Making your lobby work

August 2008 Access Control & Identity Management

For companies that have made significant investments in perimeter security and access control,

the ability to automatically screen and track visitors

is an essential part of a complete security plan. LobbyWorks claims to have a solution.

Each day scores of visitors pass through the entrances to business facilities. The ability to screen and track them can contribute substantially to the safety and protection of personnel and property.

The LobbyWorks Suite offers solutions that allow companies to:

* Determine who is in the facility at all times.

* Identify unwanted visitors.

* Eliminate abuse of visitor badges.

* Protect the confidentiality of visitors.

* Facilitate communication between hosts, visitors, and security personnel.

* Improve lobby and security desk productivity.

How does it work?

In a matter of a few seconds the system can:

1. Scan a business card or driver's licence to gather information about the visitor. For pre-registered and returning visitors, badges may already be waiting for the visitor upon arrival and simply need to be scanned for check in. If required, LobbyWorks can display visitation rules or a short safety video.

2. Take a photo of the visitor and match it with the visitor information.

3. Discretely perform security checks to ensure the visitor is expected, not on a visitor watch list and have the visit authorised in realtime. During registration, LobbyWorks also consistently checks the visitor information against a list of barred visitors. The use of such a list is crucial in securing today's business site.

LobbyWorks checks for potential matches based on names and aliases, driver's licence numbers, pictures and more. In addition, LobbyWorks checks the visitor's information against expected visitors and those who have been on site before to reuse their information and process them more quickly as returning visitors.

4. Print an individual professional badge with the visitor's name and photo, expiration time, host name, valid access areas and any other required information. Visitor badges can be printed on B/W thermal direct label printers, inkjet or laser colour printers or dye-sublimation printers. Visitor badges can have features such as time-expiring stamps or tamper-resistant inks.

5. While on site, LobbyWorks proactively tracks if the visitor signs out as expected. For expired visits, LobbyWorks can contact the host to check if the visitor is still on site. This ensures that visitors are monitored at all times and that hosts enforce your sign out policy.

In many facilities, despite significant investment in physical security, tracking of visitors is still a manual process. The registration of visitors in a paper logbook and issuing non-descript visitor tags is often the cause of lobby inefficiencies and is a source of potential security exposures.

The visitor logbook is often inaccurate and incomplete. It does not consistently include the host's name, visit location, or sign out time and therefore cannot be reliably used in cases of emergencies and forensic investigations. The problem is drastically compounded for facilities with multiple entrances and with separate logs for different types of visitors. In addition, the visitor tags issued to visitors can be easily abused by impostors. Most of all, this manual process is recognised by many companies as a missed opportunity to collect detailed and accurate information about visitors, encourage visitor pre-registration, consistently check for barred visitors, enforce mandatory visitor sign out policy, and proactively track visitors while on site.

The LobbyWorks Suite is simple to deploy and use, yet flexible and powerful enough to meet the needs of small and enterprise customers with diverse visitor management processes and policy requirements.

The LobbyWorks Visitor Management System Includes:

LobbyWorks Front Desk

Register and track visitors. Includes: photo ID/business card scan, photo and signature capture, badge printing, visitor sign in/out tracking, watch list filtering, emergency list report, delivery and asset tracking, visitor access card tracking and much more.

LobbyWorks Kiosk

Self-registration station for high traffic or unattended lobby. Ergonomically designed with voice coaching. Visitors enter their information and are then authorised remotely by a security desk or the host employee.

LobbyWorks Web Centre

Used by employees to pre-register their visitors and by authorised security personnel to view visitor traffic in realtime as well as validate, sign in and sign out visitors' badges.

LobbyWorks Notify

Used by employees at their workstation to get real-time pop-up when their visitor arrives or if their visitor requires immediate authorisation. Also used to proactively track expired visits.

LobbyWorks Reports

Allow authorised personnel to generate detailed visitor traffic reports and graphs for each day, week, month or year. View traffic per employee, visitor, department, location, building or company - true reporting flexibility at your fingertips.

LobbyWorks Administrator

Tap into LobbyWorks flexibility and power to tailor it to your specific facility and business needs. Control security policies for visitors and contractors, user permissions, badge and report templates and much more.

For more information contact Konrad Weinert, sales leader - Africa, Honeywell Systems Group, +27 (0)11 574 2500, [email protected], www.security.honeywell.com/za





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...