Gallagher Cardholder Import – driving business efficiencies across organisations
Product Profile
The advantages of using Cardax FT Cardholder Import are:
- A single source of records is used, minimising the possibility of errors.
- Predetermined access criteria based on source record data can be set up.
- The process can be set up to run automatically reducing manual operator data entry.
The Cardax FT Cardholder Import utility has been developed to allow third parties to dynamically load information into the cardholder database. This feature can be used to load cardholders for new installations, and to synchronise cardholder data on an on-going basis with other applications and databases within your organisation.
The Cardax utilities have been written with maximum flexibility in mind to allow connection to virtually any database.
Technical Specification
| Make | Gallagher |
|---|---|
| Manufacturer | Gallagher Security (Europe) Ltd |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | Cardholder Import |
| Additional info | Gallagher Cardholder Import provides the ability for cardholder data to be imported from external sources using standard software functionality known as XML Interface. Typical sources of data include a student enrolment database or a company's HR database, from a system such as SAP. The advantages of using Gallagher Cardholder Import are a single source of records can be used, minimising the possibility for errors; predetermined access criteria based on the source record data can be set up and the process can be set up to run automatically reducing manual operator data entry. |
Related Whitepapers
Cyber security and high security in a business integrated world
5 reasons to integrate mobile technology into your security solution
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

