Security directors and other managers of office buildings, residential complexes and healthcare facilities are challenged by the need to implement effective access control without unnecessarily inhibiting the movement of legitimate visitors and workers as they enter and exit a building during the course of a day.
Mobile technology has ushered in a new era of efficiency and advanced capabilities that are quickly rendering the traditional sign-in log an antiquated relic of the past.
Is That Really You?One of the biggest shortcomings of the ubiquitous sign-in sheet most of the world has used to monitor building entries up until now is that without a rigorous check of identification, there is no verifiable way to assure that the people signing their names are actually who they say they are.
However, quantifiable human characteristics, known as biometrics, are now being adapted to the world of building and site access integrity. Using this technology, security personnel are now able to determine with certainty the actual identities of everyone within the space being monitored.
Biometric applications are able to transcend the use of passwords and tie visitor identification to unchangeable personal attributes that greatly enhance the reliability of identification. These new technologies anchor visitor recognition to such things as:

Mobile fingerprint verifications, which can be employed with smartphones and scanners
Ocular iris recognition utilizing state-of-the-art matching algorithms
Face recognition capabilities added to surveillance cameras

In addition to these cutting edge tools for reinforcing visitor management security, other elements of physiology, behavior and chemistry are now beginning to be utilized to support biometric authentication networks. The ability to incorporate these applications into mobile technologies is bringing a whole new level of effectiveness to guest management.
Mobile Capture Devices In this day and age, security threats can be tied to facility entries of any kind including access to parking garages and lots. Mobile capture devices have been developed which can verify and track vehicle license plates, along with other metrics, to help create virtual perimeters.
When capture devices are incorporated into mobile technologies, they can be used at entry points, and throughout a facility, as a roving verification network that can be easily integrated into a facility’s access control system to form a seamless web of protection.
Used in conjunction with advanced printer systems, visitors and temporary workers can be issued time-stamped authorization permits that can be tracked through wireless mobile devices issued to security personnel. These data-capture devices record vital information such as:

Visitor names
ID numbers and type
Mobile phone number and location within the facility
Visitor destination
Make, model, license plate number and current location of all vehicles entering a facility

It’s easy to see that having such capabilities working in harmony with traditional security systems helps to establish an unprecedented level of security both at entry points and across a business campus.
Single Use Identifiers New elements of mobile surveillance technology have made it possible for a visitor’s own mobile device to be integrated into the generalized monitoring network. Now a facility manager can issue a one-time personal access code (PAC) or PIN to visitors and temporary workers to verify and track unique entries. Once assigned, the access code is transmitted via SMS to a visitor’s mobile device, which can then be used to enter the facility.
The PAC is funneled into the facility’s centralized security system which restricts visitor access to only the floors and offices designated by the host. Biometric and vehicle identifiers can also operate with the SMS messaging system to create a security tracking system that gives security personnel unprecedented capabilities to stop internal breaches once a visitor has entered the building—a capability unheard of until now!
The bottom line is that mobile technology has transformed the effectiveness and capacity of modern visitor management techniques, and helped meet the need for increased site security.Learn the steps leaders in the healthcare industry can undertake to create a culture of safety. Download “10 Things Healthcare Leaders Must Do to Create a Culture of Safety.”

hbspt.cta.load(343129, ‘121a2765-5c35-4e52-91f9-6add4204c190’, {});

Share This