gates, cabinets, electric switches, and sliding doors, among others. An extensive range of models is available to suit almost any kind of door, almost anywhere in the world.

FAQs

Answers to frequently asked questions about electronic cylinders.

  • Electronic cylinder installation can vary depending on the specific cylinder model, existing door hardware, and the door type.

    Installing an electronic cylinder lock requires only basic tools such as screwdrivers, a suitable power source – like batteries – and a configuration tool such as a PPD (Portable Programming Device) or a smartphone. Follow the instructions to ensure compatibility, and test the electronic cylinder carefully after installation.

    Some electronic cylinder models are relatively easy to install, while others may require more time and expertise. Read the installation instructions provided by Salto carefully and, if necessary, seek assistance from a certified Partner.

  • Yes – smart electronic cylinder locks incorporate strong encryption, robust authentication methods, and vandal-resistant designs. They offer the highest security levels when best practices are observed in their installation and use.

    Secure installation practices as well as regular firmware updates and maintenance mitigate potential vulnerabilities, too. To maintain security, monitor the smart cylinder locks’ access logs, and periodically review and update users’ credentials and access rights.

    Such measures, along with basic maintenance, allow operators to minimise the risk of unauthorised access while ensuring the system’s integrity. This should be part of a broader security policy that includes regular audits, training, and proactive measures to identify and address potential vulnerabilities.

View all products