Simplify your business security
Arm and disarm your alarm
Say goodbye to keys and shared alarm PIN codes.
Instead, activate the alarm from anywhere, at any time using your smartphone. Set the Late to Arm notification so you know your business is secure, even when you’re not there. Use Bluetooth® to arm your site locally when internet connectivity is unavailable.
Easily manage unlimited users
We’ve made it simple to add, edit, and remove an unlimited number of users, and manage which parts of the building they can access – even temporary users like contractors and cleaners. You’ll see who has activated the alarm or requested access at doors using the History log.
Control your doors
Lock and unlock doors using your smartphone or a Gallagher SMB Key Tag. Configure the doors to be locked 24/7, requiring users to request access at the reader, or set a schedule for when doors should be unlocked.
Manage multiple sites
If you manage multiple sites, you can control the security of them all from one app. Easily switch between different locations of your business using the same app, or between your business and home.
Control in your hands, wherever you are
Self-monitor your site
We’ve made it simple for you to manage security incidents, should your alarm be triggered. You’ll get notified as soon as it occurs and receive details about what is happening on your site. You’ll can then decide what to do next - investigate further, silence the alarm, or request a security guard to check on your site (AU & NZ only).
Third-party monitoring
With Gallagher security, you can also opt for your system to be configured to third-party monitoring. If your alarm is triggered, the
monitoring company will notify relevant parties in accordance with an agreed action plan. This could be people from your site, your security technician, or a guarding company who will send someone to check your premises.
Cloud-based security
Gallagher security for SMB is a cloud-based solution, allowing you to manage your security from anywhere, at any time. The system requires no on-site server, or dedicated security staff. It is automatically kept up-to-date with the latest firmware, security updates, and functionality.