Page 3 - iLOQ Canada Brochure v1_WEB
P. 3

Unbeatable benefits for building owners,
locking system administrators and end users

No batteries,                           Completely
wires or WiFi                           keyless access

iLOQ lock cylinders need                Your cellphone is the only key you
no batteries, electricity or            need. Access rights for all your
internet connection minimizing          entry points are sent to iLOQ’s
operating costs and maximizing          app running on your NFC-enabled
reliability and sustainability.         cellphone.

Easy retrofit,                          Secure cloud-based
no maintenance                          management

Our ANSI-compliant cylinders            Access rights are created, sent,
fit into existing door frames.          updated and canceled remotely
No need for drilling or changes         and in real time using iLOQ's
to the infrastructure. Fire and         secure software platform. Audit
security compliance remains.            trails help prevent or solve misuse.

Smooth                                  Optimized
integration                             user experience

API and SDK developer tools allow       iLOQ's app acts as a key and a power
integrations that prevent bottlenecks,  source. It also optimizes the user
improve user experiences and            experience by allowing residents to
reduce costs. Eliminate the need for    share access, open doors remotely
data duplication and multiple apps.     and book shared spaces.

        Maximized security with the
      lowest total cost of ownership

iLOQ’s innovative solutions harvest energy from an NFC-enabled cellphone eliminating the
  expense of purchasing batteries and the maintenance time and costs of replacing them.

The risks and expenditure involved with handling lost, stolen or unreturned mechanical keys
 are also removed making iLOQ the most secure and cost-effective solution in the market.

Minimize costs                          Maximize security

•	 Minimal lifecycle costs              •	 Consistent high level of security
•	 No physical keys needed              •	 Long-lasting reliability
•	 Access rights shared                 •	 No physical keys needed
                                        •	 Audit trails prevent misuse
    remotely and in real time
•	 Quick and easy administration

                                                                                             3
   1   2   3   4   5   6   7   8