Download PDF version Contact company
 Ian Meadows, BDM, Gallagher Security has been asked to present information on the benefits of incorporating an integrated access management platform into education facility management

Visitor management & Access control by Gallagher Security

EasyLobby, the industry leader in secure visitor management solutions, has announced the availability of a visitor management and access control integration module with Gallagher's access control systems.

The integration module allows customers using Gallagher's access control systems and EasyLobby's visitor management solutions to be able to issue different levels of access to visitors, contractors and employees directly from the EasyLobby SVM (Secure Visitor Management) visitor station. An access control proximity card or other credential can be activated from the EasyLobby station for that visitor. When the visitor checks out, the credential is automatically deactivated. Cards do not have to be pre-programmed and they can be reused.

"Many organizations want this type of integration between our visitor management system and their access control system to provide access to a turnstile, door, or elevator," said Howard Marson, CEO of EasyLobby. "This tight integration with Gallagher access control products gives our joint customers more flexibility to quickly and easily grant proximity card (or barcode) access to visitors or contractors that require it without lobby attendants needing to interface with the access system."

"This seamless integration with EasyLobby visitor management is particularly important to our customers as they deploy Gallagher's Command Center FT throughout their organization to control access for both employees, visitors, contractors and temporary employees," said Guerry Bruner, Director of Sales for Access Control, USA. "We recognize this as a more efficient method for lobby attendants to manage visitor access as well as account for all personnel on-site should a critical event occur."

Download PDF version Download PDF version

In case you missed it

Comprehensive K12 Security
Comprehensive K12 Security

For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdle...

Choosing The Right Fingerprint Capture Technology
Choosing The Right Fingerprint Capture Technology

Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabili...

How Do New Security Technologies Transform Retail And Loss Prevention?
How Do New Security Technologies Transform Retail And Loss Prevention?

When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillan...