Getting the right identification procedure for the right person was an extremely cumbersome process, according to Phillip LeClair, security manager at Connecticut Children's . In addition, the medical center's search for a better security solution was accelerated by an incident, after which officials asked the hospital to better handle visitor badging.

   
Visitor management systems – standalone or integrated – can create IDs as well as capture individual data. Besides putting photo IDs on smartcards that use radio frequency technology to transmit information about the user wirelessly to readers, biometric information such as fingerprints and iris scans can be included to positively identify a user.

   
To determine whether the easiest credential to falsify – the visible photo – has been altered, the ID photo itself can be included in the chip on the smartcard.



A NECESSARY SOLUTION

Visitor management is an area that more end-users are beginning to find necessary. However, visitor management systems are not the same as employee access systems. From a simplistic point of view, it may seem that visitor management and badging systems have a lot in common and are almost one and the same, because it seems all they do is produce a badge, but there’s a lot more to it. Visitors’ badges must be produced much more quickly than employee badges, sometimes within 15 to 30 seconds.

   
Visitor management is more of a process management tool – it’s different from badging systems in key areas: One is that the key value of visitor management is the information it collects about the people, not just for a badge, but for all the information you need to form a security perspective about a person coming in. These include where the person is from, who is hosting him or her, whether they left on time and will return, whether they are foreign visitors, and much more. There are a lot of things you collect about visitors that go way beyond a typical badging system. Not just the name tag but having information about visitors now is of prime importance. The industry has been moving towards computerized or software-driven visitor management solutions in which the software links into a company’s access control systems, watch lists and other critical information.

   
End-users can create their own watch list for internal use of disgruntled ex-employees or a spouse that is having problems or link into government watch lists.

   
People want to be able to identify if someone is a suspicious person or threat. Additionally, businesses are beginning to link the visitor system to permanent employee software systems to help manage all of their traffic better.



BADGING INVOLVED

Visitor management is a really hot topic. Whether you print a physical badge or not is a separate issue. Most large enterprises do print a badge because once they’ve collected the information, they want to visually identify customers and clearly differentiate them from employees.

   
One new generation example is EasyLobby, which is an example of a software solution for electronic visitor management. A suite of products provides complete, fast and secure visitor registration and pre-registration, recordkeeping, reporting and badging. Visitors and contractors electronically scan their ID (license, business card, etc.), and all relevant information about them is automatically read and captured in a secure database file, including their photo and/or signature, the name of the person being visited, the reason for the visit, and their entry and exit times. In twenty seconds or less, the person is professionally checked in and a high quality visitor badge is printed.

   
The software module approach links to numerous traditional electronic access control and security management systems. At the same time, electronics access control systems offer visitor management, too.