Check out our special report on casino security
Gallagher Visitor Management
Technical Specification
- Make: Gallagher
- Model code: Visitor management
- Photo ID: Yes
- Visitor Management: Yes
- Operating System: Microsoft® Windows® 7
Visitor Management is an optional licensed feature of Gallagher Command Centre, delivering extensive pre-registration and reception-based visitor management functions. Optional visitor self-registration capability is available using the touch-screen enabled Visitor Management Self-Registration Kiosk. The Kiosk allows visitors to sign-in for a visit independently of the receptionist. On completion of sign-in their host is automatically notified of their arrival via email or SMS. Hosts can manage their visitors onto and off-site from the Kiosk, including the ability to issue visitor cards and assign access, update the visit details or reprint visitor labels. Hosts of visitors who are overdue to leave are automatically notified for follow-up action.
Read more| Make | Gallagher |
|---|---|
| Manufacturer | Gallagher Security (Europe) Ltd |
| Category | Access Control>Access control software |
| Model code | Visitor management |
| Photo ID | Yes |
| Visitor Management | Yes |
| System Requirements | Operating System: Microsoft® Windows® 7 |
| Additional info |
Visitor Management is an optional licensed feature of Gallagher Command Centre, delivering extensive pre-registration and reception-based visitor management functions. Optional visitor self-registration capability is available using the touch-screen enabled Visitor Management Self-Registration Kiosk. The Kiosk allows visitors to sign-in for a visit independently of the receptionist. On completion of sign-in their host is automatically notified of their arrival via email or SMS. Hosts can manage their visitors onto and off-site from the Kiosk, including the ability to issue visitor cards and assign access, update the visit details or |
You might be interested in these products
Related Whitepapers
Cyber security and high security in a business integrated world
5 reasons to integrate mobile technology into your security solution
Access and security in the age of hybrid working
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
