Company Overview

ALCEA protects critical infrastructure such as energy, water, telecom, transportation, mining, oil and gas globally with total security solutions.
alceaglobal.com

Featured Products

Traffic Enclosure Locks

Traffic Enclosure Locks Logo

ABLOY is the only company in the world with both High-Security Mechanical and High-Security Electronic Locks to protect your critical infrastructure. The new 75481 series ABLOY Traffic Enclosure Lock is an effective solution for quickly upgrading ITS infrastructure. This flexibility provides a powerful and affordable solution because typically only about 20% of cabinets actually need electronic locks. Watch our video to see how the Traffic Enclosure Lock has evolved over the years. Contact us today for a product demonstration.

 Find Out More >>

InfraLOCK™ High-Security Locking Manhole System

InfraLOCK™ High-Security Locking Manhole System Logo

InfraLOCK™ is a heavy duty Neenah manhole cover that incorporates the ultra-strong ABLOY® PLM340 padlock. The cover is furnished with a cast iron plug that conceals the weather-resistant padlock housing. Customers in gas, water, sewer, airports and telecom industries have asked for a highly engineered secure manhole that’s also extremely user friendly and simple to use. It operates just like a normal manhole cover.
Plus it integrates ABLOY access control technology to authorize and track individuals requiring physical access inside their security perimeters.

 Find Out More >>

Abloy eCLIQ

Abloy eCLIQ Logo

ABLOY USA Critical Infrastructure introduces the U.S.A. to Abloy eCLIQ. A completely electronic cylinder platform developed by ASSA ABLOY, it is designed to be an alternative cost effective option for high security critical infrastructure applications & anywhere security is most important. eCLIQ provides the advantages of access control with all the benefits and security of a physical key system. Since it is a total electronic system, the only requirements are to download the app, activate the system by giving the keyholders their keys, then simply defining their access rights and programming the keys.

 Find Out More >>