Access Visitor Management Systems Guide

Author: Brian Rhodes, Published on May 11, 2018

"Who are you, and why are you here?"

Facilities that implement Visitor Management Systems hope they never need to ask that question to anyone, ever. While access control goes to great lengths to make sure only approved personnel are able to enter approved areas, they hardly ever handle 'temporary access' well.

For that, Visitor Management fills a niche, and claim to do a better job than the old, proven clipboard sign in sheets.

In this note, we examine visitor management systems, their common features, and how they are best deployed.

"*** *** ***, *** *** *** *** ****?"

********** **** ********* ******* ********** ******* **** **** ***** **** to *** **** ******** ** ******, ****. ***** ****** ******* goes ** ***** ******* ** **** **** **** ******** ********* are **** ** ***** ******** *****, **** ****** **** ****** 'temporary ******' ****.

*** ****, ******* ********** ***** * *****, *** ***** ** do * ****** *** **** *** ***, ****** ********* **** in ******.

** **** ****, ** ******* ******* ********** *******, ***** **************, *** *** **** *** **** ********.

[***************]

Three *****

*** ***** ******* ********** ******, ***** *** ***** ***** ***** for *** ******:

  • **************:** *** ** ******* ** ***** *** **** ******* ***** logging **. **** ********** **** ** ************ ****** ** ********* around * *********** ********* ** ********* ****, *** ** **** matches **** ******* **** * ******** *******, ********* * ********* employee. **** ***** **** **** *** *******'* ******** ** ******** tied ** * ********** **** *** ***** ******* ** * fully ******** ***** ***** ******, ********** **** ********.
  • **********:******* ****** *** ****** *********** *** **** ** ****** ** permanent *********, **** ******* ********** ******* ******* ********* *******, **** for ******** *********** ****** **** *** * *** ***** **** make ** ***** ******* ** ****** * '*******'. ** ******* is ******** ****** **** *** ******* * ********* ** ** temporary ******* ***** *********, **** **** ******* *** ** ********** by************ ********* *********.
  • *********:***** ********** *** ** ***** **** ******** ********, **** *********, of ******** *** ****. ********** *** ****-******** ********** **** ******** bases ** ******** ************** *****, ******* ********** ***** ***** ******* of ******** ** ********* *** ****** ******, ******* ******* *****, and ******* ***** *********** *****.

************, **** ******* *********** ******* **** **** ** ******* ******** and *** ***** ** *** **** *****.

Self-Service ** ***

* ****** ****** ** ******* ********** ******* *** **** *** designed ** ** **** ** ******** **** **** ***** *********** with *********. ******** *** ***** **** ******** ** ****** ***** details ***** **********, **** *** ********** ****** ******* ****** *** scenes ** ********* ****** ******* ********, ****** ***** ***** ** activity/visits, *** ********* *** *** ******** ** *** ******* ****** system.

******** *** ***** ***** ** ***** ******* **********, ******* ************ or **** ** ***** ********* ** ****** *** *******:

******* ** ****, * ******* ** ***** *******, ********* ******** access *******, **********, *** ****** ***********, *** ** **********.

Common **********

***** *** ***** *** ** ******** *** ******** ****** *** the ****** ****, **** ******* *** ***** ***** **********:

**** ** ** ******** ** **** ***:

Workstation & ****** ********

*** ******* ******** ** **, ******, ** ***** *****, ***** networked ** ** ****** ******* ********** ******, *** **** ********** stations ****** ****** *** **** ***** ***********.

**** **** *****, ******** *** '********' **** *** ******, *** often *********** ****** *********** ******* ******** ******** ** **** ********** areas. **** **** ******* ** ***** *** *** ********* *********** are *********, ** ******** ***** ***** ***** **** ** **** pictures ***** *** ******** **** ** ******* ********** **** *** issued.

ID "*******" ******

* ****** ******** ****** ****** ** * *******, *** **** paper ***** ****** ********* ******* * ***** ***** *** ***** printout ** *** ************ *******. **** ********* *** ******* ***** 'ID *******', ***** ***** ******* *** ****** ******* ** **** surveillance ******* ** ******* ******* ******.

Paper ***** *******

*** *** ****** ** * ********* ********** ******* ** * label ******. (*** ******* *****.) *** *********** ** *** ***** makes *** ******'* ******** ** ******* *****, *** *** ******* barcodes *** *********** *******/******** ****** *** ******* *** ****** ****.

*** '*********' ***** ***** ******* ****** ***** ******** *** ******* below:

Barcode *******

** *** ******* ******* ** ******* ****** **** ** ** enrolled ** ***** *******, *** ********** ******* ******** * ****** to **** *** ***** **** *********** ** ***** ******** ******* giving *** ****** *********** ********** ** *** ****** ********* *******.

D/L ** ** ******

** **** *******, ** ******* ** ********* ****** **** *** read ******* ** ******, **** ******'* ******** (*/*) ** ********** ****** ****** ***** (***) ******* ****** **** can ** ****** **** *** ******* ********** ******.

** **** *****, *** *********** ********* ** ***** *******/******** ** OCR'd ** ********* ************** *********** ** * ********* ******* **********.

System *****

** *******, *** **** ** * ******* ********** ****** ******** software, ********, *** ****** ***** **** ****** *** ***. ** some *****, ******* ********** *** ** * ******* (****) ******* of ** ****** ******, ** ***** ***** ** *** ** offered ** ** ***** ******, ** ** *** ** * 3rd ***** ***.

*** ****** ***** **** ** *** ***** ************* *** ***** of *********** **** ***** *******, *** **** **** ***** ***** about ~$*,*** - $**** *** ********** ******* ********* *** ********, licenses, *** ***********/********. **** ****** ********* *******:

  • ***'**********:*** **** ******** **** ******, *** **** ****** **** ~$****-$**** per ******* (********* *** *** ********). ***** ******* ** ***** of *********** **** ****** *******, ***** *******, *** ***** ********** programs (******* *****, ********) ** ******** ******** ******* **** ****** control.
  • ***** ************ '**********':**** ****** **** ***** ***** ******* ******* ~$***/*****, ** ** 'Enterprise' ********* ******* ****** ***** ******** ******* $*,*** *****'* *** integrates **** **** ****** ******* ******* ********* ****, *****, ***, Kantech, *****, ** ********, *** ******** ***** *-****.

***** ******* *** ********* ** ********** ** ******* ** *** or ************* ********** *******, *** *** ****** ***** ********** *** the ****.

************

*** ******** ***** * ******* ********** ******. **** ********** **** aggressive ****** ******* *** *** **** ** ********* ******* ********** beyond * ****-******* ********* ******. *******, *** ********* **** ***** to ******* **** **** ******* ********** *******:

  • ***** ******* ******: ***** ******* ******** ******** ******** ***** ***** ** *** task, * ******* ********** ****** *** **** **********. **** ********** data *****, ******** ***** '***-*******' *********, *** ****** ****** ******, sites *** ************* ***** ** *** ******* ** ******* ******** onsite ******* ******* ************ ***** ******** ********.
  • **** ********: ******** **** ****** * ******* ** ******* *** ********/******** of ***** ********** ****** ***** *** ******* ********** ** **** administration ** *** ****** ******, *** *** *** ********* ** badges ** ****** *** **** ** ************* ***** ****.
  • **** *********: **** ***** ******* ********* *********. ***********, *** ******* ****** may **** ** **** ***** ** ********* ** ** ******** onsite ** ** ******* ** ******** ********. ******* ********** ******* or ******* ***** *******.
  • ****** ********: ** **** *****, ******** *** ******** ******. ****** **** spending **** ***** ***** ******** ******** ********** ***********, ******* ********** retains *** *********** *** *** **** ********* ******** *** **** to ******* ***** ******** **** ***********.

[****: **** ***** *** ********** ******* ** ****, *** ************* updated ** ****.]

Comments (10)

Interesting subject matter Brian, the systems you mention can work standalone and/or be integrated into third party VMS/Access Control systems.

Do you plan to go further towards an evaluation/comparison/benefits of such integrations and also review the Visitor Management component that is part of other VMS/Access Control systems ?

RBH Access visitor management software are options to their access control platform. Prices vary depending on the number of client licenses one or five ($1K or $3K respectively MSRP). Ideal for facilities already using access control to leverage existing operators to manage incoming visitors.

Jolly system has a lot to be desired. They have changed the way they have done things in the past 6 months which have made it very hard to work with in terms of selling and supporting.

We used Jolly's LobbyTrack v. 6 for a couple of years and it worked pretty well for a single site. It was a bit more complex when a second one was added. Support was great and problems were resolved quickly. V. 6 was not compatible with Windows 10 and we were forced to upgrade v.8. The changes took an ok product to one that was unstable and fraught with problems with no workable solutions that could meet our needs for multiple locations. Features we frequently used were discontinued. Jolly wanted to charge us development costs to customize the new version to make v.8 work similarly to v.6. Some features were gone entirely. We are currently evaluating replacement solutions.

Interesting article. Would need high visitor volume to justify cost as you explained in the article. It would be fun to "play" with though!

OK Kudos to you People at IPVM!.. it doesn't pass a day when some customers concerns are not addressed or been addressed somewhere in IPVM.

This subject is more important today than ever before. There is a serious need to manage visitor and to very quickly verify if a person should be at a given location in any facility. Easy Lobby is a good solution but remain expensive IMO. The field is ripe for some new blood .. There aren't many and their solutions, that includes that of Jolly System is half-baked at best.

There is a lot of need in that sector and IME not correctly addressed. Would like to see more innovation in and of course, coverage of this sector.

I visited an account a few years ago that was using this exact system. It was a large orthopedic hospital.

EasyLobby Solo is a good system when not many bells and whistles are needed. We have deployed this at a customer site and they really like it. Is very good for replacing the usual pen and paper sign-in.

Here in Australia there is a company called RightCrowd which do visitor management, haven't sold it into a site yet but from what ive played around with it works well

it also integrates with Inner Range Integriti access control/intrusion system, which will get the visitor management system to dispense a access card with the relevant doors the visitor can access

most sites are too tight with money

I've done several installations of the Envoy system. Only hardware needed is an iPad and a badge printer. It is cloud based and very easy to set up and implement. Works great for organizations large and small. It has lots of nice features such as texting or emailing you a picture of the person who has checked in, invites with customizable texts, etc.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Integrator Laptop Guide on Oct 16, 2018
This 18-page guide provides guidance and statistics about integrator laptop use. 150 integrators explained to IPVM in detail about their laptops,...
Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
Door Hinges Guide on Oct 10, 2018
Some of the trickiest access control problems are caused by bad door hinges. From doors not closing right, to locks not locking, worn or warped...
Security System Health Monitoring Usage Statistics 2018 on Oct 09, 2018
How well and quickly do integrators know if devices are offline or broken? New IPVM statistics show that typically no health monitoring is...
IP Camera Installability Shootout - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision, Uniview, Vivotek on Oct 08, 2018
What are the best and worst cameras from an installation standpoint? Which manufacturers make it harder or easier to install their cameras? We...
UTC Merges Lenel and S2, Creates LenelS2 on Oct 03, 2018
UTC has completed the acquisition of S2, launching literally Lenel's2 LenelS2 with UTC declaring that "LenelS2 unites two world-class teams with...
Anti-Tailgating Startup: Spyfloor on Oct 03, 2018
A Canadian startup, Spyfloor, is using a different approach to warn against tailgating, a common access control problem. By counting feet,...
Network Cable Testing Guide on Oct 02, 2018
Proper cable installation is key to trouble-free surveillance systems. However, testing is often an afterthought, with problems only discovered...
VMS Mobile App Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone on Oct 01, 2018
Mobile VMS apps are a critical interface for the modern surveillance user. But who does it best and worst? We tested 6 manufacturers - Avigilon,...
Favorite Power Supply Manufacturer 2018 on Sep 28, 2018
While power supplies are becoming less important as PoE matures, they remain vital to access control systems, where increased power for locks,...

Most Recent Industry Reports

Knightscope Winning Investors, Struggling With Growth on Oct 16, 2018
While Knightscope's new financials show the company only winning 11 new customers in the past 12 months, the company continues to win new...
Integrator Laptop Guide on Oct 16, 2018
This 18-page guide provides guidance and statistics about integrator laptop use. 150 integrators explained to IPVM in detail about their laptops,...
Huawei Admits AI "Bubble" on Oct 16, 2018
A fascinating article from the Chinese government's Global Times: Huawei’s AI ambition to reshape industries. While the Global Times talks about...
ADI's Financials Revealed + W-Box Growth Priority on Oct 15, 2018
  ADI is one of the most powerful distributors in the security industry but how big are they? How much profit do they make? How much do they sell...
Amazon Touts Home Security Market Disruption on Oct 15, 2018
Amazon is coming for ADT and all of home security. Indeed, Amazon is advertising this as, in their own words, calling home security a: Inside...
Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
Mysterious Patent Troll 'Secure Cam' Targets Industry, Sues Hanwha, Hikvison, JCI, Panasonic, More on Oct 11, 2018
A company named "Secure Cam," who is actively hiding their ownership, has acquired a slew of video patents and is systematically suing video...
Unfixed Critical Vulnerability In Millions of XiongMai Devices Disclosed on Oct 10, 2018
XiongMai, one of the biggest OEMs alongside Dahua and Hikvision, has suffered a critical vulnerability impacting millions of their devices. This...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact