Protection from curb to core

Residential Security Handbook 2022: Smart Living Access Control & Identity Management, Integrated Solutions, Residential Estate (Industry)

Protecting our assets and families remains one of our main priorities. Tarryn Fortune, business development manager for Gallagher, discusses how Gallagher’s intelligent access control management, powerful emergency response capabilities, mobile access solutions, integrations into third-party systems, and effective cardholder and credential management, can efficiently and reliably manage all access permissions for home owners, contractors and visitors to estates.

Gallagher designs and develops technology that ensures you are protected from the curb to the core. Gallagher mobile solutions allow you to take your security on the move. “Whether it’s the flexibility to monitor a system from any location, or the convenience of using a smartphone in place of an access or ID card, our range of mobile solutions are designed to deliver user-friendly technology, underpinned by the strongest security,” says Fortune.

In the event of a security emergency, Gallagher’s access control solutions allow you to quickly lock down your site with the push of a button. The Broadcast Notifications feature enables you to update home owners and security personnel about potential hazards or shutdowns via SMS or email, delivering critical information directly to those who need it.

Delivering more than traditional access control, Gallagher provides integrated identity management for home owners, contractors and visitors, providing oversight of cardholder locations at all times.

Gallagher’s Visitor Management provides a targeted user interface for reception staff to manage the arrival and departure of visitors – including updating visitor details, capturing ID photographs, printing visitor labels, assigning escorts and providing visitor access cards, all within the POPI Act requirements. The system provides automated email/SMS communication to notify hosts of a visitor’s arrival or alert staff about a visitor whose time on site has expired.

The guard tour feature allows a number of guard checkpoints to be set up to manage a guard through a site tour route. If a guard arrives outside of the allowed times, an alarm is generated to provide protection for the guard and residents, with a real-time display showing the guard tour progress in the security control room.

Gallagher’s perimeter intrusion detection solution consists of a grid of high-tensile wires and accompanying monitoring hardware that can be constructed inside a new or existing perimeter fence. “Our range of physical applications, with monitored wires and adjustable sensors, means there is no comparison for deterrence, detection and delay at the perimeter,” says Fortune.

With the use of Gallagher Command Centre’s advanced site plans and integrations, Gallagher can provide all your security sub-systems on one user-friendly, interactive and informative platform, offering complete site protection from curb to core.


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Cloud-based or on-premises access control
Salto Systems Africa Access Control & Identity Management Products
Choosing between cloud-based and on-premises access control solutions can be a difficult decision, however, the best solution for your organisation, property, or building type will depend on a range of factors.

Improved security health check tool
Gallagher Access Control & Identity Management Products
Gallagher Security has streamlined its free Security Health Check tool, making it easier than ever to protect against potential system risks and improve business efficiencies.

Suprema showcases integrated security solutions
Suprema Access Control & Identity Management Products
Apart from being an access terminal that supports multiple credentials such as facial recognition, RFID, mobile and QR codes, the BioStation 3 also supports VoIP Intercom and real-time video monitoring features to make it a truly multi-functional reader.

Success in business process best practices
Technews Publishing Kleyn Change Management Editor's Choice Integrated Solutions Security Services & Risk Management
This month we commandeer time with the woman who is spearheading our national conversation on Women in Security, Lesley-Anne Kleyn, to get to know the lady herself a little better.

Local electronic locks
Access Control & Identity Management
YeboTech is an electronics manufacturing company, founded in 2005, which designs, markets and sells an electronic key and locking systems, aimed at replacing all conventional mechanical locks.

Selecting the correct access control system
Enkulu Technologies Access Control & Identity Management
Frazer Matchett, Managing Director of Enkulu Technologies, suggests the right questions to ask when selecting an access control solution; not just the access system, but the integrated solution that fits your requirements.

Integrated guarding services
XtraVision Integrated Solutions Access Control & Identity Management Industrial (Industry)
XtraVision offers a few tips on how to go about planning and setting up an integrated approach to sustainable and successful security services, from the initial risk assessment to the technology and people required.

Paxton secures multi-tenant office in Cape Town
Paxton Integrated Solutions Access Control & Identity Management Products
Cecilia Square in Paarl, Cape Town is an office building from where several businesses operate. The multi-tenant site has recently undergone a full refurbishment, including a complete upgrade of its security system for access control.

AI face recognition OEM module
Suprema News Access Control & Identity Management Products
Suprema AI, a company specialized in artificial intelligence–based integrated security solutions, recently launched its high-performance face recognition OEM module called ‘Q-Face Pro’ in response to the growing need for contactless security solutions.

Bi-directional integration of Gallagher and Qognify
Gallagher Integrated Solutions Products
In a world of converging technology ecosystems, siloed solutions are no longer viable; this applies in particular to physical security, where only combined information enables a comprehensive assessment of a situation and a timely response.