High security capabilities
Our high security solutions deliver fully integrated perimeter security, access control, and intruder alarms management from one centralized platform. Our high security solutions are in use at sensitive and critical sites worldwide, from utilities and civil infrastructure, to corrections and defense facilities.
With both hardware and software systems backed by professional services, we offer you an intelligent, powerful way to ensure business continuity, protect your assets and keep people safe.
Personal Identity Verification
Personal Identity Verification (PIV) solution, purpose built and approved for the United States, delivers exceptional security with the fastest form of authentication for the federal market.
Compliant with the latest Federal Information Processing Standards (FIPS) 201, its simple, effective and efficient end-to-end architecture enforces business policies, identity and credential management for all government employees and contractors.
ICD-705 US SCIF Standard
We strive to maintain the highest levels of security and standards compliance. Our solution complies with the ICD-705 US SCIF Standard, a USA Intelligence Community Directive that provides physical and technical standards for all Sensitive Compartmented Information Facilities (SCIF).
Cyber Assurance of Physical Security Systems (CAPSS)
Our solution is compliant to the UK CPNI CAPSS standard around cyber security for critical national infrastructure. CAPSS is designed to assist security managers in focusing on key areas when it comes to protecting against cyber attacks.
Security Construction and Equipment Committee (SCEC)
SCEC is an inter-departmental committee responsible for the evaluation of security equipment for use by Australian Government departments and agencies. The evaluation conducted by SCEC includes comprehensive breach testing, whereby all manner of attacks are employed to test the strength of a solution. Gallagher has a range of SCEC tested perimeter products that are available for deployment globally.
How to recognize a cyber-responsible vendor in a business integrated world
- Encryption and authentication
- Assured compliance
- Ease of use and control
- Secure devices
- Ease of patching
- Security hardening guide