iDENTYTECH Visitors Management is an easy-to-use, web-based, enterprise-class visitor management system. The iDENTYTECH visitor management system is also a part of the iDENTYTECH access control solution which integrates biometric access control terminals, video management, intruder alarm system management & much more.
•A system administrator can easily create additional roles (users) such as members (companies or residents) and operators (security officers)
•Easily schedule a new visitors from anywhere by simply logging into your account on the internet
•Check visitors in and out, including enrollment of a biometric data in order to distribute to access control units
• Track who and where the visitors are visiting within a facility.
• Monitor a “Blacklist” of banned visitors
PAPERLESS REPORTING + ENVIRONMENTAL FRIENDLY
• Monitoring of scheduled visits and quick lookup of visit details
• Logging and tracking of all transactions
HOW DOES IT WORK?
iDENTYTECH VisitorsGate™ system is a cloud-based system. Each customer receives a proprietary domain address such as comapanyname.visitorsgate.com. The hosts (such as residents or companies within the facility) will be able to access the system by this URL. It is not required to be on-site in order to schedule new visitors, hosts can access the system any time from anywhere via the internet.
Together with an access control system (biometric terminals) installed on-site IdentyTech VisitorsGate™ provides a customer with complete residential and visitors management solution. The VisitorsGate™ system also integrates well with an existing DSX vehicle barcode scanning system(in case such a system installed on-site).
Once a visitor arrives on-site, his driving license is being scanned at one of the “Operator” stations. In case the visitor is found on the list of scheduled visits the system will automatically popup the visit details. In case the visitor is not scheduled, the operator has the ability to put a new invitation. In case the visitor was detected in the blacklist, the system won’t allow to check in the visitor.
The site administrator is able to block the visitors in case he finds suspicious or they are defined as trouble makers. The administrator of the facility is also responsible for registering new hosts (residents, companies, etc.). Each host (member) registered at the system receives a username and password and able to login to the system to schedule a new visit.
1. Visitor management application server on the cloud server accessible from the internet.
2. A local access control system which includes the following component
• Access control management
• Surveillance management (optional)
• Integration with an existing DSX system
• Barcode scanning system (optional)