Gallagher Reporting retrieves and reports on stored information

Technical Specification

Features:
  • Make: Gallagher
  • Model code: Reporting
  • Visitor Management: Yes
Additional info:

Retrieve and report on stored information including events, alarms, cardholders, cardholder location, resource utilization, and site items. Configure reports to run on a repeating schedule or in response to events such as a fire alarm. Schedule the generation of reports and email automatically to recipients. Access reports easily through a ‘find reports’ viewer or ‘favorites’ list within Command Centre. Filter report content using parameters such as competency status, card type and cardholder’s last entered zone. Configure the report page layout and file output type (.doc, .xls, .pdf or .csv). Report on visitor data (when used with optional visitor management tools). View additional reports, including evacuation, access, time and contextual reporting. Report on security events from an individual server, or from multiple servers within a multi-server network.

Read more
Make Gallagher
Manufacturer Gallagher Security (Europe) Ltd
Category Access Control>Access control software
Model code Reporting
Visitor Management Yes
Additional info
  • Retrieve and report on stored information including events, alarms, cardholders, cardholder location, resource utilization, and site items.
  • Configure reports to run on a repeating schedule or in response to events such as a fire alarm.
  • Schedule the generation of reports and email automatically to recipients.
  • Access reports easily through a ‘find reports’ viewer or ‘favorites’ list within Command Centre.
  • Filter report content using parameters such as competency status, card type and cardholder’s last entered zone.
  • Configure the report page layout and file output type (.doc, .xls, .pdf or .csv).
  • Report on visitor data (when used with optional visitor management tools).
  • View additional reports, including evacuation, access, time and contextual reporting.
  • Report on security events from an individual server, or from multiple servers within a multi-server network.
Download PDF version Download PDF version

Related Whitepapers

Cyber security and high security in a business integrated world

5 reasons to integrate mobile technology into your security solution

Access and security in the age of hybrid working

Quick poll
What is the most significant challenge facing smart building security today?