Gallagher Enterprise Data Interface allows configuration and synchronisation of cardholder data with with external enterprise systems

Technical Specification

Features:
  • Make: Gallagher
  • Model code: Enterprise Data Interface
  • Import/Export of Information: Yes
Additional info:

Replicates data maintained in a primary database (e.g. human resources database) in the Gallagher database. Allows migration of existing cardholder details from an obsolete security system over to the Gallagher system. Enables mapping of existing employee fields (e.g. personal details, group memberships, licenses etc.) to their Gallagher Command Centre equivalent (e.g. personal data fields, access groups, competencies etc). Allows mapping between systems of 1:1 or 1:many relationships Allows third party data used in the external system to be translated to more meaningful descriptions on import to the Gallagher system. Provides manual one-off migrations of cardholder data to the Gallagher database and/or automatically updates when triggered by changes made in a primary employee database.

Read more
Make Gallagher
Manufacturer Gallagher Security (Europe) Ltd
Category Access Control>Access control software
Model code Enterprise Data Interface
Import/Export of Information Yes
Additional info
  • Replicates data maintained in a primary database (e.g. human resources database) in the Gallagher database.
  • Allows migration of existing cardholder details from an obsolete security system over to the Gallagher system.
  • Enables mapping of existing employee fields (e.g. personal details, group memberships, licenses etc.) to their Gallagher Command Centre equivalent (e.g. personal data fields, access groups, competencies etc).
  • Allows mapping between systems of 1:1 or 1:many relationships
  • Allows third party data used in the external system to be translated to more meaningful descriptions on import to the Gallagher system.
  • Provides manual one-off migrations of cardholder data to the Gallagher database and/or automatically updates when triggered by changes made in a primary employee database.
Download PDF version Download PDF version

Related Whitepapers

Cyber security and high security in a business integrated world

5 reasons to integrate mobile technology into your security solution

Access and security in the age of hybrid working

Quick poll
Which feature is most important in a video surveillance system?





$common_vars['trending_topic_article_popup'][0]->title

Aperio C100: Wireless digital cylinders for access control