Gallagher Personalized Actions access control software
Technical Specification
- Make: Gallagher
- Model code: Personalized Actions
- No of Cardholders included: 250
- Reader Types: Card
Personalized actions are individually programmed responses that are configured for individual cardholders or an access group – such as switching on lighting or air-conditioning in a specified zone. These responses are initiated on a cardholder’s ‘access granted’ or ‘access granted and taken’ event, with up to 250 individual cardholders or access groups able to be defined for each access zone. All authentication methods to identify the cardholder are supported, including, for example, PIN only access events and those from third-party systems integrated via the Controller application programming interface.
Read moreMake | Gallagher |
---|---|
Manufacturer | Gallagher Security (Europe) Ltd |
Category | Access Control>Access control software |
Model code | Personalized Actions |
No of Cardholders included | 250 |
Reader Types | Card |
Additional info |
Personalized actions are individually programmed responses that are configured for individual cardholders or an access group – such as switching on lighting or air-conditioning in a specified zone. These responses are initiated on a cardholder’s ‘access granted’ or ‘access granted and taken’ event, with up to 250 individual cardholders or access groups able to be defined for each access zone. All authentication methods to identify the cardholder are supported, including, for example, PIN only access events and those from third-party systems integrated via the Controller application programming interface. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Cyber security and high security in a business integrated world
5 reasons to integrate mobile technology into your security solution
Access and security in the age of hybrid working
A modern guide to data loss prevention
DownloadThe truth behind 9 mobile access myths
Download7 proven solutions for law enforcement key control and asset management
DownloadAccess control system planning phase 2
DownloadSecurity practices for hotels
Download